Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Pagter, Jakob Illeborg"'
Autor:
Damgård, Ivan, Jakobsen, Thomas P., Nielsen, Jesper Buus, Pagter, Jakob Illeborg, Østergaard, Michael Bæksvang
Publikováno v:
Damgård, I, Jakobsen, T P, Nielsen, J B, Pagter, J I & Østergaard, M B 2022, ' Fast threshold ECDSA with honest majority ', Journal of Computer Security, vol. 30, no. 1, pp. 167-196 . https://doi.org/10.3233/JCS-200112
ECDSA is a widely adopted digital signature standard. A number of threshold protocols for ECDSA have been developed that let a set of parties jointly generate the secret signing key and compute signatures, without ever revealing the signing key. Thre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::c17dabb6569e3d6cb47162de0c6cd1ac
https://pure.au.dk/portal/da/publications/fast-threshold-ecdsa-with-honest-majority(494a3496-4583-49db-b3f0-dfd9feaf34f3).html
https://pure.au.dk/portal/da/publications/fast-threshold-ecdsa-with-honest-majority(494a3496-4583-49db-b3f0-dfd9feaf34f3).html
Autor:
Damgård, Ivan, Jakobsen, Thomas Pelle, Nielsen, Jesper Buus, Pagter, Jakob Illeborg, Østergaard, Michael Bæksvang
Publikováno v:
Damgård, I, Jakobsen, T P, Nielsen, J B, Pagter, J I & Østergaard, M B 2020, Fast threshold ECDSA with honest majority . in C Galdi & V Kolesnikov (eds), Security and Cryptography for Networks . Springer, Cham, Lecture Notes in Computer Science, vol. 12238, pp. 382-400, 12th International Conference on Security and Cryptography for Networks, SCN 2020, Amalfi, Italy, 14/09/2020 . https://doi.org/10.1007/978-3-030-57990-6_19
ECDSA is a widely adopted digital signature standard. A number of threshold protocols for ECDSA have been developed that let a set of parties jointly generate the secret signing key and compute signatures, without ever revealing the signing key. Thre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::835286479c44de57210fec2c181b8f58
https://pure.au.dk/portal/da/publications/fast-threshold-ecdsa-with-honest-majority(7813e739-adf6-4293-bb4d-be67b0bdb3d9).html
https://pure.au.dk/portal/da/publications/fast-threshold-ecdsa-with-honest-majority(7813e739-adf6-4293-bb4d-be67b0bdb3d9).html
Autor:
Damgård, Ivan, Jakobsen, Thomas P., Nielsen, Jesper Buus, Pagter, Jakob Illeborg, Østergaard, Michael Bæksvang, Galdi, Clemente, Kolesnikov, Vladimir
Publikováno v:
Journal of Computer Security; 2022, Vol. 30 Issue 1, p167-196, 30p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Damgård, I B, Jakobsen, T P, Nielsen, J B & Pagter, J I 2013, Secure Key Management in the Cloud . in M Stam (ed.), Cryptography and Coding : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings . Springer VS, Lecture Notes in Computer Science, vol. 8308, pp. 270-289, Oxford, United Kingdom, 17/12/2013 . https://doi.org/10.1007/978-3-642-45239-0_16
We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::60b7910b2fc274ddd5165763b35a9e10
https://pure.au.dk/portal/da/publications/secure-key-management-in-the-cloud(9925a10c-9002-4a57-81c4-9a5507d40b43).html
https://pure.au.dk/portal/da/publications/secure-key-management-in-the-cloud(9925a10c-9002-4a57-81c4-9a5507d40b43).html
Autor:
Bøgetoft, Peter, Lund Christensen, Dan, Damgård, Ivan Bjerre, Geisler, Martin, Jacobsen, Thomas, Krøigaard, Mikkel, Nielsen, Janus Dam, Nielsen, Jesper Buus, Nielsen, Kurt, Pagter, Jakob Illeborg, Schwartzbach, Michael Ignatieff, Toft, Tomas
Publikováno v:
Bøgetoft, P, Lund Christensen, D, Damgård, I B, Geisler, M, Jacobsen, T, Krøigaard, M, Nielsen, J D, Nielsen, J B, Nielsen, K, Pagter, J I, Schwartzbach, M I, Toft, T & Nielsen, K 2009, ' Secure Multiparty Computation Goes Live ', Lecture Notes in Computer Science, vol. 5628, pp. 325-343 . https://doi.org/10.1007/978-3-642-03549-4_20
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. This work was supported by the Danish S
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::8535701db7a745a77e329f90f283bc60
https://pure.au.dk/portal/da/publications/secure-multiparty-computation-goes-live(1694df90-a375-11de-a554-000ea68e967b).html
https://pure.au.dk/portal/da/publications/secure-multiparty-computation-goes-live(1694df90-a375-11de-a554-000ea68e967b).html
Publikováno v:
Petersen, M G & Pagter, J I 2007, A Sense of Security in Pervasive Computing-is the light on when the refrigerator door is closed? in R Dhamija & S Dietrich (eds), Financial and Cryptography and Data Security : 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 2007, Revised Selecgted Papers . vol. LNCS 4886, Springer, pp. 383-388, Scarborough, Trinidad and Tobago, 15/02/2007 .
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this theoretically informed, concrete design process, also provides the basis
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::0c8e7b81f79772f9182ce0290392e9f8
https://pure.au.dk/portal/da/publications/a-sense-of-security-in-pervasive-computing--is-the-light-on-when-the-refrigerator-door-is-closed(56be2310-b159-11dd-889c-000ea68e967b).html
https://pure.au.dk/portal/da/publications/a-sense-of-security-in-pervasive-computing--is-the-light-on-when-the-refrigerator-door-is-closed(56be2310-b159-11dd-889c-000ea68e967b).html
Publikováno v:
Pedersen, M Ø & Pagter, J I 2007, The All-or-Nothing Anti-Theft Policy-Theft Protection for Pervasive Computing . in Proceedings of AINA Workshops . 1 edn, vol. 1, IEEE Computer Society Press, pp. 626-631, Niagara Falls, Canada, 21/05/2007 .
In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-N
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::3758362c34826a83eb9f61081ca293bd
https://pure.au.dk/portal/da/publications/the-allornothing-antitheft-policy--theft-protection-for-pervasive-computing(7356bc90-1b9a-11dc-bee9-02004c4f4f50).html
https://pure.au.dk/portal/da/publications/the-allornothing-antitheft-policy--theft-protection-for-pervasive-computing(7356bc90-1b9a-11dc-bee9-02004c4f4f50).html
Autor:
Damgård, Ivan Bjerre, Toft, Tomas, Pagter, Jakob Illeborg, Jakobsen, Thomas, Bogetoft, Peter, Nielsen, Kurt
Publikováno v:
Damgård, I B, Toft, T, Pagter, J I, Jakobsen, T, Bogetoft, P & Nielsen, K 2006, A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation . in G Di Crescenzo & A Rubin (eds), Financial Cryptography and Data Security : 10th International Conference, FC 2006 Anguilla, British West Indies, February 27-March 2, 2006 Revised Selected Papers . Springer, Lecture Notes in Computer Science, vol. 4107, pp. 142-147, Anguilla, Virgin Islands, British, 27/02/2006 . https://doi.org/10.1007/11889663_10
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::c7149c5ead17b107ef3be1f616aa4f2d
https://pure.au.dk/portal/da/publications/a-practical-implementation-of-secure-auctions-based-on-multiparty-integer-computation(ba0a1c80-c597-11db-bee9-02004c4f4f50).html
https://pure.au.dk/portal/da/publications/a-practical-implementation-of-secure-auctions-based-on-multiparty-integer-computation(ba0a1c80-c597-11db-bee9-02004c4f4f50).html
Autor:
Hansen, Klaus Marius, Antolin Rafael, Pablo, Camara, J., Carro, S., Metha, G., Rosengren, P., Pagter, Jakob Illeborg, Pedersen, Michael Østergaard
Publikováno v:
Hansen, K M, Antolin Rafael, P, Camara, J, Carro, S, Metha, G, Rosengren, P, Pagter, J I & Pedersen, M Ø 2005 ' eu-DOMAIN D3.1 + D4.1 Software Architecture Specification ' .
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::ae3ff023717367ea9734554adfd73019
https://pure.au.dk/portal/da/publications/eudomain-d31--d41-software-architecture-specification(6ed11930-9af0-11df-8c1a-000ea68e967b).html
https://pure.au.dk/portal/da/publications/eudomain-d31--d41-software-architecture-specification(6ed11930-9af0-11df-8c1a-000ea68e967b).html