Peter Sebastian Nordholt
Peter Sebastian Nordholt
The Alexandra Institute
Verified email at alexandra.dk - Homepage
TitleCited byYear
A new approach to practical active-secure two-party computation
JB Nielsen, PS Nordholt, C Orlandi, SS Burra
Advances in Cryptology–CRYPTO 2012, 2012
3112012
Minilego: Efficient secure two-party computation from general assumptions
TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi
Annual International Conference on the Theory and Applications of …, 2013
852013
Confidential benchmarking based on multiparty computation
I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft
International Conference on Financial Cryptography and Data Security, 169-187, 2016
412016
Signature Schemes Secure against Hard-to-Invert Leakage⋆
S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel
40*
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
SS Burra, E Larraia, JB Nielsen, PS Nordholt, C Orlandi, E Orsini, P Scholl, ...
IACR Cryptology ePrint Archive 2015, 472, 2015
292015
Lower and Upper Bounds for Deniable Public-Key Encryption
R Bendlin, J Nielsen, P Nordholt, C Orlandi
Advances in Cryptology–ASIACRYPT 2011, 125-142, 2011
21*2011
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
92018
New Approaches to Practical Secure Two-Party Computation. Institut for Datalogi, Aarhus Universitet
PS Nordholt
22013
Linear and Differential Cryptanalysis
BT Jakobsen, M Abyar, PS Nordholt
University of Aarhus, Denmark December 15, 2006
22006
Confidential Benchmarking Based on Multiparty Computation
PS Nordholt, T Toft
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
2017
A New Approach to Practical Active-Secure Two-Party Computation
J Buus Nielsen, PS Nordholt, C Orlandi, S Sheshank Burra
arXiv preprint arXiv:1202.3052, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–11