Cryptographers' World
 

Jesper Buus Nielsen


Author's Web Page Link

23 papers in database with 1181 citations StarStar

H-number: 15

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Peter Bro Miltersen,  Jesper Buus Nielsen,  Nikos Triandopoulos,  Privacy-Enhancing Auctions Using Rational Cryptography, pp. 541 - 558, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

2. Ivan Damgard,  Martin Geisler,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Asynchronous Multiparty Computation: Theory and Implementation, pp. 160 - 179, PKC 2009.

[Electronic Edition][Cited 26 times ]

3. Jesper Buus Nielsen,  Claudio Orlandi,  LEGO for Two-Party Secure Computation, pp. 368 - 386, TCC 2009.

[Electronic Edition][Cited 18 times ]

4. Ivan Damgard,  Jesper Buus Nielsen,  Daniel Wichs,  Universally Composable Multiparty Computation with Partially Isolated Parties, pp. 315 - 331, TCC 2009.

[Electronic Edition][Cited 9 times ]

5. Ivan Damgard,  Yuval Ishai,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Adam Smith,  Scalable Multiparty Computation with Nearly Optimal Work and Resilience, pp. 241 - 261, CRYPTO 2008.

[Electronic Edition][Cited 6 times ]

6. Ivan Damgard,  Jesper Buus Nielsen,  Daniel Wichs,  Isolated Proofs of Knowledge and Isolated Zero Knowledge, pp. 509 - 526, EUROCRYPT 2008.

[Electronic Edition][Cited 10 times ]

7. Danny Harnik,  Yuval Ishai,  Eyal Kushilevitz,  Jesper Buus Nielsen,  OT-Combiners via Secure Computation, pp. 393 - 411, TCC 2008.

[Electronic Edition][Cited 12 times ]

8. Ivan Damgard,  Jesper Buus Nielsen,  Scalable and Unconditionally Secure Multiparty Computation, pp. 572 - 590, CRYPTO 2007.

[Electronic Edition][Cited 19 times ]

9. Ivan Damgard,  Yvo Desmedt,  Matthias Fitzi,  Jesper Buus Nielsen,  Secure Protocols with Asymmetric Trust, pp. 357 - 375, ASIACRYPT 2007.

[Electronic Edition][Cited 5 times ]

10. JesĂşs F. Almansa,  Ivan Damgard,  Jesper Buus Nielsen,  Simplified Threshold RSA with Adaptive and Proactive Security, pp. 593 - 611, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

11. Ivan Damgard,  Matthias Fitzi,  Eike Kiltz,  Jesper Buus Nielsen,  Tomas Toft,  Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation, pp. 285 - 304, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 85 times Red Star]

12. Martin Hirt,  Jesper Buus Nielsen,  Robust Multiparty Computation with Linear Communication Complexity, pp. 463 - 482, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

13. Martin Hirt,  Jesper Buus Nielsen,  Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation, pp. 79 - 99, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

14. Martin Hirt,  Jesper Buus Nielsen,  Bartosz Przydatek,  Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract), pp. 322 - 340, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

15. Boaz Barak,  Ran Canetti,  Jesper Buus Nielsen,  Rafael Pass,  Universally Composable Protocols with Relaxed Set-Up Assumptions, pp. 186 - 195, FOCS 2004.

[Electronic Edition][Cited 73 times Red Star]

16. Ivan Damgard,  Jesper Buus Nielsen,  Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption, pp. 247 - 264, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 228 times Red StarRed Star]

17. Ran Canetti,  Hugo Krawczyk,  Jesper Buus Nielsen,  Relaxing Chosen-Ciphertext Security, pp. 565 - 582, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 85 times Red Star]

18. Ivan Damgard,  Jesper Buus Nielsen,  Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security, pp. 449 - 464, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

19. Jesper Buus Nielsen,  A Threshold Pseudorandom Function Construction and Its Applications, pp. 401 - 416, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

20. Jesper Buus Nielsen,  Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case, pp. 111 - 126, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 124 times Red StarRed Star]

21. Ivan Damgard,  Jesper Buus Nielsen,  Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor, pp. 581 - 596, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 93 times Red Star]

22. Ronald Cramer,  Ivan Damgard,  Jesper Buus Nielsen,  Multiparty Computation from Threshold Homomorphic Encryption, pp. 280 - 299, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 236 times Red StarRed Star]

23. Ivan Damgard,  Jesper Buus Nielsen,  Improved Non-committing Encryption Schemes Based on a General Complexity Assumption, pp. 432 - 450, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 54 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...