dblp.uni-trier.dewww.uni-trier.de

Jesper Buus Nielsen Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
28EEPeter Bro Miltersen, Jesper Buus Nielsen, Nikos Triandopoulos: Privacy-Enhancing Auctions Using Rational Cryptography. CRYPTO 2009: 541-558
27EEMatthias Fitzi, Jesper Buus Nielsen: On the Number of Synchronous Rounds Sufficient for Authenticated Byzantine Agreement. DISC 2009: 449-463
26EEPeter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, Tomas Toft: Secure Multiparty Computation Goes Live. Financial Cryptography 2009: 325-343
25EEIvan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen: Asynchronous Multiparty Computation: Theory and Implementation. Public Key Cryptography 2009: 160-179
24EEIvan Damgård, Jesper Buus Nielsen, Daniel Wichs: Universally Composable Multiparty Computation with Partially Isolated Parties. TCC 2009: 315-331
23EEJesper Buus Nielsen, Claudio Orlandi: LEGO for Two-Party Secure Computation. TCC 2009: 368-386
2008
22EEIvan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith: Scalable Multiparty Computation with Nearly Optimal Work and Resilience. CRYPTO 2008: 241-261
21EEIvan Damgård, Jesper Buus Nielsen, Daniel Wichs: Isolated Proofs of Knowledge and Isolated Zero Knowledge. EUROCRYPT 2008: 509-526
20EEMartin Hirt, Jesper Buus Nielsen, Bartosz Przydatek: Asynchronous Multi-Party Computation with Quadratic Communication. ICALP (2) 2008: 473-485
19EEIvan Damgård, Jesper Buus Nielsen, Claudio Orlandi: Essentially Optimal Universally Composable Oblivious Transfer. ICISC 2008: 318-335
18EEDanny Harnik, Yuval Ishai, Eyal Kushilevitz, Jesper Buus Nielsen: OT-Combiners via Secure Computation. TCC 2008: 393-411
2007
17EEIvan Damgård, Yvo Desmedt, Matthias Fitzi, Jesper Buus Nielsen: Secure Protocols with Asymmetric Trust. ASIACRYPT 2007: 357-375
16EEIvan Damgård, Jesper Buus Nielsen: Scalable and Unconditionally Secure Multiparty Computation. CRYPTO 2007: 572-590
2006
15EEMartin Hirt, Jesper Buus Nielsen: Robust Multiparty Computation with Linear Communication Complexity. CRYPTO 2006: 463-482
14EEJesús F. Almansa, Ivan Damgård, Jesper Buus Nielsen: Simplified Threshold RSA with Adaptive and Proactive Security. EUROCRYPT 2006: 593-611
13EEIvan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft: Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. TCC 2006: 285-304
2005
12EEMartin Hirt, Jesper Buus Nielsen: Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. ASIACRYPT 2005: 79-99
11EEMartin Hirt, Jesper Buus Nielsen, Bartosz Przydatek: Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract). EUROCRYPT 2005: 322-340
10EEYunlei Zhao, Jesper Buus Nielsen, Robert H. Deng, Dengguo Feng: Generic yet Practical ZK Arguments from any Public-Coin HVZK Electronic Colloquium on Computational Complexity (ECCC)(162): (2005)
2004
9EEBoaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass: Universally Composable Protocols with Relaxed Set-Up Assumptions. FOCS 2004: 186-195
2003
8EEIvan Damgård, Jesper Buus Nielsen: Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption. CRYPTO 2003: 247-264
7EERan Canetti, Hugo Krawczyk, Jesper Buus Nielsen: Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582
2002
6EEJesper Buus Nielsen: Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. CRYPTO 2002: 111-126
5EEJesper Buus Nielsen: A Threshold Pseudorandom Function Construction and Its Applications. CRYPTO 2002: 401-416
4EEIvan Damgård, Jesper Buus Nielsen: Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. CRYPTO 2002: 449-464
3EEIvan Damgård, Jesper Buus Nielsen: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. CRYPTO 2002: 581-596
2001
2EERonald Cramer, Ivan Damgård, Jesper Buus Nielsen: Multiparty Computation from Threshold Homomorphic Encryption. EUROCRYPT 2001: 280-299
2000
1EEIvan Damgård, Jesper Buus Nielsen: Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. CRYPTO 2000: 432-450

Coauthor Index

1Jesús F. Almansa [14]
2Boaz Barak [9]
3Peter Bogetoft [26]
4Ran Canetti [7] [9]
5Dan Lund Christensen [26]
6Ronald Cramer [2]
7Ivan Damgård [1] [2] [3] [4] [8] [13] [14] [16] [17] [19] [21] [22] [24] [25] [26]
8Robert H. Deng (Robert Huijie Deng) [10]
9Yvo Desmedt [17]
10Dengguo Feng [10]
11Matthias Fitzi [13] [17] [27]
12Martin Geisler [25] [26]
13Danny Harnik [18]
14Martin Hirt [11] [12] [15] [20]
15Yuval Ishai [18] [22]
16Thomas Jakobsen [26]
17Eike Kiltz [13]
18Hugo Krawczyk [7]
19Mikkel Krøigaard [22] [25] [26]
20Eyal Kushilevitz [18]
21Peter Bro Miltersen [28]
22Janus Dam Nielsen [26]
23Kurt Nielsen [26]
24Claudio Orlandi [19] [23]
25Jakob Illeborg Pagter (Jakob Pagter) [26]
26Rafael Pass [9]
27Bartosz Przydatek [11] [20]
28Michael I. Schwartzbach [26]
29Adam Smith [22]
30Tomas Toft [13] [26]
31Nikos Triandopoulos [28]
32Daniel Wichs [21] [24]
33Yunlei Zhao [10]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)