×

zbMATH — the first resource for mathematics

Nielsen, Jesper Buus

Compute Distance To:
Author ID: nielsen.jesper-buus Recent zbMATH articles by "Nielsen, Jesper Buus"
Published as: Buus Nielsen, Jesper; Nielsen, Jesper; Nielsen, Jesper B.; Nielsen, Jesper Buus
External Links: ORCID
Documents Indexed: 82 Publications since 2000, including 9 Books

Publications by Year

Citations contained in zbMATH

60 Publications have been cited 436 times in 266 Documents Cited by Year
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
27
2003
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. Zbl 1027.68601
Nielsen, Jesper Buus
26
2002
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Zbl 1028.94505
Damgård, Ivan; Nielsen, Jesper Buus
25
2002
A new approach to practical active-secure two-party computation. Zbl 1296.94134
Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank
24
2012
Continuous non-malleable codes. Zbl 1326.94093
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
21
2014
Multiparty computation from threshold homomorphic encryption. Zbl 1010.94553
Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B.
19
2001
Improved non-committing encryption schemes based on a general complexity assumption. Zbl 0989.68509
Damgård, Ivan; Nielsen, Jesper Buus
17
2000
Scalable and unconditionally secure multiparty computation. Zbl 1215.94041
Damgård, Ivan; Nielsen, Jesper Buus
15
2007
LEGO for two-party secure computation. Zbl 1213.94124
Nielsen, Jesper Buus; Orlandi, Claudio
13
2009
Secure multiparty computation and secret sharing. Zbl 1322.68003
Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus
12
2015
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
12
2008
Universally composable efficient multiparty computation from threshold homomorphic encryption. Zbl 1122.94366
Damgård, Ivan; Nielsen, Jesper Buus
12
2003
Secure multiparty computation goes live. Zbl 1417.94045
Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan; Geisler, Martin; Jakobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob; Schwartzbach, Michael; Toft, Tomas
11
2009
A tamper and leakage resilient von Neumann architecture. Zbl 1345.94060
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
10
2015
Perfectly secure oblivious RAM without random oracles. Zbl 1295.94046
Damgård, Ivan; Meldgaard, Sigurd; Nielsen, Jesper Buus
10
2011
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026
Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas
10
2006
Mind your coins: fully leakage-resilient signatures with graceful degradation. Zbl 1440.94049
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
8
2015
Additively homomorphic UC commitments with optimal amortized overhead. Zbl 1345.94047
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto
8
2015
Leakage-resilient signatures with graceful degradation. Zbl 1335.94071
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
8
2014
MiniLEGO: efficient secure two-party computation from general assumptions. Zbl 1312.94049
Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
8
2013
Secure two-party quantum evaluation of unitaries against specious adversaries. Zbl 1283.81047
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
8
2010
Asynchronous multiparty computation: theory and implementation. Zbl 1227.68014
Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus
8
2009
On the complexity of additively homomorphic UC commitments. Zbl 1388.94055
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto
7
2016
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
7
2008
Privacy-free garbled circuits with applications to efficient zero-knowledge. Zbl 1371.94634
Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio
6
2015
Superposition attacks on cryptographic protocols. Zbl 1395.94278
Damgård, Ivan; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis
6
2014
Compact VSS and efficient homomorphic UC commitments. Zbl 1317.94101
Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus
6
2014
Signature schemes secure against hard-to-invert leakage. Zbl 1292.94061
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
6
2012
Simplified threshold RSA with adaptive and proactive security. Zbl 1140.94319
Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus
6
2006
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
Dodis, Yevgeniy (ed.); Nielsen, Jesper Buus (ed.)
5
2015
On the connection between leakage tolerance and adaptive security. Zbl 1314.94091
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
5
2013
Actively secure two-party evaluation of any quantum operation. Zbl 1296.94110
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
5
2012
Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus
4
2016
Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
4
2016
On the necessary and sufficient assumptions for UC computation. Zbl 1274.94060
Damgård, Ivan; Nielsen, Jesper Buus; Orlandi, Claudio
4
2010
Robust multiparty computation with linear communication complexity. Zbl 1129.94307
Hirt, Martin; Nielsen, Jesper Buus
4
2006
Continuously non-malleable codes with split-state refresh. Zbl 1440.94048
Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele
3
2018
The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited. Zbl 1407.94099
Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel
3
2017
Non-malleable codes with split-state refresh. Zbl 1404.94065
Faonio, Antonio; Nielsen, Jesper Buus
3
2017
Predictable arguments of knowledge. Zbl 1404.94067
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
3
2017
Faster maliciously secure two-party computation using the GPU. Zbl 1378.94043
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus
3
2014
Universally composable multiparty computation with partially isolated parties. Zbl 1213.94097
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2009
Isolated proofs of knowledge and isolated zero knowledge. Zbl 1149.94310
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2008
Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. Zbl 1154.94457
Hirt, Martin; Nielsen, Jesper Buus
3
2005
A threshold pseudorandom function construction and its applications. Zbl 1026.94539
Nielsen, Jesper Buus
3
2002
Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052
Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick
2
2019
Adaptive versus static security in the UC model. Zbl 1368.94093
Damgård, Ivan; Nielsen, Jesper Buus
2
2014
Lower and upper bounds for deniable public-key encryption. Zbl 1227.94029
Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
2
2011
From passive to covert security at low cost. Zbl 1274.94058
Damgård, Ivan; Geisler, Martin; Nielsen, Jesper Buus
2
2010
Asynchronous multi-party computation with quadratic communication. Zbl 1155.68384
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2008
Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract). Zbl 1137.94372
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2005
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. Zbl 1027.68056
Damgård, Ivan; Nielsen, Jesper Buus
2
2002
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. Zbl 07178462
Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark
1
2019
Continuously non-malleable codes with split-state refresh. Zbl 1423.94070
Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele
1
2019
Fully leakage-resilient codes. Zbl 1404.94066
Faonio, Antonio; Nielsen, Jesper Buus
1
2017
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Zbl 1380.94087
Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele
1
2017
On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. Zbl 1343.94045
Damgård, Ivan; Dupuis, Frédéric; Nielsen, Jesper Buus
1
2015
Secure key management in the cloud. Zbl 1318.68046
Damgård, Ivan; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Pagter, Jakob I.
1
2013
Fully simulatable quantum-secure coin-flipping and applications. Zbl 1280.62126
Lunemann, Carolin; Nielsen, Jesper Buus
1
2011
Privacy-enhancing auctions using rational cryptography. Zbl 1252.94088
Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikos
1
2009
Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052
Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick
2
2019
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. Zbl 07178462
Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark
1
2019
Continuously non-malleable codes with split-state refresh. Zbl 1423.94070
Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele
1
2019
Continuously non-malleable codes with split-state refresh. Zbl 1440.94048
Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele
3
2018
The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited. Zbl 1407.94099
Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel
3
2017
Non-malleable codes with split-state refresh. Zbl 1404.94065
Faonio, Antonio; Nielsen, Jesper Buus
3
2017
Predictable arguments of knowledge. Zbl 1404.94067
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
3
2017
Fully leakage-resilient codes. Zbl 1404.94066
Faonio, Antonio; Nielsen, Jesper Buus
1
2017
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Zbl 1380.94087
Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele
1
2017
On the complexity of additively homomorphic UC commitments. Zbl 1388.94055
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto
7
2016
Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus
4
2016
Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
4
2016
Secure multiparty computation and secret sharing. Zbl 1322.68003
Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus
12
2015
A tamper and leakage resilient von Neumann architecture. Zbl 1345.94060
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
10
2015
Mind your coins: fully leakage-resilient signatures with graceful degradation. Zbl 1440.94049
Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele
8
2015
Additively homomorphic UC commitments with optimal amortized overhead. Zbl 1345.94047
Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto
8
2015
Privacy-free garbled circuits with applications to efficient zero-knowledge. Zbl 1371.94634
Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio
6
2015
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
Dodis, Yevgeniy (ed.); Nielsen, Jesper Buus (ed.)
5
2015
On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. Zbl 1343.94045
Damgård, Ivan; Dupuis, Frédéric; Nielsen, Jesper Buus
1
2015
Continuous non-malleable codes. Zbl 1326.94093
Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele
21
2014
Leakage-resilient signatures with graceful degradation. Zbl 1335.94071
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
8
2014
Superposition attacks on cryptographic protocols. Zbl 1395.94278
Damgård, Ivan; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis
6
2014
Compact VSS and efficient homomorphic UC commitments. Zbl 1317.94101
Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus
6
2014
Faster maliciously secure two-party computation using the GPU. Zbl 1378.94043
Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus
3
2014
Adaptive versus static security in the UC model. Zbl 1368.94093
Damgård, Ivan; Nielsen, Jesper Buus
2
2014
MiniLEGO: efficient secure two-party computation from general assumptions. Zbl 1312.94049
Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
8
2013
On the connection between leakage tolerance and adaptive security. Zbl 1314.94091
Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela
5
2013
Secure key management in the cloud. Zbl 1318.68046
Damgård, Ivan; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Pagter, Jakob I.
1
2013
A new approach to practical active-secure two-party computation. Zbl 1296.94134
Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank
24
2012
Signature schemes secure against hard-to-invert leakage. Zbl 1292.94061
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela
6
2012
Actively secure two-party evaluation of any quantum operation. Zbl 1296.94110
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
5
2012
Perfectly secure oblivious RAM without random oracles. Zbl 1295.94046
Damgård, Ivan; Meldgaard, Sigurd; Nielsen, Jesper Buus
10
2011
Lower and upper bounds for deniable public-key encryption. Zbl 1227.94029
Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio
2
2011
Fully simulatable quantum-secure coin-flipping and applications. Zbl 1280.62126
Lunemann, Carolin; Nielsen, Jesper Buus
1
2011
Secure two-party quantum evaluation of unitaries against specious adversaries. Zbl 1283.81047
Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis
8
2010
On the necessary and sufficient assumptions for UC computation. Zbl 1274.94060
Damgård, Ivan; Nielsen, Jesper Buus; Orlandi, Claudio
4
2010
From passive to covert security at low cost. Zbl 1274.94058
Damgård, Ivan; Geisler, Martin; Nielsen, Jesper Buus
2
2010
LEGO for two-party secure computation. Zbl 1213.94124
Nielsen, Jesper Buus; Orlandi, Claudio
13
2009
Secure multiparty computation goes live. Zbl 1417.94045
Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan; Geisler, Martin; Jakobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob; Schwartzbach, Michael; Toft, Tomas
11
2009
Asynchronous multiparty computation: theory and implementation. Zbl 1227.68014
Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus
8
2009
Universally composable multiparty computation with partially isolated parties. Zbl 1213.94097
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2009
Privacy-enhancing auctions using rational cryptography. Zbl 1252.94088
Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikos
1
2009
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
12
2008
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
7
2008
Isolated proofs of knowledge and isolated zero knowledge. Zbl 1149.94310
Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel
3
2008
Asynchronous multi-party computation with quadratic communication. Zbl 1155.68384
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2008
Scalable and unconditionally secure multiparty computation. Zbl 1215.94041
Damgård, Ivan; Nielsen, Jesper Buus
15
2007
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026
Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas
10
2006
Simplified threshold RSA with adaptive and proactive security. Zbl 1140.94319
Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus
6
2006
Robust multiparty computation with linear communication complexity. Zbl 1129.94307
Hirt, Martin; Nielsen, Jesper Buus
4
2006
Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. Zbl 1154.94457
Hirt, Martin; Nielsen, Jesper Buus
3
2005
Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract). Zbl 1137.94372
Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz
2
2005
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
27
2003
Universally composable efficient multiparty computation from threshold homomorphic encryption. Zbl 1122.94366
Damgård, Ivan; Nielsen, Jesper Buus
12
2003
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. Zbl 1027.68601
Nielsen, Jesper Buus
26
2002
Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Zbl 1028.94505
Damgård, Ivan; Nielsen, Jesper Buus
25
2002
A threshold pseudorandom function construction and its applications. Zbl 1026.94539
Nielsen, Jesper Buus
3
2002
Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. Zbl 1027.68056
Damgård, Ivan; Nielsen, Jesper Buus
2
2002
Multiparty computation from threshold homomorphic encryption. Zbl 1010.94553
Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B.
19
2001
Improved non-committing encryption schemes based on a general complexity assumption. Zbl 0989.68509
Damgård, Ivan; Nielsen, Jesper Buus
17
2000
all top 5

Cited by 482 Authors

16 Hazay, Carmit
16 Nielsen, Jesper Buus
14 Venturi, Daniele
10 Ostrovsky, Rafail
9 Ishai, Yuval
8 Damgård, Ivan Bjerre
8 Faonio, Antonio
8 Lindell, Yehuda
7 Hofheinz, Dennis
7 Katz, Jonathan N.
7 Venkitasubramaniam, Muthuramakrishnan
5 Coretti, Sandro
5 Kushilevitz, Eyal
5 Toft, Tomas
5 Visconti, Ivan
4 Broadbent, Anne
4 Camenisch, Jan L.
4 Canetti, Ran
4 Dodis, Yevgeniy
4 Fujisaki, Eiichiro
4 Garay, Juan A.
4 Hemenway, Brett
4 Huang, Jianye
4 Huang, Qiong
4 Libert, Benoît
4 Mu, Yi
4 Patra, Arpita
4 Pinkas, Benny
4 Prabhakaran, Manoj M.
4 Sahai, Amit
4 Schaffner, Christian
4 Smart, Nigel P.
4 Susilo, Willy
4 Yung, Moti
3 Aggarwal, Divesh
3 Applebaum, Benny
3 Baum, Carsten
3 Cascudo, Ignacio
3 Chen, Rongmao
3 Choudhary, Ashish
3 Chu, Cheng-Kang
3 Chung, Kai-Min
3 Cohen, Ran
3 Dachman-Soled, Dana
3 Farshim, Pooya
3 Fischlin, Marc
3 Goyal, Vipul
3 Guo, Fuchun
3 Gupta, Divya
3 Hanaoka, Goichiro
3 Li, Yanbing
3 Liu, Feng-Hao
3 Matsuda, Takahiro
3 Mohassel, Payman
3 Mukherjee, Pratyay
3 O’Neill, Adam
3 Orsini, Emmanuela
3 Pandey, Omkant
3 Polychroniadou, Antigoni
3 Raghuraman, Srinivasan
3 Ranellucci, Samuel
3 Sadeghi, Ahmad-Reza
3 Schneider, Thomas
3 Scholl, Peter
3 Tartary, Christophe
3 Wichs, Daniel
3 Yanai, Avishay
3 Zhou, Hong-Sheng
3 Zikas, Vassilis
2 Albrecht, Martin R.
2 Anada, Hiroaki
2 Arita, Seiko
2 Armknecht, Frederik
2 Ateniese, Giuseppe
2 Bellare, Mihir
2 Biagioni, Silvio
2 Bogdanov, Andrej
2 Boyar, Joan F.
2 Boyle, Elette
2 Choi, Seung Geol
2 Chow, Sherman S. M.
2 David, Bernardo Machado
2 Deng, Robert Huijie
2 Döttling, Nico
2 Faust, Sebastian
2 Fischlin, Roger
2 Gagliardoni, Tommaso
2 Goldreich, Oded
2 Goodrich, Michael Truman
2 Herranz, Javier
2 Huang, Wei
2 Jager, Tibor
2 Jia, Dingding
2 Kanukurthi, Bhavana
2 Katzenbeisser, Stefan
2 Kiltz, Eike
2 Komargodski, Ilan
2 Krenn, Stephan
2 Kulkarni, Mukul
2 Kumaresan, Ranjit
...and 382 more Authors

Citations by Year