Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tomas Toft
@article{DBLP:journals/joc/HazayMRTN19, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft and Angelo Agatino Nicolosi}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {265--323}, year = {2019}, url = {https://doi.org/10.1007/s00145-017-9275-7}, doi = {10.1007/S00145-017-9275-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayMRTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BaumDTZ16, author = {Carsten Baum and Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Better Preprocessing for Secure Multiparty Computation}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {327--345}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_18}, doi = {10.1007/978-3-319-39555-5\_18}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/BaumDTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DamgardDNNT16, author = {Ivan Damg{\aa}rd and Kasper Damg{\aa}rd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, editor = {Jens Grossklags and Bart Preneel}, title = {Confidential Benchmarking Based on Multiparty Computation}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {169--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_10}, doi = {10.1007/978-3-662-54970-4\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DamgardDNNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDTZ16, author = {Carsten Baum and Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, title = {Better Preprocessing for Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2016}, url = {http://eprint.iacr.org/2016/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardTZ16, author = {Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, title = {Fast Multiparty Multiplications from shared bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2016}, url = {http://eprint.iacr.org/2016/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardDNNT15, author = {Ivan Damg{\aa}rd and Kasper Damg{\aa}rd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, title = {Confidential Benchmarking based on Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1006}, year = {2015}, url = {http://eprint.iacr.org/2015/1006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardDNNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayT14, author = {Carmit Hazay and Tomas Toft}, title = {Computationally Secure Pattern Matching in the Presence of Malicious Adversaries}, journal = {J. Cryptol.}, volume = {27}, number = {2}, pages = {358--395}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9147-8}, doi = {10.1007/S00145-013-9147-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DamgardLT14, author = {Ivan Damg{\aa}rd and Rasmus Lauritsen and Tomas Toft}, editor = {Michel Abdalla and Roberto De Prisco}, title = {An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {398--415}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_23}, doi = {10.1007/978-3-319-10879-7\_23}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DamgardLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardLT14, author = {Ivan Damg{\aa}rd and Rasmus Lauritsen and Tomas Toft}, title = {An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2014}, url = {http://eprint.iacr.org/2014/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ErkinVTL13, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Privacy-preserving distributed clustering}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2013}, pages = {4}, year = {2013}, url = {https://doi.org/10.1186/1687-417X-2013-4}, doi = {10.1186/1687-417X-2013-4}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ErkinVTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LipmaaT13, author = {Helger Lipmaa and Tomas Toft}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Secure Equality and Greater-Than Tests with Sublinear Online Complexity}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7966}, pages = {645--656}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39212-2\_56}, doi = {10.1007/978-3-642-39212-2\_56}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LipmaaT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Toft13, author = {Tomas Toft}, editor = {Hyang{-}Sook Lee and Dong{-}Guk Han}, title = {A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation}, booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8565}, pages = {20--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12160-4\_2}, doi = {10.1007/978-3-319-12160-4\_2}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Toft13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BogdanovNTW12, author = {Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan Willemson}, title = {High-performance secure multi-party computation for data mining applications}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {6}, pages = {403--418}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0177-2}, doi = {10.1007/S10207-012-0177-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BogdanovNTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ErkinVTL12, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {3}, pages = {1053--1066}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2190726}, doi = {10.1109/TIFS.2012.2190726}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ErkinVTL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesGKT12, author = {Michael Backes and Ian Goldberg and Aniket Kate and Tomas Toft}, editor = {Heung Youl Youm and Yoojae Won}, title = {Adding query privacy to robust DHTs}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {30--31}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414473}, doi = {10.1145/2414456.2414473}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesGKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DamgardKT12, author = {Ivan Damg{\aa}rd and Jonas K{\"{o}}lker and Tomas Toft}, editor = {Orr Dunkelman}, title = {Secure Computation, I/O-Efficient Algorithms and Distributed Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {278--295}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_18}, doi = {10.1007/978-3-642-27954-6\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DamgardKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HazayMRT12, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft}, editor = {Orr Dunkelman}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {313--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_20}, doi = {10.1007/978-3-642-27954-6\_20}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HazayMRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DahlNT12, author = {Morten Dahl and Chao Ning and Tomas Toft}, editor = {Angelos D. Keromytis}, title = {On Secure Two-Party Integer Division}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {164--178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_13}, doi = {10.1007/978-3-642-32946-3\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DahlNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahlNT12, author = {Morten Dahl and Chao Ning and Tomas Toft}, title = {On Secure Two-party Integer Division}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2012}, url = {http://eprint.iacr.org/2012/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahlNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Toft11, author = {Tomas Toft}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Sub-linear, Secure Comparison with Two Non-colluding Parties}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {174--191}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_11}, doi = {10.1007/978-3-642-19379-8\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Toft11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Toft11, author = {Tomas Toft}, editor = {Cyril Gavoille and Pierre Fraigniaud}, title = {Secure data structures based on multi-party computation}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011}, pages = {291--292}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993806.1993859}, doi = {10.1145/1993806.1993859}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Toft11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-1072, author = {Michael Backes and Ian Goldberg and Aniket Kate and Tomas Toft}, title = {Adding Query Privacy to Robust DHTs}, journal = {CoRR}, volume = {abs/1107.1072}, year = {2011}, url = {http://arxiv.org/abs/1107.1072}, eprinttype = {arXiv}, eprint = {1107.1072}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-1072.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Toft11, author = {Tomas Toft}, title = {Secure Datastructures based on Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2011}, url = {http://eprint.iacr.org/2011/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Toft11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayMRT11, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2011}, url = {http://eprint.iacr.org/2011/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayMRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HazayT10, author = {Carmit Hazay and Tomas Toft}, editor = {Masayuki Abe}, title = {Computationally Secure Pattern Matching in the Presence of Malicious Adversaries}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {195--212}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_12}, doi = {10.1007/978-3-642-17373-8\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HazayT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Toft09, author = {Tomas Toft}, editor = {Marc Fischlin}, title = {Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {357--371}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_24}, doi = {10.1007/978-3-642-00862-7\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Toft09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Toft09, author = {Tomas Toft}, editor = {Roger Dingledine and Philippe Golle}, title = {Solving Linear Programs Using Multiparty Computation}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {90--107}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_6}, doi = {10.1007/978-3-642-03549-4\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Toft09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BogetoftCDGJKNNNPST09, author = {Peter Bogetoft and Dan Lund Christensen and Ivan Damg{\aa}rd and Martin Geisler and Thomas P. Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael I. Schwartzbach and Tomas Toft}, editor = {Roger Dingledine and Philippe Golle}, title = {Secure Multiparty Computation Goes Live}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {325--343}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_20}, doi = {10.1007/978-3-642-03549-4\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BogetoftCDGJKNNNPST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ReistadT09, author = {Tord Ingolf Reistad and Tomas Toft}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Linear, Constant-Rounds Bit-Decomposition}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {245--257}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_17}, doi = {10.1007/978-3-642-14423-3\_17}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ReistadT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ErkinFGKLT09, author = {Zekeriya Erkin and Martin Franz and Jorge Guajardo and Stefan Katzenbeisser and Inald Lagendijk and Tomas Toft}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Privacy-Preserving Face Recognition}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {235--253}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_14}, doi = {10.1007/978-3-642-03168-7\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/ErkinFGKLT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/ErkinVTL09, author = {Zekeriya Erkin and Thijs Veugen and Tomas Toft and Reginald L. Lagendijk}, title = {Privacy-preserving user clustering in a social network}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {96--100}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386476}, doi = {10.1109/WIFS.2009.5386476}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/ErkinVTL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/DamgardT08, author = {Ivan Damg{\aa}rd and Tomas Toft}, title = {Trading Sugar Beet Quotas - Secure Multiparty Computation in Practice}, journal = {{ERCIM} News}, volume = {2008}, number = {73}, year = {2008}, url = {http://ercim-news.ercim.eu/trading-sugar-beet-quotas-secure-multiparty-computation-in-practice}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/DamgardT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogetoftCDGJKNNNPST08, author = {Peter Bogetoft and Dan Lund Christensen and Ivan Damg{\aa}rd and Martin Geisler and Thomas P. Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael I. Schwartzbach and Tomas Toft}, title = {Multiparty Computation Goes Live}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2008}, url = {http://eprint.iacr.org/2008/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogetoftCDGJKNNNPST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ReistadT07, author = {Tord Ingolf Reistad and Tomas Toft}, editor = {Yvo Desmedt}, title = {Secret Sharing Comparison by Transformation and Rotation}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {169--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_14}, doi = {10.1007/978-3-642-10230-1\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/ReistadT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wine/NielsenT07, author = {Kurt Nielsen and Tomas Toft}, editor = {Xiaotie Deng and Fan Chung Graham}, title = {Secure Relative Performance Scheme}, booktitle = {Internet and Network Economics, Third International Workshop, {WINE} 2007, San Diego, CA, USA, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4858}, pages = {396--403}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77105-0\_44}, doi = {10.1007/978-3-540-77105-0\_44}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/wine/NielsenT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BogetoftDJNPT06, author = {Peter Bogetoft and Ivan Damg{\aa}rd and Thomas P. Jakobsen and Kurt Nielsen and Jakob Pagter and Tomas Toft}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {142--147}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_10}, doi = {10.1007/11889663\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BogetoftDJNPT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DamgardFKNT06, author = {Ivan Damg{\aa}rd and Matthias Fitzi and Eike Kiltz and Jesper Buus Nielsen and Tomas Toft}, editor = {Shai Halevi and Tal Rabin}, title = {Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {285--304}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_15}, doi = {10.1007/11681878\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DamgardFKNT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFNT05, author = {Ivan Damg{\aa}rd and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft}, title = {How to Split a Shared Secret into Shared Bits in Constant-Round}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2005}, url = {http://eprint.iacr.org/2005/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFNT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.