Peter Sebastian Nordholt
Peter Sebastian Nordholt
Chainalysis
Bekræftet mail på chainalysis.com - Startside
Titel
Citeret af
Citeret af
År
A new approach to practical active-secure two-party computation
JB Nielsen, PS Nordholt, C Orlandi, SS Burra
Advances in Cryptology–CRYPTO 2012, 2012
3492012
MiniLEGO: Efficient secure two-party computation from general assumptions
TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi
Annual International Conference on the Theory and Applications of …, 2013
892013
Confidential benchmarking based on multiparty computation
I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft
International Conference on Financial Cryptography and Data Security, 169-187, 2016
502016
Signature Schemes Secure against Hard-to-Invert Leakage⋆
S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel
42*
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
SS Burra, E Larraia, JB Nielsen, PS Nordholt, C Orlandi, E Orsini, P Scholl, ...
IACR Cryptol. ePrint Arch. 2015, 472, 2015
342015
Lower and Upper Bounds for Deniable Public-Key Encryption
R Bendlin, J Nielsen, P Nordholt, C Orlandi
Advances in Cryptology–ASIACRYPT 2011, 125-142, 2011
27*2011
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
182018
New Approaches to Practical Secure Two-Party Computation
PS Nordholt
22013
Linear and Differential Cryptanalysis
BT Jakobsen, M Abyar, PS Nordholt
University of Aarhus, Denmark December 15, 2006
22006
Confidential Benchmarking Based on Multiparty Computation
PS Nordholt, T Toft
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
2017
A New Approach to Practical Active-Secure Two-Party Computation
J Buus Nielsen, PS Nordholt, C Orlandi, S Sheshank Burra
arXiv, arXiv: 1202.3052, 2012
2012
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–11