Multiparty unconditionally secure protocols D Chaum, C Crépeau, I Damgard Proceedings of the twentieth annual ACM symposium on Theory of computing, 11-19, 1988 | 2343 | 1988 |
A design principle for hash functions IB Damgård Conference on the Theory and Application of Cryptology, 416-427, 1989 | 1781 | 1989 |
Multiparty computation from somewhat homomorphic encryption I Damgård, V Pastro, N Smart, S Zakarias Annual Cryptology Conference, 643-662, 2012 | 1586 | 2012 |
Proofs of partial knowledge and simplified design of witness hiding protocols R Cramer, I Damgård, B Schoenmakers Annual International Cryptology Conference, 174-187, 1994 | 1563 | 1994 |
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system I Damgård, M Jurik Public Key Cryptography: 4th International Workshop on Practice and Theory …, 2001 | 1524 | 2001 |
Multiparty computation from threshold homomorphic encryption R Cramer, I Damgård, JB Nielsen Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 828 | 2001 |
Secure multiparty computation R Cramer, IB Damgård Cambridge University Press, 2015 | 818 | 2015 |
Secure multiparty computation goes live P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ... International Conference on Financial Cryptography and Data Security, 325-343, 2009 | 784 | 2009 |
General secure multi-party computation from any linear secret-sharing scheme R Cramer, I Damgård, U Maurer International Conference on the Theory and Applications of Cryptographic …, 2000 | 758 | 2000 |
Practical covertly secure MPC for dishonest majority–or: breaking the SPDZ limits I Damgård, M Keller, E Larraia, V Pastro, P Scholl, NP Smart Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 620 | 2013 |
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft Theory of Cryptography Conference, 285-304, 2006 | 588 | 2006 |
Homomorphic encryption and secure comparison I Damgard, M Geisler, M Kroigard International Journal of Applied Cryptography 1 (1), 22-31, 2008 | 510* | 2008 |
Collision free hash functions and public key signature schemes IB Damgård Workshop on the Theory and Application of of Cryptographic Techniques, 203-216, 1987 | 499 | 1987 |
Towards practical public key systems secure against chosen ciphertext attacks I Damgård Advances in Cryptology—CRYPTO’91: Proceedings 11, 445-456, 1992 | 482 | 1992 |
Semi-homomorphic encryption and multiparty computation R Bendlin, I Damgård, C Orlandi, S Zakarias Annual International Conference on the Theory and Applications of …, 2011 | 452 | 2011 |
A statistically-hiding integer commitment scheme based on groups with hidden order I Damgård, E Fujisaki Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002 | 430 | 2002 |
Efficient concurrent zero-knowledge in the auxiliary string model I Damgård International Conference on the Theory and Applications of Cryptographic …, 2000 | 398 | 2000 |
Multiparty computations ensuring privacy of each party’s input and correctness of the result D Chaum, IB Damgård, J Van de Graaf Advances in Cryptology—CRYPTO’87: Proceedings 7, 87-119, 1988 | 360 | 1988 |
Scalable and unconditionally secure multiparty computation I Damgård, JB Nielsen Annual International Cryptology Conference, 572-590, 2007 | 356 | 2007 |
Share conversion, pseudorandom secret-sharing and applications to secure computation R Cramer, I Damgård, Y Ishai Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 332 | 2005 |