Tore Kasper Frederiksen

Orcid: 0000-0002-0358-2638

According to our database1, Tore Kasper Frederiksen authored at least 25 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Threshold (Fully) Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2025

2024
Detecting Rogue Decryption in (Threshold) Encryption via Self-Incriminating Proofs.
IACR Cryptol. ePrint Arch., 2024

Updatable Privacy-Preserving Blueprints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

A New Approach to Efficient and Secure Fixed-Point Computation.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Attribute-based Single Sign-On: Secure, Private, and Efficient.
IACR Cryptol. ePrint Arch., 2023

Eagle: Efficient Privacy Preserving Smart Contracts.
Proceedings of the Financial Cryptography and Data Security, 2023

Improved Distributed RSA Key Generation Using the Miller-Rabin Test.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

SoK: Privacy-Enhancing Technologies in Finance.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
SoK: Mitigation of Front-Running in Decentralized Finance.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

2021
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange.
Proceedings of the Applied Cryptography and Network Security, 2021

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
The OLYMPUS Architecture - Oblivious Identity Management for Private User-Friendly Services.
Sensors, 2020

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Identity Management: State of the Art, Challenges and Perspectives.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services.
Proceedings of the 2019 Global IoT Summit, 2019

2018
Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2016
On the Complexity of Additively Homomorphic UC Commitments.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2015

Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

A Unified Approach to MPC with Preprocessing Using OT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Faster Maliciously Secure Two-Party Computation Using the GPU.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

2013
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.
Proceedings of the Advances in Cryptology, 2013

Fast and Maliciously Secure Two-Party Computation Using the GPU.
Proceedings of the Applied Cryptography and Network Security, 2013


  Loading...