×

Nielsen, Jesper Buus

Compute Distance To:
Author ID: nielsen.jesper-buus Recent zbMATH articles by "Nielsen, Jesper Buus"
Published as: Nielsen, Jesper Buus; Buus Nielsen, Jesper; Nielsen, Jesper B.
all top 5

Co-Authors

3 single-authored
30 Damgård, Ivan Bjerre
10 Venturi, Daniele
8 Orlandi, Claudio
7 Faonio, Antonio
6 Nordholt, Peter Sebastian
5 Faust, Sebastian
5 Hirt, Martin
5 Jakobsen, Thomas Pelle
4 David, Bernardo Machado
4 Frederiksen, Tore Kasper
4 Simkin, Mark
4 Zottarel, Angela
3 Coron, Jean-Sébastien
3 Dupuis, Frédéric
3 Fitzi, Matthias
3 Geisler, Martin
3 Krøigaard, Mikkel
3 Larsen, Kasper Green
3 Mukherjee, Pratyay
3 Ranellucci, Samuel
3 Rijmen, Vincent
3 Salvail, Louis
2 Aggarwal, Divesh
2 Burra, Sai Sheshank
2 Cascudo, Ignacio
2 Cramer, Ronald John Fitzgerald
2 Dodis, Yevgeniy
2 Döttling, Nico
2 Giacomelli, Irene
2 Hazay, Carmit
2 Ishai, Yuval
2 Krawczyk, Hugo
2 Obremski, Maciej
2 Pagter, Jakob I.
2 Przydatek, Bartosz
2 Purwanto, Erick
2 Toft, Tomas
2 Trifiletti, Roberto
2 Wichs, Daniel
1 Almansa, Jesús F.
1 Baum, Carsten
1 Beerliová-Trubíniová, Zuzana
1 Bendlin, Rikke
1 Bogetoft, Peter
1 Bro Miltersen, Peter
1 Canetti, Ran
1 Christensen, Dan Lund
1 Desmedt, Yvo G.
1 Dowsley, Rafael
1 Funder, Jakob
1 Gentry, Craig
1 Ghosh, Satrajit
1 Halevi, Shai
1 Harnik, Danny
1 Hubáček, Pavel
1 Jacob, Riko
1 Kiltz, Eike
1 Kushilevitz, Eyal
1 Larraia, Enrique
1 Lunemann, Carolin
1 Magri, Bernardo
1 Meldgaard, Sigurd
1 Nielsen, Janus Dam
1 Nielsen, Kurt
1 Nilges, Tobias
1 Oechsner, Sabine
1 Orsini, Emmanuela
1 Ostrovsky, Rafail
1 Polychroniadou, Antigoni
1 Rabin, Tal
1 Raskin, Michael A.
1 Ribeiro, João L.
1 Rosén, Adi
1 Rosen, Alon
1 Scholl, Peter
1 Schwartzbach, Michael I.
1 Smart, Nigel P.
1 Triandopoulos, Nikos
1 Yakoubov, Sophia

Publications by Year

Citations contained in zbMATH Open

75 Publications have been cited 654 times in 404 Documents Cited by Year
A new approach to practical active-secure two-party computation. Zbl 1296.94134
Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank
46
2012
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. Zbl 1027.68601
Nielsen, Jesper Buus
39
2002
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
35
2003
Multiparty computation from threshold homomorphic encryption. Zbl 1010.94553
Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B.
29
2001
Scalable and unconditionally secure multiparty computation. Zbl 1215.94041
Damgård, Ivan; Nielsen, Jesper Buus
28
2007
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Zbl 1028.94505
Damgård, Ivan; Nielsen, Jesper Buus
26
2002
Continuous non-malleable codes. Zbl 1326.94093
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
24
2014
LEGO for two-party secure computation. Zbl 1213.94124
Nielsen, Jesper Buus; Orlandi, Claudio
20
2009
Improved non-committing encryption schemes based on a general complexity assumption. Zbl 0989.68509
Damgård, Ivan; Nielsen, Jesper Buus
20
2000
Secure multiparty computation and secret sharing. Zbl 1322.68003
Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus
20
2015
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026
Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas
18
2006
Secure multiparty computation goes live. Zbl 1417.94045
Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan; Geisler, Martin; Jakobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob; Schwartzbach, Michael; Toft, Tomas
18
2009
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
17
2008
Universally composable efficient multiparty computation from threshold homomorphic encryption. Zbl 1122.94366
Damgård, Ivan; Nielsen, Jesper Buus
16
2003
Asynchronous multiparty computation: theory and implementation. Zbl 1227.68014
Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus
15
2009
Perfectly secure oblivious RAM without random oracles. Zbl 1295.94046
Damgård, Ivan; Meldgaard, Sigurd; Nielsen, Jesper Buus
15
2011
Secure two-party quantum evaluation of unitaries against specious adversaries. Zbl 1283.81047
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
13
2010
Privacy-free garbled circuits with applications to efficient zero-knowledge. Zbl 1371.94634
Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio
11
2015
A tamper and leakage resilient von Neumann architecture. Zbl 1345.94060
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
11
2015
The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited. Zbl 1407.94099
Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel
11
2017
Actively secure two-party evaluation of any quantum operation. Zbl 1296.94110
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
11
2012
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
11
2008
Additively homomorphic UC commitments with optimal amortized overhead. Zbl 1345.94047
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto
10
2015
Superposition attacks on cryptographic protocols. Zbl 1395.94278
Damgård, Ivan; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis
9
2014
Simplified threshold RSA with adaptive and proactive security. Zbl 1140.94319
Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus
9
2006
Leakage-resilient signatures with graceful degradation. Zbl 1335.94071
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
9
2014
MiniLEGO: efficient secure two-party computation from general assumptions. Zbl 1312.94049
Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
9
2013
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. Zbl 07178462
Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark
9
2019
Mind your coins: fully leakage-resilient signatures with graceful degradation. Zbl 1440.94049
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
8
2015
On the complexity of additively homomorphic UC commitments. Zbl 1388.94055
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto
8
2016
Compact VSS and efficient homomorphic UC commitments. Zbl 1317.94101
Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus
7
2014
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
7
2015
Signature schemes secure against hard-to-invert leakage. Zbl 1292.94061
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
7
2012
Yes, there is an oblivious RAM lower bound! Zbl 1430.94077
Larsen, Kasper Green; Nielsen, Jesper Buus
7
2018
On the connection between leakage tolerance and adaptive security. Zbl 1314.94091
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
6
2013
A threshold pseudorandom function construction and its applications. Zbl 1026.94539
Nielsen, Jesper Buus
6
2002
Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus
5
2016
Robust multiparty computation with linear communication complexity. Zbl 1129.94307
Hirt, Martin; Nielsen, Jesper Buus
5
2006
Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
5
2016
On the necessary and sufficient assumptions for UC computation. Zbl 1274.94060
Damgård, Ivan; Nielsen, Jesper Buus; Orlandi, Claudio
4
2010
Lower and upper bounds for deniable public-key encryption. Zbl 1227.94029
Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
4
2011
Continuously non-malleable codes with split-state refresh. Zbl 1440.94048
Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele
3
2018
Adaptive versus static security in the UC model. Zbl 1368.94093
Damgård, Ivan; Nielsen, Jesper Buus
3
2014
Universally composable multiparty computation with partially isolated parties. Zbl 1213.94097
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2009
From passive to covert security at low cost. Zbl 1274.94058
Damgård, Ivan; Geisler, Martin; Nielsen, Jesper Buus
3
2010
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. Zbl 1027.68056
Damgård, Ivan; Nielsen, Jesper Buus
3
2002
Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052
Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick
3
2019
Isolated proofs of knowledge and isolated zero knowledge. Zbl 1149.94310
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2008
Fully simulatable quantum-secure coin-flipping and applications. Zbl 1280.62126
Lunemann, Carolin; Nielsen, Jesper Buus
3
2011
Maliciously secure oblivious linear function evaluation with constant overhead. Zbl 1420.94067
Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias
3
2017
Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. Zbl 1154.94457
Hirt, Martin; Nielsen, Jesper Buus
3
2005
Faster maliciously secure two-party computation using the GPU. Zbl 1378.94043
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus
3
2014
Predictable arguments of knowledge. Zbl 1404.94067
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
3
2017
Non-malleable codes with split-state refresh. Zbl 1404.94065
Faonio, Antonio; Nielsen, Jesper Buus
3
2017
On the communication required for unconditionally secure multiplication. Zbl 1391.94740
Damgård, Ivan; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Michael
2
2016
On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. Zbl 1343.94045
Damgård, Ivan; Dupuis, Frédéric; Nielsen, Jesper Buus
2
2015
On the number of synchronous rounds sufficient for authenticated Byzantine agreement. Zbl 1261.68025
Fitzi, Matthias; Nielsen, Jesper Buus
2
2009
Lower bounds for leakage-resilient secret sharing. Zbl 1479.94338
Nielsen, Jesper Buus; Simkin, Mark
2
2020
Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract). Zbl 1137.94372
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2005
Asynchronous multi-party computation with quadratic communication. Zbl 1155.68384
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2008
Continuously non-malleable codes with split-state refresh. Zbl 1423.94070
Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele
1
2019
Secure key management in the cloud. Zbl 1318.68046
Damgård, Ivan; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Pagter, Jakob I.
1
2013
Privacy-enhancing auctions using rational cryptography. Zbl 1252.94088
Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikos
1
2009
Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Zbl 1387.94006
1
2018
Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Zbl 1387.94008
1
2018
Unconditionally secure computation with reduced interaction. Zbl 1371.94631
Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi
1
2016
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Zbl 1380.94087
Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele
1
2017
TARDIS: a foundation of time-lock puzzles in UC. Zbl 1479.94124
Baum, Carsten; David, Bernardo; Dowsley, Rafael; Nielsen, Jesper Buus; Oechsner, Sabine
1
2021
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.
1
2021
Lower bounds for oblivious data structures. Zbl 1432.68093
Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus
1
2019
Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Zbl 1360.94005
1
2017
Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Zbl 1360.94006
1
2017
On the computational overhead of MPC with dishonest majority. Zbl 1400.94167
Nielsen, Jesper Buus; Ranellucci, Samuel
1
2017
Fully leakage-resilient codes. Zbl 1404.94066
Faonio, Antonio; Nielsen, Jesper Buus
1
2017
Communication lower bounds for statistically secure MPC, with or without preprocessing. Zbl 1478.68091
Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus
1
2019
TARDIS: a foundation of time-lock puzzles in UC. Zbl 1479.94124
Baum, Carsten; David, Bernardo; Dowsley, Rafael; Nielsen, Jesper Buus; Oechsner, Sabine
1
2021
High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080
Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P.
1
2021
Lower bounds for leakage-resilient secret sharing. Zbl 1479.94338
Nielsen, Jesper Buus; Simkin, Mark
2
2020
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. Zbl 07178462
Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark
9
2019
Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052
Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick
3
2019
Continuously non-malleable codes with split-state refresh. Zbl 1423.94070
Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele
1
2019
Lower bounds for oblivious data structures. Zbl 1432.68093
Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus
1
2019
Communication lower bounds for statistically secure MPC, with or without preprocessing. Zbl 1478.68091
Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus
1
2019
Yes, there is an oblivious RAM lower bound! Zbl 1430.94077
Larsen, Kasper Green; Nielsen, Jesper Buus
7
2018
Continuously non-malleable codes with split-state refresh. Zbl 1440.94048
Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele
3
2018
Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Zbl 1387.94006
1
2018
Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Zbl 1387.94008
1
2018
The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited. Zbl 1407.94099
Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel
11
2017
Maliciously secure oblivious linear function evaluation with constant overhead. Zbl 1420.94067
Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias
3
2017
Predictable arguments of knowledge. Zbl 1404.94067
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
3
2017
Non-malleable codes with split-state refresh. Zbl 1404.94065
Faonio, Antonio; Nielsen, Jesper Buus
3
2017
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Zbl 1380.94087
Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele
1
2017
Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Zbl 1360.94005
1
2017
Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Zbl 1360.94006
1
2017
On the computational overhead of MPC with dishonest majority. Zbl 1400.94167
Nielsen, Jesper Buus; Ranellucci, Samuel
1
2017
Fully leakage-resilient codes. Zbl 1404.94066
Faonio, Antonio; Nielsen, Jesper Buus
1
2017
On the complexity of additively homomorphic UC commitments. Zbl 1388.94055
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto
8
2016
Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus
5
2016
Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
5
2016
On the communication required for unconditionally secure multiplication. Zbl 1391.94740
Damgård, Ivan; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Michael
2
2016
Unconditionally secure computation with reduced interaction. Zbl 1371.94631
Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi
1
2016
Secure multiparty computation and secret sharing. Zbl 1322.68003
Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus
20
2015
Privacy-free garbled circuits with applications to efficient zero-knowledge. Zbl 1371.94634
Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio
11
2015
A tamper and leakage resilient von Neumann architecture. Zbl 1345.94060
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
11
2015
Additively homomorphic UC commitments with optimal amortized overhead. Zbl 1345.94047
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto
10
2015
Mind your coins: fully leakage-resilient signatures with graceful degradation. Zbl 1440.94049
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
8
2015
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
7
2015
On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. Zbl 1343.94045
Damgård, Ivan; Dupuis, Frédéric; Nielsen, Jesper Buus
2
2015
Continuous non-malleable codes. Zbl 1326.94093
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
24
2014
Superposition attacks on cryptographic protocols. Zbl 1395.94278
Damgård, Ivan; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis
9
2014
Leakage-resilient signatures with graceful degradation. Zbl 1335.94071
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
9
2014
Compact VSS and efficient homomorphic UC commitments. Zbl 1317.94101
Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus
7
2014
Adaptive versus static security in the UC model. Zbl 1368.94093
Damgård, Ivan; Nielsen, Jesper Buus
3
2014
Faster maliciously secure two-party computation using the GPU. Zbl 1378.94043
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus
3
2014
MiniLEGO: efficient secure two-party computation from general assumptions. Zbl 1312.94049
Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
9
2013
On the connection between leakage tolerance and adaptive security. Zbl 1314.94091
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
6
2013
Secure key management in the cloud. Zbl 1318.68046
Damgård, Ivan; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Pagter, Jakob I.
1
2013
A new approach to practical active-secure two-party computation. Zbl 1296.94134
Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank
46
2012
Actively secure two-party evaluation of any quantum operation. Zbl 1296.94110
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
11
2012
Signature schemes secure against hard-to-invert leakage. Zbl 1292.94061
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
7
2012
Perfectly secure oblivious RAM without random oracles. Zbl 1295.94046
Damgård, Ivan; Meldgaard, Sigurd; Nielsen, Jesper Buus
15
2011
Lower and upper bounds for deniable public-key encryption. Zbl 1227.94029
Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
4
2011
Fully simulatable quantum-secure coin-flipping and applications. Zbl 1280.62126
Lunemann, Carolin; Nielsen, Jesper Buus
3
2011
Secure two-party quantum evaluation of unitaries against specious adversaries. Zbl 1283.81047
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
13
2010
On the necessary and sufficient assumptions for UC computation. Zbl 1274.94060
Damgård, Ivan; Nielsen, Jesper Buus; Orlandi, Claudio
4
2010
From passive to covert security at low cost. Zbl 1274.94058
Damgård, Ivan; Geisler, Martin; Nielsen, Jesper Buus
3
2010
LEGO for two-party secure computation. Zbl 1213.94124
Nielsen, Jesper Buus; Orlandi, Claudio
20
2009
Secure multiparty computation goes live. Zbl 1417.94045
Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan; Geisler, Martin; Jakobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob; Schwartzbach, Michael; Toft, Tomas
18
2009
Asynchronous multiparty computation: theory and implementation. Zbl 1227.68014
Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus
15
2009
Universally composable multiparty computation with partially isolated parties. Zbl 1213.94097
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2009
On the number of synchronous rounds sufficient for authenticated Byzantine agreement. Zbl 1261.68025
Fitzi, Matthias; Nielsen, Jesper Buus
2
2009
Privacy-enhancing auctions using rational cryptography. Zbl 1252.94088
Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikos
1
2009
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
17
2008
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
11
2008
Isolated proofs of knowledge and isolated zero knowledge. Zbl 1149.94310
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2008
Asynchronous multi-party computation with quadratic communication. Zbl 1155.68384
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2008
Scalable and unconditionally secure multiparty computation. Zbl 1215.94041
Damgård, Ivan; Nielsen, Jesper Buus
28
2007
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026
Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas
18
2006
Simplified threshold RSA with adaptive and proactive security. Zbl 1140.94319
Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus
9
2006
Robust multiparty computation with linear communication complexity. Zbl 1129.94307
Hirt, Martin; Nielsen, Jesper Buus
5
2006
Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. Zbl 1154.94457
Hirt, Martin; Nielsen, Jesper Buus
3
2005
Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract). Zbl 1137.94372
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2005
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
35
2003
Universally composable efficient multiparty computation from threshold homomorphic encryption. Zbl 1122.94366
Damgård, Ivan; Nielsen, Jesper Buus
16
2003
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. Zbl 1027.68601
Nielsen, Jesper Buus
39
2002
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Zbl 1028.94505
Damgård, Ivan; Nielsen, Jesper Buus
26
2002
A threshold pseudorandom function construction and its applications. Zbl 1026.94539
Nielsen, Jesper Buus
6
2002
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. Zbl 1027.68056
Damgård, Ivan; Nielsen, Jesper Buus
3
2002
Multiparty computation from threshold homomorphic encryption. Zbl 1010.94553
Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B.
29
2001
Improved non-committing encryption schemes based on a general complexity assumption. Zbl 0989.68509
Damgård, Ivan; Nielsen, Jesper Buus
20
2000
all top 5

Cited by 705 Authors

21 Hazay, Carmit
19 Nielsen, Jesper Buus
15 Venturi, Daniele
14 Ostrovsky, Rafail
13 Ishai, Yuval
11 Damgård, Ivan Bjerre
10 Venkitasubramaniam, Muthuramakrishnan
9 Faonio, Antonio
9 Lindell, Yehuda
9 Orsini, Emmanuela
8 Goyal, Vipul
8 Hofheinz, Dennis
8 Katz, Jonathan N.
8 Libert, Benoît
8 Scholl, Peter
8 Smart, Nigel P.
7 Canetti, Ran
7 Coretti, Sandro
7 Khurana, Dakshita
7 Komargodski, Ilan
7 Polychroniadou, Antigoni
6 Cohen, Ran
6 Kushilevitz, Eyal
6 Shi, Elaine
6 Soria-Vazquez, Eduardo
6 Wichs, Daniel
6 Yung, Moti
5 Baum, Carsten
5 Camenisch, Jan L.
5 Dodis, Yevgeniy
5 Garay, Juan A.
5 Gupta, Divya
5 Huang, Jianye
5 Huang, Qiong
5 Jager, Tibor
5 Maji, Hemanta K.
5 Mohassel, Payman
5 Nayak, Kartik
5 O’Neill, Adam
5 Pass, Rafael
5 Patra, Arpita
5 Sahai, Amit
5 Susilo, Willy
5 Toft, Tomas
5 Visconti, Ivan
4 Applebaum, Benny
4 Asharov, Gilad
4 Boyle, Elette
4 Broadbent, Anne
4 Cascudo, Ignacio
4 Chan, T.-H. Hubert
4 Chen, Rongmao
4 Chung, Kai-Min
4 Dachman-Soled, Dana
4 Fujisaki, Eiichiro
4 Gagliardoni, Tommaso
4 Hanaoka, Goichiro
4 Hemenway, Brett
4 Kiltz, Eike
4 Liu, Feng-Hao
4 Matsuda, Takahiro
4 Mu, Yi
4 Mukherjee, Pratyay
4 Pinkas, Benny
4 Prabhakaran, Manoj M.
4 Raghuraman, Srinivasan
4 Ranellucci, Samuel
4 Schaffner, Christian
4 Song, Yifan
4 Srinivasan, Akshayaram
4 Tanaka, Keisuke
4 Waters, Brent
4 Yanai, Avishay
4 Zhandry, Mark
4 Zikas, Vassilis
3 Aggarwal, Divesh
3 Agrawal, Shashank
3 Ateniese, Giuseppe
3 Bartusek, James
3 Chandran, Nishanth
3 Choudhary, Ashish
3 Chow, Sherman S. M.
3 Chu, Cheng-Kang
3 David, Bernardo Machado
3 Döttling, Nico
3 Farshim, Pooya
3 Faust, Sebastian
3 Fischlin, Marc
3 Gordon, S. Dov
3 Guo, Fuchun
3 Haitner, Iftach
3 Kanukurthi, Bhavana
3 Kaptchuk, Gabriel
3 Larraia, Enrique
3 Li, Yanbing
3 Lin, Wei-Kai
3 Malozemoff, Alex J.
3 Maurer, Ueli M.
3 Nof, Ariel
3 Orlandi, Claudio
...and 605 more Authors
all top 5

Cited in 40 Serials

58 Journal of Cryptology
20 Theoretical Computer Science
19 Designs, Codes and Cryptography
5 SIAM Journal on Computing
4 International Journal of Theoretical Physics
4 Information Sciences
4 Quantum Information Processing
3 Journal of Computer and System Sciences
3 Information and Computation
3 Distributed Computing
2 Information Processing Letters
2 Journal of Zhejiang University. Science A
2 Cryptography and Communications
1 Artificial Intelligence
1 Computers & Mathematics with Applications
1 Discrete Applied Mathematics
1 Physics Letters. A
1 Automatica
1 Social Choice and Welfare
1 Mathematical and Computer Modelling
1 SIAM Journal on Discrete Mathematics
1 Journal of Parallel and Distributed Computing
1 Neural Computation
1 International Journal of Foundations of Computer Science
1 Computational Complexity
1 Formal Methods in System Design
1 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
1 Finite Fields and their Applications
1 Journal of the ACM
1 Journal of Discrete Mathematical Sciences & Cryptography
1 New Journal of Physics
1 ACM Transactions on Information and System Security (TISSEC)
1 Mathematical Biosciences and Engineering
1 Journal of Mathematical Cryptology
1 Advances in Mathematics of Communications
1 Statistical Analysis and Data Mining
1 Journal of Logical and Algebraic Methods in Programming
1 Journal of Applied Mathematics and Computational Mechanics
1 Zhurnal Belorusskogo Gosudarstvennogo Universiteta. Matematika. Informatika
1 Prikladnaya Diskretnaya Matematika

Citations by Year