Підписатись
Tomas Toft
Tomas Toft
PostDoc, Computer Science Dept., Aarhus University
Підтверджена електронна адреса в cs.au.dk
Назва
Посилання
Посилання
Рік
Secure multiparty computation goes live
P Bogetoft, D Christensen, I Damgård, M Geisler, T Jakobsen, ...
Financial Cryptography and Data Security, 325-343, 2009
7782009
Privacy-preserving face recognition
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft
Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009
7682009
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, J Nielsen, T Toft
Theory of Cryptography, 285-304, 2006
6412006
Generating private recommendations efficiently using homomorphic encryption and data packing
Z Erkin, T Veugen, T Toft, RL Lagendijk
IEEE transactions on information forensics and security 7 (3), 1053-1066, 2012
3002012
High-performance secure multi-party computation for data mining applications
D Bogdanov, M Niitsoo, T Toft, J Willemson
International Journal of Information Security 11 (6), 403-418, 2012
2792012
A practical implementation of secure auctions based on multiparty integer computation
P Bogetoft, I Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft
Financial Cryptography and Data Security, 142-147, 2006
174*2006
Confidential benchmarking based on multiparty computation
I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft
International Conference on Financial Cryptography and Data Security, 169-187, 2016
1182016
Secure Equality and Greater-Than Tests with Sublinear Online Complexity
H Lipmaa, T Toft
93*
Primitives and applications for multi-party computation
T Toft
PhD thesis, University of Aarhus, Aarhus, Denmark, 2007
912007
Solving linear programs using multiparty computation
T Toft
Financial Cryptography and Data Security, 90-107, 2009
892009
Efficient RSA key generation and threshold paillier in the two-party setting
C Hazay, GL Mikkelsen, T Rabin, T Toft, AA Nicolosi
Journal of Cryptology 32, 265-323, 2019
862019
On secure two-party integer division
M Dahl, C Ning, T Toft
International conference on financial cryptography and data security, 164-178, 2012
542012
Privacy-preserving user clustering in a social network
Z Erkin, T Veugen, T Toft, RL Lagendijk
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
522009
Constant-rounds, almost-linear bit-decomposition of secret shared values
T Toft
Cryptographers’ Track at the RSA Conference, 357-371, 2009
502009
Sub-linear, secure comparison with two non-colluding parties
T Toft
International Workshop on Public Key Cryptography, 174-191, 2011
482011
Secure data structures based on multi-party computation
T Toft
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011
462011
Better preprocessing for secure multiparty computation
C Baum, I Damgård, T Toft, R Zakarias
International Conference on Applied Cryptography and Network Security, 327-345, 2016
432016
Linear, constant-rounds bit-decomposition
T Reistad, T Toft
Information, Security and Cryptology–ICISC 2009: 12th International …, 2010
432010
Privacy-preserving distributed clustering
Z Erkin, T Veugen, T Toft, RL Lagendijk
EURASIP Journal on Information Security 2013, 1-15, 2013
422013
An empirical study and some improvements of the MiniMac protocol for secure computation
I Damgård, R Lauritsen, T Toft
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
362014
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20