New primitives for actively-secure MPC over rings with applications to private machine learning I Damgård, D Escudero, T Frederiksen, M Keller, P Scholl, N Volgushev 2019 IEEE Symposium on Security and Privacy (SP), 1102-1120, 2019 | 112 | 2019 |
MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi | 101 | 2013 |
Privacy-free garbled circuits with applications to efficient zero-knowledge TK Frederiksen, JB Nielsen, C Orlandi Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 78 | 2015 |
A unified approach to MPC with preprocessing using OT TK Frederiksen, M Keller, E Orsini, P Scholl Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015 | 57 | 2015 |
Fast and maliciously secure two-party computation using the GPU TK Frederiksen, JB Nielsen Applied Cryptography and Network Security: 11th International Conference …, 2013 | 49 | 2013 |
Fast distributed RSA key generation for semi-honest and malicious adversaries TK Frederiksen, Y Lindell, V Osheter, B Pinkas Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 46 | 2018 |
Faster maliciously secure two-party computation using the GPU TK Frederiksen, TP Jakobsen, JB Nielsen Security and Cryptography for Networks: 9th International Conference, SCN …, 2014 | 46 | 2014 |
P2DEX: privacy-preserving decentralized cryptocurrency exchange C Baum, B David, TK Frederiksen Applied Cryptography and Network Security: 19th International Conference …, 2021 | 40 | 2021 |
On the complexity of additively homomorphic UC commitments TK Frederiksen, TP Jakobsen, JB Nielsen, R Trifiletti Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 35 | 2015 |
TinyLEGO: An interactive garbling scheme for maliciously secure two-party computation TK Frederiksen, TP Jakobsen, JB Nielsen, R Trifiletti Cryptology ePrint Archive, 2015 | 35 | 2015 |
Committed MPC: Maliciously Secure Multiparty Computation from Homomorphic Commitments TK Frederiksen, B Pinkas, A Yanai Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 23 | 2018 |
Sok: Mitigation of front-running in decentralized finance C Baum, JH Chiang, B David, TK Frederiksen, L Gentile Cryptology ePrint Archive, 2021 | 19 | 2021 |
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020 | 18 | 2020 |
The OLYMPUS architecture—Oblivious identity management for private user-friendly services R Torres Moreno, J Bernal Bernabe, J Garcia Rodriguez, ... Sensors 20 (3), 945, 2020 | 11 | 2020 |
Olympus: Towards oblivious identity management for private and user-friendly services RT Moreno, JB Bernabe, A Skarmeta, M Stausholm, TK Frederiksen, ... 2019 Global IoT Summit (GIoTS), 1-6, 2019 | 8 | 2019 |
A practical implementation of Regev’s LWE-based cryptosystem TK Frederiksen Technical report, 2010 | 8 | 2010 |
A multi-bit threshold variant of Regev's LWE-based cryptosystem TK Frederiksen Cryptology ePrint Archive, 2011 | 4 | 2011 |
A holistic approach to enhanced security and privacy in digital health passports T Frederiksen Proceedings of the 16th International Conference on Availability …, 2021 | 3 | 2021 |
Eagle: Efficient Privacy Preserving Smart Contracts C Baum, JH Chiang, B David, TK Frederiksen Cryptology ePrint Archive, 2022 | 2 | 2022 |
Identity Management: State of the Art, Challenges and Perspectives TK Frederiksen, J Hesse, A Lehmann, R Torres Moreno Privacy and Identity Management. Data for Better Living: AI and Privacy …, 2020 | 2 | 2020 |