Edit Profile (opens in new tab) Nielsen, Jesper Buus Compute Distance To: Compute Author ID: nielsen.jesper-buus Published as: Nielsen, Jesper Buus; Buus Nielsen, Jesper; Nielsen, Jesper B. more...less Documents Indexed: 83 Publications since 2000, including 1 Book 8 Contributions as Editor Co-Authors: 87 Co-Authors with 88 Joint Publications 1,632 Co-Co-Authors all top 5 Co-Authors 3 single-authored 31 Damgård, Ivan Bjerre 11 Venturi, Daniele 8 Orlandi, Claudio 7 Faonio, Antonio 6 Jakobsen, Thomas Pelle 6 Nordholt, Peter Sebastian 5 Faust, Sebastian 5 Hirt, Martin 4 David, Bernardo Machado 4 Frederiksen, Tore Kasper 4 Magri, Bernardo 4 Simkin, Mark 4 Zottarel, Angela 3 Coron, Jean-Sébastien 3 Dupuis, Frédéric 3 Fitzi, Matthias 3 Geisler, Martin 3 Krøigaard, Mikkel 3 Larsen, Kasper Green 3 Mukherjee, Pratyay 3 Pagter, Jakob Illeborg 3 Ranellucci, Samuel 3 Rijmen, Vincent 3 Salvail, Louis 2 Aggarwal, Divesh 2 Burra, Sai Sheshank 2 Cascudo, Ignacio 2 Chakraborty, Suvradip 2 Cramer, Ronald John Fitzgerald 2 Dodis, Yevgeniy 2 Döttling, Nico 2 Giacomelli, Irene 2 Hazay, Carmit 2 Ishai, Yuval 2 Krawczyk, Hugo 2 Matt, Christian 2 Obremski, Maciej 2 Przydatek, Bartosz 2 Purwanto, Erick 2 Toft, Tomas 2 Trifiletti, Roberto 2 Tschudi, Daniel 2 Wichs, Daniel 1 Almansa, Jesús F. 1 Baum, Carsten 1 Beerliová-Trubíniová, Zuzana 1 Bendlin, Rikke 1 Bogetoft, Peter 1 Bro Miltersen, Peter 1 Canetti, Ran 1 Christensen, Dan Lund 1 Desmedt, Yvo G. 1 Dinsdale-Young, Thomas 1 Dowsley, Rafael 1 Dziembowski, Stefan 1 Eller Thomsen, Søren 1 Funder, Jakob 1 Gentry, Craig 1 Ghosh, Satrajit 1 Halevi, Shai 1 Harnik, Danny 1 Holmgaard Kamp, Simon 1 Hubáček, Pavel 1 Jacob, Riko 1 Kiltz, Eike 1 Kushilevitz, Eyal 1 Larraia, Enrique 1 Lunemann, Carolin 1 Meldgaard, Sigurd 1 Nielsen, Janus Dam 1 Nielsen, Kurt 1 Nilges, Tobias 1 Oechsner, Sabine 1 Orsini, Emmanuela 1 Østergaard, Michael Bæksvang 1 Ostrovsky, Rafail 1 Polychroniadou, Antigoni 1 Rabin, Tal 1 Raskin, Michael A. 1 Ribeiro, João L. 1 Rosén, Adi 1 Rosen, Alon 1 Scholl, Peter 1 Schwartzbach, Michael I. 1 Smart, Nigel P. 1 Triandopoulos, Nikos 1 Yakoubov, Sophia Serials 8 Lecture Notes in Computer Science 3 Journal of Cryptology 2 Theoretical Computer Science all top 5 Fields 88 Information and communication theory, circuits (94-XX) 30 Computer science (68-XX) 8 General and overarching topics; collections (00-XX) 3 Quantum theory (81-XX) 3 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Statistics (62-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 75 Publications have been cited 750 times in 470 Documents Cited by ▼ Year ▼ A new approach to practical active-secure two-party computation. Zbl 1296.94134Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank 50 2012 Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. Zbl 1027.68601Nielsen, Jesper Buus 44 2002 Relaxing chosen-ciphertext security. Zbl 1122.94359Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B. 40 2003 Scalable and unconditionally secure multiparty computation. Zbl 1215.94041Damgård, Ivan; Nielsen, Jesper Buus 36 2007 Multiparty computation from threshold homomorphic encryption. Zbl 1010.94553Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B. 33 2001 Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Zbl 1028.94505Damgård, Ivan; Nielsen, Jesper Buus 29 2002 Secure multiparty computation and secret sharing. Zbl 1322.68003Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus 27 2015 Continuous non-malleable codes. Zbl 1326.94093Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele 25 2014 Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas 25 2006 Secure multiparty computation goes live. Zbl 1417.94045Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan; Geisler, Martin; Jakobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob; Schwartzbach, Michael; Toft, Tomas 24 2009 Improved non-committing encryption schemes based on a general complexity assumption. Zbl 0989.68509Damgård, Ivan; Nielsen, Jesper Buus 21 2000 Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam 20 2008 LEGO for two-party secure computation. Zbl 1213.94124Nielsen, Jesper Buus; Orlandi, Claudio 20 2009 Universally composable efficient multiparty computation from threshold homomorphic encryption. Zbl 1122.94366Damgård, Ivan; Nielsen, Jesper Buus 19 2003 Asynchronous multiparty computation: theory and implementation. Zbl 1227.68014Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus 17 2009 Perfectly secure oblivious RAM without random oracles. Zbl 1295.94046Damgård, Ivan; Meldgaard, Sigurd; Nielsen, Jesper Buus 15 2011 Privacy-free garbled circuits with applications to efficient zero-knowledge. Zbl 1371.94634Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio 13 2015 Actively secure two-party evaluation of any quantum operation. Zbl 1296.94110Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis 13 2012 Secure two-party quantum evaluation of unitaries against specious adversaries. Zbl 1283.81047Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis 13 2010 OT-combiners via secure computation. Zbl 1162.94366Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus 12 2008 The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited. Zbl 1407.94099Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel 12 2017 Superposition attacks on cryptographic protocols. Zbl 1395.94278Damgård, Ivan; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis 11 2014 A tamper and leakage resilient von Neumann architecture. Zbl 1345.94060Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele 11 2015 Mind your coins: fully leakage-resilient signatures with graceful degradation. Zbl 1440.94049Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele 10 2015 Simplified threshold RSA with adaptive and proactive security. Zbl 1140.94319Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus 10 2006 Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. Zbl 07178462Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark 10 2019 Additively homomorphic UC commitments with optimal amortized overhead. Zbl 1345.94047Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto 10 2015 Leakage-resilient signatures with graceful degradation. Zbl 1335.94071Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela 9 2014 MiniLEGO: efficient secure two-party computation from general assumptions. Zbl 1312.94049Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio 9 2013 Maliciously secure oblivious linear function evaluation with constant overhead. Zbl 1420.94067Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias 9 2017 Yes, there is an oblivious RAM lower bound! Zbl 1430.94077Larsen, Kasper Green; Nielsen, Jesper Buus 9 2018 On the complexity of additively homomorphic UC commitments. Zbl 1388.94055Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto 8 2016 Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004 7 2015 Signature schemes secure against hard-to-invert leakage. Zbl 1292.94061Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela 7 2012 Compact VSS and efficient homomorphic UC commitments. Zbl 1317.94101Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus 7 2014 Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela 6 2016 Robust multiparty computation with linear communication complexity. Zbl 1129.94307Hirt, Martin; Nielsen, Jesper Buus 6 2006 A threshold pseudorandom function construction and its applications. Zbl 1026.94539Nielsen, Jesper Buus 6 2002 On the connection between leakage tolerance and adaptive security. Zbl 1314.94091Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela 6 2013 Predictable arguments of knowledge. Zbl 1404.94067Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele 6 2017 Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus 5 2016 Lower and upper bounds for deniable public-key encryption. Zbl 1227.94029Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio 5 2011 On the communication required for unconditionally secure multiplication. Zbl 1391.94740Damgård, Ivan; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Michael 4 2016 Adaptive versus static security in the UC model. Zbl 1368.94093Damgård, Ivan; Nielsen, Jesper Buus 4 2014 Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. Zbl 1027.68056Damgård, Ivan; Nielsen, Jesper Buus 4 2002 Continuously non-malleable codes with split-state refresh. Zbl 1440.94048Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele 4 2018 On the necessary and sufficient assumptions for UC computation. Zbl 1274.94060Damgård, Ivan; Nielsen, Jesper Buus; Orlandi, Claudio 4 2010 Fully simulatable quantum-secure coin-flipping and applications. Zbl 1280.62126Lunemann, Carolin; Nielsen, Jesper Buus 4 2011 Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick 3 2019 Faster maliciously secure two-party computation using the GPU. Zbl 1378.94043Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus 3 2014 Isolated proofs of knowledge and isolated zero knowledge. Zbl 1149.94310Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel 3 2008 Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract). Zbl 1137.94372Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz 3 2005 Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. Zbl 1154.94457Hirt, Martin; Nielsen, Jesper Buus 3 2005 From passive to covert security at low cost. Zbl 1274.94058Damgård, Ivan; Geisler, Martin; Nielsen, Jesper Buus 3 2010 Universally composable multiparty computation with partially isolated parties. Zbl 1213.94097Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel 3 2009 On the number of synchronous rounds sufficient for authenticated Byzantine agreement. Zbl 1261.68025Fitzi, Matthias; Nielsen, Jesper Buus 3 2009 Non-malleable codes with split-state refresh. Zbl 1404.94065Faonio, Antonio; Nielsen, Jesper Buus 3 2017 Communication lower bounds for statistically secure MPC, with or without preprocessing. Zbl 1478.68091Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus 2 2019 Lower bounds for oblivious data structures. Zbl 1432.68093Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus 2 2019 On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. Zbl 1343.94045Damgård, Ivan; Dupuis, Frédéric; Nielsen, Jesper Buus 2 2015 Asynchronous multi-party computation with quadratic communication. Zbl 1155.68384Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz 2 2008 Lower bounds for leakage-resilient secret sharing. Zbl 1479.94338Nielsen, Jesper Buus; Simkin, Mark 2 2020 TARDIS: a foundation of time-lock puzzles in UC. Zbl 1479.94124Baum, Carsten; David, Bernardo; Dowsley, Rafael; Nielsen, Jesper Buus; Oechsner, Sabine 2 2021 Unconditionally secure computation with reduced interaction. Zbl 1371.94631Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi 1 2016 Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Zbl 1360.94005 1 2017 Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Zbl 1360.94006 1 2017 Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Zbl 1380.94087Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele 1 2017 Continuously non-malleable codes with split-state refresh. Zbl 1423.94070Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele 1 2019 Secure key management in the cloud. Zbl 1318.68046Damgård, Ivan; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Pagter, Jakob I. 1 2013 Privacy-enhancing auctions using rational cryptography. Zbl 1252.94088Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikos 1 2009 Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Zbl 1387.94006 1 2018 Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Zbl 1387.94008 1 2018 High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. 1 2021 On the computational overhead of MPC with dishonest majority. Zbl 1400.94167Nielsen, Jesper Buus; Ranellucci, Samuel 1 2017 Fully leakage-resilient codes. Zbl 1404.94066Faonio, Antonio; Nielsen, Jesper Buus 1 2017 TARDIS: a foundation of time-lock puzzles in UC. Zbl 1479.94124Baum, Carsten; David, Bernardo; Dowsley, Rafael; Nielsen, Jesper Buus; Oechsner, Sabine 2 2021 High-performance multi-party computation for binary circuits based on oblivious transfer. Zbl 1470.94080Burra, Sai Sheshank; Larraia, Enrique; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Orsini, Emmanuela; Scholl, Peter; Smart, Nigel P. 1 2021 Lower bounds for leakage-resilient secret sharing. Zbl 1479.94338Nielsen, Jesper Buus; Simkin, Mark 2 2020 Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. Zbl 07178462Aggarwal, Divesh; Damgård, Ivan; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick; Ribeiro, João; Simkin, Mark 10 2019 Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick 3 2019 Communication lower bounds for statistically secure MPC, with or without preprocessing. Zbl 1478.68091Damgård, Ivan; Larsen, Kasper Green; Nielsen, Jesper Buus 2 2019 Lower bounds for oblivious data structures. Zbl 1432.68093Jacob, Riko; Larsen, Kasper Green; Nielsen, Jesper Buus 2 2019 Continuously non-malleable codes with split-state refresh. Zbl 1423.94070Faonio, Antonio; Buus Nielsen, Jesper; Simkin, Mark; Venturi, Daniele 1 2019 Yes, there is an oblivious RAM lower bound! Zbl 1430.94077Larsen, Kasper Green; Nielsen, Jesper Buus 9 2018 Continuously non-malleable codes with split-state refresh. Zbl 1440.94048Faonio, Antonio; Nielsen, Jesper Buus; Simkin, Mark; Venturi, Daniele 4 2018 Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Zbl 1387.94006 1 2018 Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Zbl 1387.94008 1 2018 The TinyTable protocol for 2-party secure computation, or: Gate-scrambling revisited. Zbl 1407.94099Damgård, Ivan; Nielsen, Jesper Buus; Nielsen, Michael; Ranellucci, Samuel 12 2017 Maliciously secure oblivious linear function evaluation with constant overhead. Zbl 1420.94067Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias 9 2017 Predictable arguments of knowledge. Zbl 1404.94067Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele 6 2017 Non-malleable codes with split-state refresh. Zbl 1404.94065Faonio, Antonio; Nielsen, Jesper Buus 3 2017 Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Zbl 1360.94005 1 2017 Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Zbl 1360.94006 1 2017 Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model. Zbl 1380.94087Faonio, Antonio; Buus Nielsen, Jesper; Venturi, Daniele 1 2017 On the computational overhead of MPC with dishonest majority. Zbl 1400.94167Nielsen, Jesper Buus; Ranellucci, Samuel 1 2017 Fully leakage-resilient codes. Zbl 1404.94066Faonio, Antonio; Nielsen, Jesper Buus 1 2017 On the complexity of additively homomorphic UC commitments. Zbl 1388.94055Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Trifiletti, Roberto 8 2016 Signature schemes secure against hard-to-invert leakage. Zbl 1355.94053Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela 6 2016 Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus 5 2016 On the communication required for unconditionally secure multiplication. Zbl 1391.94740Damgård, Ivan; Nielsen, Jesper Buus; Polychroniadou, Antigoni; Raskin, Michael 4 2016 Unconditionally secure computation with reduced interaction. Zbl 1371.94631Damgård, Ivan; Nielsen, Jesper Buus; Ostrovsky, Rafail; Rosén, Adi 1 2016 Secure multiparty computation and secret sharing. Zbl 1322.68003Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus 27 2015 Privacy-free garbled circuits with applications to efficient zero-knowledge. Zbl 1371.94634Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio 13 2015 A tamper and leakage resilient von Neumann architecture. Zbl 1345.94060Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele 11 2015 Mind your coins: fully leakage-resilient signatures with graceful degradation. Zbl 1440.94049Faonio, Antonio; Nielsen, Jesper Buus; Venturi, Daniele 10 2015 Additively homomorphic UC commitments with optimal amortized overhead. Zbl 1345.94047Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus; Trifiletti, Roberto 10 2015 Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004 7 2015 On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation. Zbl 1343.94045Damgård, Ivan; Dupuis, Frédéric; Nielsen, Jesper Buus 2 2015 Continuous non-malleable codes. Zbl 1326.94093Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus; Venturi, Daniele 25 2014 Superposition attacks on cryptographic protocols. Zbl 1395.94278Damgård, Ivan; Funder, Jakob; Nielsen, Jesper Buus; Salvail, Louis 11 2014 Leakage-resilient signatures with graceful degradation. Zbl 1335.94071Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela 9 2014 Compact VSS and efficient homomorphic UC commitments. Zbl 1317.94101Damgård, Ivan; David, Bernardo; Giacomelli, Irene; Nielsen, Jesper Buus 7 2014 Adaptive versus static security in the UC model. Zbl 1368.94093Damgård, Ivan; Nielsen, Jesper Buus 4 2014 Faster maliciously secure two-party computation using the GPU. Zbl 1378.94043Frederiksen, Tore Kasper; Jakobsen, Thomas P.; Nielsen, Jesper Buus 3 2014 MiniLEGO: efficient secure two-party computation from general assumptions. Zbl 1312.94049Frederiksen, Tore Kasper; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio 9 2013 On the connection between leakage tolerance and adaptive security. Zbl 1314.94091Nielsen, Jesper Buus; Venturi, Daniele; Zottarel, Angela 6 2013 Secure key management in the cloud. Zbl 1318.68046Damgård, Ivan; Jakobsen, Thomas P.; Nielsen, Jesper Buus; Pagter, Jakob I. 1 2013 A new approach to practical active-secure two-party computation. Zbl 1296.94134Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio; Burra, Sai Sheshank 50 2012 Actively secure two-party evaluation of any quantum operation. Zbl 1296.94110Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis 13 2012 Signature schemes secure against hard-to-invert leakage. Zbl 1292.94061Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela 7 2012 Perfectly secure oblivious RAM without random oracles. Zbl 1295.94046Damgård, Ivan; Meldgaard, Sigurd; Nielsen, Jesper Buus 15 2011 Lower and upper bounds for deniable public-key encryption. Zbl 1227.94029Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio 5 2011 Fully simulatable quantum-secure coin-flipping and applications. Zbl 1280.62126Lunemann, Carolin; Nielsen, Jesper Buus 4 2011 Secure two-party quantum evaluation of unitaries against specious adversaries. Zbl 1283.81047Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis 13 2010 On the necessary and sufficient assumptions for UC computation. Zbl 1274.94060Damgård, Ivan; Nielsen, Jesper Buus; Orlandi, Claudio 4 2010 From passive to covert security at low cost. Zbl 1274.94058Damgård, Ivan; Geisler, Martin; Nielsen, Jesper Buus 3 2010 Secure multiparty computation goes live. Zbl 1417.94045Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan; Geisler, Martin; Jakobsen, Thomas; Krøigaard, Mikkel; Nielsen, Janus Dam; Nielsen, Jesper Buus; Nielsen, Kurt; Pagter, Jakob; Schwartzbach, Michael; Toft, Tomas 24 2009 LEGO for two-party secure computation. Zbl 1213.94124Nielsen, Jesper Buus; Orlandi, Claudio 20 2009 Asynchronous multiparty computation: theory and implementation. Zbl 1227.68014Damgård, Ivan; Geisler, Martin; Krøigaard, Mikkel; Nielsen, Jesper Buus 17 2009 Universally composable multiparty computation with partially isolated parties. Zbl 1213.94097Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel 3 2009 On the number of synchronous rounds sufficient for authenticated Byzantine agreement. Zbl 1261.68025Fitzi, Matthias; Nielsen, Jesper Buus 3 2009 Privacy-enhancing auctions using rational cryptography. Zbl 1252.94088Miltersen, Peter Bro; Nielsen, Jesper Buus; Triandopoulos, Nikos 1 2009 Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam 20 2008 OT-combiners via secure computation. Zbl 1162.94366Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus 12 2008 Isolated proofs of knowledge and isolated zero knowledge. Zbl 1149.94310Damgård, Ivan; Nielsen, Jesper Buus; Wichs, Daniel 3 2008 Asynchronous multi-party computation with quadratic communication. Zbl 1155.68384Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz 2 2008 Scalable and unconditionally secure multiparty computation. Zbl 1215.94041Damgård, Ivan; Nielsen, Jesper Buus 36 2007 Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas 25 2006 Simplified threshold RSA with adaptive and proactive security. Zbl 1140.94319Almansa, Jesús F.; Damgård, Ivan; Nielsen, Jesper Buus 10 2006 Robust multiparty computation with linear communication complexity. Zbl 1129.94307Hirt, Martin; Nielsen, Jesper Buus 6 2006 Cryptographic asynchronous multi-party computation with optimal resilience (extended abstract). Zbl 1137.94372Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz 3 2005 Upper bounds on the communication complexity of optimally resilient cryptographic multiparty computation. Zbl 1154.94457Hirt, Martin; Nielsen, Jesper Buus 3 2005 Relaxing chosen-ciphertext security. Zbl 1122.94359Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B. 40 2003 Universally composable efficient multiparty computation from threshold homomorphic encryption. Zbl 1122.94366Damgård, Ivan; Nielsen, Jesper Buus 19 2003 Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. Zbl 1027.68601Nielsen, Jesper Buus 44 2002 Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor. Zbl 1028.94505Damgård, Ivan; Nielsen, Jesper Buus 29 2002 A threshold pseudorandom function construction and its applications. Zbl 1026.94539Nielsen, Jesper Buus 6 2002 Expanding pseudorandom functions; or: From known-plaintext security to chosen-plaintext security. Zbl 1027.68056Damgård, Ivan; Nielsen, Jesper Buus 4 2002 Multiparty computation from threshold homomorphic encryption. Zbl 1010.94553Cramer, Ronald; Damgård, Ivan; Nielsen, Jesper B. 33 2001 Improved non-committing encryption schemes based on a general complexity assumption. Zbl 0989.68509Damgård, Ivan; Nielsen, Jesper Buus 21 2000 all cited Publications top 5 cited Publications all top 5 Cited by 803 Authors 22 Hazay, Carmit 20 Nielsen, Jesper Buus 17 Venturi, Daniele 16 Ostrovsky, Rafail 14 Ishai, Yuval 11 Damgård, Ivan Bjerre 11 Faonio, Antonio 11 Venkitasubramaniam, Muthuramakrishnan 10 Goyal, Vipul 10 Scholl, Peter 9 Katz, Jonathan N. 9 Libert, Benoît 9 Lindell, Yehuda 9 Orsini, Emmanuela 9 Smart, Nigel P. 8 Hofheinz, Dennis 8 Wichs, Daniel 7 Canetti, Ran 7 Cohen, Ran 7 Coretti, Sandro 7 Khurana, Dakshita 7 Komargodski, Ilan 7 Polychroniadou, Antigoni 7 Yung, Moti 6 Jager, Tibor 6 Kushilevitz, Eyal 6 Maji, Hemanta K. 6 Mohassel, Payman 6 Shi, Elaine 6 Soria-Vazquez, Eduardo 5 Asharov, Gilad 5 Baum, Carsten 5 Boyle, Elette 5 Camenisch, Jan L. 5 Chung, Kai-Min 5 Dodis, Yevgeniy 5 Döttling, Nico 5 Garay, Juan A. 5 Gupta, Divya 5 Hanaoka, Goichiro 5 Huang, Jianye 5 Huang, Qiong 5 Matsuda, Takahiro 5 Nayak, Kartik 5 O’Neill, Adam 5 Orlandi, Claudio 5 Pass, Rafael 5 Patra, Arpita 5 Prabhakaran, Manoj M. 5 Ranellucci, Samuel 5 Sahai, Amit 5 Song, Yifan 5 Susilo, Willy 5 Toft, Tomas 5 Visconti, Ivan 5 Yanai, Avishay 5 Zhandry, Mark 4 Applebaum, Benny 4 Branco, Pedro 4 Broadbent, Anne 4 Cascudo, Ignacio 4 Chan, T.-H. Hubert 4 Chen, Rongmao 4 Cheon, Jung Hee 4 Choudhary, Ashish 4 Dachman-Soled, Dana 4 Escudero, Daniel E. 4 Farshim, Pooya 4 Fujisaki, Eiichiro 4 Gagliardoni, Tommaso 4 Goel, Aarushi 4 Haitner, Iftach 4 Hemenway, Brett 4 Kaptchuk, Gabriel 4 Kiltz, Eike 4 Liu, Feng-Hao 4 Mu, Yi 4 Mukherjee, Pratyay 4 Nof, Ariel 4 Pinkas, Benny 4 Raghuraman, Srinivasan 4 Schaffner, Christian 4 Srinivasan, Akshayaram 4 Tanaka, Keisuke 4 Waters, Brent 4 Weiss, Mor 4 Zhou, Hong-Sheng 4 Zikas, Vassilis 3 Aggarwal, Divesh 3 Agrawal, Shashank 3 Ateniese, Giuseppe 3 Bartusek, James 3 Blazy, Olivier 3 Chandran, Nishanth 3 Chevalier, Céline 3 Chow, Sherman S. M. 3 Chu, Cheng-Kang 3 Dalskov, Anders 3 David, Bernardo Machado 3 ElDefrawy, Karim ...and 703 more Authors all top 5 Cited in 42 Serials 61 Journal of Cryptology 20 Theoretical Computer Science 20 Designs, Codes and Cryptography 7 Quantum Information Processing 5 SIAM Journal on Computing 4 International Journal of Theoretical Physics 4 Information Sciences 4 Information and Computation 3 Journal of Computer and System Sciences 3 Distributed Computing 2 Information Processing Letters 2 Journal of Zhejiang University. Science A 2 Cryptography and Communications 1 Artificial Intelligence 1 Computers & Mathematics with Applications 1 Discrete Applied Mathematics 1 Physics Letters. A 1 Automatica 1 Pacific Journal of Mathematics 1 Social Choice and Welfare 1 Mathematical and Computer Modelling 1 SIAM Journal on Discrete Mathematics 1 Journal of Parallel and Distributed Computing 1 Neural Computation 1 International Journal of Foundations of Computer Science 1 Computational Complexity 1 Formal Methods in System Design 1 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 1 Finite Fields and their Applications 1 Journal of the ACM 1 Journal of Discrete Mathematical Sciences & Cryptography 1 New Journal of Physics 1 ACM Transactions on Information and System Security (TISSEC) 1 Mathematical Biosciences and Engineering 1 Journal of Mathematical Cryptology 1 Advances in Mathematics of Communications 1 Statistical Analysis and Data Mining 1 Journal of Logical and Algebraic Methods in Programming 1 Journal of Applied Mathematics and Computational Mechanics 1 Zhurnal Belorusskogo Gosudarstvennogo Universiteta. Matematika. Informatika 1 Mathematical Foundations of Computing 1 Prikladnaya Diskretnaya Matematika all top 5 Cited in 15 Fields 434 Information and communication theory, circuits (94-XX) 169 Computer science (68-XX) 37 Quantum theory (81-XX) 9 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 7 Number theory (11-XX) 4 Algebraic geometry (14-XX) 2 Combinatorics (05-XX) 2 Numerical analysis (65-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Field theory and polynomials (12-XX) 1 Group theory and generalizations (20-XX) 1 Statistics (62-XX) 1 Mechanics of particles and systems (70-XX) 1 Operations research, mathematical programming (90-XX) 1 Biology and other natural sciences (92-XX) Citations by Year