What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ronald Cramer
Google Scholar
59
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/tcc
Vector Commitments over Rings and Compressed $\varSigma $-Protocols.
Thomas Attema
Ignacio Cascudo
Ronald Cramer
Ivan Damgård
Daniel Escudero
2021
conf/crypto
A Compressed $\varSigma $-Protocol Theory for Lattices.
Thomas Attema
Ronald Cramer
Lisa Kohl
2021
conf/crypto
Compressing Proofs of k-Out-Of-n Partial Knowledge.
Thomas Attema
Ronald Cramer
Serge Fehr
2021
conf/crypto
Asymptotically-Good Arithmetic Secret Sharing over $\mathbb {Z}/p^{\ell }\mathbb {Z}$ with Strong Multiplication and Its Applications to Efficient MPC.
Ronald Cramer
Matthieu Rambaud
Chaoping Xing
2021
conf/asiacrypt
Improved Single-Round Secure Multiplication Using Regenerating Codes.
Mark Abspoel
Ronald Cramer
Daniel Escudero
Ivan Damgård
Chaoping Xing
2021
conf/asiacrypt
Compressed $\varSigma $-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures.
Thomas Attema
Ronald Cramer
Matthieu Rambaud
2020
conf/crypto
Compressed $\varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.
Thomas Attema
Ronald Cramer
2020
conf/eurocrypt
Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes.
Ronald Cramer
Chaoping Xing
2020
conf/asiacrypt
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over $\mathbb {Z}/p^k\mathbb {Z} $.
Mark Abspoel
Ronald Cramer
Ivan Damgård
Daniel Escudero
Matthieu Rambaud
Chaoping Xing
Chen Yuan
2020
conf/tcc
On the Complexity of Arithmetic Secret Sharing.
Ronald Cramer
Chaoping Xing
Chen Yuan
2019
conf/tcc
Efficient Information-Theoretic Secure Multiparty Computation over Z/p<sup>k</sup>Z via Galois Rings.
Mark Abspoel
Ronald Cramer
Ivan Damgård
Daniel Escudero
Chen Yuan
2018
conf/crypto
Amortized Complexity of Information-Theoretically Secure MPC Revisited.
Ignacio Cascudo
Ronald Cramer
Chaoping Xing
Chen Yuan
2018
conf/crypto
SPDℤ<sub>2<sup>k</sup></sub>: Efficient MPC mod 2<sup>k</sup> for Dishonest Majority.
Ronald Cramer
Ivan Damgård
Daniel Escudero
Peter Scholl
Chaoping Xing
2017
conf/eurocrypt
Short Stickelberger Class Relations and Application to Ideal-SVP.
Ronald Cramer
Léo Ducas
Benjamin Wesolowski
2017
conf/eurocrypt
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack.
Ronald Cramer
Ivan Damgård
Chaoping Xing
Chen Yuan
2016
conf/eurocrypt
Recovering Short Generators of Principal Ideals in Cyclotomic Rings.
Ronald Cramer
Léo Ducas
Chris Peikert
Oded Regev
2015
journals/tifs
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations.
Thijs Veugen
Robbert de Haan
Ronald Cramer
Frank Muller
2015
conf/eurocrypt
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Ronald Cramer
Ivan Bjerre Damgård
Nico Döttling
Serge Fehr
Gabriele Spini
2015
conf/tcc
Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model.
Ronald Cramer
Carles Padró
Chaoping Xing
2014
journals/joc
On the Amortized Complexity of Zero-Knowledge Protocols.
Ronald Cramer
Ivan Damgård
Marcel Keller
2012
conf/pkc
DDH-Like Assumptions Based on Extension Rings.
Ronald Cramer
Ivan Damgård
Eike Kiltz
Sarah Zakarias
Angela Zottarel
2011
conf/crypto
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.
Ignacio Cascudo Pueyo
Ronald Cramer
Chaoping Xing
2011
conf/eurocrypt
The Arithmetic Codex: Theory and Applications.
Ronald Cramer
2010
conf/tcc
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems.
Ronald Cramer
Dennis Hofheinz
Eike Kiltz
2009
conf/crypto
On the Amortized Complexity of Zero-Knowledge Protocols.
Ronald Cramer
Ivan Damgård
2009
conf/crypto
Fixed Finite Field.
Ignacio Cascudo Pueyo
Hao Chen
Ronald Cramer
Chaoping Xing
2008
conf/eurocrypt
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves.
Hao Chen
Ronald Cramer
Robbert de Haan
Ignacio Cascudo Pueyo
2008
conf/eurocrypt
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
Ronald Cramer
Yevgeniy Dodis
Serge Fehr
Carles Padró
Daniel Wichs
2007
conf/crypto
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra.
Ronald Cramer
Eike Kiltz
Carles Padró
2007
conf/eurocrypt
Secure Computation from Random Error Correcting Codes.
Hao Chen
Ronald Cramer
Shafi Goldwasser
Robbert de Haan
Vinod Vaikuntanathan
2007
conf/eurocrypt
Atomic Secure Multi-party Multiplication with Low Communication.
Ronald Cramer
Ivan Damgård
Robbert de Haan
2007
conf/asiacrypt
Bounded CCA2-Secure Encryption.
Ronald Cramer
Goichiro Hanaoka
Dennis Hofheinz
Hideki Imai
Eike Kiltz
Rafael Pass
Abhi Shelat
Vinod Vaikuntanathan
2006
conf/crypto
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields.
Hao Chen
Ronald Cramer
2006
conf/crypto
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.
Saurabh Agarwal
Ronald Cramer
Robbert de Haan
2005
conf/crypto
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields.
Ronald Cramer
Serge Fehr
Martijn Stam
2005
conf/crypto
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes.
Ronald Cramer
Vanesa Daza
Ignacio Gracia
Jorge Jiménez Urroz
Gregor Leander
Jaume Martí-Farré
Carles Padró
2005
conf/tcc
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
Ronald Cramer
Ivan Damgård
Yuval Ishai
2004
conf/tcc
Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation.
Ronald Cramer
Ivan Damgård
2003
conf/eurocrypt
Efficient Multi-party Computation over Rings.
Ronald Cramer
Serge Fehr
Yuval Ishai
Eyal Kushilevitz
2002
conf/crypto
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups.
Ronald Cramer
Serge Fehr
2002
conf/eurocrypt
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption.
Ronald Cramer
Victor Shoup
2002
conf/asiacrypt
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments.
Masayuki Abe
Ronald Cramer
Serge Fehr
2001
conf/crypto
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase.
Ronald Cramer
Ivan Damgård
Serge Fehr
2001
conf/crypto
Secure Distributed Linear Algebra in a Constant Number of Rounds.
Ronald Cramer
Ivan Damgård
2001
conf/eurocrypt
Multiparty Computation from Threshold Homomorphic Encryption.
Ronald Cramer
Ivan Damgård
Jesper Buus Nielsen
2000
conf/pkc
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions.
Ronald Cramer
Ivan Damgård
Philip D. MacKenzie
2000
conf/eurocrypt
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme.
Ronald Cramer
Ivan Damgård
Ueli M. Maurer
1999
conf/ccs
Signature Schemes Based on the Strong RSA Assumption.
Ronald Cramer
Victor Shoup
1999
conf/eurocrypt
Efficient Multiparty Computations Secure Against an Adaptive Adversary.
Ronald Cramer
Ivan Damgård
Stefan Dziembowski
Martin Hirt
Tal Rabin
1998
conf/crypto
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
Ronald Cramer
Victor Shoup
1998
conf/crypto
Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?
Ronald Cramer
Ivan Damgård
1997
conf/eurocrypt
A Secure and Optimally Efficient Multi-Authority Election Scheme.
Ronald Cramer
Rosario Gennaro
Berry Schoenmakers
1997
conf/eurocrypt
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation.
Ronald Cramer
Ivan Damgård
1996
conf/crypto
New Generation of Secure and Practical RSA-Based Signatures.
Ronald Cramer
Ivan Damgård
1996
conf/eurocrypt
Multi-Autority Secret-Ballot Elections with Linear Work.
Ronald Cramer
Matthew K. Franklin
Berry Schoenmakers
Moti Yung
1995
conf/crypto
Secure Signature Schemes based on Interactive Protocols.
Ronald Cramer
Ivan Damgård
1994
conf/crypto
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
Ronald Cramer
Ivan Damgård
Berry Schoenmakers
1994
conf/esorics
The ESPRIT Project CAFE - High Security Digital Payment Systems.
Jean-Paul Boly
Antoon Bosselaers
Ronald Cramer
Rolf Michelsen
Stig Fr. Mjølsnes
Frank Muller
Torben P. Pedersen
Birgit Pfitzmann
Peter de Rooij
Berry Schoenmakers
Matthias Schunter
Luc Vallée
Michael Waidner
1993
conf/eurocrypt
Improved Privacy in Wallets with Observers (Extended Abstract).
Ronald Cramer
Torben P. Pedersen
Coauthors
Abhi Shelat
(1)
Angela Zottarel
(1)
Antoon Bosselaers
(1)
Benjamin Wesolowski
(1)
Berry Schoenmakers
(4)
Birgit Pfitzmann
(1)
Carles Padró
(4)
Chaoping Xing
(11)
Chen Yuan
(5)
Chris Peikert
(1)
Daniel Escudero
(5)
Daniel Wichs
(1)
Dennis Hofheinz
(2)
Eike Kiltz
(4)
Eyal Kushilevitz
(1)
Frank Muller
(2)
Gabriele Spini
(1)
Goichiro Hanaoka
(1)
Gregor Leander
(1)
Hao Chen
(4)
Hideki Imai
(1)
Ignacio Cascudo
(2)
Ignacio Cascudo Pueyo
(3)
Ignacio Gracia
(1)
Ivan Bjerre Damgård
(1)
Ivan Damgård
(23)
Jaume Martí-Farré
(1)
Jean-Paul Boly
(1)
Jesper Buus Nielsen
(1)
Jorge Jiménez Urroz
(1)
Léo Ducas
(2)
Lisa Kohl
(1)
Luc Vallée
(1)
Marcel Keller
(1)
Mark Abspoel
(3)
Martijn Stam
(1)
Martin Hirt
(1)
Masayuki Abe
(1)
Matthew K. Franklin
(1)
Matthias Schunter
(1)
Matthieu Rambaud
(3)
Michael Waidner
(1)
Moti Yung
(1)
Nico Döttling
(1)
Oded Regev
(1)
Peter de Rooij
(1)
Peter Scholl
(1)
Philip D. MacKenzie
(1)
Rafael Pass
(1)
Robbert de Haan
(5)
Rolf Michelsen
(1)
Ronald Cramer
(59)
Rosario Gennaro
(1)
Sarah Zakarias
(1)
Saurabh Agarwal
(1)
Serge Fehr
(8)
Shafi Goldwasser
(1)
Stefan Dziembowski
(1)
Stig Fr. Mjølsnes
(1)
Tal Rabin
(1)
Thijs Veugen
(1)
Thomas Attema
(5)
Torben P. Pedersen
(2)
Ueli M. Maurer
(1)
Vanesa Daza
(1)
Victor Shoup
(3)
Vinod Vaikuntanathan
(2)
Yevgeniy Dodis
(1)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to