Ronald Cramer

Results: 13



#Item
1Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

Cambridge University Press3 - Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgård and Jesper Buus Nielsen Table of Contents More information

Add to Reading List

Source URL: users-cs.au.dk

Language: English - Date: 2016-04-21 06:42:55
2Multiparty Computation, an Introduction Ronald Cramer Ivan Damgård  Jesper Buus Nielsen

Multiparty Computation, an Introduction Ronald Cramer Ivan Damgård Jesper Buus Nielsen

Add to Reading List

Source URL: www.daimi.au.dk

- Date: 2009-05-20 09:10:29
    3Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer∗ Victor Shoup†

    Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer∗ Victor Shoup†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2001-12-12 07:16:30
      4A Twist on the Naor-Yung Paradigm and Its Application to Ecient CCA-Secure Encryption from Hard Search Problems ?  Ronald Cramer , Dennis Hofheinz

      A Twist on the Naor-Yung Paradigm and Its Application to Ecient CCA-Secure Encryption from Hard Search Problems ? Ronald Cramer , Dennis Hofheinz

      Add to Reading List

      Source URL: www.kjdf.de

      Language: English - Date: 2014-06-10 05:37:36
        5Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer∗ L´eo Ducas†

        Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer∗ L´eo Ducas†

        Add to Reading List

        Source URL: web.eecs.umich.edu

        Language: English - Date: 2016-02-25 10:59:18
          6Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

          Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2001-12-17 07:56:45
            7On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University  Classic Zero-Knowledge Protocols

            On the Amortized Complexity of Zero-Knowledge Proofs Ronald Cramer, CWI Ivan Damgård, Århus University Classic Zero-Knowledge Protocols

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2009-09-22 17:56:28
            8Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

            Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

            Add to Reading List

            Source URL: www.daimi.au.dk

            Language: English - Date: 2012-12-31 05:19:12
            9On the Amortized Complexity of Zero-knowledge Protocols Ronald Cramer? , Ivan Damg˚ ard?? , and Marcel Keller? ? ? CWI/Leiden University, Aarhus University, and University of Bristol  Abstract. We propose a general tech

            On the Amortized Complexity of Zero-knowledge Protocols Ronald Cramer? , Ivan Damg˚ ard?? , and Marcel Keller? ? ? CWI/Leiden University, Aarhus University, and University of Bristol Abstract. We propose a general tech

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-05-09 09:29:46
            10Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer∗ L´eo Ducas†

            Recovering Short Generators of Principal Ideals in Cyclotomic Rings Ronald Cramer∗ L´eo Ducas†

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2015-04-06 06:31:39