dblp.uni-trier.dewww.uni-trier.de

Ivan Damgård Vis

Ivan Bjerre Damgård

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
116EERonald Cramer, Ivan Damgård: On the Amortized Complexity of Zero-Knowledge Protocols. CRYPTO 2009: 177-191
115EEIvan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner: Improving the Security of Quantum Protocols via Commit-and-Open. CRYPTO 2009: 408-427
114EEPeter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, Tomas Toft: Secure Multiparty Computation Goes Live. Financial Cryptography 2009: 325-343
113EEIvan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen: Asynchronous Multiparty Computation: Theory and Implementation. Public Key Cryptography 2009: 160-179
112EEIvan Damgård, Gert Læssøe Mikkelsen: On the Theory and Practice of Personal Digital Signatures. Public Key Cryptography 2009: 277-296
111EEIvan Damgård, Jesper Buus Nielsen, Daniel Wichs: Universally Composable Multiparty Computation with Partially Isolated Parties. TCC 2009: 315-331
110EEIvan Damgård, Martin Geisler, Mikkel Krøigaard: A correction to 'efficient and secure comparison for on-line auctions'. IJACT 1(4): 323-324 (2009)
2008
109 Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, Igor Walukiewicz: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part I: Tack A: Algorithms, Automata, Complexity, and Games Springer 2008
108 Luca Aceto, Ivan Damgård, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingólfsdóttir, Igor Walukiewicz: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations Springer 2008
107EEIvan Damgård, Lars R. Knudsen, Søren S. Thomsen: Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. ACNS 2008: 144-155
106EEIvan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith: Scalable Multiparty Computation with Nearly Optimal Work and Resilience. CRYPTO 2008: 241-261
105EEIvan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek: Public-Key Encryption with Non-interactive Opening. CT-RSA 2008: 239-255
104EEIvan Damgård, Michael Østergaard Pedersen: RFID Security: Tradeoffs between Security and Efficiency. CT-RSA 2008: 318-332
103EEIvan Damgård, Jesper Buus Nielsen, Daniel Wichs: Isolated Proofs of Knowledge and Isolated Zero Knowledge. EUROCRYPT 2008: 509-526
102EEIvan Damgård, Jesper Buus Nielsen, Claudio Orlandi: Essentially Optimal Universally Composable Oblivious Transfer. ICISC 2008: 318-335
101EEIvan Damgård, Martin Geisler, Mikkel Krøigaard: Homomorphic encryption and secure comparison. IJACT 1(1): 22-31 (2008)
100EEIvan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Cryptography in the Bounded-Quantum-Storage Model. SIAM J. Comput. 37(6): 1865-1890 (2008)
2007
99EEIvan Damgård, Martin Geisler, Mikkel Krøigaard: Efficient and Secure Comparison for On-Line Auctions. ACISP 2007: 416-430
98EEIvan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen: Secure Protocols with Asymmetric Trust. ASIACRYPT 2007: 357-375
97EEIvan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Secure Identification and QKD in the Bounded-Quantum-Storage Model. CRYPTO 2007: 342-359
96EEIvan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner: A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. CRYPTO 2007: 360-378
95EEIvan Damgård, Jesper Buus Nielsen: Scalable and Unconditionally Secure Multiparty Computation. CRYPTO 2007: 572-590
94EERonald Cramer, Ivan Damgård, Robbert de Haan: Atomic Secure Multi-party Multiplication with Low Communication. EUROCRYPT 2007: 329-346
93EEIvan Damgård, Rune Thorbek: Non-interactive Proofs for Integer Multiplication. EUROCRYPT 2007: 412-429
92EEIvan Damgård: A "proof-reading" of Some Issues in Cryptography. ICALP 2007: 2-11
2006
91EEIvan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Oblivious Transfer and Linear Functions. CRYPTO 2006: 427-444
90EEIvan Damgård, Yuval Ishai: Scalable Secure Multiparty Computation. CRYPTO 2006: 501-520
89EEIvan Damgård, Kasper Dupont, Michael Østergaard Pedersen: Unclonable Group Identification. EUROCRYPT 2006: 555-572
88EEJesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen: Simplified Threshold RSA with Adaptive and Proactive Security. EUROCRYPT 2006: 593-611
87EEPeter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. Financial Cryptography 2006: 142-147
86EEIvan Damgård, Rune Thorbek: Linear Integer Secret Sharing and Distributed Exponentiation. Public Key Cryptography 2006: 75-90
85EEIvan Damgård: Theory and Practice of Multiparty Computation. SCN 2006: 360-364
84EEIvan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft: Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. TCC 2006: 285-304
83EEIvan Damgård, Nelly Fazio, Antonio Nicolosi: Non-interactive Zero-Knowledge from Homomorphic Encryption. TCC 2006: 41-59
82EEIvan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner: A Tight High-Order Entropic Quantum Uncertainty Relation With Applications CoRR abs/quant-ph/0612014: (2006)
81EEIvan Damgård, Gudmund Skovbjerg Frandsen: An Extended Quadratic Frobenius Primality Test with Average- and Worst-Case Error Estimate. J. Cryptology 19(4): 489-520 (2006)
2005
80EEIvan Damgård, Yuval Ishai: Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. CRYPTO 2005: 378-394
79EEIvan Damgård, Thomas Brochmann Pedersen, Louis Salvail: A Quantum Cipher with Near Optimal Key-Recycling. CRYPTO 2005: 494-510
78EEIvan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Cryptography In the Bounded Quantum-Storage Model. FOCS 2005: 449-458
77EEIvan Damgård, Kasper Dupont: Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. Public Key Cryptography 2005: 346-361
76EERonald Cramer, Ivan Damgård, Yuval Ishai: Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. TCC 2005: 342-362
75EEIvan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner: Cryptography In the Bounded Quantum-Storage Model CoRR abs/quant-ph/0508222: (2005)
74EEIvan Damgård, Gudmund Skovbjerg Frandsen: Efficient algorithms for the gcd and cubic residuosity in the ring of Eisenstein integers. J. Symb. Comput. 39(6): 643-652 (2005)
2004
73EEIvan Damgård, Serge Fehr, Louis Salvail: Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks. CRYPTO 2004: 254-272
72EEIvan Damgård, Thomas Pedersen, Louis Salvail: On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. EUROCRYPT 2004: 91-108
71EERonald Cramer, Ivan Damgård: Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation. TCC 2004: 223-237
70EEIvan Damgård, Serge Fehr, Kirill Morozov, Louis Salvail: Unfair Noisy Channels and Oblivious Transfer. TCC 2004: 355-373
69EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: Adaptive versus Non-Adaptive Security of Multi-Party Protocols. J. Cryptology 17(3): 153-207 (2004)
2003
68EEIvan Damgård, Mads Jurik: A Length-Flexible Threshold Cryptosystem with Applications. ACISP 2003: 350-364
67EEIvan Damgård, Jesper Buus Nielsen: Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. CRYPTO 2003: 247-264
66EEIvan Damgård, Gudmund Skovbjerg Frandsen: Efficient Algorithms for GCD and Cubic Residuosity in the Ring of Eisenstein Integers. FCT 2003: 109-117
65EEIvan Damgård, Gudmund Skovbjerg Frandsen: An Extended Quadratic Frobenius Primality Test with Average and Worst Case Error Estimates. FCT 2003: 118-131
64EEIvan Damgård, Jens Groth: Non-interactive and reusable non-malleable commitment schemes. STOC 2003: 426-437
2002
63EEIvan Damgård, Eiichiro Fujisaki: A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order. ASIACRYPT 2002: 125-142
62EEIvan Damgård, Jesper Buus Nielsen: Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. CRYPTO 2002: 449-464
61EEIvan Damgård, Jesper Buus Nielsen: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. CRYPTO 2002: 581-596
60EEIvan Damgård, Maciej Koprowski: Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups. EUROCRYPT 2002: 256-271
59EEIvan Damgård, Mads Jurik: Client/Server Tradeoffs for Online Elections. Public Key Cryptography 2002: 125-140
2001
58EERonald Cramer, Ivan Damgård: Secure Distributed Linear Algebra in a Constant Number of Rounds. CRYPTO 2001: 119-136
57EERonald Cramer, Ivan Damgård, Serge Fehr: On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase. CRYPTO 2001: 503-523
56EEIvan Damgård, Maciej Koprowski: Practical Threshold RSA Signatures without a Trusted Dealer. EUROCRYPT 2001: 152-165
55EERan Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin: On Adaptive vs. Non-adaptive Security of Multiparty Protocols. EUROCRYPT 2001: 262-279
54EERonald Cramer, Ivan Damgård, Jesper Buus Nielsen: Multiparty Computation from Threshold Homomorphic Encryption. EUROCRYPT 2001: 280-299
53EEIvan Damgård, Mads Jurik: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Public Key Cryptography 2001: 119-136
2000
52EEJan Camenisch, Ivan Damgård: Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. ASIACRYPT 2000: 331-345
51EEIvan Damgård, Jesper Buus Nielsen: Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. CRYPTO 2000: 432-450
50EERonald Cramer, Ivan Damgård, Ueli M. Maurer: General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. EUROCRYPT 2000: 316-334
49EEIvan Damgård: Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. EUROCRYPT 2000: 418-430
48 Ronald Cramer, Ivan Damgård, Philip D. MacKenzie: Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions. Public Key Cryptography 2000: 354-373
47EERonald Cramer, Ivan Damgård, Stefan Dziembowski: On the complexity of verifiable secret sharing and multiparty computation. STOC 2000: 325-334
46EEJoan Boyar, Ivan Damgård, René Peralta: Short Non-Interactive Cryptographic Proofs. J. Cryptology 13(4): 449-472 (2000)
1999
45 Ivan Damgård: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998 Springer 1999
44EERonald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin: Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326
43EEIvan Damgård, Joe Kilian, Louis Salvail: On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions. EUROCRYPT 1999: 56-73
1998
42EERonald Cramer, Ivan Damgård: Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? CRYPTO 1998: 424-441
41EEIvan Damgård, Birgit Pfitzmann: Sequential Iteration of Interactive Arguments and an Efficient Zero-Knowledge Argument for NP. ICALP 1998: 772-783
40EEIvan Damgård: Commitment Schemes and Zero-Knowledge Protocols. Lectures on Data Security 1998: 63-86
39 Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: Statistical Secrecy and Multibit Commitments. IEEE Transactions on Information Theory 44(3): 1143-1151 (1998)
38EEJørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen: Zero-Knowledge Authentication Scheme with Secret Key Exchange. J. Cryptology 11(3): 147-159 (1998)
37EEIvan Damgård, Lars R. Knudsen: Two-Key Triple Encryption. J. Cryptology 11(3): 209-218 (1998)
1997
36EERonald Cramer, Ivan Damgård: Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. EUROCRYPT 1997: 75-87
35EERonald Cramer, Ivan Damgård: Linear Zero-Knowledge - A Note on Efficient Zero-Knowledge Proofs and Arguments. STOC 1997: 436-445
34 Ivan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. J. Cryptology 10(3): 163-194 (1997)
1996
33EERonald Cramer, Ivan Damgård: New Generation of Secure and Practical RSA-Based Signatures. CRYPTO 1996: 173-185
32EEIvan Damgård, Torben P. Pedersen: New Convertible Undeniable Signature Schemes. EUROCRYPT 1996: 372-386
31 Ronald Cramer, Ivan Damgård, Torben P. Pedersen: Efficient and Provable Security Amplifications. Security Protocols Workshop 1996: 101-109
1995
30EERonald Cramer, Ivan Damgård: Escure Signature Schemes based on Interactive Protocols. CRYPTO 1995: 297-310
29EEIvan Damgård, Oded Goldreich, Tatsuaki Okamoto, Avi Wigderson: Honest Verifier vs Dishonest Verifier in Public Cain Zero-Knowledge Proofs. CRYPTO 1995: 325-338
28 Ivan Damgård, Lars R. Knudsen: Multiple Encryption with Minimum Key. Cryptography: Policy and Algorithms 1995: 156-164
27 Ivan Damgård: Practical and Provably Secure Release of a Secret and Exchange of Signatures. J. Cryptology 8(4): 201-222 (1995)
1994
26EERonald Cramer, Ivan Damgård, Berry Schoenmakers: Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. CRYPTO 1994: 174-187
25EELidong Chen, Ivan Damgård, Torben P. Pedersen: Parallel Divertibility of Proofs of Knowledge (Extended Abstract). EUROCRYPT 1994: 140-155
1993
24EEIvan Damgård: Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions (Extended Abstract). CRYPTO 1993: 100-109
23EEIvan Damgård, Torben P. Pedersen, Birgit Pfitzmann: On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures. CRYPTO 1993: 250-265
22EEIvan Damgård: Practical and Provably Secure Release of a Secret and Exchange of Signatures. EUROCRYPT 1993: 200-217
21EEIvan Damgård, Lars R. Knudsen: The Breaking of the AR Hash Function. EUROCRYPT 1993: 286-292
1992
20EEJørgen Brandt, Ivan Damgård: On Generation of Probable Primes By Incremental Search. CRYPTO 1992: 358-370
19EEIvan Damgård: Non-Interactive Circuit Based Proofs and Non-Interactive Perfect Zero-knowledge with Proprocessing. EUROCRYPT 1992: 341-355
18EELidong Chen, Ivan Damgård: Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract). EUROCRYPT 1992: 461-466
1991
17 Ivan Damgård: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings Springer 1991
16EEJørgen Brandt, Ivan Damgård, Peter Landrock: Speeding up Prime Number Generation. ASIACRYPT 1991: 440-449
15EEIvan Damgård: Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. CRYPTO 1991: 445-456
1990
14EEJoan Boyar, David Chaum, Ivan Damgård, Torben P. Pedersen: Convertible Undeniable Signatures. CRYPTO 1990: 189-205
1989
13EEIvan Damgård: On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs. CRYPTO 1989: 17-27
12EEIvan Damgård: A Design Principle for Hash Functions. CRYPTO 1989: 416-427
1988
11EEIvan Damgård: On the Randomness of Legendre and Jacobi Sequences. CRYPTO 1988: 163-172
10EEIvan Damgård: Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals. CRYPTO 1988: 328-335
9EEGilles Brassard, Ivan Damgård: "Practical IP" <= MA. CRYPTO 1988: 580-582
8EEJørgen Brandt, Ivan Damgård, Peter Landrock, Torben P. Pedersen: Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract). CRYPTO 1988: 583-588
7EEJørgen Brandt, Ivan Damgård, Peter Landrock: Anonymous and Verifiable Registration in Databases. EUROCRYPT 1988: 167-176
6 David Chaum, Claude Crépeau, Ivan Damgård: Multiparty Unconditionally Secure Protocols (Extended Abstract) STOC 1988: 11-19
1987
5EEErnest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf: Gradual and Verifiable Release of a Secret. CRYPTO 1987: 156-166
4EEDavid Chaum, Claude Crépeau, Ivan Damgård: Multiparty Unconditionally Secure Protocols (Abstract). CRYPTO 1987: 462
3EEDavid Chaum, Ivan Damgård, Jeroen van de Graaf: Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. CRYPTO 1987: 87-119
2EEIvan Damgård: Collision Free Hash Functions and Public Key Signature Schemes. EUROCRYPT 1987: 203-216
1 Ivan Damgård: Concatenated group codes and their exponents. IEEE Transactions on Information Theory 33(6): 849-854 (1987)

Coauthor Index

1Luca Aceto [108] [109]
2Jesús F. Almansa [88]
3Peter Bogetoft [87] [114]
4Joan Boyar [14] [46]
5Jørgen Brandt [7] [8] [16] [20] [38]
6Gilles Brassard [9]
7Ernest F. Brickell [5]
8Jan Camenisch [52]
9Ran Canetti [55] [69]
10David Chaum [3] [4] [5] [6] [14]
11Lidong Chen [18] [25]
12Dan Lund Christensen [114]
13Ronald Cramer [26] [30] [31] [33] [35] [36] [42] [44] [47] [48] [50] [54] [57] [58] [71] [76] [94] [116]
14Claude Crépeau [4] [6]
15Yvo Desmedt [98]
16Kasper Dupont [77] [89]
17Stefan Dziembowski [44] [47] [55] [69]
18Nelly Fazio [83]
19Serge Fehr [57] [70] [73] [75] [78] [82] [91] [96] [97] [100] [115]
20Matthias Fitzi [84] [98]
21Gudmund Skovbjerg Frandsen [65] [66] [74] [81]
22Eiichiro Fujisaki [63]
23Martin Geisler [99] [101] [110] [113] [114]
24Leslie Ann Goldberg [108] [109]
25Oded Goldreich [29]
26Jeroen van de Graaf [3] [5]
27Jens Groth [64]
28Robbert de Haan [94]
29Magnús M. Halldórsson [108] [109]
30Martin Hirt [44]
31Dennis Hofheinz [105]
32Anna Ingólfsdóttir [108] [109]
33Yuval Ishai [55] [69] [76] [80] [90] [106]
34Thomas Jakobsen [87] [114]
35Mads Jurik [53] [59] [68]
36Joe Kilian [43]
37Eike Kiltz [84] [105]
38Lars R. Knudsen [21] [28] [37] [107]
39Maciej Koprowski [56] [60]
40Mikkel Krøigaard [99] [101] [106] [110] [113] [114]
41Peter Landrock [7] [8] [16] [38]
42Carolin Lunemann [115]
43Philip D. MacKenzie [48]
44Tal Malkin [55] [69]
45Ueli M. Maurer [50]
46Gert Læssøe Mikkelsen [112]
47Kirill Morozov [70]
48Antonio Nicolosi [83]
49Janus Dam Nielsen [114]
50Jesper Buus Nielsen [51] [54] [61] [62] [67] [84] [88] [95] [98] [102] [103] [106] [111] [113] [114]
51Kurt Nielsen [87] [114]
52Tatsuaki Okamoto [29]
53Claudio Orlandi [102]
54Jakob Illeborg Pagter (Jakob Pagter) [87] [114]
55Michael Østergaard Pedersen [89] [104]
56Thomas Pedersen [72]
57Torben P. Pedersen [8] [14] [23] [25] [31] [32] [34] [38] [39]
58Thomas Brochmann Pedersen [79]
59René Peralta [46]
60Birgit Pfitzmann [23] [34] [39] [41]
61Tal Rabin [44]
62Renato Renner [82] [96]
63Louis Salvail [43] [70] [72] [73] [75] [78] [79] [82] [91] [96] [97] [100] [115]
64Christian Schaffner [75] [78] [82] [91] [96] [97] [100] [115]
65Berry Schoenmakers [26]
66Michael I. Schwartzbach [114]
67Adam Smith [106]
68Søren S. Thomsen [107]
69Rune Thorbek [86] [93] [105]
70Tomas Toft [84] [87] [114]
71Igor Walukiewicz [108] [109]
72Daniel Wichs [103] [111]
73Avi Wigderson [29]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)