Secure multiparty computation goes live P Bogetoft, D Christensen, I Damgård, M Geisler, T Jakobsen, ... Financial Cryptography and Data Security, 325-343, 2009 | 575 | 2009 |
Privacy-preserving face recognition Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft International symposium on privacy enhancing technologies symposium, 235-253, 2009 | 567 | 2009 |
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation I Damgård, M Fitzi, E Kiltz, J Nielsen, T Toft Theory of Cryptography, 285-304, 2006 | 424 | 2006 |
Generating private recommendations efficiently using homomorphic encryption and data packing Z Erkin, T Veugen, T Toft, RL Lagendijk IEEE transactions on information forensics and security 7 (3), 1053-1066, 2012 | 187 | 2012 |
High-performance secure multi-party computation for data mining applications D Bogdanov, M Niitsoo, T Toft, J Willemson International Journal of Information Security 11 (6), 403-418, 2012 | 155 | 2012 |
A practical implementation of secure auctions based on multiparty integer computation P Bogetoft, I Damgård, T Jakobsen, K Nielsen, J Pagter, T Toft Financial Cryptography and Data Security, 142-147, 2006 | 147* | 2006 |
Efficient RSA key generation and threshold paillier in the two-party setting C Hazay, GL Mikkelsen, T Rabin, T Toft, AA Nicolosi Journal of Cryptology 32 (2), 265-323, 2019 | 90 | 2019 |
Computationally secure pattern matching in the presence of malicious adversaries C Hazay, T Toft International Conference on the Theory and Application of Cryptology and …, 2010 | 78 | 2010 |
Primitives and applications for multi-party computation T Toft PhD thesis, University of Aarhus, Aarhus, Denmark, 2007 | 73 | 2007 |
Secure Equality and Greater-Than Tests with Sublinear Online Complexity H Lipmaa, T Toft | 61* | |
Confidential benchmarking based on multiparty computation I Damgård, K Damgård, K Nielsen, PS Nordholt, T Toft International Conference on Financial Cryptography and Data Security, 169-187, 2016 | 56 | 2016 |
Springer Berlin Heidelberg Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft Berlin, Heidelberg, 2009 | 55 | 2009 |
Solving linear programs using multiparty computation T Toft Financial Cryptography and Data Security, 90-107, 2009 | 54 | 2009 |
On secure two-party integer division M Dahl, C Ning, T Toft International Conference on Financial Cryptography and Data Security, 164-178, 2012 | 38 | 2012 |
Privacy-preserving user clustering in a social network Z Erkin, T Veugen, T Toft, RL Lagendijk 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 38 | 2009 |
Constant-rounds, almost-linear bit-decomposition of secret shared values T Toft Cryptographers’ Track at the RSA Conference, 357-371, 2009 | 38 | 2009 |
Sub-linear, secure comparison with two non-colluding parties T Toft International Workshop on Public Key Cryptography, 174-191, 2011 | 34 | 2011 |
An empirical study and some improvements of the MiniMac protocol for secure computation I Damgård, R Lauritsen, T Toft International Conference on Security and Cryptography for Networks, 398-415, 2014 | 30 | 2014 |
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. E Kiltz, I Damgaard, M Fitzi, JB Nielsen, T Toft IACR Cryptol. ePrint Arch. 2005, 66, 2005 | 30 | 2005 |
Secure data structures based on multi-party computation T Toft Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011 | 29 | 2011 |