Jesper Buus Nielsen

Orcid: 0000-0002-7074-0683

Affiliations:
  • Aarhus University


According to our database1, Jesper Buus Nielsen authored at least 136 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Network agnostic consensus in constant time.
IACR Cryptol. ePrint Arch., 2025

Asynchronous YOSO a la Paillier.
IACR Cryptol. ePrint Arch., 2025

OCash: Fully Anonymous Payments Between Blockchain Light Clients.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Malleable SNARKs and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Early Stopping for Any Number of Corruptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Byzantine Agreement Decomposed: Honest Majority Asynchronous Total-Order Broadcast from Reliable Broadcast.
IACR Cryptol. ePrint Arch., 2023

CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

On Valiant's Conjecture - Impossibility of Incrementally Verifiable Computation from Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Practical Large-Scale Proof-Of-Stake Asynchronous Total-Order Broadcast.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Fast threshold ECDSA with honest majority.
J. Comput. Secur., 2022

Enig: Player Replaceable Finality Layers with Optimal Validity.
IACR Cryptol. ePrint Arch., 2022

Universally Composable Subversion-Resilient Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Public Randomness Extraction with Ephemeral Roles and Worst-Case Corruptions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

GearBox: Optimal-size Shard Committees by Leveraging the Safety-Liveness Dichotomy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Encryption to the Future - A Paradigm for Sending Secret Messages to Future (Anonymous) Committees.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy.
IACR Cryptol. ePrint Arch., 2021

Encryption to the Future: A Paradigm for Sending Secret Messages to Future (Anonymous) Committees.
IACR Cryptol. ePrint Arch., 2021

Random-Index PIR and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Weight-Based Nakamoto-Style Blockchains.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

TARDIS: A Foundation of Time-Lock Puzzles in UC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Continuously Non-malleable Codes in the Split-State Model.
J. Cryptol., 2020

Leveraging Weight Functions for Optimistic Responsiveness in Blockchains.
IACR Cryptol. ePrint Arch., 2020

Random-index PIR with Applications to Large-Scale Secure MPC.
IACR Cryptol. ePrint Arch., 2020

CRAFT: Composable Randomness and Almost Fairness from Time.
IACR Cryptol. ePrint Arch., 2020

TARDIS: Time And Relative Delays In Simulation.
IACR Cryptol. ePrint Arch., 2020

Afgjort: A Partially Synchronous Finality Layer for Blockchains.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Fast Threshold ECDSA with Honest Majority.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Lower Bounds for Leakage-Resilient Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Reverse Firewalls for Actively Secure MPCs.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Afgjort - A Semi-Synchronous Finality Layer for Blockchains.
IACR Cryptol. ePrint Arch., 2019

Lower Bounds for Oblivious Data Structures.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

Continuous Non-Malleable Codes in the 8-Split-State Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Yes, There is an Oblivious RAM Lower Bound!
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Continuously Non-malleable Codes with Split-State Refresh.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model.
Theor. Comput. Sci., 2017

Universally Composable Zero-Knowledge Proof of Membership.
IACR Cryptol. ePrint Arch., 2017

Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model.
Electron. Colloquium Comput. Complex., 2017

On the Computational Overhead of MPC with Dishonest Majority.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Fully Leakage-Resilient Codes.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Non-malleable Codes with Split-State Refresh.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Predictable Arguments of Knowledge.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

The TinyTable Protocol for 2-Party Secure Computation, or: Gate-Scrambling Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Cross&Clean: Amortized Garbled Circuits with Constant Overhead.
IACR Cryptol. ePrint Arch., 2016

Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation.
IACR Cryptol. ePrint Arch., 2016

Cross and Clean: Amortized Garbled Circuits with Constant Overhead.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

On the Complexity of Additively Homomorphic UC Commitments.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Unconditionally Secure Computation with Reduced Interaction.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

On the Communication Required for Unconditionally Secure Multiplication.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Rate-1, Linear Time and Additively Homomorphic UC Commitments.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Reactive Garbling: Foundation, Instantiation, Application.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Foundations of Reactive Garbling Schemes.
IACR Cryptol. ePrint Arch., 2015

TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2015

On the Communication required for Unconditionally Secure Multiplication.
IACR Cryptol. ePrint Arch., 2015

Unconditionally Secure Computation with Reduced Interaction.
IACR Cryptol. ePrint Arch., 2015

High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

A Tamper and Leakage Resilient von Neumann Architecture.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Additively Homomorphic UC Commitments with Optimal Amortized Overhead.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Secure Multiparty Computation and Secret Sharing.
Cambridge University Press, ISBN: 9781107043053, 2015

2014
Invisible Adaptive Attacks.
IACR Cryptol. ePrint Arch., 2014

A Tamper and Leakage Resilient Random Access Machine.
IACR Cryptol. ePrint Arch., 2014

An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014

Continuous Non-malleable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Faster Maliciously Secure Two-Party Computation Using the GPU.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Adaptive versus Static Security in the UC Model.
Proceedings of the Provable Security - 8th International Conference, 2014

Leakage-Resilient Signatures with Graceful Degradation.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

A Framework for Outsourcing of Secure Computation.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Compact VSS and Efficient Homomorphic UC Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the Connection between Leakage Tolerance and Adaptive Security.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Secure Key Management in the Cloud.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Superposition Attacks on Cryptographic Protocols.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.
Proceedings of the Advances in Cryptology, 2013

Limits on the Power of Cryptographic Cheap Talk.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Fast and Maliciously Secure Two-Party Computation Using the GPU.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
A New Approach to Practical Active-Secure Two-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Actively Secure Two-Party Evaluation of Any Quantum Operation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Signature Schemes Secure against Hard-to-Invert Leakage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Using Inverted Indices for Accelerating LINGO Calculations.
J. Chem. Inf. Model., 2011

A sub-cubic time algorithm for computing the quartet distance between two general trees.
Algorithms Mol. Biol., 2011

Perfectly Secure Oblivious RAM without Random Oracles.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Algorithms for a Parallel Implementation of Hidden Markov Models with a Small State Space.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Lower and Upper Bounds for Deniable Public-Key Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Fully Simulatable Quantum-Secure Coin-Flipping and Applications.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
A generalization of Paillier's public-key system with applications to electronic voting.
Int. J. Inf. Sec., 2010

On the Necessary and Sufficient Assumptions for UC Computation.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

From Passive to Covert Security at Low Cost.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

On the theoretical gap between synchronous and asynchronous MPC protocols.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.
Proceedings of the Advances in Cryptology, 2010

Privacy-enhancing auctions using rational cryptography.
Proceedings of the Behavioral and Quantitative Game Theory, 2010

2009
On the Number of Synchronous Rounds Sufficient for Authenticated Byzantine Agreement.
Proceedings of the Distributed Computing, 23rd International Symposium, 2009

A Tree Based Method for the Rapid Screening of Chemical Fingerprints.
Proceedings of the Algorithms in Bioinformatics, 9th International Workshop, 2009

LEGO for Two-Party Secure Computation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Universally Composable Multiparty Computation with Partially Isolated Parties.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Asynchronous Multiparty Computation: Theory and Implementation.
Proceedings of the Public Key Cryptography, 2009

A Quadratic Time Algorithm for Computing the Quartet Distance between Two General Trees.
Proceedings of the International Joint Conferences on Bioinformatics, 2009


2008
Privacy-Enhancing First-Price Auctions Using Rational Cryptography.
IACR Cryptol. ePrint Arch., 2008

On the Number of Synchronous Rounds Required for Byzantine Agreement.
IACR Cryptol. ePrint Arch., 2008

Multiparty Computation Goes Live.
IACR Cryptol. ePrint Arch., 2008

Almost-Asynchronous MPC with Faulty Minority.
IACR Cryptol. ePrint Arch., 2008

SNPFile - A software library and file format for large scale association mapping and population genetics studies.
BMC Bioinform., 2008

OT-Combiners via Secure Computation.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Essentially Optimal Universally Composable Oblivious Transfer.
Proceedings of the Information Security and Cryptology, 2008

Asynchronous Multi-Party Computation with Quadratic Communication.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Isolated Proofs of Knowledge and Isolated Zero Knowledge.
Proceedings of the Advances in Cryptology, 2008

Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Proceedings of the Advances in Cryptology, 2008

2007
Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free.
IACR Cryptol. ePrint Arch., 2007

Scalable and Unconditionally Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2007

Secure Protocols with Asymmetric Trust.
Proceedings of the Advances in Cryptology, 2007

2006
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Simplified Threshold RSA with Adaptive and Proactive Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Robust Multiparty Computation with Linear Communication Complexity.
Proceedings of the Advances in Cryptology, 2006

2005
How to Split a Shared Secret into Shared Bits in Constant-Round.
IACR Cryptol. ePrint Arch., 2005

Generic yet Practical ZK Arguments from any Public-Coin HVZK
Electron. Colloquium Comput. Complex., 2005

Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract).
Proceedings of the Advances in Cryptology, 2005

Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation.
Proceedings of the Advances in Cryptology, 2005

2004
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2004

Universally Composable Protocols with Relaxed Set-Up Assumptions.
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004

2003
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption.
Proceedings of the Advances in Cryptology, 2003

Relaxing Chosen-Ciphertext Security.
Proceedings of the Advances in Cryptology, 2003

2002
A Threshold Pseudorandom Function Construction and Its Applications.
Proceedings of the Advances in Cryptology, 2002

Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case.
Proceedings of the Advances in Cryptology, 2002

Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor.
Proceedings of the Advances in Cryptology, 2002

Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security.
Proceedings of the Advances in Cryptology, 2002

2001
Multiparty Computation from Threshold Homomorphic Encryption.
Proceedings of the Advances in Cryptology, 2001

2000
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption.
Proceedings of the Advances in Cryptology, 2000


  Loading...