New primitives for actively-secure MPC over rings with applications to private machine learning I Damgård, D Escudero, T Frederiksen, M Keller, P Scholl, N Volgushev 2019 IEEE Symposium on Security and Privacy (SP), 1102-1120, 2019 | 157 | 2019 |
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi | 103 | 2013 |
Privacy-free garbled circuits with applications to efficient zero-knowledge TK Frederiksen, JB Nielsen, C Orlandi Annual International Conference on the Theory and Applications of …, 2015 | 84 | 2015 |
A unified approach to MPC with preprocessing using OT TK Frederiksen, M Keller, E Orsini, P Scholl International conference on the theory and application of cryptology and …, 2015 | 70 | 2015 |
P2DEX: privacy-preserving decentralized cryptocurrency exchange C Baum, B David, TK Frederiksen International Conference on Applied Cryptography and Network Security, 163-194, 2021 | 65 | 2021 |
Fast distributed RSA key generation for semi-honest and malicious adversaries TK Frederiksen, Y Lindell, V Osheter, B Pinkas Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 60 | 2018 |
Faster maliciously secure two-party computation using the GPU TK Frederiksen, TP Jakobsen, JB Nielsen Security and Cryptography for Networks: 9th International Conference, SCN …, 2014 | 50 | 2014 |
Fast and maliciously secure two-party computation using the GPU TK Frederiksen, JB Nielsen Applied Cryptography and Network Security: 11th International Conference …, 2013 | 50 | 2013 |
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020 | 44 | 2020 |
On the complexity of additively homomorphic UC commitments TK Frederiksen, TP Jakobsen, JB Nielsen, R Trifiletti Theory of Cryptography Conference, 542-565, 2015 | 39 | 2015 |
TinyLEGO: An interactive garbling scheme for maliciously secure two-party computation TK Frederiksen, TP Jakobsen, JB Nielsen, R Trifiletti Cryptology ePrint Archive, 2015 | 36 | 2015 |
Sok: Mitigation of front-running in decentralized finance C Baum, J Hsin-yu Chiang, B David, TK Frederiksen, L Gentile International Conference on Financial Cryptography and Data Security, 250-271, 2022 | 33 | 2022 |
Committed MPC: Maliciously secure multiparty computation from homomorphic commitments TK Frederiksen, B Pinkas, A Yanai Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 25 | 2018 |
The OLYMPUS architecture—Oblivious identity management for private user-friendly services R Torres Moreno, J Bernal Bernabe, J Garcia Rodriguez, ... Sensors 20 (3), 945, 2020 | 19 | 2020 |
Eagle: Efficient privacy preserving smart contracts C Baum, JH Chiang, B David, TK Frederiksen International Conference on Financial Cryptography and Data Security, 270-288, 2023 | 18 | 2023 |
Sok: Privacy-enhancing technologies in finance C Baum, JH Chiang, B David, TK Frederiksen Cryptology ePrint Archive, 2023 | 10 | 2023 |
Olympus: Towards oblivious identity management for private and user-friendly services RT Moreno, JB Bernabe, A Skarmeta, M Stausholm, TK Frederiksen, ... 2019 Global IoT Summit (GIoTS), 1-6, 2019 | 10 | 2019 |
A practical implementation of Regev’s LWE-based cryptosystem TK Frederiksen Technical report, 2010 | 8 | 2010 |
Improved distributed rsa key generation using the miller-rabin test J Burkhardt, I Damgård, TK Frederiksen, S Ghosh, C Orlandi Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
A holistic approach to enhanced security and privacy in digital health passports T Frederiksen Proceedings of the 16th International Conference on Availability …, 2021 | 5 | 2021 |