BibTeX records: Tomas Toft

download as .bib file

@article{DBLP:journals/joc/HazayMRTN19,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft and
                  Angelo Agatino Nicolosi},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {265--323},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-017-9275-7},
  doi          = {10.1007/S00145-017-9275-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayMRTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaumDTZ16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Better Preprocessing for Secure Multiparty Computation},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {327--345},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_18},
  doi          = {10.1007/978-3-319-39555-5\_18},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BaumDTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DamgardDNNT16,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Damg{\aa}rd and
                  Kurt Nielsen and
                  Peter Sebastian Nordholt and
                  Tomas Toft},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Confidential Benchmarking Based on Multiparty Computation},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_10},
  doi          = {10.1007/978-3-662-54970-4\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DamgardDNNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDTZ16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  title        = {Better Preprocessing for Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardTZ16,
  author       = {Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  title        = {Fast Multiparty Multiplications from shared bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardDNNT15,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Damg{\aa}rd and
                  Kurt Nielsen and
                  Peter Sebastian Nordholt and
                  Tomas Toft},
  title        = {Confidential Benchmarking based on Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1006},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardDNNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayT14,
  author       = {Carmit Hazay and
                  Tomas Toft},
  title        = {Computationally Secure Pattern Matching in the Presence of Malicious
                  Adversaries},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {2},
  pages        = {358--395},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9147-8},
  doi          = {10.1007/S00145-013-9147-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DamgardLT14,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Lauritsen and
                  Tomas Toft},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {An Empirical Study and Some Improvements of the MiniMac Protocol for
                  Secure Computation},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_23},
  doi          = {10.1007/978-3-319-10879-7\_23},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DamgardLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardLT14,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Lauritsen and
                  Tomas Toft},
  title        = {An Empirical Study and some Improvements of the MiniMac Protocol for
                  Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ErkinVTL13,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving distributed clustering},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2013},
  pages        = {4},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-417X-2013-4},
  doi          = {10.1186/1687-417X-2013-4},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ErkinVTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LipmaaT13,
  author       = {Helger Lipmaa and
                  Tomas Toft},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {Secure Equality and Greater-Than Tests with Sublinear Online Complexity},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7966},
  pages        = {645--656},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39212-2\_56},
  doi          = {10.1007/978-3-642-39212-2\_56},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LipmaaT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Toft13,
  author       = {Tomas Toft},
  editor       = {Hyang{-}Sook Lee and
                  Dong{-}Guk Han},
  title        = {A Secure Priority Queue; Or: On Secure Datastructures from Multiparty
                  Computation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2013 - 16th International
                  Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8565},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12160-4\_2},
  doi          = {10.1007/978-3-319-12160-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Toft13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BogdanovNTW12,
  author       = {Dan Bogdanov and
                  Margus Niitsoo and
                  Tomas Toft and
                  Jan Willemson},
  title        = {High-performance secure multi-party computation for data mining applications},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {6},
  pages        = {403--418},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0177-2},
  doi          = {10.1007/S10207-012-0177-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BogdanovNTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ErkinVTL12,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Generating Private Recommendations Efficiently Using Homomorphic Encryption
                  and Data Packing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {3},
  pages        = {1053--1066},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2190726},
  doi          = {10.1109/TIFS.2012.2190726},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ErkinVTL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesGKT12,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Tomas Toft},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Adding query privacy to robust DHTs},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {30--31},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414473},
  doi          = {10.1145/2414456.2414473},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesGKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DamgardKT12,
  author       = {Ivan Damg{\aa}rd and
                  Jonas K{\"{o}}lker and
                  Tomas Toft},
  editor       = {Orr Dunkelman},
  title        = {Secure Computation, I/O-Efficient Algorithms and Distributed Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {278--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_18},
  doi          = {10.1007/978-3-642-27954-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DamgardKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HazayMRT12,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft},
  editor       = {Orr Dunkelman},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_20},
  doi          = {10.1007/978-3-642-27954-6\_20},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HazayMRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DahlNT12,
  author       = {Morten Dahl and
                  Chao Ning and
                  Tomas Toft},
  editor       = {Angelos D. Keromytis},
  title        = {On Secure Two-Party Integer Division},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_13},
  doi          = {10.1007/978-3-642-32946-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DahlNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahlNT12,
  author       = {Morten Dahl and
                  Chao Ning and
                  Tomas Toft},
  title        = {On Secure Two-party Integer Division},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahlNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Toft11,
  author       = {Tomas Toft},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Sub-linear, Secure Comparison with Two Non-colluding Parties},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_11},
  doi          = {10.1007/978-3-642-19379-8\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Toft11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Toft11,
  author       = {Tomas Toft},
  editor       = {Cyril Gavoille and
                  Pierre Fraigniaud},
  title        = {Secure data structures based on multi-party computation},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011},
  pages        = {291--292},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993806.1993859},
  doi          = {10.1145/1993806.1993859},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Toft11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-1072,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Tomas Toft},
  title        = {Adding Query Privacy to Robust DHTs},
  journal      = {CoRR},
  volume       = {abs/1107.1072},
  year         = {2011},
  url          = {http://arxiv.org/abs/1107.1072},
  eprinttype    = {arXiv},
  eprint       = {1107.1072},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1107-1072.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toft11,
  author       = {Tomas Toft},
  title        = {Secure Datastructures based on Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toft11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayMRT11,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayMRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HazayT10,
  author       = {Carmit Hazay and
                  Tomas Toft},
  editor       = {Masayuki Abe},
  title        = {Computationally Secure Pattern Matching in the Presence of Malicious
                  Adversaries},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_12},
  doi          = {10.1007/978-3-642-17373-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HazayT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Toft09,
  author       = {Tomas Toft},
  editor       = {Marc Fischlin},
  title        = {Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared
                  Values},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_24},
  doi          = {10.1007/978-3-642-00862-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Toft09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Toft09,
  author       = {Tomas Toft},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Solving Linear Programs Using Multiparty Computation},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_6},
  doi          = {10.1007/978-3-642-03549-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Toft09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BogetoftCDGJKNNNPST09,
  author       = {Peter Bogetoft and
                  Dan Lund Christensen and
                  Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Thomas P. Jakobsen and
                  Mikkel Kr{\o}igaard and
                  Janus Dam Nielsen and
                  Jesper Buus Nielsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Michael I. Schwartzbach and
                  Tomas Toft},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Secure Multiparty Computation Goes Live},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {325--343},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_20},
  doi          = {10.1007/978-3-642-03549-4\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BogetoftCDGJKNNNPST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ReistadT09,
  author       = {Tord Ingolf Reistad and
                  Tomas Toft},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Linear, Constant-Rounds Bit-Decomposition},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {245--257},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_17},
  doi          = {10.1007/978-3-642-14423-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ReistadT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ErkinFGKLT09,
  author       = {Zekeriya Erkin and
                  Martin Franz and
                  Jorge Guajardo and
                  Stefan Katzenbeisser and
                  Inald Lagendijk and
                  Tomas Toft},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Privacy-Preserving Face Recognition},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {235--253},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_14},
  doi          = {10.1007/978-3-642-03168-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ErkinFGKLT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/ErkinVTL09,
  author       = {Zekeriya Erkin and
                  Thijs Veugen and
                  Tomas Toft and
                  Reginald L. Lagendijk},
  title        = {Privacy-preserving user clustering in a social network},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386476},
  doi          = {10.1109/WIFS.2009.5386476},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/DamgardT08,
  author       = {Ivan Damg{\aa}rd and
                  Tomas Toft},
  title        = {Trading Sugar Beet Quotas - Secure Multiparty Computation in Practice},
  journal      = {{ERCIM} News},
  volume       = {2008},
  number       = {73},
  year         = {2008},
  url          = {http://ercim-news.ercim.eu/trading-sugar-beet-quotas-secure-multiparty-computation-in-practice},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/DamgardT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogetoftCDGJKNNNPST08,
  author       = {Peter Bogetoft and
                  Dan Lund Christensen and
                  Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Thomas P. Jakobsen and
                  Mikkel Kr{\o}igaard and
                  Janus Dam Nielsen and
                  Jesper Buus Nielsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Michael I. Schwartzbach and
                  Tomas Toft},
  title        = {Multiparty Computation Goes Live},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogetoftCDGJKNNNPST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ReistadT07,
  author       = {Tord Ingolf Reistad and
                  Tomas Toft},
  editor       = {Yvo Desmedt},
  title        = {Secret Sharing Comparison by Transformation and Rotation},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {169--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_14},
  doi          = {10.1007/978-3-642-10230-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ReistadT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wine/NielsenT07,
  author       = {Kurt Nielsen and
                  Tomas Toft},
  editor       = {Xiaotie Deng and
                  Fan Chung Graham},
  title        = {Secure Relative Performance Scheme},
  booktitle    = {Internet and Network Economics, Third International Workshop, {WINE}
                  2007, San Diego, CA, USA, December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4858},
  pages        = {396--403},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77105-0\_44},
  doi          = {10.1007/978-3-540-77105-0\_44},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/wine/NielsenT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BogetoftDJNPT06,
  author       = {Peter Bogetoft and
                  Ivan Damg{\aa}rd and
                  Thomas P. Jakobsen and
                  Kurt Nielsen and
                  Jakob Pagter and
                  Tomas Toft},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {A Practical Implementation of Secure Auctions Based on Multiparty
                  Integer Computation},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {142--147},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_10},
  doi          = {10.1007/11889663\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BogetoftDJNPT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DamgardFKNT06,
  author       = {Ivan Damg{\aa}rd and
                  Matthias Fitzi and
                  Eike Kiltz and
                  Jesper Buus Nielsen and
                  Tomas Toft},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Unconditionally Secure Constant-Rounds Multi-party Computation for
                  Equality, Comparison, Bits and Exponentiation},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {285--304},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_15},
  doi          = {10.1007/11681878\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DamgardFKNT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFNT05,
  author       = {Ivan Damg{\aa}rd and
                  Matthias Fitzi and
                  Jesper Buus Nielsen and
                  Tomas Toft},
  title        = {How to Split a Shared Secret into Shared Bits in Constant-Round},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFNT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics