Warning: preg_match() [function.preg-match]: Compilation failed: invalid range in character class at offset 4 in /var/www/mortendahl.dk/public_html/blog/wp-content/plugins/lightbox-plus/classes/shd.class.php on line 1384
Warning: preg_match_all() [function.preg-match-all]: Compilation failed: invalid range in character class at offset 4 in /var/www/mortendahl.dk/public_html/blog/wp-content/plugins/lightbox-plus/classes/shd.class.php on line 700
Warning: Invalid argument supplied for foreach() in /var/www/mortendahl.dk/public_html/blog/wp-content/plugins/lightbox-plus/classes/shd.class.php on line 707
Warning: preg_match_all() [function.preg-match-all]: Compilation failed: invalid range in character class at offset 4 in /var/www/mortendahl.dk/public_html/blog/wp-content/plugins/lightbox-plus/classes/shd.class.php on line 700
Warning: Invalid argument supplied for foreach() in /var/www/mortendahl.dk/public_html/blog/wp-content/plugins/lightbox-plus/classes/shd.class.php on line 707
During my university years I’ve made the following research papers in the areas of formal security analysis, models for cryptographic protocols, secure multi-party computation, and type systems:
- Private Data Aggregation on a Budget
with Valerio Pastro and Mathieu Poumeyrol
presented at Private Multi-Party Machine Learning 2016 (PMPML’16) - Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption
with Ivan Damgård
published at EUROCRYPT 2014 (EC’14)
technical report, blog post - Symbolic Analysis of Cryptographic Protocols — Models, Methods, and Soundness
Ph.D. thesis, Aarhus University, 2013
thesis, blog post - On Secure Two-Party Integer Division
with Chao Ning and Tomas Toft
published at Financial Cryptography and Data Security 2012 (FC’12)
paper (Springer), technical report - Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols
with Naoki Kabayashi, Yunde Sun, and Hans Hüttel
published at International Symposium on Automated Technology for Verification and Analysis 2011 (ATVA’11)
paper (Springer), blog post - Formal Analysis of Privacy for Anonymous Location Based Services
with Stephanie Delaune and Graham Steel
published at Theory of Security and Applications 2011 (TOSCA’11)
Springer - Formal Analysis of Privacy for Vehicular Mix-Zones
with Stephanie Delaune and Graham Steel
published at European Symposium on Research in Computer Security 2010 (ESORICS’10)
presented at Embedded Security in Cars 2010 (ESCAR’10)
presented at Formal Methods and Cryptography 2010 (CryptoForma’10)
presented at Workshop on Foundations of Security and Privacy 2010 (FCS-PrivMod’10)
Springer - Don’t Let The Opponents Grind You Down
with Hans Hüttel
presented at Workshop on Foundations of Security and Privacy 2010 (FCS-PrivMod’10) - Type Inference for a Correspondence Certifying Type System
with Hans Hüttel
presented at Nordic Workshop on Programming Theory 2008 (NWPT’08) - Security Made Easy — Proving Security using Type Inference
M.Sc. thesis, Aalborg University, 2008
thesis, blog post - Resource Bound Analysis for Database Queries
with James Cheney
published at Programming Languages and Analysis for Security 2008 (PLAS’08)
ACM - A Modal Logic for Mobile Resources
with Claus Thrane, Uffe Sørensen, and Martin Clemmesen
B.Sc. project, Aalborg University 2008
paper