Følg
Martin Geisler
Martin Geisler
University of Aarhus
Verificeret mail på geisler.net - Startside
Titel
Citeret af
Citeret af
År
Secure Multiparty Computation Goes Live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
7592009
Asynchronous multiparty computation: Theory and implementation
I Damgård, M Geisler, M Krøigaard, JB Nielsen
International workshop on public key cryptography, 160-179, 2009
3302009
Homomorphic encryption and secure comparison
I Damgard, M Geisler, M Kroigard
International Journal of Applied Cryptography 1 (1), 22-31, 2008
2922008
Efficient and secure comparison for on-line auctions
I Damgård, M Geisler, M Krøigaard
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
2562007
A correction to'efficient and secure comparison for on-line auctions'
I Damgard, M Geisler, M Kroigard
International Journal of Applied Cryptography 1 (4), 323-324, 2009
1592009
Cryptographic Protocols:: Theory and Implementation
M Geisler
Aarhus University, Faculty of Science, Department, 2010
732010
Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, and Tomas Toft. Multiparty computation goes live
P Bogetoft, DL Christensen, I Damgard, M Geisler, T Jakobsen, ...
Cryptology ePrint Archive, Report 2008/068, 2008. http://eprint. iacr. org, 2008
592008
From passive to covert security at low cost
I Damgård, M Geisler, JB Nielsen
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
382010
Clans, Gilden und Gamefamilies: Soziale Prozesse in Computerspielgemeinschaften
M Geisler
Beltz Juventa, 2009
362009
Multiparty computation goes live
P Bogetoft, DL Christensen, I Damgard, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security (FC), 2009
262009
Distributing the key distribution centre in Sakai–Kasahara based systems
M Geisler, NP Smart
IMA International Conference on Cryptography and Coding, 252-262, 2009
212009
Integrity protection for revision control
C Cachin, M Geisler
Applied Cryptography and Network Security: 7th International Conference …, 2009
192009
Financial cryptography and data security
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Berlin, Heidelberg: Springer-Verlag, 325-343, 2009
172009
Secure multiparty computation goes live
P Bøgetoft, DL Christensen, IB Damgård, M Geisler, T Jacobsen, ...
Lecture Notes in Computer Science 5628, 325-343, 2009
82009
About random bits
M Geisler, M Krøigård, A Danielsen
82004
Implementing Asynchronous Multi-Party Computation
M Geisler
Phd Progress Report, 2008
22008
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–16