User profiles for Tore Kasper Frederiksen

Tore Kasper Frederiksen

Blockchain Cryptography Engineer, Zama
Verified email at zama.ai
Cited by 927

P2DEX: privacy-preserving decentralized cryptocurrency exchange

C Baum, B David, TK Frederiksen - International Conference on Applied …, 2021 - Springer
Cryptocurrency exchange services are either trusted central entities that have been routinely
hacked (losing over 8 billion USD), or decentralized services that make all orders public …

Minilego: Efficient secure two-party computation from general assumptions

TK Frederiksen, TP Jakobsen, JB Nielsen… - Advances in Cryptology …, 2013 - Springer
One of the main tools to construct secure two-party computation protocols are Yao garbled
circuits. Using the cut-and-choose technique, one can get reasonably efficient Yao-based …

Privacy-free garbled circuits with applications to efficient zero-knowledge

TK Frederiksen, JB Nielsen, C Orlandi - … on the Theory and Applications of …, 2015 - Springer
In the last few years garbled circuits (GC) have been elevated from being merely a component
in Yao’s protocol for secure two-party computation, to a cryptographic primitive in its own …

A unified approach to MPC with preprocessing using OT

TK Frederiksen, M Keller, E Orsini, P Scholl - International conference on …, 2015 - Springer
SPDZ, TinyOT and MiniMAC are a family of MPC protocols based on secret sharing with
MACs, where a preprocessing stage produces multiplication triples in a finite field. This work …

Sok: Mitigation of front-running in decentralized finance

…, J Hsin-yu Chiang, B David, TK Frederiksen… - … Conference on Financial …, 2022 - Springer
Front-running is the malicious, and often illegal, act of both manipulating the order of
pending trades and injecting additional trades to make a profit at the cost of other users. In …

Fast distributed RSA key generation for semi-honest and malicious adversaries

TK Frederiksen, Y Lindell, V Osheter… - Advances in Cryptology …, 2018 - Springer
We present two new, highly efficient, protocols for securely generating a distributed RSA key
pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously …

Eagle: Efficient privacy preserving smart contracts

…, JH Chiang, B David, TK Frederiksen - … Conference on Financial …, 2023 - Springer
The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations
(DAO), which in current form are exposed to front-running of token transactions and …

Faster maliciously secure two-party computation using the GPU

TK Frederiksen, TP Jakobsen, JB Nielsen - Security and Cryptography for …, 2014 - Springer
We present a new protocol for maliciously secure two-party computation based on cut-and-choose
of garbled circuits using the recent idea of “forge-and-loose”, which eliminates around …

Sok: Privacy-enhancing technologies in finance

…, JH Chiang, B David, TK Frederiksen - Cryptology ePrint …, 2023 - eprint.iacr.org
Recent years have seen the emergence of practical advanced cryptographic tools that not
only protect data privacy and authenticity, but also allow for jointly processing data from …

Fast and maliciously secure two-party computation using the GPU

TK Frederiksen, JB Nielsen - … Conference, ACNS 2013, Banff, AB, Canada …, 2013 - Springer
We describe, and implement, a maliciously secure protocol for two-party computation in a
parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient …