BibTeX records: Ronald Cramer

download as .bib file

@article{DBLP:journals/jms/SpiniMAAGFVHWLC22,
  author       = {Gabriele Spini and
                  Emiliano Mancini and
                  Thomas Attema and
                  Mark Abspoel and
                  Jan de Gier and
                  Serge Fehr and
                  Thijs Veugen and
                  Maran van Heesch and
                  Dani{\"{e}}l Worm and
                  Andrea De Luca and
                  Ronald Cramer and
                  Peter M. A. Sloot},
  title        = {New Approach to Privacy-Preserving Clinical Decision Support Systems
                  for {HIV} Treatment},
  journal      = {J. Medical Syst.},
  volume       = {46},
  number       = {12},
  pages        = {84},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10916-022-01851-x},
  doi          = {10.1007/S10916-022-01851-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/SpiniMAAGFVHWLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AttemaCCDE22,
  author       = {Thomas Attema and
                  Ignacio Cascudo and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Vector Commitments over Rings and Compressed {\textdollar}{\textbackslash}varSigma
                  {\textdollar}-Protocols},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {173--202},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_7},
  doi          = {10.1007/978-3-031-22318-1\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AttemaCCDE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaCCDE22,
  author       = {Thomas Attema and
                  Ignacio Cascudo and
                  Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Daniel Escudero},
  title        = {Vector Commitments over Rings and Compressed {\(\Sigma\)}-Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/181},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaCCDE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/CramerDW21,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Benjamin Wesolowski},
  title        = {Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial
                  Time},
  journal      = {J. {ACM}},
  volume       = {68},
  number       = {2},
  pages        = {8:1--8:26},
  year         = {2021},
  url          = {https://doi.org/10.1145/3431725},
  doi          = {10.1145/3431725},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/CramerDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbspoelCEDX21,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Daniel Escudero and
                  Ivan Damg{\aa}rd and
                  Chaoping Xing},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Improved Single-Round Secure Multiplication Using Regenerating Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {222--244},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_8},
  doi          = {10.1007/978-3-030-92075-3\_8},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbspoelCEDX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AttemaCR21,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Matthieu Rambaud},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocols
                  for Bilinear Group Arithmetic Circuits and Application to Logarithmic
                  Transparent Threshold Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {526--556},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_18},
  doi          = {10.1007/978-3-030-92068-5\_18},
  timestamp    = {Fri, 03 Dec 2021 17:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AttemaCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaCF21,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Serge Fehr},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Compressing Proofs of k-Out-Of-n Partial Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {65--91},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_3},
  doi          = {10.1007/978-3-030-84259-8\_3},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaCF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaCK21,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Lisa Kohl},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {A Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol
                  Theory for Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {549--579},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_19},
  doi          = {10.1007/978-3-030-84245-1\_19},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerRX21,
  author       = {Ronald Cramer and
                  Matthieu Rambaud and
                  Chaoping Xing},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Asymptotically-Good Arithmetic Secret Sharing over {\textdollar}{\textbackslash}mathbb
                  \{Z\}/p{\^{}}\{{\textbackslash}ell \}{\textbackslash}mathbb \{Z\}{\textdollar}
                  with Strong Multiplication and Its Applications to Efficient {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {656--686},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_22},
  doi          = {10.1007/978-3-030-84252-9\_22},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerRX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/AbspoelC021,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Daniel Escudero},
  title        = {Secure Computation over Integers Modulo Powers of Two},
  journal      = {{ERCIM} News},
  volume       = {2021},
  number       = {126},
  year         = {2021},
  url          = {https://ercim-news.ercim.eu/en126/special/secure-computation-over-integers-modulo-powers-of-two},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/AbspoelC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelC0DX21,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Daniel Escudero and
                  Ivan Damg{\aa}rd and
                  Chaoping Xing},
  title        = {Improved single-round secure multiplication using regenerating codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/253},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelC0DX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaCK21,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Lisa Kohl},
  title        = {A Compressed {\(\Sigma\)}-Protocol Theory for Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/307},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CramerXY20,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved
                  Codex},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {1},
  pages        = {263--272},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2019.2939135},
  doi          = {10.1109/TIT.2019.2939135},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CramerXY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbspoelCD0RX020,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Matthieu Rambaud and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications
                  to {MPC} over {\textdollar}{\textbackslash}mathbb \{Z\}/p{\^{}}k{\textbackslash}mathbb
                  \{Z\} {\textdollar}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {151--180},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_6},
  doi          = {10.1007/978-3-030-64840-4\_6},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbspoelCD0RX020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AttemaC20,
  author       = {Thomas Attema and
                  Ronald Cramer},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol
                  Theory and Practical Application to Plug {\&} Play Secure Algorithmics},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {513--543},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_18},
  doi          = {10.1007/978-3-030-56877-1\_18},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AttemaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerX20,
  author       = {Ronald Cramer and
                  Chaoping Xing},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Blackbox Secret Sharing Revisited: {A} Coding-Theoretic Approach with
                  Application to Expansionless Near-Threshold Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {499--528},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_18},
  doi          = {10.1007/978-3-030-45721-1\_18},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerX020,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {On the Complexity of Arithmetic Secret Sharing},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {444--469},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_16},
  doi          = {10.1007/978-3-030-64381-2\_16},
  timestamp    = {Tue, 15 Dec 2020 12:05:01 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerX020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaC20,
  author       = {Thomas Attema and
                  Ronald Cramer},
  title        = {Compressed {\(\Sigma\)}-Protocol Theory and Practical Application
                  to Plug {\&} Play Secure Algorithmics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaCF20,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Serge Fehr},
  title        = {Compressing Proofs of k-Out-Of-n Partial Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/753},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaCF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelCDERXY20,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Matthieu Rambaud and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications
                  to {MPC} over Z/p{\^{}}k {Z}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1256},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1256},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelCDERXY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaCR20,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Matthieu Rambaud},
  title        = {Compressed Sigma-Protocols for Bilinear Circuits and Applications
                  to Logarithmic-Sized Transparent Threshold Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1447},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1447},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbspoelCD0Y19,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Chen Yuan},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Efficient Information-Theoretic Secure Multiparty Computation over
                  Z/p\({}^{\mbox{k}}\)Z via Galois Rings},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {471--501},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_19},
  doi          = {10.1007/978-3-030-36030-6\_19},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AbspoelCD0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerRX19,
  author       = {Ronald Cramer and
                  Matthieu Rambaud and
                  Chaoping Xing},
  title        = {Asymptotically-Good Arithmetic Secret Sharing over Z/(p{\^{}}{\textbackslash}ell
                  {Z)} with Strong Multiplication and Its Applications to Efficient
                  {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerRX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelCDEY19,
  author       = {Mark Abspoel and
                  Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Chen Yuan},
  title        = {Efficient Information-Theoretic Secure Multiparty Computation over
                  {\(\mathbb{Z}\)}/p\({}^{\mbox{k}}\) {\(\mathbb{Z}\)} via Galois Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelCDEY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerX19,
  author       = {Ronald Cramer and
                  Chaoping Xing},
  title        = {Blackbox Secret Sharing Revisited: {A} Coding-Theoretic Approach with
                  Application to Expansionless Near-Threshold Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1134},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerXY19,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {On the Complexity of Arithmetic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1137},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttemaCX19,
  author       = {Thomas Attema and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {A note on short invertible ring elements and applications to cyclotomic
                  and trinomials number fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1200},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttemaCX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CascudoCXY18,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {395--426},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_14},
  doi          = {10.1007/978-3-319-96878-0\_14},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CascudoCXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDESX18,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Peter Scholl and
                  Chaoping Xing},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC}
                  mod 2\({}^{\mbox{k}}\) for Dishonest Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {769--798},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_26},
  doi          = {10.1007/978-3-319-96881-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDESX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-01107,
  author       = {Thomas Attema and
                  Emiliano Mancini and
                  Gabriele Spini and
                  Mark Abspoel and
                  Jan de Gier and
                  Serge Fehr and
                  Thijs Veugen and
                  Maran van Heesch and
                  Dani{\"{e}}l Worm and
                  Andrea De Luca and
                  Ronald Cramer and
                  Peter M. A. Sloot},
  title        = {A New Approach to Privacy-Preserving Clinical Decision Support Systems
                  for {HIV} Treatment},
  journal      = {CoRR},
  volume       = {abs/1810.01107},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.01107},
  eprinttype    = {arXiv},
  eprint       = {1810.01107},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-01107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoCXY18,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoCXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDESX18,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Peter Scholl and
                  Chaoping Xing},
  title        = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC}
                  mod 2\({}^{\mbox{k}}\) for Dishonest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDESX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDW17,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Benjamin Wesolowski},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Short Stickelberger Class Relations and Application to Ideal-SVP},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {324--348},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_12},
  doi          = {10.1007/978-3-319-56620-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDXY17,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Chaoping Xing and
                  Chen Yuan},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving
                  Linear Soundness Slack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {479--500},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_17},
  doi          = {10.1007/978-3-319-56620-7\_17},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDDGX17,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  editor       = {Junji Shikata},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_1},
  doi          = {10.1007/978-3-319-72089-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDPR16,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Chris Peikert and
                  Oded Regev},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {559--585},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_20},
  doi          = {10.1007/978-3-662-49896-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramerXY16,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {On Multi-Point Local Decoding of Reed-Muller Codes},
  journal      = {CoRR},
  volume       = {abs/1604.01925},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.01925},
  eprinttype    = {arXiv},
  eprint       = {1604.01925},
  timestamp    = {Sat, 25 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/CramerXY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/CramerXY16,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {On Multi-Point Local Decoding of Reed-Muller Codes},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR16-051}},
  year         = {2016},
  url          = {https://eccc.weizmann.ac.il/report/2016/051},
  eprinttype    = {ECCC},
  eprint       = {TR16-051},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/CramerXY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerXY16,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {On Multi-Point Local Decoding of Reed-Muller Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerXY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDGX16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving
                  Linear Soundness Slack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDW16,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Benjamin Wesolowski},
  title        = {Short Stickelberger Class Relations and application to Ideal-SVP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/885},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/cu/CDN2015,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Secure Multiparty Computation and Secret Sharing},
  publisher    = {Cambridge University Press},
  year         = {2015},
  url          = {http://www.cambridge.org/de/academic/subjects/computer-science/cryptography-cryptology-and-coding/secure-multiparty-computation-and-secret-sharing?format=HB\&\#38;isbn=9781107043053},
  isbn         = {9781107043053},
  timestamp    = {Sun, 21 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/cu/CDN2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/CascudoCMPX15,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Diego Mirandola and
                  Carles Padr{\'{o}} and
                  Chaoping Xing},
  title        = {On Secret Sharing with Nonlinear Product Reconstruction},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {29},
  number       = {2},
  pages        = {1114--1131},
  year         = {2015},
  url          = {https://doi.org/10.1137/130931886},
  doi          = {10.1137/130931886},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/CascudoCMPX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VeugenHCM15,
  author       = {Thijs Veugen and
                  Robbert de Haan and
                  Ronald Cramer and
                  Frank Muller},
  title        = {A Framework for Secure Computations With Two Non-Colluding Servers
                  and Multiple Clients, Applied to Recommendations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {445--457},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2370255},
  doi          = {10.1109/TIFS.2014.2370255},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VeugenHCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CascudoCMZ15,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Diego Mirandola and
                  Gilles Z{\'{e}}mor},
  title        = {Squares of Random Linear Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {3},
  pages        = {1159--1173},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2015.2393251},
  doi          = {10.1109/TIT.2015.2393251},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CascudoCMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {313--336},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_11},
  doi          = {10.1007/978-3-662-46803-6\_11},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerPX15,
  author       = {Ronald Cramer and
                  Carles Padr{\'{o}} and
                  Chaoping Xing},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Optimal Algebraic Manipulation Detection Codes in the Constant-Error
                  Model},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {481--501},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_20},
  doi          = {10.1007/978-3-662-46494-6\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerPX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramerX15,
  author       = {Ronald Cramer and
                  Chaoping Xing},
  title        = {An Improvement on the Hasse-Weil Bound and applications to Character
                  Sums, Cryptography and Coding},
  journal      = {CoRR},
  volume       = {abs/1505.01700},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.01700},
  eprinttype    = {arXiv},
  eprint       = {1505.01700},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CramerX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDPR15,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Chris Peikert and
                  Oded Regev},
  title        = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDK15,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Marcel Keller},
  title        = {On the Amortized Complexity of Zero-knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CramerDK14,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Marcel Keller},
  title        = {On the Amortized Complexity of Zero-Knowledge Protocols},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {2},
  pages        = {284--316},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9145-x},
  doi          = {10.1007/S00145-013-9145-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CramerDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CascudoCX14,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {7},
  pages        = {3871--3888},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2314099},
  doi          = {10.1109/TIT.2014.2314099},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CascudoCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CascudoCMZ14,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Diego Mirandola and
                  Gilles Z{\'{e}}mor},
  title        = {On powers of codes},
  journal      = {CoRR},
  volume       = {abs/1407.0848},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.0848},
  eprinttype    = {arXiv},
  eprint       = {1407.0848},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CascudoCMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerPX14,
  author       = {Ronald Cramer and
                  Carles Padr{\'{o}} and
                  Chaoping Xing},
  title        = {Optimal Algebraic Manipulation Detection Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerPX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoCX14,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoCMZ14,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Diego Mirandola and
                  Gilles Z{\'{e}}mor},
  title        = {On powers of codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoCMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PueyoCX13,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {Bounds on the Threshold Gap in Secret Sharing and its Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {59},
  number       = {9},
  pages        = {5600--5612},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIT.2013.2264504},
  doi          = {10.1109/TIT.2013.2264504},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PueyoCX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PueyoCMPX13,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Diego Mirandola and
                  Carles Padr{\'{o}} and
                  Chaoping Xing},
  title        = {On secret sharing with nonlinear product reconstruction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PueyoCMPX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PueyoCXY12,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing and
                  An Yang},
  title        = {Asymptotic Bound for Multiplication Complexity in the Extensions of
                  Small Finite Fields},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {7},
  pages        = {4930--4935},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2011.2180696},
  doi          = {10.1109/TIT.2011.2180696},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PueyoCXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDP12,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Valerio Pastro},
  editor       = {Adam D. Smith},
  title        = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative
                  Relations},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_4},
  doi          = {10.1007/978-3-642-32284-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/CascudoCX12,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {The arithmetic codex},
  booktitle    = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September
                  3-7, 2012},
  pages        = {75--79},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITW.2012.6404767},
  doi          = {10.1109/ITW.2012.6404767},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/CascudoCX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDKZZ12,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Eike Kiltz and
                  Sarah Zakarias and
                  Angela Zottarel},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {DDH-Like Assumptions Based on Extension Rings},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {644--661},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_38},
  doi          = {10.1007/978-3-642-30057-8\_38},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDKZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor       = {Ronald Cramer},
  title        = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9},
  doi          = {10.1007/978-3-642-28914-9},
  isbn         = {978-3-642-28913-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-2936,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications},
  journal      = {CoRR},
  volume       = {abs/1207.2936},
  year         = {2012},
  url          = {http://arxiv.org/abs/1207.2936},
  eprinttype    = {arXiv},
  eprint       = {1207.2936},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1207-2936.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PueyoCX12,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {Bounds on the Threshold Gap in Secret Sharing over Small Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PueyoCX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PueyoCX12a,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {The Arithmetic Codex},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PueyoCX12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PueyoCX11,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  editor       = {Phillip Rogaway},
  title        = {The Torsion-Limit for Algebraic Function Fields and Its Application
                  to Arithmetic Secret Sharing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {685--705},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_39},
  doi          = {10.1007/978-3-642-22792-9\_39},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PueyoCX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Cramer11,
  author       = {Ronald Cramer},
  editor       = {Kenneth G. Paterson},
  title        = {The Arithmetic Codex: Theory and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {1},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_1},
  doi          = {10.1007/978-3-642-20465-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Cramer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDKZZ11,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Eike Kiltz and
                  Sarah Zakarias and
                  Angela Zottarel},
  title        = {DDH-like Assumptions Based on Extension Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDKZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDP11,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Valerio Pastro},
  title        = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative
                  Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerHK10,
  author       = {Ronald Cramer and
                  Dennis Hofheinz and
                  Eike Kiltz},
  editor       = {Daniele Micciancio},
  title        = {A Twist on the Naor-Yung Paradigm and Its Application to Efficient
                  CCA-Secure Encryption from Hard Search Problems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {146--164},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_10},
  doi          = {10.1007/978-3-642-11799-2\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD09,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Shai Halevi},
  title        = {On the Amortized Complexity of Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_11},
  doi          = {10.1007/978-3-642-03356-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PueyoCCX09,
  author       = {Ignacio Cascudo Pueyo and
                  Hao Chen and
                  Ronald Cramer and
                  Chaoping Xing},
  editor       = {Shai Halevi},
  title        = {Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication
                  over \emph{Any} Fixed Finite Field},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {466--486},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_28},
  doi          = {10.1007/978-3-642-03356-8\_28},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PueyoCCX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerHK09,
  author       = {Ronald Cramer and
                  Dennis Hofheinz and
                  Eike Kiltz},
  title        = {Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CramerDGULMP08,
  author       = {Ronald Cramer and
                  Vanesa Daza and
                  Ignacio Gracia and
                  Jorge Jim{\'{e}}nez Urroz and
                  Gregor Leander and
                  Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {On Codes, Matroids, and Secure Multiparty Computation From Linear
                  Secret-Sharing Schemes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2644--2657},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921692},
  doi          = {10.1109/TIT.2008.921692},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/CramerDGULMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenCHP08,
  author       = {Hao Chen and
                  Ronald Cramer and
                  Robbert de Haan and
                  Ignacio Cascudo Pueyo},
  editor       = {Nigel P. Smart},
  title        = {Strongly Multiplicative Ramp Schemes from High Degree Rational Points
                  on Curves},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {451--470},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_26},
  doi          = {10.1007/978-3-540-78967-3\_26},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenCHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDFPW08,
  author       = {Ronald Cramer and
                  Yevgeniy Dodis and
                  Serge Fehr and
                  Carles Padr{\'{o}} and
                  Daniel Wichs},
  editor       = {Nigel P. Smart},
  title        = {Detection of Algebraic Manipulation with Applications to Robust Secret
                  Sharing and Fuzzy Extractors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {471--488},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_27},
  doi          = {10.1007/978-3-540-78967-3\_27},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDFPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7381,
  editor       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  title        = {Cryptography, 16.09. - 21.09.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07381},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/07381/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2008,
  editor       = {Ronald Cramer},
  title        = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1},
  doi          = {10.1007/978-3-540-78440-1},
  isbn         = {978-3-540-78439-5},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDFPW08,
  author       = {Ronald Cramer and
                  Yevgeniy Dodis and
                  Serge Fehr and
                  Carles Padr{\'{o}} and
                  Daniel Wichs},
  title        = {Detection of Algebraic Manipulation with Applications to Robust Secret
                  Sharing and Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDFPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CramerHHIKPSV07,
  author       = {Ronald Cramer and
                  Goichiro Hanaoka and
                  Dennis Hofheinz and
                  Hideki Imai and
                  Eike Kiltz and
                  Rafael Pass and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  editor       = {Kaoru Kurosawa},
  title        = {Bounded CCA2-Secure Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {502--518},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_31},
  doi          = {10.1007/978-3-540-76900-2\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CramerHHIKPSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerKP07,
  author       = {Ronald Cramer and
                  Eike Kiltz and
                  Carles Padr{\'{o}}},
  editor       = {Alfred Menezes},
  title        = {A Note on Secure Computation of the Moore-Penrose Pseudoinverse and
                  Its Application to Secure Linear Algebra},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {613--630},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_34},
  doi          = {10.1007/978-3-540-74143-5\_34},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenCGHV07,
  author       = {Hao Chen and
                  Ronald Cramer and
                  Shafi Goldwasser and
                  Robbert de Haan and
                  Vinod Vaikuntanathan},
  editor       = {Moni Naor},
  title        = {Secure Computation from Random Error Correcting Codes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {291--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_17},
  doi          = {10.1007/978-3-540-72540-4\_17},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenCGHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDH07,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Robbert de Haan},
  editor       = {Moni Naor},
  title        = {Atomic Secure Multi-party Multiplication with Low Communication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {329--346},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_19},
  doi          = {10.1007/978-3-540-72540-4\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07,
  author       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  editor       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  title        = {07381 Executive Summary - Cryptography},
  booktitle    = {Cryptography, 16.09. - 21.09.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07381},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1292},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BlomerBCM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07a,
  author       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  editor       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  title        = {07381 Abstracts Collection -- Cryptography},
  booktitle    = {Cryptography, 16.09. - 21.09.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07381},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1293},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BlomerBCM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgarwalCH06,
  author       = {Saurabh Agarwal and
                  Ronald Cramer and
                  Robbert de Haan},
  editor       = {Cynthia Dwork},
  title        = {Asymptotically Optimal Two-Round Perfectly Secure Message Transmission},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {394--408},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_24},
  doi          = {10.1007/11818175\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgarwalCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenC06,
  author       = {Hao Chen and
                  Ronald Cramer},
  editor       = {Cynthia Dwork},
  title        = {Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party
                  Computations over Small Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {521--536},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_31},
  doi          = {10.1007/11818175\_31},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerHK06,
  author       = {Ronald Cramer and
                  Dennis Hofheinz and
                  Eike Kiltz},
  title        = {A Note on Bounded Chosen Ciphertext Security from Black-box Semantical
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0018105,
  author       = {Dario Catalano and
                  Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Giovanni Di Crescenzo and
                  David Pointcheval},
  title        = {Contemporary cryptology},
  series       = {Advanced courses in mathematics : {CRM} Barcelona},
  publisher    = {Birkh{\"{a}}user},
  year         = {2005},
  isbn         = {978-3-7643-7294-1},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0018105.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDGULMP05,
  author       = {Ronald Cramer and
                  Vanesa Daza and
                  Ignacio Gracia and
                  Jorge Jim{\'{e}}nez Urroz and
                  Gregor Leander and
                  Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  editor       = {Victor Shoup},
  title        = {On Codes, Matroids and Secure Multi-party Computation from Linear
                  Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {327--343},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_20},
  doi          = {10.1007/11535218\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDGULMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerFS05,
  author       = {Ronald Cramer and
                  Serge Fehr and
                  Martijn Stam},
  editor       = {Victor Shoup},
  title        = {Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {344--360},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_21},
  doi          = {10.1007/11535218\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerFS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerDI05,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai},
  editor       = {Joe Kilian},
  title        = {Share Conversion, Pseudorandom Secret-Sharing and Applications to
                  Secure Computation},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {342--362},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_19},
  doi          = {10.1007/978-3-540-30576-7\_19},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerDI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2005,
  editor       = {Ronald Cramer},
  title        = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b136415},
  doi          = {10.1007/B136415},
  isbn         = {3-540-25910-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CramerD04,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Moni Naor},
  title        = {Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_13},
  doi          = {10.1007/978-3-540-24638-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CramerD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDGULMP04,
  author       = {Ronald Cramer and
                  Vanesa Daza and
                  Ignacio Gracia and
                  Jorge Jim{\'{e}}nez Urroz and
                  Gregor Leander and
                  Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {On codes, matroids and secure multi-party computation from linear
                  secret sharing schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDGULMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CramerS03,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Design and Analysis of Practical Public-Key Encryption Schemes Secure
                  against Adaptive Chosen Ciphertext Attack},
  journal      = {{SIAM} J. Comput.},
  volume       = {33},
  number       = {1},
  pages        = {167--226},
  year         = {2003},
  url          = {https://doi.org/10.1137/S0097539702403773},
  doi          = {10.1137/S0097539702403773},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CramerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerFIK03,
  author       = {Ronald Cramer and
                  Serge Fehr and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  editor       = {Eli Biham},
  title        = {Efficient Multi-party Computation over Rings},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {596--613},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_37},
  doi          = {10.1007/3-540-39200-9\_37},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerFIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerFIK03,
  author       = {Ronald Cramer and
                  Serge Fehr and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Efficient Multi-Party Computation over Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerFIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbeCF02,
  author       = {Masayuki Abe and
                  Ronald Cramer and
                  Serge Fehr},
  editor       = {Yuliang Zheng},
  title        = {Non-interactive Distributed-Verifier Proofs and Proving Relations
                  among Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_13},
  doi          = {10.1007/3-540-36178-2\_13},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbeCF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerF02,
  author       = {Ronald Cramer and
                  Serge Fehr},
  editor       = {Moti Yung},
  title        = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {272--287},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_18},
  doi          = {10.1007/3-540-45708-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerS02,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Lars R. Knudsen},
  title        = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_4},
  doi          = {10.1007/3-540-46035-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerF02,
  author       = {Ronald Cramer and
                  Serge Fehr},
  title        = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD01,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Joe Kilian},
  title        = {Secure Distributed Linear Algebra in a Constant Number of Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_7},
  doi          = {10.1007/3-540-44647-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDF01,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Serge Fehr},
  editor       = {Joe Kilian},
  title        = {On the Cost of Reconstructing a Secret, or {VSS} with Optimal Reconstruction
                  Phase},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {503--523},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_30},
  doi          = {10.1007/3-540-44647-8\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDN01,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  editor       = {Birgit Pfitzmann},
  title        = {Multiparty Computation from Threshold Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {280--299},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_18},
  doi          = {10.1007/3-540-44987-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-072,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR01-072}},
  year         = {2001},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-072/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR01-072},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR01-072.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS01,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS01a,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Design and Analysis of Practical Public-Key Encryption Schemes Secure
                  against Adaptive Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramerS00,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Signature schemes based on the strong {RSA} assumption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {161--185},
  year         = {2000},
  url          = {https://doi.org/10.1145/357830.357847},
  doi          = {10.1145/357830.357847},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CramerS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Ueli M. Maurer},
  editor       = {Bart Preneel},
  title        = {General Secure Multi-party Computation from any Linear Secret-Sharing
                  Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_22},
  doi          = {10.1007/3-540-45539-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {354--373},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_24},
  doi          = {10.1007/978-3-540-46588-1\_24},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CramerDD00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {On the complexity of verifiable secret sharing and multiparty computation},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {325--334},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335343},
  doi          = {10.1145/335305.335343},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/CramerDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Ueli Maurer},
  title        = {General Secure Multi-Party Computation from any Linear Secret Sharing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDD00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski},
  title        = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDM00a,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDM00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDN00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Multiparty Computation from Threshold Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CramerS99,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Signature Schemes Based on the Strong {RSA} Assumption},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {46--51},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319716},
  doi          = {10.1145/319709.319716},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CramerS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Martin Hirt and
                  Tal Rabin},
  editor       = {Jacques Stern},
  title        = {Efficient Multiparty Computations Secure Against an Adaptive Adversary},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {311--326},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_22},
  doi          = {10.1007/3-540-48910-X\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS99,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Signature Schemes Based on the Strong {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Cramer98,
  author       = {Ronald Cramer},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Introduction to Secure Computation},
  booktitle    = {Lectures on Data Security, Modern Cryptology in Theory and Practice,
                  Summer School, Aarhus, Denmark, July 1998},
  series       = {Lecture Notes in Computer Science},
  volume       = {1561},
  pages        = {16--62},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48969-X\_2},
  doi          = {10.1007/3-540-48969-X\_2},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Cramer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerS98,
  author       = {Ronald Cramer and
                  Victor Shoup},
  editor       = {Hugo Krawczyk},
  title        = {A Practical Public Key Cryptosystem Provably Secure Against Adaptive
                  Chosen Ciphertext Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055717},
  doi          = {10.1007/BFB0055717},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD98,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Hugo Krawczyk},
  title        = {Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge
                  be for Free?},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {424--441},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055745},
  doi          = {10.1007/BFB0055745},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS98,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {A Practical Public Key Cryptosystem Provably Secure against Adaptive
                  Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/CramerGS97,
  author       = {Ronald Cramer and
                  Rosario Gennaro and
                  Berry Schoenmakers},
  title        = {A secure and optimally efficient multi-authority election scheme},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {8},
  number       = {5},
  pages        = {481--490},
  year         = {1997},
  url          = {https://doi.org/10.1002/ett.4460080506},
  doi          = {10.1002/ETT.4460080506},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/CramerGS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerD97,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Walter Fumy},
  title        = {Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {75--87},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_7},
  doi          = {10.1007/3-540-69053-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerGS97,
  author       = {Ronald Cramer and
                  Rosario Gennaro and
                  Berry Schoenmakers},
  editor       = {Walter Fumy},
  title        = {A Secure and Optimally Efficient Multi-Authority Election Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_9},
  doi          = {10.1007/3-540-69053-0\_9},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerGS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CramerD97,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Frank Thomson Leighton and
                  Peter W. Shor},
  title        = {Linear Zero-Knowledge - {A} Note on Efficient Zero-Knowledge Proofs
                  and Arguments},
  booktitle    = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
                  of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages        = {436--445},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258533.258635},
  doi          = {10.1145/258533.258635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CramerD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramesD96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Neal Koblitz},
  title        = {New Generation of Secure and Practical RSA-Based Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {173--185},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_14},
  doi          = {10.1007/3-540-68697-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramesD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96,
  author       = {Ronald Cramer and
                  Matthew K. Franklin and
                  Berry Schoenmakers and
                  Moti Yung},
  editor       = {Ueli M. Maurer},
  title        = {Multi-Autority Secret-Ballot Elections with Linear Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_7},
  doi          = {10.1007/3-540-68339-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CramerDP96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Provable Security Amplifications},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_9},
  doi          = {10.1007/3-540-62494-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CramerDP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {On Monotone Function Closure of Statistical Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD96a,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {Linear Zero-Knowledge - {A} note on Efficient Zero-Knowledge Proofs
                  and Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerD95,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  editor       = {Don Coppersmith},
  title        = {Secure Signature Schemes based on Interactive Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {297--310},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_24},
  doi          = {10.1007/3-540-44750-4\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerD95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDS94,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Berry Schoenmakers},
  editor       = {Yvo Desmedt},
  title        = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding
                  Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {174--187},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_19},
  doi          = {10.1007/3-540-48658-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94,
  author       = {Jean{-}Paul Boly and
                  Antoon Bosselaers and
                  Ronald Cramer and
                  Rolf Michelsen and
                  Stig Fr. Mj{\o}lsnes and
                  Frank Muller and
                  Torben P. Pedersen and
                  Birgit Pfitzmann and
                  Peter de Rooij and
                  Berry Schoenmakers and
                  Matthias Schunter and
                  Luc Vall{\'{e}}e and
                  Michael Waidner},
  editor       = {Dieter Gollmann},
  title        = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_66},
  doi          = {10.1007/3-540-58618-0\_66},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BolyBCMMMPPRSSVW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerP93,
  author       = {Ronald Cramer and
                  Torben P. Pedersen},
  editor       = {Tor Helleseth},
  title        = {Improved Privacy in Wallets with Observers (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {329--343},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_29},
  doi          = {10.1007/3-540-48285-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics