A new approach to practical active-secure two-party computation JB Nielsen, PS Nordholt, C Orlandi, SS Burra Advances in Cryptology–CRYPTO 2012, 2012 | 507 | 2012 |
Confidential benchmarking based on multiparty computation I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft International Conference on Financial Cryptography and Data Security, 169-187, 2016 | 105 | 2016 |
Minilego: Efficient secure two-party computation from general assumptions TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 103 | 2013 |
Lower and Upper Bounds for Deniable Public-Key Encryption R Bendlin, J Nielsen, P Nordholt, C Orlandi Advances in Cryptology–ASIACRYPT 2011, 125-142, 2011 | 56* | 2011 |
Minimising communication in honest-majority MPC by batchwise multiplication verification PS Nordholt, M Veeningen International Conference on Applied Cryptography and Network Security, 321-339, 2018 | 51 | 2018 |
High performance multi-party computation for binary circuits based on oblivious transfer SS Burra, E Larraia, JB Nielsen, PS Nordholt, C Orlandi, E Orsini, P Scholl, ... Cryptology ePrint Archive, 2015 | 51* | 2015 |
Signature Schemes Secure against Hard-to-Invert Leakage⋆ S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel | 51* | |
Cross-layer deanonymization methods in the lightning protocol M Romiti, F Victor, P Moreno-Sanchez, PS Nordholt, B Haslhofer, M Maffei International Conference on Financial Cryptography and Data Security, 187-204, 2021 | 22 | 2021 |
Linear and Differential Cryptanalysis BT Jakobsen, M Abyar, PS Nordholt University of Aarhus, Denmark December 15, 2006 | 3 | 2006 |
New Approaches to Practical Secure Two-Party Computation PS Nordholt Institut for Datalogi, Aarhus Universitet, 2013 | 1 | 2013 |