Aarhus Universitets segl

Publikationer

Følg med i de senest publicerede videnskabelige artikler fra Institut for Biologi. Oversigten viser Instituttets publikationer med de nyeste øverst:

Sortér efter: Dato | Forfatter | Titel

Wu, H., George, R. E., Wesenberg, J. H., Mølmer, K., Schuster, D. I., Schoelkopf, R. J., Itoh, K. M., Ardavan, A., Morton, J. J. L. & Briggs, G. A. D. (2010). Storage of Multiple Coherent Microwave Excitations in an Electron Spin Ensemble. Physical Review Letters, 105(14), 140503. https://doi.org/10.1103/PhysRevLett.105.140503
Damgård, I. B. (1989). A Design Principle for Hash Functions. I G. Brassard (red.), Advances in Cryptology - CRYPTO' 89 Proceedings (s. 416-427). Springer. https://doi.org/10.1007/0-387-34805-0_39
Damgård, I. B. (1989). On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. I G. Brassard (red.), Advances in Cryptology - CRYPTO' 89 Proceedings (s. 17-27). Springer. https://doi.org/10.1007/0-387-34805-0_3
Boyar, J., Chaum, D., Damgård, I. B. & Pedersen, T. (1990). Convertible Undeniable Signatures. I A. J. Menezez & S. A. Vanstone (red.), Advances in Cryptology - CRYPT0' 90: Proceedings (s. 189-205). Springer. https://doi.org/10.1007/3-540-38424-3_14
Damgård, I. B. (1991). Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks. I J. Feigenbaum (red.), Advances in Cryptology - CRYPTO '91: Proceedings (s. 445-456). Springer. https://doi.org/10.1007/3-540-46766-1_36
Chen, L. & Damgård, I. B. (1993). Security Bounds for Parallel Versions of Identification Protocols (extended abstract). I R. A. Rueppel (red.), Advances in Cryptology - EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings (s. 461-466). Springer. https://doi.org/10.1007/3-540-47555-9_40
Damgård, I. B. (1993). Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Preprocessing. I R. A. Rueppel (red.), Advances in Cryptology - EUROCRYPT' 92: Workshop on the Theory and Application of Cryptographic Techniques Balatonfüred, Hungary, May 24-28, 1992 Proceedings (s. 341-355). Springer. https://doi.org/10.1007/3-540-47555-9_28
Damgård, I. B. & Knudsen, L. R. (1994). The breaking of the AR Hash Function. I T. Helleseth (red.), Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings Springer. https://doi.org/10.1007/3-540-48285-7_25
Damgård, I. B. (1994). Practical and Provably Secure Release of a Secret and Exchange of Signatures. I T. Helleseth (red.), Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings (s. 200-217). Springer. https://doi.org/10.1007/3-540-48285-7_17
Damgård, I. B., Pedersen, T. P. & Pfitzmann, B. (1994). On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. I D. R. Stinson (red.), Advances in Cryptology - CRYPTO' 93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings (s. 250-265). Springer. https://doi.org/10.1007/3-540-48329-2_22
Damgård, I. B. (1994). Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). I D. R. Stinson (red.), Advances in Cryptology - CRYPTO' 93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings (s. 100-109). Springer. https://doi.org/10.1007/3-540-48329-2_9
Kragh, H. (2010). Auroral chemistry: The riddle of the green line. Bulletin for the History of Chemistry, 35(2), 97-104.
Lorentsen, L., Tuovinen, A.-P. & Xu, J. (2001). Modelling of Features and Feature Interactions in Nokia Mobile Phones Using Coloured Petri Nets. I K. Jensen (red.), Third Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (s. 1-14). Department of Computer Science, Aarhus University.
Chen, L., Damgård, I. B. & Pedersen, T. P. (1995). Parallel divertibility of proofs of knowledge (Extended abstract). I A. De Santis (red.), Advances in Cryptology - EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9-12, 1994 Proceedings (s. 140-155). Springer. https://doi.org/10.1007/BFb0053431
Cramer, R., Damgård, I. B. & Schoenmakers, B. (1994). Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. I Y. G. Desmedt (red.), Advances in Cryptology - CRYPTO '94: 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21-25, 1994 Proceedings (s. 174-187). Springer. https://doi.org/10.1007/3-540-48658-5_19
Damgård, I. B. & Knudsen, L. R. (1996). Multiple encryption with minimum key. I E. Dawson & J. Golic (red.), Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995 Proceedings (s. 156-164). Springer. https://doi.org/10.1007/BFb0032355
Damgård, I. B., Goldreich, O., Okamoto, T. & Wigderson, A. (1995). Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs. I D. Coppersmith (red.), Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (s. 325-338). Springer. https://doi.org/10.1007/3-540-44750-4_26
Cramer, R. & Damgård, I. B. (1995). Secure Signature Schemes based on Interactive Protocols. I D. Coppersmith (red.), Advances in Cryptology - CRYPT0' 95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27-31, 1995 Proceedings (s. 297-310). Springer. https://doi.org/10.1007/3-540-44750-4_24
Cramer, R., Damgård, I. B. & Pedersen, T. P. (1997). Efficient and provable security amplifications. I M. Lomas (red.), Security Protocols: International Workshop Cambridge, United Kingdom, April 10-12, 1996 Proceedings (s. 101-109). Springer. https://doi.org/10.1007/3-540-62494-5_9
Damgård, I. B. & Pedersen, T. P. (1996). New Convertible Undeniable Signature Schemes. I U. Maurer (red.), Advances in Cryptology - EUROCRYPT '96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings (s. 372-386). Springer. https://doi.org/10.1007/3-540-68339-9_32
Cramer, R. & Damgård, I. B. (1996). New Generation of Secure and Practical RSA-Based Signatures. I N. Koblitz (red.), Advances in Cryptology - CRYPTO '96: 16th Annual International Cryptology Conference Santa Barbara, California, USA August 18-22, 1996 Proceedings (s. 173-185). Springer. https://doi.org/10.1007/3-540-68697-5_14
Cramer, R. & Damgård, I. B. (1997). Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. I W. Fumy (red.), Advances in Cryptology - EUROCRYPT '97: International Conference on the Theory and Application of Cryptographic Techniques Konstanz, Germany, May 11-15, 1997 Proceedings (s. 75-87). Springer. https://doi.org/10.1007/3-540-69053-0_7
Damgård, I. B. & Knudsen, L. R. (1998). Two-Key Triple Encryption. Journal of Cryptology, 11(3), 209-218. https://doi.org/10.1007/s001459900044
Cramer, R. & Damgård, I. B. (1997). Linear zero-knowledge-a note on efficient zero-knowledge proofs and arguments. I Proceedings of the twenty-ninth annual ACM symposium on Theory of computing (s. 436-445). Association for Computing Machinery. https://doi.org/10.1145/258533.258635
Damgård, I. B., Pedersen, T. P. & Pfitzmann, B. (1998). Statistical secrecy and multibit commitments. I E E E Transactions on Information Theory, 44(3), 1143-1151. https://doi.org/10.1109/18.669255
Pedersen, C. L. & Nielsen, L. P. (2010). Surface structure of biofilm removing sulfurous compounds from air. Abstract fra 2010 Duke-UAM Conference On Biofiltration For Air Pollution Control, Washington DC, USA.
Barbetta, C., Imparato, A. & Fournier, J.-B. (2010). On the surface tension of fluctuating quasi-spherical vesicles. The European Physical Journal E: Soft Matter and Biological Physics, 31(3), 333-342. https://doi.org/10.1140/epje/i2010-10579-1
Caraglio, M., Imparato, A. & Pelizzola, A. (2010). Pathways of mechanical unfolding of FnIII10: Low force intermediates. Journal of Chemical Physics, 133(6), 065101. https://doi.org/10.1063/1.3464476
Lecomte, V., Imparato, A. & van Wijland, F. (2010). Current Fluctuations in Systems with Diffusive Dynamics,in and out of Equilibrium. Progress of Theoretical Physics. Supplement, 184, 276-289.
Imparato, A., Imparato, A., Luccioli, S. & Torcini, A. (2010). Out-of-Equilibrium versus Dynamical andThermodynamical Transitions for a Model Protein. Progress of Theoretical Physics. Supplement, 184, 339-350.
Damgård, I. B. (1999). Commitment Schemes and Zero-Knowledge Protocols. I I. B. Damgård (red.), Lectures on Data Security: Modern Cryptology in Theory and Practice (s. 63-86). Springer. https://doi.org/10.1007/3-540-48969-X_3
Damgård, I. B. & Pfitzmann, B. (1998). Sequential iteration of interactive arguments and an efficient zero-knowledge argument for NP. I K. G. Larsen, S. Skyum & G. Winskel (red.), Automata, Languages and Programming: 25th International Colloquium, ICALP'98 Aalborg, Denmark, July 13-17, 1998 Proceedings (s. 772-783). Springer. https://doi.org/10.1007/BFb0055101
Damgård, I. B. & Cramer, R. (1998). Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? I H. Krawczyk (red.), Advances in Cryptology - CRYPTO '98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23-27, 1998 Proceedings (s. 424-441). Springer. https://doi.org/10.1007/BFb0055745
Schwartzbach, M. I. (red.) (2003). PLAN-X 2004 Informal Proceedings. Department of Computer Science, Aarhus University.
Damgård, I. B., Killian, J. & Salvail, L. (1999). On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. I J. Stern (red.), Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (s. 56-73). Springer. https://doi.org/10.1007/3-540-48910-X_5
Cramer, R., Damgård, I. B., Dziembowski, S., Hirt, M. & Rabin, T. (1999). Efficient Multiparty Computations Secure Against an Adaptive Adversary. I J. Stern (red.), Advances in Cryptology - EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2-6, 1999 Proceedings (s. 311-326). Springer. https://doi.org/10.1007/3-540-48910-X_22

Sortér efter: Dato | Forfatter | Titel