Peter Sebastian Nordholt

According to our database1, Peter Sebastian Nordholt authored at least 8 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Cross-Layer Deanonymization Methods in the Lightning Protocol.
Proceedings of the Financial Cryptography and Data Security, 2021

2018
Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification.
Proceedings of the Applied Cryptography and Network Security, 2018

2016
Confidential Benchmarking Based on Multiparty Computation.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

2013
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.
Proceedings of the Advances in Cryptology, 2013

2012
A New Approach to Practical Active-Secure Two-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Signature Schemes Secure against Hard-to-Invert Leakage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Lower and Upper Bounds for Deniable Public-Key Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011


  Loading...