Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Ivan Damgård
Perfectly Secure Oblivious RAM Without Random Oracles
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Constant-Overhead Secure Computation of Boolean Circuits Using Preprocessing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
SPD$$\mathbb {Z}_{2^k}$$: Efficient MPC Mod $$2^k$$ for Dishonest Majority
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
New Generation of Secure and Practical RSA-Based Signatures
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Amortized Complexity of Zero-Knowledge Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks
1
2
›