Tomas Toft
According to our database1,
Tomas Toft
authored at least 31 papers
between 2005 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
J. Cryptol., 2019
2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
J. Cryptol., 2014
An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation.
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
2012
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing.
IEEE Trans. Inf. Forensics Secur., 2012
Int. J. Inf. Sec., 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Topics in Cryptology, 2009
2008
ERCIM News, 2008
2007
Proceedings of the Internet and Network Economics, Third International Workshop, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation.
Proceedings of the Financial Cryptography and Data Security, 2006
2005
IACR Cryptol. ePrint Arch., 2005