Ronald Cramer

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Vector commitments over rings and compressed \(\varSigma \)-protocols
Theory of Cryptography
2023-08-14Paper
Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
Lecture Notes in Computer Science
2023-05-26Paper
Improved single-round secure multiplication using regenerating codes
Lecture Notes in Computer Science
2023-05-12Paper
Asymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \)2023-03-29Paper
Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time
Journal of the ACM
2022-12-08Paper
Compressed \(\varSigma\)-protocol theory and practical application to plug \& play secure algorithmics2022-12-07Paper
Compressing proofs of \(k\)-out-of-\(n\) partial knowledge2022-05-18Paper
A compressed \(\varSigma \)-protocol theory for lattices2022-04-22Paper
Asymptotically-good arithmetic secret sharing over \(\mathbb{Z}/p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPC2022-04-22Paper
On the complexity of arithmetic secret sharing2022-03-23Paper
Blackbox secret sharing revisited: a coding-theoretic approach with application to expansionless near-threshold schemes2021-12-01Paper
Amortized complexity of information-theoretically secure MPC revisited2020-06-30Paper
Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings2020-04-30Paper
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex
IEEE Transactions on Information Theory
2020-01-28Paper
\(\mathrm{SPD}\mathbb {Z}_{2^k}\): efficient MPC \(\mod 2^k\) for dishonest majority2018-09-26Paper
Linear-time non-malleable codes in the bit-wise independent tampering model2018-03-16Paper
Asymptotic Bound for Multiplication Complexity in the Extensions of Small Finite Fields
IEEE Transactions on Information Theory
2017-07-12Paper
Short Stickelberger class relations and application to Ideal-SVP
Lecture Notes in Computer Science
2017-06-13Paper
Amortized complexity of zero-knowledge proofs revisited: achieving linear soundness slack
Lecture Notes in Computer Science
2017-06-13Paper
Bounds on the Threshold Gap in Secret Sharing and its Applications
IEEE Transactions on Information Theory
2017-06-08Paper
Torsion limits and Riemann-Roch systems for function fields and applications
IEEE Transactions on Information Theory
2017-05-16Paper
Squares of Random Linear Codes
IEEE Transactions on Information Theory
2017-04-28Paper
An improvement to the Hasse-Weil bound and applications to character sums, cryptography and coding
Advances in Mathematics
2017-02-17Paper
Recovering short generators of principal ideals in cyclotomic rings
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
New generation of secure and practical RSA-based signatures
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Secure multiparty computation and secret sharing2015-08-06Paper
On secret sharing with nonlinear product reconstruction
SIAM Journal on Discrete Mathematics
2015-07-21Paper
Optimal algebraic manipulation detection codes in the constant-error model
Theory of Cryptography
2015-07-06Paper
On the complexity of verifiable secret sharing and multiparty computation
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
On the amortized complexity of zero-knowledge protocols
Journal of Cryptology
2014-09-25Paper
Multi-authority secret-ballot elections with linear work
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Algebraic manipulation detection codes
Science China. Mathematics
2014-03-05Paper
On the amortized complexity of zero knowledge protocols for multiplicative relations
Lecture Notes in Computer Science
2012-11-06Paper
DDH-like assumptions based on extension rings
Public Key Cryptography – PKC 2012
2012-07-20Paper
The torsion-limit for algebraic function fields and its application to arithmetic secret sharing
Lecture Notes in Computer Science
2011-08-12Paper
The arithmetic codex: theory and applications. (Abstract)
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
Theory of Cryptography
2010-02-24Paper
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
On the Amortized Complexity of Zero-Knowledge Protocols
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
IEEE Transactions on Information Theory
2009-02-24Paper
Bounded CCA2-Secure Encryption
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Secure Computation from Random Error Correcting Codes
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Atomic Secure Multi-party Multiplication with Low Communication
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
Lecture Notes in Computer Science
2007-09-04Paper
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Lecture Notes in Computer Science
2007-09-04Paper
Multiparty computation, an introduction2006-09-25Paper
General secure multi-party computation from any linear secret-sharing scheme2006-03-01Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Contemporary cryptology.
Advanced Courses in Mathematics -- CRM Barcelona
2005-08-30Paper
scientific article; zbMATH DE number 2086698 (Why is no real title available?)2004-08-11Paper
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
SIAM Journal on Computing
2004-01-08Paper
scientific article; zbMATH DE number 2009982 (Why is no real title available?)2003-11-26Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942426 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1842509 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1842488 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1808209 (Why is no real title available?)2002-09-30Paper
scientific article; zbMATH DE number 1302863 (Why is no real title available?)2001-07-23Paper
scientific article; zbMATH DE number 1559559 (Why is no real title available?)2001-02-28Paper
scientific article; zbMATH DE number 1406779 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1394320 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1440068 (Why is no real title available?)2000-01-01Paper
scientific article; zbMATH DE number 1302835 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1304080 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1304184 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1162684 (Why is no real title available?)1998-06-11Paper
scientific article; zbMATH DE number 1031000 (Why is no real title available?)1997-12-01Paper
scientific article; zbMATH DE number 883898 (Why is no real title available?)1997-01-06Paper


Research outcomes over time


This page was built for person: Ronald Cramer