Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Toft, Tomas
add a person with the name Toft, Tomas
 

Other publications of authors with the same name

Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing., , , and . IEEE Trans. Information Forensics and Security, 7 (3): 1053-1066 (2012)Linear, Constant-Rounds Bit-Decomposition., and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 245-257. Springer, (2009)Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting., , , , and . J. Cryptology, 32 (2): 265-323 (2019)Solving Linear Programs Using Multiparty Computation.. Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 90-107. Springer, (2009)Privacy-preserving distributed clustering., , , and . EURASIP J. Information Security, (2013)Privacy-preserving user clustering in a social network., , , and . WIFS, page 96-100. IEEE, (2009)Multiparty Computation Goes Live., , , , , , , , , and 2 other author(s). IACR Cryptology ePrint Archive, (2008)Fast Multiparty Multiplications from shared bits., , and . IACR Cryptology ePrint Archive, (2016)Secure Multiparty Computation Goes Live., , , , , , , , , and 2 other author(s). Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 325-343. Springer, (2009)Secret Sharing Comparison by Transformation and Rotation., and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 169-180. Springer, (2007)