Follow
Peter Sebastian Nordholt
Peter Sebastian Nordholt
Chainalysis
Verified email at chainalysis.com - Homepage
Title
Cited by
Cited by
Year
A new approach to practical active-secure two-party computation
JB Nielsen, PS Nordholt, C Orlandi, SS Burra
Advances in Cryptology–CRYPTO 2012, 2012
4932012
Minilego: Efficient secure two-party computation from general assumptions
TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
1032013
Confidential benchmarking based on multiparty computation
I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft
International Conference on Financial Cryptography and Data Security, 169-187, 2016
1012016
Lower and Upper Bounds for Deniable Public-Key Encryption
R Bendlin, J Nielsen, P Nordholt, C Orlandi
Advances in Cryptology–ASIACRYPT 2011, 125-142, 2011
54*2011
Signature Schemes Secure against Hard-to-Invert Leakage⋆
S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel
51*
Minimising communication in honest-majority MPC by batchwise multiplication verification
PS Nordholt, M Veeningen
International Conference on Applied Cryptography and Network Security, 321-339, 2018
502018
High performance multi-party computation for binary circuits based on oblivious transfer
SS Burra, E Larraia, JB Nielsen, PS Nordholt, C Orlandi, E Orsini, P Scholl, ...
Cryptology ePrint Archive, 2015
48*2015
Cross-layer deanonymization methods in the lightning protocol
M Romiti, F Victor, P Moreno-Sanchez, PS Nordholt, B Haslhofer, M Maffei
International Conference on Financial Cryptography and Data Security, 187-204, 2021
222021
Linear and Differential Cryptanalysis
BT Jakobsen, M Abyar, PS Nordholt
University of Aarhus, Denmark December 15, 2006
32006
New Approaches to Practical Secure Two-Party Computation
PS Nordholt
Institut for Datalogi, Aarhus Universitet, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–10