Aarhus University Seal / Aarhus Universitets segl

Jesper Buus Nielsen

  1. 2020
  2. Udgivet

    Continuously Non-malleable Codes in the Split-State Model. / Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele.

    I: Journal of Cryptology, Bind 33, Nr. 4, 10.2020, s. 2034-2077.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

  3. Udgivet

    Lower bounds for leakage-resilient secret sharing. / Nielsen, Jesper Buus; Simkin, Mark.

    Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. red. / Anne Canteaut; Yuval Ishai. Cham : Springer, 2020. s. 556-577 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bind 12105 LNCS).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  4. Udgivet

    Afgjort : A partially synchronous finality layer for blockchains. / Dinsdale-Young, Thomas; Magri, Bernardo; Matt, Christian; Nielsen, Jesper Buus; Tschudi, Daniel.

    Security and Cryptography for Networks. red. / Clemente Galdi; Vladimir Kolesnikov. Cham : Springer, 2020. s. 24-44 (Lecture Notes in Computer Science, Bind 12238).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  5. Udgivet

    Fast threshold ECDSA with honest majority. / Damgård, Ivan; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Pagter, Jakob Illeborg; Østergaard, Michael Bæksvang.

    Security and Cryptography for Networks. red. / Clemente Galdi; Vladimir Kolesnikov. Cham : Springer, 2020. s. 382-400 (Lecture Notes in Computer Science, Bind 12238).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  6. Udgivet

    Reverse firewalls for actively secure mpcs. / Chakraborty, Suvradip; Dziembowski, Stefan; Nielsen, Jesper Buus.

    Advances in Cryptology - CRYPTO 2020. red. / Daniele Micciancio; Thomas Ristenpart. Cham : Springer, 2020. s. 732-762 (Lecture Notes in Computer Science, Bind 12171).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  7. 2019
  8. Udgivet

    Continuously non-malleable codes with split-state refresh. / Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele.

    I: Theoretical Computer Science, Bind 759, 02.2019, s. 98-132.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

  9. Udgivet

    Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing. / Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus.

    Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. red. / Alexandra Boldyreva; Daniele Micciancio. Bind II Springer, 2019. s. 61-84 (Lecture Notes in Computer Science, Bind 11693).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  10. Udgivet

    Lower Bounds for Oblivious Data Structures. / Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus.

    Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. red. / Timothy M. Chan. Society for Industrial and Applied Mathematics, 2019. s. 2439-2447 (Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, Bind PRDA19).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  11. Udgivet

    Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. / Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark.

    Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings. red. / Alexandra Boldyreva; Daniele Micciancio. Bind II Cham : Springer, 2019. s. 510-539 (Lecture Notes in Computer Science, Bind 11693).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  12. 2018
  13. Udgivet

    Continuously Non-malleable Codes with Split-State Refresh. / Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele.

    Applied Cryptography and Network Security. red. / Bart Preneel; Frederik Vercauteren. Bind 10892 Cham : Springer VS, 2018. s. 121-139 (Lecture Notes in Computer Science (LNCS); Nr. 10892).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  14. Udgivet

    Yes, There is an Oblivious RAM Lower Bound! / Larsen, Kasper Green; Nielsen, Jesper Buus.

    Advances in Cryptology -- CRYPTO 2018. red. / Hovav Shacham; Alexandra Boldyreva. Cham : Springer VS, 2018. s. 523-542 (Lecture Notes in Computer Science (LNCS); Nr. 10992).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  15. 2017
  16. Udgivet

    DUPLO: Unifying Cut-and-Choose for Garbled Circuits. / Kolesnikov, Vladimir; Nielsen, Jesper Buus; Rosulek, Mike; Trieu, Ni; Trifiletti, Roberto.

    DUPLO: Unifying Cut-and-Choose for Garbled Circuits. New York, NY, USA : Association for Computing Machinery, 2017. s. 3-20.

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  17. Udgivet

    TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. / Döttling, Nico Marcel; Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias; Trifiletti, Roberto.

    Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security : CCS '17. Association for Computing Machinery, 2017. s. 2263-2276.

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  18. Udgivet

    Fully Leakage-resilient Signatures Revisited : Graceful degradation, noisy leakage, and construction in the bounded-retrieval model. / Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele.

    I: Theoretical Computer Science, Bind 660, Nr. C, 01.01.2017, s. 23-56.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

  19. Udgivet

    Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. / Coron, Jean-Sébastien (Redaktør); Nielsen, Jesper Buus (Redaktør).

    Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. red. / Jean-Sébastien Coron; Jesper Buus Nielsen. Bind 10212 Springer, Cham : Springer VS, 2017. (Lecture Notes in Computer Science, Bind 10212).

    Publikation: Bidrag til bog/antologi/rapport/proceedingBidrag til bog/antologiForskningpeer review

  20. Udgivet

    Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. / Coron, Jean-Sébastien (Redaktør); Nielsen, Jesper Buus (Redaktør).

    Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. red. / Jean-Sébastien Coron; Jesper Buus Nielsen. Bind 10211 Springer, Cham : Springer VS, 2017. (Lecture Notes in Computer Science, Bind 10211).

    Publikation: Bidrag til bog/antologi/rapport/proceedingBidrag til bog/antologiForskningpeer review

  21. Udgivet

    Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. / Coron, Jean-Sébastien (Redaktør); Nielsen, Jesper Buus (Redaktør).

    Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. red. / Jean-Sébastien Coron; Jesper Buus Nielsen. Bind 10210 Springer, Cham : Springer VS, 2017. (Lecture Notes in Computer Science, Bind 10210).

    Publikation: Bidrag til bog/antologi/rapport/proceedingBidrag til bog/antologiForskningpeer review

  22. Udgivet

    Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. / Nielsen, Jesper Buus; Schneider, Thomas; Trifiletti, Roberto.

    NDSS ’17. San Diego, CA : Internet Society, 2017. s. 1-15.

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  23. Udgivet

    Fully Leakage-Resilient Codes. / Faonio, Antonio; Nielsen, Jesper Buus.

    Public-Key Cryptography -- PKC 2017. red. / Serge Fehr. Bind 10174 Berlin, Heidelberg : Springer VS, 2017. s. 333-358 (Lecture Notes in Computer Science, Bind 10174).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  24. Udgivet

    Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. / Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias.

    Advances in Cryptology -- ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. red. / Tsuyoshi Takagi; Thomas Peyrin. Bind 10624 Cham : Springer VS, 2017. s. 629-659 (Lecture Notes in Computer Science, Bind 10624).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  25. Udgivet

    Non-malleable Codes with Split-State Refresh. / Faonio, Antonio; Nielsen, Jesper Buus.

    Public-Key Cryptography -- PKC 2017. red. / Serge Fehr. Berlin, Heidelberg : Springer VS, 2017. s. 279-309 (Lecture Notes in Computer Science, Bind 10174).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  26. Udgivet

    On the computational overhead of MPC with dishonest majority. / Nielsen, Jesper Buus; Ranellucci, Samuel.

    Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. red. / Serge Fehr . Bind 10175 Berlin Heidelberg : Springer VS, 2017. s. 369-395 (Lecture Notes in Computer Science, Bind 10175).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  27. Udgivet

    Predictable arguments of knowledge. / Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele.

    Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. red. / Serge Fehr. Bind 10174 Springer VS, 2017. s. 121-150 (Lecture Notes in Computer Science, Bind 10174).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  28. Udgivet

    The tinytable protocol for 2-party secure computation, or : Gate-scrambling revisited. / Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel.

    Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. red. / Jonathan Katz; Hovav Shacham. Bind 10401 Springer VS, 2017. s. 167-187 (Lecture Notes in Computer Science, Bind 10401).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  29. 2016
  30. Udgivet

    Signature Schemes Secure Against Hard-to-Invert Leakage. / Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela.

    I: Journal of Cryptology, Bind 29, Nr. 2, 04.2016, s. 422-455.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

  31. Udgivet

    A Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas P.; Nielsen, Jesper Buus; Orlandi, Claudio.

    2016, Internet Archive.

    Publikation: AndetUdgivelser på nettet - Net-publikationForskning

  32. Udgivet

    Cross and Clean: Amortized Garbled Circuits with Constant Overhead. / Nielsen, Jesper Buus; Orlandi, Claudio.

    Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I. red. / Martin Hirt; Adam Smith. Bind 9985 Berlin : Springer VS, 2016. s. 582-603 (Lecture Notes in Computer Science (LNCS), Bind 9985).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  33. Udgivet

    Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel.

    2016, Internet Archive.

    Publikation: AndetUdgivelser på nettet - Net-publikationForskning

  34. Udgivet

    On the Communication Required for Unconditionally Secure Multiplication. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Mikhail.

    Advances in Cryptology – CRYPTO 2016. Bind 9815 Springer VS, 2016. s. 459-488 (Lecture Notes in Computer Science, Bind 9815).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  35. Udgivet

    On the Communication and Round Complexity of Secure Computation. / Polychroniadou, Antigoni; Damgård, Ivan Bjerre; Garg, Sanjam; Mukherjee, Pratyay; Nielsen, Jesper Buus; Pandey, Omkant.

    Aarhus : Institut for Datalogi, Aarhus Universitet, 2016. 29 s.

    Publikation: Bog/antologi/afhandling/rapportRapportForskningpeer review

  36. Udgivet

    On the Complexity of Additively Homomorphic UC Commitments. / Trifiletti, Roberto; Nielsen, Jesper Buus; Frederiksen, Tore Kasper; Jakobsen, Thomas P.

    Theory of Cryptography - 13th International Conference, TCC 2016-A. red. / Eyal Kushilevitz; Tal Malkin. Bind 9562 Springer Berlin Heidelberg : Springer VS, 2016. s. 542-565 (Lecture Notes in Computer Science, Bind 9562).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  37. Udgivet

    On the Computational Overhead of MPC with Dishonest Majority. / Nielsen, Jesper Buus; Ranellucci, Samuel.

    2016, Internet Archive.

    Publikation: AndetUdgivelser på nettet - Net-publikationForskning

  38. Udgivet

    Rate-1, linear time and additively homomorphic UC commitments. / Cascudo, Ignacio; Damgård, Ivan; David, Bernardo Machado; Döttling, Nico; Nielsen, Jesper Buus.

    Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. red. / Matthew Robshaw; Jonathan Katz. Bind 9816 Springer VS, 2016. s. 179-207 (Lecture Notes in Computer Science, Bind 9816).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  39. Udgivet

    Reactive garbling : Foundation, instantiation, application. / Nielsen, Jesper Buus; Ranellucci, Samuel.

    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. red. / Jung Hee Cheon; Tsuyoshi Takagi . Bind 10032 Springer VS, 2016. s. 1022-1052 (Lecture Notes in Computer Science, Bind 10032).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  40. Udgivet

    Unconditionally secure computation with reduced interaction. / Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi.

    Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. red. / Marc Fischlin; Jean-Sébastien Coron . Bind 9666 Springer VS, 2016. s. 420-447 (Lecture Notes in Computer Science, Bind 9666).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  41. 2015
  42. Udgivet

    TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation. / Trifiletti, Roberto; Nielsen, Jesper Buus; Jakobsen, Thomas P.; Frederiksen, Tore Kasper.

    2015.

    Publikation: AndetUdgivelser på nettet - Net-publikationForskning

  43. Udgivet

    A Tamper and Leakage Resilient von Neumann Architecture. / Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele.

    Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings. red. / Jonathan Katz. Springer VS, 2015. s. 579-603 (Lecture Notes in Computer Science, Bind 9020).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  44. Udgivet

    Additively Homomorphic UC commitments with Optimal Amortized Overhead. / Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; David, Bernardo Machado; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto.

    Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings. red. / Jonathan Katz . Springer, 2015. s. 495–515 (Lecture Notes in Computer Science, Bind 9020).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  45. Udgivet

    High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. / Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela ; Scholl, Peter; Smart, Nigel P.

    2015, Report 2015/472.

    Publikation: AndetUdgivelser på nettet - Net-publikationForskning

  46. Udgivet

    Mind Your Coins : Fully Leakage-Resilient Signatures with Graceful Degradation. / Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele.

    Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I. red. / Magnús M. Halldórsson; Kazuo Iwama; Naoki Kobayashi; Bettina Speckmann. Bind Part 1 Berlin : Springer VS, 2015. s. 456-468 (Lecture Notes in Computer Science; Nr. Part 1, Bind 9134).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  47. Udgivet

    On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. / Damgård, Ivan Bjerre; Dupont-Dupuis, Fréderic; Nielsen, Jesper Buus.

    Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. Springer VS, 2015. s. 87-104 (Lecture Notes in Computer Science, Bind 9063).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  48. Udgivet

    Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio.

    Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. red. / Elisabeth Oswald; Marc Fischlin. Springer VS, 2015. s. 191-219 (Lecture Notes in Computer Science, Bind 9057).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  49. Udgivet

    Secure Multiparty Computation and Secret Sharing. / Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Cambridge : Cambridge University Press, 2015. 381 s.

    Publikation: Bog/antologi/afhandling/rapportBogForskningpeer review

  50. Udgivet

    Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes. / Nielsen, Jesper Buus.

    8th International Conference on Information Theoretic Security, ICITS 2015. red. / S. Wolf ; A. Lehmann. Bind 9063 Springer, 2015. s. XI-XII (Lecture Notes in Computer Science).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  51. Udgivet

    Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. / Dodis, Yevgeniy (Redaktør); Nielsen, Jesper Buus (Redaktør).

    Springer VS, 2015. 659 s. (Lecture Notes in Computer Science, Bind 9014).

    Publikation: Bog/antologi/afhandling/rapportAntologiForskningpeer review

  52. Udgivet

    Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II. / Dodis, Yevgeniy (Redaktør); Nielsen, Jesper Buus (Redaktør).

    Springer VS, 2015. 659 s. (Lecture Notes in Computer Science, Bind 9015).

    Publikation: Bog/antologi/afhandling/rapportAntologiForskningpeer review

  53. 2014
  54. Udgivet

    Adaptive versus static security in the UC Model. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. red. / Sherman S. M. Chow ; Joseph K. Liu; Lucas C. K. Hui ; Siu Ming Yiu. Springer VS, 2014. s. 10-28 (Lecture Notes in Computer Science, Bind 8782).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  55. Udgivet

    Faster Maliciously Secure Two-Party Computation Using the GPU. / Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus.

    Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. red. / Michel Abdalla; Roberto De Prisco. Springer, 2014. s. 358-379 (Lecture Notes in Computer Science, Bind 8642).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  56. Udgivet

    Leakage-resilient signatures with graceful degradation. / Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela.

    Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. red. / Hugo Krawczyk. Springer, 2014. s. 362-379 (Lecture Notes in Computer Science, Bind 8383 ).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  57. Udgivet

    Superposition attacks on cryptographic protocols. / Damgård, Ivan Bjerre; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis.

    Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings. red. / Carles Padró . Springer, 2014. s. 142-161 (Lecture Notes in Computer Science, Bind 8317).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  58. Udgivet

    Compact VSS and Efficient Homomorphic UC Commitments. / Damgård, Ivan Bjerre; David, Bernardo Machado; Giacomelli, Irene; Nielsen, Jesper Buus.

    Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. red. / Palash Sarkar; Tetsu Iwata. Springer VS, 2014. s. 213-232 (Lecture Notes in Computer Science, Bind 8874).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  59. Udgivet

    Continuous Non-malleable Codes. / Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniel.

    Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings. red. / Yehuda Lindell. Springer, 2014. s. 465-488 (Lecture Notes in Computer Science, Bind 8349).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  60. Udgivet

    Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Orlandi, Claudio.

    Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14 . red. / Gail-Joon Ahn ; Alina Oprea; Reihaneh Safavi-Naini. Association for Computing Machinery, 2014. s. 81-92 .

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  61. Udgivet
  62. 2013
  63. Udgivet

    On the Connection between Leakage Tolerance and Adaptive Security. / Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela.

    Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings. red. / Kaoru Kurosawa ; Goichiro Hanaoka. Springer VS, 2013. s. 497-515 (Lecture Notes in Computer Science, Bind 7778).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  64. Udgivet

    Fast and maliciously secure two-party computation using the GPU. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus.

    Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceeding. Springer VS, 2013. s. 339-356 (Lecture Notes in Computer Science, Bind 7954).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  65. Udgivet

    Limits on the Power of Cryptographic Cheap Talk. / Hubacek, Pavel; Nielsen, Jesper Buus; Rosen, Alon.

    Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I. red. / Ran Canetti ; Juan A. Garay . Springer VS, 2013. s. 277-297 (Lecture Notes in Computer Science, Bind 8042).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  66. Udgivet

    MiniLEGO : Efficient secure two-party computation from general assumptions. / Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.

    Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. red. / Thomas Johansson; Phong Q. Nguyen. Springer VS, 2013. s. 537-556 (Lecture Notes in Computer Science, Bind 7881 ).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  67. Udgivet

    Secure Key Management in the Cloud. / Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Pagter, Jakob Illeborg.

    Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings. red. / Martijn Stam. Springer VS, 2013. s. 270-289 (Lecture Notes in Computer Science, Bind 8308).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  68. 2012
  69. Udgivet

    A New Approach to Practical Active-Secure Two-Party Computation. / Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank.

    I: Lecture Notes in Computer Science, Bind 7417, 2012, s. 681-700 .

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  70. Udgivet

    Actively Secure Two-Party Evaluation of Any Quantum Operation. / Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis.

    I: Lecture Notes in Computer Science, Bind 7417, 2012, s. 794-811.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  71. Udgivet

    Signature Schemes Secure against Hard-to-Invert Leakage. / Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela.

    I: Lecture Notes in Computer Science, Bind 7658, 2012, s. 98-115.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  72. 2011
  73. Udgivet

    A New Approach to Practical Active-Secure Two-Party Computation. / Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank.

    2011.

    Publikation: Working paperForskning

  74. Udgivet

    Fully simulatable quantum-secure coin-flipping and applications. / Lunemann, Carolin; Nielsen, Jesper Buus.

    I: Lecture Notes in Computer Science, Bind 6737, 2011, s. 21-40.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  75. Udgivet

    Lower and Upper Bounds for Deniable Public-Key Encryption. / Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.

    I: Lecture Notes in Computer Science, Bind 7073, 2011, s. 125-142.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  76. Udgivet

    Perfectly Secure Oblivious RAM without Random Oracles. / Damgård, Ivan Bjerre; Meldgaard, Sigurd Torkel; Nielsen, Jesper Buus.

    I: Lecture Notes in Computer Science, Bind 6597, 2011, s. 144-163.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  77. Udgivet

    Superposition Attacks on Cryptographic Protocols. / Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus; Salvail, Louis.

    2011.

    Publikation: Working paperForskning

  78. 2010
  79. Udgivet

    A generalization of Paillier's public-key system with applications to electronic voting. / Damgård, Ivan Bjerre; Jurik, Mads Johan; Nielsen, Jesper Buus.

    I: International Journal of Information Security, Bind 9, Nr. 6, 2010, s. 371-385.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskningpeer review

  80. Udgivet

    From Passive to Covert Security at Low Cost. / Damgård, Ivan Bjerre; Geisler, Martin; Nielsen, Jesper Buus.

    I: Lecture Notes in Computer Science, Bind 5978, 2010, s. 128-145.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  81. Udgivet

    On the Necessary and Sufficient Assumptions for UC Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    I: Lecture Notes in Computer Science, Bind 5978, 2010, s. 109-127.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  82. Udgivet

    On the theoretical gap between synchronous and asynchronous MPC protocols. / Beerliová-Trubíniová, Zuzana; Hirt, Martin; Nielsen, Jesper Buus.

    Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing. PODC '10. red. / Andrea Richa ; Rachid Guerraoui. Association for Computing Machinery, 2010. s. 211-218.

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  83. Udgivet

    Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries. / Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis.

    I: Lecture Notes in Computer Science, Bind 6223, 2010, s. 685-706.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  84. 2009
  85. Udgivet

    Asynchronous Multiparty Computation : Theory and Implementation. / Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus.

    I: Lecture Notes in Computer Science, Bind 5443, 2009, s. 160-179.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  86. Udgivet

    Essentially Optimal Universally Composable Oblivious Transfer. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.

    I: Lecture Notes in Computer Science, Bind 5461, 2009, s. 1-14.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  87. Udgivet

    LEGO for Two-Party Secure Computation. / Nielsen, Jesper Buus; Orlandi, Claudio.

    I: Lecture Notes in Computer Science, Bind 5444, 2009, s. 368-386.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  88. Udgivet

    On the Number of Synchronous Rounds Sufficient for Authenticated Byzantine Agreement. / Fitzi, Matthias; Nielsen, Jesper Buus.

    I: Lecture Notes in Computer Science, Bind 5805, 2009, s. 449-463.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  89. Udgivet

    Privacy-Enhancing Auctions Using Rational Cryptography. / Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikolaos.

    I: Lecture Notes in Computer Science, Bind 5677, 2009, s. 541-558.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  90. Udgivet

    Secure Multiparty Computation Goes Live. / Bøgetoft, Peter; Lund Christensen, Dan; Damgård, Ivan Bjerre; Geisler, Martin; Jacobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob Illeborg; Schwartzbach, Michael Ignatieff; Toft, Tomas; Nielsen, Kurt.

    I: Lecture Notes in Computer Science, Bind 5628, 2009, s. 325-343.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  91. Udgivet

    Universally Composable Multiparty Computation with Partially Isolated Parties. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel.

    I: Lecture Notes in Computer Science, Bind 5444, 2009, s. 315-331.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  92. 2008
  93. Udgivet

    Asynchronous Multi-Party Computation with Quadratic Communication. / Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz.

    I: Lecture Notes in Computer Science, Bind 5126, 2008, s. 473-485.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  94. Udgivet

    Isolated Proofs of Knowledge and Isolated Zero Knowledge. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel.

    I: Lecture Notes in Computer Science, Bind 4965, 2008, s. 509-526.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  95. Udgivet

    OT-Combiners Via Secure Computation. / Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus.

    I: Lecture Notes in Computer Science, Bind 4948, 2008, s. 393-411.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  96. Udgivet

    Scalable Multiparty Computation with Nearly Optimal Work and Resilience. / Damgård, Ivan Bjerre; Krøigaard, Mikkel; Ishai, Yuval; Nielsen, Jesper Buus; Smith, Adam.

    I: Lecture Notes in Computer Science, Bind 5157, 2008, s. 241-261.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisKonferenceartikelForskningpeer review

  97. 2007
  98. Udgivet

    How to Share a Key (Invited paper). / Fitzi, Matthias; Nielsen, Jesper Buus; Wolf, Stefan.

    2007. Paper præsenteret ved 45th Annual Allerton Conference on Communication, Control, and Computing, 2007, Urbana-Champaign, USA.

    Publikation: KonferencebidragPaperForskning

  99. Udgivet

    Scalable and Unconditionally Secure Multiparty Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings. red. / Alfred Menezes. Springer, 2007. s. 572-590 (Lecture Notes in Computer Science, Bind 4622).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  100. Udgivet

    Secure Protocols with Asymmetric Trust. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Fitzi, Matthias; Desmedt, Yvo.

    Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Springer, 2007. s. 357-375 (Lecture Notes in Computer Science, Bind 4833).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  101. Udgivet

    Summary Report on Rational Cryptographic Protocols. / Nielsen, Jesper Buus (Redaktør); Alwen, Joël; Cachin, Christian; Pereira, Olivier; Sadeghi, Ahmad-Reza; Schoenmakers, Berry; Shelat, Abhi; Visconti, Ivan.

    ECRYPT - European Network of Excellence in Cryptology, 2007.

    Publikation: Working paperForskning

  102. 2006
  103. Udgivet

    Robust Multiparty Computation with Linear Communication Complexity. / Hirt, Martin; Nielsen, Jesper Buus.

    Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference. red. / Cynthia Dwork. 2006. s. 463-482 (Lecture Notes in Computer Science, Bind 4117).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  104. Udgivet

    Simplified Threshold RSA with Adaptive and Proactive Security. / Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Advances in Cryptology - Eurocrypt 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings. red. / Serge Vaudenay. Springer, 2006. s. 593-611 (Lecture Notes in Computer Science, Bind 4004).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  105. Udgivet

    Summary Report on Unconditionally Secure Protocols. / Nielsen, Jesper Buus (Redaktør); Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian.

    University of Aarhus (BRICS) : ECRYPT - European Network of Excellence in Cryptology, 2006. s. 1- 25.

    Publikation: Working paperForskning

  106. Udgivet

    Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Toft, Tomas; Kiltz, Eike; Fitzi, Matthias.

    Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings. red. / Shai Halevi; Tal Rabin. Springer, 2006. s. 285-304 (Lecture Notes in Computer Science, Bind 3876).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  107. 2005
  108. Udgivet

    Cryptographic Asynchronous Multi-party Computation with Optimal Resilience : Extended abstract. / Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz.

    Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings. red. / Ronald Cramer. Springer LNCS 3494, 2005. s. 322-340 (Lecture Notes in Computer Science, Bind 3494).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  109. Udgivet

    Generic yet Practical ZK Arguments from any Public-Coin HVZK. / Zhao, Yunlei; Nielsen, Jesper Buus; Deng, Robert H.; Feng, Dengguo.

    I: Electronic Colloquium on Computational Complexity, Nr. TR05-162, 2005, s. 1-16.

    Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avisTidsskriftartikelForskning

  110. Udgivet

    How to Split a Shared Secret into Shared Bits in Constant-Round. / Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus; Toft, Tomas.

    Cryptology ePrint Archive, 2005. 11 s.

    Publikation: Bog/antologi/afhandling/rapportRapportForskningpeer review

  111. Udgivet

    Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computations. / Hirt, Martin; Nielsen, Jesper Buus.

    Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings. red. / Bimal Roy. Springer, 2005. s. 79-99 (Lecture Notes in Computer Science, Bind 3788).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  112. 2004
  113. Udgivet

    Universally Composable Protocols with Relaxed Set-Up Assumptions. / Barak, B.; Canetti, R.; Nielsen, J.B.; Pass, R.; IEEE (Redaktør).

    Ikke angivet. IEEE Press, 2004. s. 186-195.

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  114. Udgivet

    Universally composable protocols with relaxed set-up assumptions. / Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus; Pass, Rafael.

    45th Annual IEEE Symposium on Foundations of Computer Science, 2004. Proceedings.. IEEE Computer Society Press, 2004. s. 186-195.

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  115. 2003
  116. Udgivet

    On Protocol Security in the Cryptographic Model. / Nielsen, Jesper Buus.

    BRICS Dissertation Series DS-03-8 udg. Århus Universitet : Afdeling for Kunsthistorie, Institut for Æstetiske Fag, Aarhus Universitet, 2003.

    Publikation: Bog/antologi/afhandling/rapportPh.d.-afhandling

  117. Udgivet

    Relaxing Chosen-Ciphertext Security. / Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus.

    Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings. red. / Dan Boneh. Springer, 2003. s. 565-582 (Lecture Notes in Computer Science, Bind 2729).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

  118. Udgivet

    Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.

    Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings. red. / Dan Boneh. Springer, 2003. s. 247-264 (Lecture Notes in Computer Science, Bind 2729).

    Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

Forrige 1 2 Næste