D-Index & Metrics Best Publications
Computer Science
Denmark
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 74 Citations 26,738 265 World Ranking 887 National Ranking 3

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in Denmark Leader Award

2022 - Research.com Computer Science in Denmark Leader Award

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Algorithm
  • Programming language

The scientist’s investigation covers issues in Theoretical computer science, Commitment scheme, Cryptography, Computer security and Homomorphic encryption. The concepts of his Theoretical computer science study are interwoven with issues in Secret sharing, Encryption, Security parameter, Verifiable secret sharing and Secure two-party computation. His biological study spans a wide range of topics, including Secure multi-party computation and Multiplication.

His Commitment scheme research includes elements of Cryptographic protocol, Mathematical proof, Zero-knowledge proof, Function and String. The various areas that Ivan Damgård examines in his Computer security study include Protocol and Digital signature. His study in Homomorphic encryption is interdisciplinary in nature, drawing from both Ciphertext, Public-key cryptography, Cryptosystem, Precomputation and Homomorphic secret sharing.

His most cited work include:

  • Multiparty unconditionally secure protocols (1254 citations)
  • A design principle for hash functions (993 citations)
  • Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols (985 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Theoretical computer science, Discrete mathematics, Computer security, Cryptography and Secure multi-party computation. Ivan Damgård interconnects Homomorphic encryption, Encryption and Protocol, Commitment scheme, Oblivious transfer in the investigation of issues within Theoretical computer science. His Homomorphic encryption study integrates concerns from other disciplines, such as Cryptosystem and Public-key cryptography.

In his study, which falls under the umbrella issue of Discrete mathematics, Communication complexity is strongly linked to Mathematical proof. His Cryptography research includes themes of Multiplication and Constant. Ivan Damgård has researched Secure multi-party computation in several fields, including Verifiable secret sharing, Boolean circuit and Secret sharing.

He most often published in these fields:

  • Theoretical computer science (46.22%)
  • Discrete mathematics (23.51%)
  • Computer security (21.35%)

What were the highlights of his more recent work (between 2014-2021)?

  • Secure multi-party computation (18.38%)
  • Discrete mathematics (23.51%)
  • Theoretical computer science (46.22%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Secure multi-party computation, Discrete mathematics, Theoretical computer science, Protocol and Computer security. His studies in Secure multi-party computation integrate themes in fields like Boolean circuit, Verifiable secret sharing, Communication complexity, Function and Upper and lower bounds. The study of Discrete mathematics is intertwined with the study of Security parameter in a number of ways.

Ivan Damgård has included themes like Homomorphic encryption, Mathematical proof, Oblivious transfer, Correctness and Cryptosystem in his Theoretical computer science study. His research investigates the connection between Homomorphic encryption and topics such as Commitment scheme that intersect with issues in Universal composability. His Protocol study combines topics from a wide range of disciplines, such as Distributed computing, Active security, Set and Benchmark.

Between 2014 and 2021, his most popular works were:

  • Secure Multiparty Computation (56 citations)
  • Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions (34 citations)
  • Secure Arithmetic Computation with Constant Computational Overhead (28 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Algorithm
  • Algebra

His primary areas of study are Secure multi-party computation, Protocol, Theoretical computer science, Computer security and Commitment scheme. The Secure multi-party computation study combines topics in areas such as Function, Boolean circuit, Modulo and Benchmark. His work carried out in the field of Protocol brings together such families of science as Password, Distributed computing and AES implementations.

Ivan Damgård combines subjects such as Homomorphic encryption, Hash function and Secret sharing with his study of Theoretical computer science. His research investigates the link between Homomorphic encryption and topics such as Algorithm that cross with problems in Mathematical proof. His research in Computer security tackles topics such as Set which are related to areas like Scheme and Construct.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Multiparty unconditionally secure protocols

David Chaum;Claude Crépeau;Ivan Damgard.
symposium on the theory of computing (1988)

2126 Citations

A design principle for hash functions

Ivan Bjerre Damgård.
international cryptology conference (1989)

1606 Citations

Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols

Ronald Cramer;Ivan Damgård;Berry Schoenmakers.
international cryptology conference (1994)

1398 Citations

A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System

Ivan Damgård;Mats Jurik.
public key cryptography (2001)

1355 Citations

Multiparty Computation from Somewhat Homomorphic Encryption

Ivan Damgård;Valerio Pastro;Nigel Smart;Sarah Zakarias.
international cryptology conference (2012)

1095 Citations

Multiparty Computation from Threshold Homomorphic Encryption

Ronald Cramer;Ivan Damgård;Jesper Buus Nielsen.
theory and application of cryptographic techniques (2001)

712 Citations

A statistically-hiding integer commitment scheme based on groups with hidden order

Ivan Damgard;Eiichiro Fujisaki.
Lecture Notes in Computer Science (2002)

673 Citations

Secure Multiparty Computation Goes Live

Peter Bogetoft;Dan Lund Christensen;Ivan Damgård;Martin Geisler.
financial cryptography (2009)

651 Citations

General secure multi-party computation from any linear secret-sharing scheme

Ronald Cramer;Ivan Damgård;Ueli Maurer.
theory and application of cryptographic techniques (2000)

640 Citations

Multiparty Unconditionally Secure Protocols (Extended Abstract)

David Chaum;Claude Crépeau;Ivan Damgård.
symposium on the theory of computing (1988)

563 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Ivan Damgård

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 123

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 122

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 95

Bart Preneel

Bart Preneel

KU Leuven

Publications: 95

Yehuda Lindell

Yehuda Lindell

Bar-Ilan University

Publications: 79

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 79

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 74

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 73

Ran Canetti

Ran Canetti

Boston University

Publications: 73

Moti Yung

Moti Yung

Columbia University

Publications: 63

Eyal Kushilevitz

Eyal Kushilevitz

Technion – Israel Institute of Technology

Publications: 62

Rafael Pass

Rafael Pass

Cornell University

Publications: 60

Nigel P. Smart

Nigel P. Smart

KU Leuven

Publications: 58

Helger Lipmaa

Helger Lipmaa

University of Tartu

Publications: 52

Ueli Maurer

Ueli Maurer

ETH Zurich

Publications: 51

Rosario Gennaro

Rosario Gennaro

City College of New York

Publications: 51

Trending Scientists

Kwan-Liu Ma

Kwan-Liu Ma

University of California, Davis

Fabio Paternò

Fabio Paternò

National Research Council (CNR)

Catherine J. Morrison Paul

Catherine J. Morrison Paul

University of California, Davis

Mariana Raykova

Mariana Raykova

Google (United States)

Jianqiang Gu

Jianqiang Gu

Tianjin University

Michael J. L. Magrath

Michael J. L. Magrath

University of Melbourne

Uwe Kornak

Uwe Kornak

University of Göttingen

Akio Wanaka

Akio Wanaka

Nara Medical University

Rachel E. Klevit

Rachel E. Klevit

University of Washington

David Paré

David Paré

Natural Resources Canada

Stephen S. Gao

Stephen S. Gao

Missouri University of Science and Technology

Gerd-Rüdiger Burmester

Gerd-Rüdiger Burmester

Humboldt-Universität zu Berlin

Mary A. Rutherford

Mary A. Rutherford

King's College London

Mansoor Niaz

Mansoor Niaz

Universidad de Oriente

Carolyn Ellis

Carolyn Ellis

University of South Florida

Something went wrong. Please try again later.