Continuously Non-malleable Codes in the Split-State Model. / Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele.
I: Journal of Cryptology, Bind 33, Nr. 4, 10.2020, s. 2034-2077.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Tidsskriftartikel › Forskning › peer review
Lower bounds for leakage-resilient secret sharing. / Nielsen, Jesper Buus; Simkin, Mark.
Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. red. / Anne Canteaut; Yuval Ishai. Cham : Springer, 2020. s. 556-577 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bind 12105 LNCS).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Afgjort : A partially synchronous finality layer for blockchains. / Dinsdale-Young, Thomas; Magri, Bernardo; Matt, Christian; Nielsen, Jesper Buus; Tschudi, Daniel.
Security and Cryptography for Networks. red. / Clemente Galdi; Vladimir Kolesnikov. Cham : Springer, 2020. s. 24-44 (Lecture Notes in Computer Science, Bind 12238).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Fast threshold ECDSA with honest majority. / Damgård, Ivan; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Pagter, Jakob Illeborg; Østergaard, Michael Bæksvang.
Security and Cryptography for Networks. red. / Clemente Galdi; Vladimir Kolesnikov. Cham : Springer, 2020. s. 382-400 (Lecture Notes in Computer Science, Bind 12238).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Reverse firewalls for actively secure mpcs. / Chakraborty, Suvradip; Dziembowski, Stefan; Nielsen, Jesper Buus.
Advances in Cryptology - CRYPTO 2020. red. / Daniele Micciancio; Thomas Ristenpart. Cham : Springer, 2020. s. 732-762 (Lecture Notes in Computer Science, Bind 12171).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Continuously non-malleable codes with split-state refresh. / Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele.
I: Theoretical Computer Science, Bind 759, 02.2019, s. 98-132.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Tidsskriftartikel › Forskning › peer review
Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing. / Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus.
Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. red. / Alexandra Boldyreva; Daniele Micciancio. Bind II Springer, 2019. s. 61-84 (Lecture Notes in Computer Science, Bind 11693).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Lower Bounds for Oblivious Data Structures. / Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. red. / Timothy M. Chan. Society for Industrial and Applied Mathematics, 2019. s. 2439-2447 (Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, Bind PRDA19).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. / Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark.
Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings. red. / Alexandra Boldyreva; Daniele Micciancio. Bind II Cham : Springer, 2019. s. 510-539 (Lecture Notes in Computer Science, Bind 11693).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Continuously Non-malleable Codes with Split-State Refresh. / Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele.
Applied Cryptography and Network Security. red. / Bart Preneel; Frederik Vercauteren. Bind 10892 Cham : Springer VS, 2018. s. 121-139 (Lecture Notes in Computer Science (LNCS); Nr. 10892).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Yes, There is an Oblivious RAM Lower Bound! / Larsen, Kasper Green; Nielsen, Jesper Buus.
Advances in Cryptology -- CRYPTO 2018. red. / Hovav Shacham; Alexandra Boldyreva. Cham : Springer VS, 2018. s. 523-542 (Lecture Notes in Computer Science (LNCS); Nr. 10992).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
DUPLO: Unifying Cut-and-Choose for Garbled Circuits. / Kolesnikov, Vladimir; Nielsen, Jesper Buus; Rosulek, Mike; Trieu, Ni; Trifiletti, Roberto.
DUPLO: Unifying Cut-and-Choose for Garbled Circuits. New York, NY, USA : Association for Computing Machinery, 2017. s. 3-20.Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. / Döttling, Nico Marcel; Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias; Trifiletti, Roberto.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security : CCS '17. Association for Computing Machinery, 2017. s. 2263-2276.Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Fully Leakage-resilient Signatures Revisited : Graceful degradation, noisy leakage, and construction in the bounded-retrieval model. / Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele.
I: Theoretical Computer Science, Bind 660, Nr. C, 01.01.2017, s. 23-56.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Tidsskriftartikel › Forskning › peer review
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. / Coron, Jean-Sébastien (Redaktør); Nielsen, Jesper Buus (Redaktør).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III. red. / Jean-Sébastien Coron; Jesper Buus Nielsen. Bind 10212 Springer, Cham : Springer VS, 2017. (Lecture Notes in Computer Science, Bind 10212).Publikation: Bidrag til bog/antologi/rapport/proceeding › Bidrag til bog/antologi › Forskning › peer review
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. / Coron, Jean-Sébastien (Redaktør); Nielsen, Jesper Buus (Redaktør).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II. red. / Jean-Sébastien Coron; Jesper Buus Nielsen. Bind 10211 Springer, Cham : Springer VS, 2017. (Lecture Notes in Computer Science, Bind 10211).Publikation: Bidrag til bog/antologi/rapport/proceeding › Bidrag til bog/antologi › Forskning › peer review
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. / Coron, Jean-Sébastien (Redaktør); Nielsen, Jesper Buus (Redaktør).
Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I. red. / Jean-Sébastien Coron; Jesper Buus Nielsen. Bind 10210 Springer, Cham : Springer VS, 2017. (Lecture Notes in Computer Science, Bind 10210).Publikation: Bidrag til bog/antologi/rapport/proceeding › Bidrag til bog/antologi › Forskning › peer review
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. / Nielsen, Jesper Buus; Schneider, Thomas; Trifiletti, Roberto.
NDSS ’17. San Diego, CA : Internet Society, 2017. s. 1-15.Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Fully Leakage-Resilient Codes. / Faonio, Antonio; Nielsen, Jesper Buus.
Public-Key Cryptography -- PKC 2017. red. / Serge Fehr. Bind 10174 Berlin, Heidelberg : Springer VS, 2017. s. 333-358 (Lecture Notes in Computer Science, Bind 10174).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. / Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias.
Advances in Cryptology -- ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. red. / Tsuyoshi Takagi; Thomas Peyrin. Bind 10624 Cham : Springer VS, 2017. s. 629-659 (Lecture Notes in Computer Science, Bind 10624).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Non-malleable Codes with Split-State Refresh. / Faonio, Antonio; Nielsen, Jesper Buus.
Public-Key Cryptography -- PKC 2017. red. / Serge Fehr. Berlin, Heidelberg : Springer VS, 2017. s. 279-309 (Lecture Notes in Computer Science, Bind 10174).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
On the computational overhead of MPC with dishonest majority. / Nielsen, Jesper Buus; Ranellucci, Samuel.
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. red. / Serge Fehr . Bind 10175 Berlin Heidelberg : Springer VS, 2017. s. 369-395 (Lecture Notes in Computer Science, Bind 10175).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Predictable arguments of knowledge. / Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele.
Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. red. / Serge Fehr. Bind 10174 Springer VS, 2017. s. 121-150 (Lecture Notes in Computer Science, Bind 10174).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
The tinytable protocol for 2-party secure computation, or : Gate-scrambling revisited. / Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel.
Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. red. / Jonathan Katz; Hovav Shacham. Bind 10401 Springer VS, 2017. s. 167-187 (Lecture Notes in Computer Science, Bind 10401).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Signature Schemes Secure Against Hard-to-Invert Leakage. / Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela.
I: Journal of Cryptology, Bind 29, Nr. 2, 04.2016, s. 422-455.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Tidsskriftartikel › Forskning › peer review
A Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas P.; Nielsen, Jesper Buus; Orlandi, Claudio.
2016, Internet Archive.Publikation: Andet › Udgivelser på nettet - Net-publikation › Forskning
Cross and Clean: Amortized Garbled Circuits with Constant Overhead. / Nielsen, Jesper Buus; Orlandi, Claudio.
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I. red. / Martin Hirt; Adam Smith. Bind 9985 Berlin : Springer VS, 2016. s. 582-603 (Lecture Notes in Computer Science (LNCS), Bind 9985).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel.
2016, Internet Archive.Publikation: Andet › Udgivelser på nettet - Net-publikation › Forskning
On the Communication Required for Unconditionally Secure Multiplication. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Mikhail.
Advances in Cryptology – CRYPTO 2016. Bind 9815 Springer VS, 2016. s. 459-488 (Lecture Notes in Computer Science, Bind 9815).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
On the Communication and Round Complexity of Secure Computation. / Polychroniadou, Antigoni; Damgård, Ivan Bjerre; Garg, Sanjam; Mukherjee, Pratyay; Nielsen, Jesper Buus; Pandey, Omkant.
Aarhus : Institut for Datalogi, Aarhus Universitet, 2016. 29 s.Publikation: Bog/antologi/afhandling/rapport › Rapport › Forskning › peer review
On the Complexity of Additively Homomorphic UC Commitments. / Trifiletti, Roberto; Nielsen, Jesper Buus; Frederiksen, Tore Kasper; Jakobsen, Thomas P.
Theory of Cryptography - 13th International Conference, TCC 2016-A. red. / Eyal Kushilevitz; Tal Malkin. Bind 9562 Springer Berlin Heidelberg : Springer VS, 2016. s. 542-565 (Lecture Notes in Computer Science, Bind 9562).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
On the Computational Overhead of MPC with Dishonest Majority. / Nielsen, Jesper Buus; Ranellucci, Samuel.
2016, Internet Archive.Publikation: Andet › Udgivelser på nettet - Net-publikation › Forskning
Rate-1, linear time and additively homomorphic UC commitments. / Cascudo, Ignacio; Damgård, Ivan; David, Bernardo Machado; Döttling, Nico; Nielsen, Jesper Buus.
Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. red. / Matthew Robshaw; Jonathan Katz. Bind 9816 Springer VS, 2016. s. 179-207 (Lecture Notes in Computer Science, Bind 9816).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Reactive garbling : Foundation, instantiation, application. / Nielsen, Jesper Buus; Ranellucci, Samuel.
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. red. / Jung Hee Cheon; Tsuyoshi Takagi . Bind 10032 Springer VS, 2016. s. 1022-1052 (Lecture Notes in Computer Science, Bind 10032).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Unconditionally secure computation with reduced interaction. / Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi.
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. red. / Marc Fischlin; Jean-Sébastien Coron . Bind 9666 Springer VS, 2016. s. 420-447 (Lecture Notes in Computer Science, Bind 9666).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation. / Trifiletti, Roberto; Nielsen, Jesper Buus; Jakobsen, Thomas P.; Frederiksen, Tore Kasper.
2015.Publikation: Andet › Udgivelser på nettet - Net-publikation › Forskning
A Tamper and Leakage Resilient von Neumann Architecture. / Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele.
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings. red. / Jonathan Katz. Springer VS, 2015. s. 579-603 (Lecture Notes in Computer Science, Bind 9020).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Additively Homomorphic UC commitments with Optimal Amortized Overhead. / Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; David, Bernardo Machado; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto.
Public-Key Cryptography, PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30-April 1, 2015, Proceedings. red. / Jonathan Katz . Springer, 2015. s. 495–515 (Lecture Notes in Computer Science, Bind 9020).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. / Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela ; Scholl, Peter; Smart, Nigel P.
2015, Report 2015/472.Publikation: Andet › Udgivelser på nettet - Net-publikation › Forskning
Mind Your Coins : Fully Leakage-Resilient Signatures with Graceful Degradation. / Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele.
Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I. red. / Magnús M. Halldórsson; Kazuo Iwama; Naoki Kobayashi; Bettina Speckmann. Bind Part 1 Berlin : Springer VS, 2015. s. 456-468 (Lecture Notes in Computer Science; Nr. Part 1, Bind 9134).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. / Damgård, Ivan Bjerre; Dupont-Dupuis, Fréderic; Nielsen, Jesper Buus.
Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. Springer VS, 2015. s. 87-104 (Lecture Notes in Computer Science, Bind 9063).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio.
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II. red. / Elisabeth Oswald; Marc Fischlin. Springer VS, 2015. s. 191-219 (Lecture Notes in Computer Science, Bind 9057).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Secure Multiparty Computation and Secret Sharing. / Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus.
Cambridge : Cambridge University Press, 2015. 381 s.Publikation: Bog/antologi/afhandling/rapport › Bog › Forskning › peer review
Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes. / Nielsen, Jesper Buus.
8th International Conference on Information Theoretic Security, ICITS 2015. red. / S. Wolf ; A. Lehmann. Bind 9063 Springer, 2015. s. XI-XII (Lecture Notes in Computer Science).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. / Dodis, Yevgeniy (Redaktør); Nielsen, Jesper Buus (Redaktør).
Springer VS, 2015. 659 s. (Lecture Notes in Computer Science, Bind 9014).Publikation: Bog/antologi/afhandling/rapport › Antologi › Forskning › peer review
Theory of Cryptography : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II. / Dodis, Yevgeniy (Redaktør); Nielsen, Jesper Buus (Redaktør).
Springer VS, 2015. 659 s. (Lecture Notes in Computer Science, Bind 9015).Publikation: Bog/antologi/afhandling/rapport › Antologi › Forskning › peer review
Adaptive versus static security in the UC Model. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.
Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. red. / Sherman S. M. Chow ; Joseph K. Liu; Lucas C. K. Hui ; Siu Ming Yiu. Springer VS, 2014. s. 10-28 (Lecture Notes in Computer Science, Bind 8782).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Faster Maliciously Secure Two-Party Computation Using the GPU. / Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus.
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. red. / Michel Abdalla; Roberto De Prisco. Springer, 2014. s. 358-379 (Lecture Notes in Computer Science, Bind 8642).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Leakage-resilient signatures with graceful degradation. / Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela.
Public-Key Cryptography – PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. red. / Hugo Krawczyk. Springer, 2014. s. 362-379 (Lecture Notes in Computer Science, Bind 8383 ).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Superposition attacks on cryptographic protocols. / Damgård, Ivan Bjerre; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis.
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings. red. / Carles Padró . Springer, 2014. s. 142-161 (Lecture Notes in Computer Science, Bind 8317).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Compact VSS and Efficient Homomorphic UC Commitments. / Damgård, Ivan Bjerre; David, Bernardo Machado; Giacomelli, Irene; Nielsen, Jesper Buus.
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. red. / Palash Sarkar; Tetsu Iwata. Springer VS, 2014. s. 213-232 (Lecture Notes in Computer Science, Bind 8874).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Continuous Non-malleable Codes. / Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniel.
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings. red. / Yehuda Lindell. Springer, 2014. s. 465-488 (Lecture Notes in Computer Science, Bind 8349).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Framework for Outsourcing of Secure Computation. / Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Orlandi, Claudio.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14 . red. / Gail-Joon Ahn ; Alina Oprea; Reihaneh Safavi-Naini. Association for Computing Machinery, 2014. s. 81-92 .Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio.
Cryptology ePrint Archive, 2014. s. 30.Publikation: Working paper › Forskning
On the Connection between Leakage Tolerance and Adaptive Security. / Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela.
Public-Key Cryptography – PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 – March 1, 2013. Proceedings. red. / Kaoru Kurosawa ; Goichiro Hanaoka. Springer VS, 2013. s. 497-515 (Lecture Notes in Computer Science, Bind 7778).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Fast and maliciously secure two-party computation using the GPU. / Frederiksen, Tore Kasper; Nielsen, Jesper Buus.
Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceeding. Springer VS, 2013. s. 339-356 (Lecture Notes in Computer Science, Bind 7954).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Limits on the Power of Cryptographic Cheap Talk. / Hubacek, Pavel; Nielsen, Jesper Buus; Rosen, Alon.
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I. red. / Ran Canetti ; Juan A. Garay . Springer VS, 2013. s. 277-297 (Lecture Notes in Computer Science, Bind 8042).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
MiniLEGO : Efficient secure two-party computation from general assumptions. / Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.
Advances in Cryptology – EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. red. / Thomas Johansson; Phong Q. Nguyen. Springer VS, 2013. s. 537-556 (Lecture Notes in Computer Science, Bind 7881 ).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Secure Key Management in the Cloud. / Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Pagter, Jakob Illeborg.
Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings. red. / Martijn Stam. Springer VS, 2013. s. 270-289 (Lecture Notes in Computer Science, Bind 8308).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
A New Approach to Practical Active-Secure Two-Party Computation. / Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank.
I: Lecture Notes in Computer Science, Bind 7417, 2012, s. 681-700 .Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Actively Secure Two-Party Evaluation of Any Quantum Operation. / Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis.
I: Lecture Notes in Computer Science, Bind 7417, 2012, s. 794-811.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Signature Schemes Secure against Hard-to-Invert Leakage. / Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela.
I: Lecture Notes in Computer Science, Bind 7658, 2012, s. 98-115.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
A New Approach to Practical Active-Secure Two-Party Computation. / Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank.
2011.Publikation: Working paper › Forskning
Fully simulatable quantum-secure coin-flipping and applications. / Lunemann, Carolin; Nielsen, Jesper Buus.
I: Lecture Notes in Computer Science, Bind 6737, 2011, s. 21-40.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Lower and Upper Bounds for Deniable Public-Key Encryption. / Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio.
I: Lecture Notes in Computer Science, Bind 7073, 2011, s. 125-142.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Perfectly Secure Oblivious RAM without Random Oracles. / Damgård, Ivan Bjerre; Meldgaard, Sigurd Torkel; Nielsen, Jesper Buus.
I: Lecture Notes in Computer Science, Bind 6597, 2011, s. 144-163.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Superposition Attacks on Cryptographic Protocols. / Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus; Salvail, Louis.
2011.Publikation: Working paper › Forskning
A generalization of Paillier's public-key system with applications to electronic voting. / Damgård, Ivan Bjerre; Jurik, Mads Johan; Nielsen, Jesper Buus.
I: International Journal of Information Security, Bind 9, Nr. 6, 2010, s. 371-385.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Tidsskriftartikel › Forskning › peer review
From Passive to Covert Security at Low Cost. / Damgård, Ivan Bjerre; Geisler, Martin; Nielsen, Jesper Buus.
I: Lecture Notes in Computer Science, Bind 5978, 2010, s. 128-145.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
On the Necessary and Sufficient Assumptions for UC Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.
I: Lecture Notes in Computer Science, Bind 5978, 2010, s. 109-127.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
On the theoretical gap between synchronous and asynchronous MPC protocols. / Beerliová-Trubíniová, Zuzana; Hirt, Martin; Nielsen, Jesper Buus.
Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing. PODC '10. red. / Andrea Richa ; Rachid Guerraoui. Association for Computing Machinery, 2010. s. 211-218.Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries. / Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis.
I: Lecture Notes in Computer Science, Bind 6223, 2010, s. 685-706.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Asynchronous Multiparty Computation : Theory and Implementation. / Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus.
I: Lecture Notes in Computer Science, Bind 5443, 2009, s. 160-179.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Essentially Optimal Universally Composable Oblivious Transfer. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio.
I: Lecture Notes in Computer Science, Bind 5461, 2009, s. 1-14.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
LEGO for Two-Party Secure Computation. / Nielsen, Jesper Buus; Orlandi, Claudio.
I: Lecture Notes in Computer Science, Bind 5444, 2009, s. 368-386.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
On the Number of Synchronous Rounds Sufficient for Authenticated Byzantine Agreement. / Fitzi, Matthias; Nielsen, Jesper Buus.
I: Lecture Notes in Computer Science, Bind 5805, 2009, s. 449-463.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Privacy-Enhancing Auctions Using Rational Cryptography. / Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikolaos.
I: Lecture Notes in Computer Science, Bind 5677, 2009, s. 541-558.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Secure Multiparty Computation Goes Live. / Bøgetoft, Peter; Lund Christensen, Dan; Damgård, Ivan Bjerre; Geisler, Martin; Jacobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob Illeborg; Schwartzbach, Michael Ignatieff; Toft, Tomas; Nielsen, Kurt.
I: Lecture Notes in Computer Science, Bind 5628, 2009, s. 325-343.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Universally Composable Multiparty Computation with Partially Isolated Parties. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel.
I: Lecture Notes in Computer Science, Bind 5444, 2009, s. 315-331.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Asynchronous Multi-Party Computation with Quadratic Communication. / Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz.
I: Lecture Notes in Computer Science, Bind 5126, 2008, s. 473-485.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Isolated Proofs of Knowledge and Isolated Zero Knowledge. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Wichs, Daniel.
I: Lecture Notes in Computer Science, Bind 4965, 2008, s. 509-526.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
OT-Combiners Via Secure Computation. / Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus.
I: Lecture Notes in Computer Science, Bind 4948, 2008, s. 393-411.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
Scalable Multiparty Computation with Nearly Optimal Work and Resilience. / Damgård, Ivan Bjerre; Krøigaard, Mikkel; Ishai, Yuval; Nielsen, Jesper Buus; Smith, Adam.
I: Lecture Notes in Computer Science, Bind 5157, 2008, s. 241-261.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Konferenceartikel › Forskning › peer review
How to Share a Key (Invited paper). / Fitzi, Matthias; Nielsen, Jesper Buus; Wolf, Stefan.
2007. Paper præsenteret ved 45th Annual Allerton Conference on Communication, Control, and Computing, 2007, Urbana-Champaign, USA.Publikation: Konferencebidrag › Paper › Forskning
Scalable and Unconditionally Secure Multiparty Computation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings. red. / Alfred Menezes. Springer, 2007. s. 572-590 (Lecture Notes in Computer Science, Bind 4622).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Secure Protocols with Asymmetric Trust. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Fitzi, Matthias; Desmedt, Yvo.
Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Springer, 2007. s. 357-375 (Lecture Notes in Computer Science, Bind 4833).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Summary Report on Rational Cryptographic Protocols. / Nielsen, Jesper Buus (Redaktør); Alwen, Joël; Cachin, Christian; Pereira, Olivier; Sadeghi, Ahmad-Reza; Schoenmakers, Berry; Shelat, Abhi; Visconti, Ivan.
ECRYPT - European Network of Excellence in Cryptology, 2007.Publikation: Working paper › Forskning
Robust Multiparty Computation with Linear Communication Complexity. / Hirt, Martin; Nielsen, Jesper Buus.
Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference. red. / Cynthia Dwork. 2006. s. 463-482 (Lecture Notes in Computer Science, Bind 4117).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Simplified Threshold RSA with Adaptive and Proactive Security. / Almansa Guerra, Jesus Fernando; Damgård, Ivan Bjerre; Nielsen, Jesper Buus.
Advances in Cryptology - Eurocrypt 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006. Proceedings. red. / Serge Vaudenay. Springer, 2006. s. 593-611 (Lecture Notes in Computer Science, Bind 4004).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Summary Report on Unconditionally Secure Protocols. / Nielsen, Jesper Buus (Redaktør); Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian.
University of Aarhus (BRICS) : ECRYPT - European Network of Excellence in Cryptology, 2006. s. 1- 25.Publikation: Working paper › Forskning
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Toft, Tomas; Kiltz, Eike; Fitzi, Matthias.
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings. red. / Shai Halevi; Tal Rabin. Springer, 2006. s. 285-304 (Lecture Notes in Computer Science, Bind 3876).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience : Extended abstract. / Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz.
Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings. red. / Ronald Cramer. Springer LNCS 3494, 2005. s. 322-340 (Lecture Notes in Computer Science, Bind 3494).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Generic yet Practical ZK Arguments from any Public-Coin HVZK. / Zhao, Yunlei; Nielsen, Jesper Buus; Deng, Robert H.; Feng, Dengguo.
I: Electronic Colloquium on Computational Complexity, Nr. TR05-162, 2005, s. 1-16.Publikation: Bidrag til tidsskrift/Konferencebidrag i tidsskrift /Bidrag til avis › Tidsskriftartikel › Forskning
How to Split a Shared Secret into Shared Bits in Constant-Round. / Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus; Toft, Tomas.
Cryptology ePrint Archive, 2005. 11 s.Publikation: Bog/antologi/afhandling/rapport › Rapport › Forskning › peer review
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computations. / Hirt, Martin; Nielsen, Jesper Buus.
Advances in Cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings. red. / Bimal Roy. Springer, 2005. s. 79-99 (Lecture Notes in Computer Science, Bind 3788).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Universally Composable Protocols with Relaxed Set-Up Assumptions. / Barak, B.; Canetti, R.; Nielsen, J.B.; Pass, R.; IEEE (Redaktør).
Ikke angivet. IEEE Press, 2004. s. 186-195.Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Universally composable protocols with relaxed set-up assumptions. / Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus; Pass, Rafael.
45th Annual IEEE Symposium on Foundations of Computer Science, 2004. Proceedings.. IEEE Computer Society Press, 2004. s. 186-195.Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
On Protocol Security in the Cryptographic Model. / Nielsen, Jesper Buus.
BRICS Dissertation Series DS-03-8 udg. Århus Universitet : Afdeling for Kunsthistorie, Institut for Æstetiske Fag, Aarhus Universitet, 2003.Publikation: Bog/antologi/afhandling/rapport › Ph.d.-afhandling
Relaxing Chosen-Ciphertext Security. / Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus.
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings. red. / Dan Boneh. Springer, 2003. s. 565-582 (Lecture Notes in Computer Science, Bind 2729).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. / Damgård, Ivan Bjerre; Nielsen, Jesper Buus.
Advances in Cryptology - CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings. red. / Dan Boneh. Springer, 2003. s. 247-264 (Lecture Notes in Computer Science, Bind 2729).Publikation: Bidrag til bog/antologi/rapport/proceeding › Konferencebidrag i proceedings › Forskning › peer review