Peter Sebastian Nordholt
Peter Sebastian Nordholt
The Alexandra Institute
Verified email at - Homepage
Cited by
Cited by
A new approach to practical active-secure two-party computation
JB Nielsen, PS Nordholt, C Orlandi, SS Burra
Advances in Cryptology–CRYPTO 2012, 2012
MiniLEGO: Efficient secure two-party computation from general assumptions
TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi
Annual International Conference on the Theory and Applications of …, 2013
Confidential benchmarking based on multiparty computation
I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft
International Conference on Financial Cryptography and Data Security, 169-187, 2016
Signature Schemes Secure against Hard-to-Invert Leakage⋆
S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
SS Burra, E Larraia, JB Nielsen, PS Nordholt, C Orlandi, E Orsini, P Scholl, ...
IACR Cryptol. ePrint Arch. 2015, 472, 2015
Lower and Upper Bounds for Deniable Public-Key Encryption
R Bendlin, J Nielsen, P Nordholt, C Orlandi
Advances in Cryptology–ASIACRYPT 2011, 125-142, 2011
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
New Approaches to Practical Secure Two-Party Computation
PS Nordholt
Linear and Differential Cryptanalysis
BT Jakobsen, M Abyar, PS Nordholt
University of Aarhus, Denmark December 15, 2006
Confidential Benchmarking Based on Multiparty Computation
PS Nordholt, T Toft
Financial Cryptography and Data Security: 20th International Conference, FC …, 2017
A New Approach to Practical Active-Secure Two-Party Computation
J Buus Nielsen, PS Nordholt, C Orlandi, S Sheshank Burra
arXiv, arXiv: 1202.3052, 2012
The system can't perform the operation now. Try again later.
Articles 1–11