Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ronald Cramer
@article{DBLP:journals/jms/SpiniMAAGFVHWLC22, author = {Gabriele Spini and Emiliano Mancini and Thomas Attema and Mark Abspoel and Jan de Gier and Serge Fehr and Thijs Veugen and Maran van Heesch and Dani{\"{e}}l Worm and Andrea De Luca and Ronald Cramer and Peter M. A. Sloot}, title = {New Approach to Privacy-Preserving Clinical Decision Support Systems for {HIV} Treatment}, journal = {J. Medical Syst.}, volume = {46}, number = {12}, pages = {84}, year = {2022}, url = {https://doi.org/10.1007/s10916-022-01851-x}, doi = {10.1007/S10916-022-01851-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/SpiniMAAGFVHWLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AttemaCCDE22, author = {Thomas Attema and Ignacio Cascudo and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Vector Commitments over Rings and Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocols}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {173--202}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_7}, doi = {10.1007/978-3-031-22318-1\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AttemaCCDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaCCDE22, author = {Thomas Attema and Ignacio Cascudo and Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Daniel Escudero}, title = {Vector Commitments over Rings and Compressed {\(\Sigma\)}-Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2022}, url = {https://eprint.iacr.org/2022/181}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AttemaCCDE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/CramerDW21, author = {Ronald Cramer and L{\'{e}}o Ducas and Benjamin Wesolowski}, title = {Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time}, journal = {J. {ACM}}, volume = {68}, number = {2}, pages = {8:1--8:26}, year = {2021}, url = {https://doi.org/10.1145/3431725}, doi = {10.1145/3431725}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/CramerDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbspoelCEDX21, author = {Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damg{\aa}rd and Chaoping Xing}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Improved Single-Round Secure Multiplication Using Regenerating Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {222--244}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_8}, doi = {10.1007/978-3-030-92075-3\_8}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbspoelCEDX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AttemaCR21, author = {Thomas Attema and Ronald Cramer and Matthieu Rambaud}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {526--556}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_18}, doi = {10.1007/978-3-030-92068-5\_18}, timestamp = {Fri, 03 Dec 2021 17:36:41 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AttemaCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaCF21, author = {Thomas Attema and Ronald Cramer and Serge Fehr}, editor = {Tal Malkin and Chris Peikert}, title = {Compressing Proofs of k-Out-Of-n Partial Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {65--91}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_3}, doi = {10.1007/978-3-030-84259-8\_3}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaCF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaCK21, author = {Thomas Attema and Ronald Cramer and Lisa Kohl}, editor = {Tal Malkin and Chris Peikert}, title = {A Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol Theory for Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {549--579}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_19}, doi = {10.1007/978-3-030-84245-1\_19}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerRX21, author = {Ronald Cramer and Matthieu Rambaud and Chaoping Xing}, editor = {Tal Malkin and Chris Peikert}, title = {Asymptotically-Good Arithmetic Secret Sharing over {\textdollar}{\textbackslash}mathbb \{Z\}/p{\^{}}\{{\textbackslash}ell \}{\textbackslash}mathbb \{Z\}{\textdollar} with Strong Multiplication and Its Applications to Efficient {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {656--686}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_22}, doi = {10.1007/978-3-030-84252-9\_22}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerRX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/AbspoelC021, author = {Mark Abspoel and Ronald Cramer and Daniel Escudero}, title = {Secure Computation over Integers Modulo Powers of Two}, journal = {{ERCIM} News}, volume = {2021}, number = {126}, year = {2021}, url = {https://ercim-news.ercim.eu/en126/special/secure-computation-over-integers-modulo-powers-of-two}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/AbspoelC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelC0DX21, author = {Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damg{\aa}rd and Chaoping Xing}, title = {Improved single-round secure multiplication using regenerating codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2021}, url = {https://eprint.iacr.org/2021/253}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelC0DX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaCK21, author = {Thomas Attema and Ronald Cramer and Lisa Kohl}, title = {A Compressed {\(\Sigma\)}-Protocol Theory for Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2021}, url = {https://eprint.iacr.org/2021/307}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttemaCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CramerXY20, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {1}, pages = {263--272}, year = {2020}, url = {https://doi.org/10.1109/TIT.2019.2939135}, doi = {10.1109/TIT.2019.2939135}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CramerXY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbspoelCD0RX020, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications to {MPC} over {\textdollar}{\textbackslash}mathbb \{Z\}/p{\^{}}k{\textbackslash}mathbb \{Z\} {\textdollar}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {151--180}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_6}, doi = {10.1007/978-3-030-64840-4\_6}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbspoelCD0RX020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AttemaC20, author = {Thomas Attema and Ronald Cramer}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Compressed {\textdollar}{\textbackslash}varSigma {\textdollar}-Protocol Theory and Practical Application to Plug {\&} Play Secure Algorithmics}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {513--543}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_18}, doi = {10.1007/978-3-030-56877-1\_18}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AttemaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerX20, author = {Ronald Cramer and Chaoping Xing}, editor = {Anne Canteaut and Yuval Ishai}, title = {Blackbox Secret Sharing Revisited: {A} Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {499--528}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_18}, doi = {10.1007/978-3-030-45721-1\_18}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerX020, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On the Complexity of Arithmetic Secret Sharing}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {444--469}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_16}, doi = {10.1007/978-3-030-64381-2\_16}, timestamp = {Tue, 15 Dec 2020 12:05:01 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CramerX020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaC20, author = {Thomas Attema and Ronald Cramer}, title = {Compressed {\(\Sigma\)}-Protocol Theory and Practical Application to Plug {\&} Play Secure Algorithmics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2020}, url = {https://eprint.iacr.org/2020/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttemaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaCF20, author = {Thomas Attema and Ronald Cramer and Serge Fehr}, title = {Compressing Proofs of k-Out-Of-n Partial Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2020}, url = {https://eprint.iacr.org/2020/753}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttemaCF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelCDERXY20, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan}, title = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications to {MPC} over Z/p{\^{}}k {Z}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1256}, year = {2020}, url = {https://eprint.iacr.org/2020/1256}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelCDERXY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaCR20, author = {Thomas Attema and Ronald Cramer and Matthieu Rambaud}, title = {Compressed Sigma-Protocols for Bilinear Circuits and Applications to Logarithmic-Sized Transparent Threshold Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1447}, year = {2020}, url = {https://eprint.iacr.org/2020/1447}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AttemaCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AbspoelCD0Y19, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Chen Yuan}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Efficient Information-Theoretic Secure Multiparty Computation over Z/p\({}^{\mbox{k}}\)Z via Galois Rings}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {471--501}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_19}, doi = {10.1007/978-3-030-36030-6\_19}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AbspoelCD0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerRX19, author = {Ronald Cramer and Matthieu Rambaud and Chaoping Xing}, title = {Asymptotically-Good Arithmetic Secret Sharing over Z/(p{\^{}}{\textbackslash}ell {Z)} with Strong Multiplication and Its Applications to Efficient {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {832}, year = {2019}, url = {https://eprint.iacr.org/2019/832}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerRX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelCDEY19, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Chen Yuan}, title = {Efficient Information-Theoretic Secure Multiparty Computation over {\(\mathbb{Z}\)}/p\({}^{\mbox{k}}\) {\(\mathbb{Z}\)} via Galois Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2019}, url = {https://eprint.iacr.org/2019/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelCDEY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerX19, author = {Ronald Cramer and Chaoping Xing}, title = {Blackbox Secret Sharing Revisited: {A} Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1134}, year = {2019}, url = {https://eprint.iacr.org/2019/1134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerXY19, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {On the Complexity of Arithmetic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1137}, year = {2019}, url = {https://eprint.iacr.org/2019/1137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttemaCX19, author = {Thomas Attema and Ronald Cramer and Chaoping Xing}, title = {A note on short invertible ring elements and applications to cyclotomic and trinomials number fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1200}, year = {2019}, url = {https://eprint.iacr.org/2019/1200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttemaCX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CascudoCXY18, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {395--426}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_14}, doi = {10.1007/978-3-319-96878-0\_14}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CascudoCXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDESX18, author = {Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Peter Scholl and Chaoping Xing}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC} mod 2\({}^{\mbox{k}}\) for Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {769--798}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_26}, doi = {10.1007/978-3-319-96881-0\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDESX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-01107, author = {Thomas Attema and Emiliano Mancini and Gabriele Spini and Mark Abspoel and Jan de Gier and Serge Fehr and Thijs Veugen and Maran van Heesch and Dani{\"{e}}l Worm and Andrea De Luca and Ronald Cramer and Peter M. A. Sloot}, title = {A New Approach to Privacy-Preserving Clinical Decision Support Systems for {HIV} Treatment}, journal = {CoRR}, volume = {abs/1810.01107}, year = {2018}, url = {http://arxiv.org/abs/1810.01107}, eprinttype = {arXiv}, eprint = {1810.01107}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-01107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoCXY18, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2018}, url = {https://eprint.iacr.org/2018/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoCXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDESX18, author = {Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Peter Scholl and Chaoping Xing}, title = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC} mod 2\({}^{\mbox{k}}\) for Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2018}, url = {https://eprint.iacr.org/2018/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDESX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDW17, author = {Ronald Cramer and L{\'{e}}o Ducas and Benjamin Wesolowski}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Short Stickelberger Class Relations and Application to Ideal-SVP}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {324--348}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_12}, doi = {10.1007/978-3-319-56620-7\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDXY17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Chaoping Xing and Chen Yuan}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {479--500}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_17}, doi = {10.1007/978-3-319-56620-7\_17}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDDGX17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, editor = {Junji Shikata}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {1--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_1}, doi = {10.1007/978-3-319-72089-0\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDPR16, author = {Ronald Cramer and L{\'{e}}o Ducas and Chris Peikert and Oded Regev}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {559--585}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_20}, doi = {10.1007/978-3-662-49896-5\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CramerXY16, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {On Multi-Point Local Decoding of Reed-Muller Codes}, journal = {CoRR}, volume = {abs/1604.01925}, year = {2016}, url = {http://arxiv.org/abs/1604.01925}, eprinttype = {arXiv}, eprint = {1604.01925}, timestamp = {Sat, 25 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/CramerXY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/CramerXY16, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {On Multi-Point Local Decoding of Reed-Muller Codes}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR16-051}}, year = {2016}, url = {https://eccc.weizmann.ac.il/report/2016/051}, eprinttype = {ECCC}, eprint = {TR16-051}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/CramerXY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerXY16, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {On Multi-Point Local Decoding of Reed-Muller Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2016}, url = {http://eprint.iacr.org/2016/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerXY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDGX16, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2016}, url = {http://eprint.iacr.org/2016/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD16, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2016}, url = {http://eprint.iacr.org/2016/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDW16, author = {Ronald Cramer and L{\'{e}}o Ducas and Benjamin Wesolowski}, title = {Short Stickelberger Class Relations and application to Ideal-SVP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2016}, url = {http://eprint.iacr.org/2016/885}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/cu/CDN2015, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Secure Multiparty Computation and Secret Sharing}, publisher = {Cambridge University Press}, year = {2015}, url = {http://www.cambridge.org/de/academic/subjects/computer-science/cryptography-cryptology-and-coding/secure-multiparty-computation-and-secret-sharing?format=HB\&\#38;isbn=9781107043053}, isbn = {9781107043053}, timestamp = {Sun, 21 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/cu/CDN2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/CascudoCMPX15, author = {Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padr{\'{o}} and Chaoping Xing}, title = {On Secret Sharing with Nonlinear Product Reconstruction}, journal = {{SIAM} J. Discret. Math.}, volume = {29}, number = {2}, pages = {1114--1131}, year = {2015}, url = {https://doi.org/10.1137/130931886}, doi = {10.1137/130931886}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/CascudoCMPX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VeugenHCM15, author = {Thijs Veugen and Robbert de Haan and Ronald Cramer and Frank Muller}, title = {A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {445--457}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2370255}, doi = {10.1109/TIFS.2014.2370255}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VeugenHCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CascudoCMZ15, author = {Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z{\'{e}}mor}, title = {Squares of Random Linear Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {3}, pages = {1159--1173}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2393251}, doi = {10.1109/TIT.2015.2393251}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CascudoCMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {313--336}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_11}, doi = {10.1007/978-3-662-46803-6\_11}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerPX15, author = {Ronald Cramer and Carles Padr{\'{o}} and Chaoping Xing}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {481--501}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_20}, doi = {10.1007/978-3-662-46494-6\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerPX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CramerX15, author = {Ronald Cramer and Chaoping Xing}, title = {An Improvement on the Hasse-Weil Bound and applications to Character Sums, Cryptography and Coding}, journal = {CoRR}, volume = {abs/1505.01700}, year = {2015}, url = {http://arxiv.org/abs/1505.01700}, eprinttype = {arXiv}, eprint = {1505.01700}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CramerX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDPR15, author = {Ronald Cramer and L{\'{e}}o Ducas and Chris Peikert and Oded Regev}, title = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2015}, url = {http://eprint.iacr.org/2015/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDK15, author = {Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller}, title = {On the Amortized Complexity of Zero-knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2015}, url = {http://eprint.iacr.org/2015/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2015}, url = {http://eprint.iacr.org/2015/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CramerDK14, author = {Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller}, title = {On the Amortized Complexity of Zero-Knowledge Protocols}, journal = {J. Cryptol.}, volume = {27}, number = {2}, pages = {284--316}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9145-x}, doi = {10.1007/S00145-013-9145-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CramerDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CascudoCX14, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing}, title = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {7}, pages = {3871--3888}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2314099}, doi = {10.1109/TIT.2014.2314099}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CascudoCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CascudoCMZ14, author = {Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z{\'{e}}mor}, title = {On powers of codes}, journal = {CoRR}, volume = {abs/1407.0848}, year = {2014}, url = {http://arxiv.org/abs/1407.0848}, eprinttype = {arXiv}, eprint = {1407.0848}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CascudoCMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerPX14, author = {Ronald Cramer and Carles Padr{\'{o}} and Chaoping Xing}, title = {Optimal Algebraic Manipulation Detection Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2014}, url = {http://eprint.iacr.org/2014/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerPX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoCX14, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing}, title = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2014}, url = {http://eprint.iacr.org/2014/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoCMZ14, author = {Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z{\'{e}}mor}, title = {On powers of codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2014}, url = {http://eprint.iacr.org/2014/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoCMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PueyoCX13, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, title = {Bounds on the Threshold Gap in Secret Sharing and its Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {59}, number = {9}, pages = {5600--5612}, year = {2013}, url = {https://doi.org/10.1109/TIT.2013.2264504}, doi = {10.1109/TIT.2013.2264504}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PueyoCX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PueyoCMPX13, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Diego Mirandola and Carles Padr{\'{o}} and Chaoping Xing}, title = {On secret sharing with nonlinear product reconstruction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2013}, url = {http://eprint.iacr.org/2013/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PueyoCMPX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PueyoCXY12, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing and An Yang}, title = {Asymptotic Bound for Multiplication Complexity in the Extensions of Small Finite Fields}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {7}, pages = {4930--4935}, year = {2012}, url = {https://doi.org/10.1109/TIT.2011.2180696}, doi = {10.1109/TIT.2011.2180696}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PueyoCXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDP12, author = {Ronald Cramer and Ivan Damg{\aa}rd and Valerio Pastro}, editor = {Adam D. Smith}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {62--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_4}, doi = {10.1007/978-3-642-32284-6\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CramerDP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/CascudoCX12, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing}, title = {The arithmetic codex}, booktitle = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September 3-7, 2012}, pages = {75--79}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ITW.2012.6404767}, doi = {10.1109/ITW.2012.6404767}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/CascudoCX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDKZZ12, author = {Ronald Cramer and Ivan Damg{\aa}rd and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {DDH-Like Assumptions Based on Extension Rings}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {644--661}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_38}, doi = {10.1007/978-3-642-30057-8\_38}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CramerDKZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2012, editor = {Ronald Cramer}, title = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9}, doi = {10.1007/978-3-642-28914-9}, isbn = {978-3-642-28913-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1207-2936, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, title = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications}, journal = {CoRR}, volume = {abs/1207.2936}, year = {2012}, url = {http://arxiv.org/abs/1207.2936}, eprinttype = {arXiv}, eprint = {1207.2936}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1207-2936.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PueyoCX12, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, title = {Bounds on the Threshold Gap in Secret Sharing over Small Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2012}, url = {http://eprint.iacr.org/2012/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PueyoCX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PueyoCX12a, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, title = {The Arithmetic Codex}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2012}, url = {http://eprint.iacr.org/2012/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PueyoCX12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PueyoCX11, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, editor = {Phillip Rogaway}, title = {The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {685--705}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_39}, doi = {10.1007/978-3-642-22792-9\_39}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PueyoCX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Cramer11, author = {Ronald Cramer}, editor = {Kenneth G. Paterson}, title = {The Arithmetic Codex: Theory and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {1}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_1}, doi = {10.1007/978-3-642-20465-4\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Cramer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDKZZ11, author = {Ronald Cramer and Ivan Damg{\aa}rd and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, title = {DDH-like Assumptions Based on Extension Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2011}, url = {http://eprint.iacr.org/2011/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDKZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDP11, author = {Ronald Cramer and Ivan Damg{\aa}rd and Valerio Pastro}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2011}, url = {http://eprint.iacr.org/2011/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerHK10, author = {Ronald Cramer and Dennis Hofheinz and Eike Kiltz}, editor = {Daniele Micciancio}, title = {A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {146--164}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_10}, doi = {10.1007/978-3-642-11799-2\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD09, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Shai Halevi}, title = {On the Amortized Complexity of Zero-Knowledge Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {177--191}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_11}, doi = {10.1007/978-3-642-03356-8\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PueyoCCX09, author = {Ignacio Cascudo Pueyo and Hao Chen and Ronald Cramer and Chaoping Xing}, editor = {Shai Halevi}, title = {Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over \emph{Any} Fixed Finite Field}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {466--486}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_28}, doi = {10.1007/978-3-642-03356-8\_28}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PueyoCCX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerHK09, author = {Ronald Cramer and Dennis Hofheinz and Eike Kiltz}, title = {Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2009}, url = {http://eprint.iacr.org/2009/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CramerDGULMP08, author = {Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jim{\'{e}}nez Urroz and Gregor Leander and Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, title = {On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2644--2657}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921692}, doi = {10.1109/TIT.2008.921692}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CramerDGULMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenCHP08, author = {Hao Chen and Ronald Cramer and Robbert de Haan and Ignacio Cascudo Pueyo}, editor = {Nigel P. Smart}, title = {Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {451--470}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_26}, doi = {10.1007/978-3-540-78967-3\_26}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenCHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDFPW08, author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr{\'{o}} and Daniel Wichs}, editor = {Nigel P. Smart}, title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {471--488}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_27}, doi = {10.1007/978-3-540-78967-3\_27}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDFPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7381, editor = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, title = {Cryptography, 16.09. - 21.09.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07381}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/07381/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2008, editor = {Ronald Cramer}, title = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1}, doi = {10.1007/978-3-540-78440-1}, isbn = {978-3-540-78439-5}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDFPW08, author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr{\'{o}} and Daniel Wichs}, title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2008}, url = {http://eprint.iacr.org/2008/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDFPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CramerHHIKPSV07, author = {Ronald Cramer and Goichiro Hanaoka and Dennis Hofheinz and Hideki Imai and Eike Kiltz and Rafael Pass and Abhi Shelat and Vinod Vaikuntanathan}, editor = {Kaoru Kurosawa}, title = {Bounded CCA2-Secure Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {502--518}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_31}, doi = {10.1007/978-3-540-76900-2\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CramerHHIKPSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerKP07, author = {Ronald Cramer and Eike Kiltz and Carles Padr{\'{o}}}, editor = {Alfred Menezes}, title = {A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {613--630}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_34}, doi = {10.1007/978-3-540-74143-5\_34}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenCGHV07, author = {Hao Chen and Ronald Cramer and Shafi Goldwasser and Robbert de Haan and Vinod Vaikuntanathan}, editor = {Moni Naor}, title = {Secure Computation from Random Error Correcting Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {291--310}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_17}, doi = {10.1007/978-3-540-72540-4\_17}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenCGHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDH07, author = {Ronald Cramer and Ivan Damg{\aa}rd and Robbert de Haan}, editor = {Moni Naor}, title = {Atomic Secure Multi-party Multiplication with Low Communication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {329--346}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_19}, doi = {10.1007/978-3-540-72540-4\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07, author = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, editor = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, title = {07381 Executive Summary - Cryptography}, booktitle = {Cryptography, 16.09. - 21.09.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07381}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1292}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BlomerBCM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07a, author = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, editor = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, title = {07381 Abstracts Collection -- Cryptography}, booktitle = {Cryptography, 16.09. - 21.09.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07381}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1293}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BlomerBCM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgarwalCH06, author = {Saurabh Agarwal and Ronald Cramer and Robbert de Haan}, editor = {Cynthia Dwork}, title = {Asymptotically Optimal Two-Round Perfectly Secure Message Transmission}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {394--408}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_24}, doi = {10.1007/11818175\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgarwalCH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenC06, author = {Hao Chen and Ronald Cramer}, editor = {Cynthia Dwork}, title = {Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {521--536}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_31}, doi = {10.1007/11818175\_31}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerHK06, author = {Ronald Cramer and Dennis Hofheinz and Eike Kiltz}, title = {A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2006}, url = {http://eprint.iacr.org/2006/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0018105, author = {Dario Catalano and Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Giovanni Di Crescenzo and David Pointcheval}, title = {Contemporary cryptology}, series = {Advanced courses in mathematics : {CRM} Barcelona}, publisher = {Birkh{\"{a}}user}, year = {2005}, isbn = {978-3-7643-7294-1}, timestamp = {Fri, 12 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0018105.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDGULMP05, author = {Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jim{\'{e}}nez Urroz and Gregor Leander and Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, editor = {Victor Shoup}, title = {On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {327--343}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_20}, doi = {10.1007/11535218\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDGULMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerFS05, author = {Ronald Cramer and Serge Fehr and Martijn Stam}, editor = {Victor Shoup}, title = {Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {344--360}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_21}, doi = {10.1007/11535218\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerFS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerDI05, author = {Ronald Cramer and Ivan Damg{\aa}rd and Yuval Ishai}, editor = {Joe Kilian}, title = {Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {342--362}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_19}, doi = {10.1007/978-3-540-30576-7\_19}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerDI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2005, editor = {Ronald Cramer}, title = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b136415}, doi = {10.1007/B136415}, isbn = {3-540-25910-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CramerD04, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Moni Naor}, title = {Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {223--237}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_13}, doi = {10.1007/978-3-540-24638-1\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CramerD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDGULMP04, author = {Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jim{\'{e}}nez Urroz and Gregor Leander and Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, title = {On codes, matroids and secure multi-party computation from linear secret sharing schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2004}, url = {http://eprint.iacr.org/2004/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDGULMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/CramerS03, author = {Ronald Cramer and Victor Shoup}, title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack}, journal = {{SIAM} J. Comput.}, volume = {33}, number = {1}, pages = {167--226}, year = {2003}, url = {https://doi.org/10.1137/S0097539702403773}, doi = {10.1137/S0097539702403773}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/CramerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerFIK03, author = {Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz}, editor = {Eli Biham}, title = {Efficient Multi-party Computation over Rings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {596--613}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_37}, doi = {10.1007/3-540-39200-9\_37}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerFIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerFIK03, author = {Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz}, title = {Efficient Multi-Party Computation over Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2003}, url = {http://eprint.iacr.org/2003/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerFIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbeCF02, author = {Masayuki Abe and Ronald Cramer and Serge Fehr}, editor = {Yuliang Zheng}, title = {Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {206--223}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_13}, doi = {10.1007/3-540-36178-2\_13}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbeCF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerF02, author = {Ronald Cramer and Serge Fehr}, editor = {Moti Yung}, title = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {272--287}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_18}, doi = {10.1007/3-540-45708-9\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerS02, author = {Ronald Cramer and Victor Shoup}, editor = {Lars R. Knudsen}, title = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {45--64}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_4}, doi = {10.1007/3-540-46035-7\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerF02, author = {Ronald Cramer and Serge Fehr}, title = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2002}, url = {http://eprint.iacr.org/2002/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD01, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Joe Kilian}, title = {Secure Distributed Linear Algebra in a Constant Number of Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {119--136}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_7}, doi = {10.1007/3-540-44647-8\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDF01, author = {Ronald Cramer and Ivan Damg{\aa}rd and Serge Fehr}, editor = {Joe Kilian}, title = {On the Cost of Reconstructing a Secret, or {VSS} with Optimal Reconstruction Phase}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {503--523}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_30}, doi = {10.1007/3-540-44647-8\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDN01, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, editor = {Birgit Pfitzmann}, title = {Multiparty Computation from Threshold Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {280--299}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_18}, doi = {10.1007/3-540-44987-6\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR01-072, author = {Ronald Cramer and Victor Shoup}, title = {Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR01-072}}, year = {2001}, url = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-072/index.html}, eprinttype = {ECCC}, eprint = {TR01-072}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR01-072.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS01, author = {Ronald Cramer and Victor Shoup}, title = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2001}, url = {http://eprint.iacr.org/2001/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS01a, author = {Ronald Cramer and Victor Shoup}, title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2001}, url = {http://eprint.iacr.org/2001/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CramerS00, author = {Ronald Cramer and Victor Shoup}, title = {Signature schemes based on the strong {RSA} assumption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {3}, pages = {161--185}, year = {2000}, url = {https://doi.org/10.1145/357830.357847}, doi = {10.1145/357830.357847}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CramerS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli M. Maurer}, editor = {Bart Preneel}, title = {General Secure Multi-party Computation from any Linear Secret-Sharing Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {316--334}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_22}, doi = {10.1007/3-540-45539-6\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {354--373}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_24}, doi = {10.1007/978-3-540-46588-1\_24}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CramerDD00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski}, editor = {F. Frances Yao and Eugene M. Luks}, title = {On the complexity of verifiable secret sharing and multiparty computation}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {325--334}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335343}, doi = {10.1145/335305.335343}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CramerDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer}, title = {General Secure Multi-Party Computation from any Linear Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2000}, url = {http://eprint.iacr.org/2000/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDD00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski}, title = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2000}, url = {http://eprint.iacr.org/2000/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDM00a, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2000}, url = {http://eprint.iacr.org/2000/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDM00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDN00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Multiparty Computation from Threshold Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2000}, url = {http://eprint.iacr.org/2000/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CramerS99, author = {Ronald Cramer and Victor Shoup}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {Signature Schemes Based on the Strong {RSA} Assumption}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {46--51}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319716}, doi = {10.1145/319709.319716}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CramerS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski and Martin Hirt and Tal Rabin}, editor = {Jacques Stern}, title = {Efficient Multiparty Computations Secure Against an Adaptive Adversary}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {311--326}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_22}, doi = {10.1007/3-540-48910-X\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS99, author = {Ronald Cramer and Victor Shoup}, title = {Signature Schemes Based on the Strong {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {1999}, url = {http://eprint.iacr.org/1999/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Cramer98, author = {Ronald Cramer}, editor = {Ivan Damg{\aa}rd}, title = {Introduction to Secure Computation}, booktitle = {Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998}, series = {Lecture Notes in Computer Science}, volume = {1561}, pages = {16--62}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48969-X\_2}, doi = {10.1007/3-540-48969-X\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Cramer98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerS98, author = {Ronald Cramer and Victor Shoup}, editor = {Hugo Krawczyk}, title = {A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {13--25}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055717}, doi = {10.1007/BFB0055717}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD98, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Hugo Krawczyk}, title = {Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {424--441}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055745}, doi = {10.1007/BFB0055745}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS98, author = {Ronald Cramer and Victor Shoup}, title = {A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {1998}, url = {http://eprint.iacr.org/1998/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/CramerGS97, author = {Ronald Cramer and Rosario Gennaro and Berry Schoenmakers}, title = {A secure and optimally efficient multi-authority election scheme}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {481--490}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080506}, doi = {10.1002/ETT.4460080506}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/CramerGS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerD97, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Walter Fumy}, title = {Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {75--87}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_7}, doi = {10.1007/3-540-69053-0\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerGS97, author = {Ronald Cramer and Rosario Gennaro and Berry Schoenmakers}, editor = {Walter Fumy}, title = {A Secure and Optimally Efficient Multi-Authority Election Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {103--118}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_9}, doi = {10.1007/3-540-69053-0\_9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerGS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CramerD97, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Frank Thomson Leighton and Peter W. Shor}, title = {Linear Zero-Knowledge - {A} Note on Efficient Zero-Knowledge Proofs and Arguments}, booktitle = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997}, pages = {436--445}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/258533.258635}, doi = {10.1145/258533.258635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CramerD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramesD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Neal Koblitz}, title = {New Generation of Secure and Practical RSA-Based Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {173--185}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_14}, doi = {10.1007/3-540-68697-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramesD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96, author = {Ronald Cramer and Matthew K. Franklin and Berry Schoenmakers and Moti Yung}, editor = {Ueli M. Maurer}, title = {Multi-Autority Secret-Ballot Elections with Linear Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {72--83}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_7}, doi = {10.1007/3-540-68339-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CramerDP96, author = {Ronald Cramer and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {T. Mark A. Lomas}, title = {Efficient and Provable Security Amplifications}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {101--109}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_9}, doi = {10.1007/3-540-62494-5\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/CramerDP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD96, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {On Monotone Function Closure of Statistical Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {1996}, url = {http://eprint.iacr.org/1996/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD96a, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {Linear Zero-Knowledge - {A} note on Efficient Zero-Knowledge Proofs and Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {1996}, url = {http://eprint.iacr.org/1996/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerD95, author = {Ronald Cramer and Ivan Damg{\aa}rd}, editor = {Don Coppersmith}, title = {Secure Signature Schemes based on Interactive Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {297--310}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_24}, doi = {10.1007/3-540-44750-4\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerD95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDS94, author = {Ronald Cramer and Ivan Damg{\aa}rd and Berry Schoenmakers}, editor = {Yvo Desmedt}, title = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {174--187}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_19}, doi = {10.1007/3-540-48658-5\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94, author = {Jean{-}Paul Boly and Antoon Bosselaers and Ronald Cramer and Rolf Michelsen and Stig Fr. Mj{\o}lsnes and Frank Muller and Torben P. Pedersen and Birgit Pfitzmann and Peter de Rooij and Berry Schoenmakers and Matthias Schunter and Luc Vall{\'{e}}e and Michael Waidner}, editor = {Dieter Gollmann}, title = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {217--230}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_66}, doi = {10.1007/3-540-58618-0\_66}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BolyBCMMMPPRSSVW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerP93, author = {Ronald Cramer and Torben P. Pedersen}, editor = {Tor Helleseth}, title = {Improved Privacy in Wallets with Observers (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {329--343}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_29}, doi = {10.1007/3-540-48285-7\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.