Martin Geisler
Martin Geisler
University of Aarhus
Verified email at geisler.net - Homepage
TitleCited byYear
Secure Multiparty Computation Goes Live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
4192009
Asynchronous multiparty computation: Theory and implementation
I Damgård, M Geisler, M Krøigaard, JB Nielsen
International Workshop on Public Key Cryptography, 160-179, 2009
2512009
Homomorphic encryption and secure comparison
I Damgard, M Geisler, M Kroigard
International Journal of Applied Cryptography 1 (1), 22-31, 2008
1872008
Efficient and secure comparison for on-line auctions
I Damgård, M Geisler, M Krøigaard
Australasian Conference on Information Security and Privacy, 416-430, 2007
1532007
Janus Dam Nielsen
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael Schwartzbach, Tomas …, 2009
1102009
A correction to" Efficient and Secure Comparison for On-Line Auctions".
I Damgård, M Geisler, M Krøigaard
IJACT 1 (4), 323-324, 2009
992009
Cryptographic Protocols:: Theory and Implementation
M Geisler
Aarhus University, Faculty of Science, Department, 2010
632010
Multiparty Computation Goes Live.
P Bogetoft, DL Christensen, I Damgård, M Geisler, TP Jakobsen, ...
IACR Cryptology ePrint Archive 2008, 68, 2008
462008
Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, et al. Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security, 325-343, 0
29
From passive to covert security at low cost
I Damgård, M Geisler, JB Nielsen
Theory of Cryptography Conference, 128-145, 2010
252010
Financial cryptography and data security
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Berlin, Heidelberg: Springer-Verlag, 325-343, 2009
192009
Integrity protection for revision control
C Cachin, M Geisler
International Conference on Applied Cryptography and Network Security, 382-399, 2009
172009
Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems
M Geisler, NP Smart
IMA International Conference on Cryptography and Coding, 252-262, 2009
152009
Secure multiparty computation goes live
P Bogetoft, DL Christensen, I Damgård, M Geisler, T Jakobsen, ...
Cryptology EPrint Archive, Report 2008/068, 2008
122008
About random bits
M Geisler, M Krøigård, A Danielsen
82004
Implementing Asynchronous Multi-Party Computation
M Geisler
Phd Progress Report, 2008
22008
Asynchronous Multiparty Computation
IB Damgård, M Geisler, M Krøigaard, JB Nielsen
Lecture Notes in Computer Science, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–17