Personal Information

Name: Jesper Buus Nielsen
Born: 7 May 1973
Nationality: Danish


  • MSc, Computer Science, Aarhus University, August, 2001.
  • PhD, Computer Science, Aarhus University, August, 2003.


  • Aarhus University, Department of Computer Science, Denmark
    • April 2018–present, Professor in cryptology.
    • January 2010–March 2018, Associate professor in cryptology.
    • September 2004–December 2009, Assistant professor in cryptology.
    • September 1999–August 2003, PhD student in cryptology.
  • IBM T.J.Watson Research Center, NY, USA
    • March 2002–August 2002, Visiting the Cryptography Research Group.
  • ETH Zürich, Switzerland, Information Security and Cryptography Group
    • September 2003–August 2004, Senior Researcher.
    • June 2017–September 2017, Visiting Professor.
  • Parental leaves:
    • 12 December 2013–25 December 2012;
    • 10 June 2015–1 September 2012;
    • 24 januar 2017–6. februar 2017;
    • 2 October 2017–31 December 2017.


I have more than 70 papers at peer-reviewed conferences and journals. My h-index is 32. My publications have more than 5000 citations. I am the author of one book targeted at teaching secure multiparty computation at university level.

  • Most of my publications can be found here: DBLP.
  • Pre-prints and open access versions of articles: IACR ePrint.
  • My Google Scholar profile is here.

Research Focus

I’m currently interested in block chain technology, lower bounds of oblivious data structures, theory of multiparty computation, implementing secure multiparty computation in practicerational cryptographyleakage resilient cryptographytamper resilient cryptography, and universal composability. In the past I worked on a wide range of topics within and relating to cryptography, including:

  • Asymptotic complexity of multiparty computation
  • Asynchronous distributed computing
  • Byzantine agreement
  • Chosen-ciphertext security
  • Implementing secure multiparty computation in practice
  • New approaches to secure multiparty computation
  • Non-committing encryption and deniable encryption
  • How to model security
  • Oblivious transfer
  • Threshold cryptosystems
  • Cryptography and game theory
  • Security amplification of block-ciphers
  • Universally composable security
  • Secure quantum computation

Teaching and Supervision

I have designed and taught courses at the university level for 15 years. I have had the honour to be (co-)supervisor for the following brilliant PhD students:

  • Claudio Orlandi
  • Peter Sebastian Nordholt
  • Pavel Hubáček
  • Angela Zottarel
  • Thomas Pelle Jakobsen
  • Tore Kasper Frederiksen
  • Pratyay Mukherjee
  • Bernado Machado David
  • Carsten Baum
  • Roberto Trifiletti
  • Satrajit Ghosh
  • Sabine Oechsner


I have personally received and managed grants totalling 3M€:

  • MOSIF: Modeller og teknikker til sikre flerpartsberegninger. 01.01.2007–31.12.2009. Funded by the Danish Agency for Science, Technology and Innovation. 2,156,413 DKK.
  • Sapere Aude Starting Grant. Basic research in cryptologic protocol theory. 01.01.2011-13.12.2014. Principal investigator. 5,670,219 DKK.
  • ERC Starting Grant. Basic research in cryptographic protocol theory. 01.12.2011-31.11.2016. Principal investigator. €1,171,019.
  • BETHE: Better Theory for Better Practice in MPC. Independent Research Fund Denmark. 5,530,753DKK

In addition to my personal grants, I am taking (have taken) part in the following research projects with management responsibility:

  • ECRYPT: European Network of Excellence in Cryptology. 01.02.2004–29.01.2008. I organized and administrated the participation of the Department of Computer Science, Aarhus University in this network.
  • CAGT: Center for Algorithmic Game Theory. 01.09.2007–31.01.2011. Co-applicant and principle investigator. 3,700,000DKK. Carlsberg Foundation.
  • CFEM: Centre for Foundations of Electronic Markets. 01.07.2010–30.6.2016. Co-applicant and principle investigator.
  • CTIC: Center for the Theory of Interactive Computation. 01.04.2011–31.03.2017. Work package leader.
  • SODA: Scalable Oblivious Data Analytics. 2017-01-01–2019-12-31. Participant.


I am co-founder of three companies based on my research on secure multiparty computation:

Professional Activities

  • I acted as co-program committee chair for:
    • Twelfth IACR Theory of Cryptography Conference, TCC 2015.
    • 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2017.
    • 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2018.
  • I acted as program committee member for 40 program committees for international conferences.
  • Member of the steering committee of the annual workshop Theory and Practice of Secure Multiparty Computation
  • Member of the Test of Time Committee of IACR Theory of Cryptography Conference 2016-2018.
  • I have acted as opponent on the following PhD defences:
    • Johan Sjödin, ETH Zürich, 2007.
    • Bingsheng Zhang, Tartu University, 2011.
    • Christoph Lucas, ETH Zürich. 2012.
    • Sebastiaan de Hoogh, TU Eindhoven, 2012.
    • Tobias Nilges, Karlsruhe Institute of Technology, 2015.
    • Daniel Tschudi, ETH Zürich, 2017.

Institutional Responsibilities

  • Member of Information Security Committee, Faculty of Science and Technology, Aarhus University, 2013–2017. Head of same committee 2017–present.
  • Member of the PhD School Admittance Committee, Graduate School of Science and Technology, Faculty of Science and Technology, Aarhus University, 2015–present.
  • WP lead of Cyber Security in the Centre for Digitalisation, Big Data and Data Analytics (DIGIT) (, 2017–present.

Invited Talks at Conference,Workshops, Schools and Seminars

  • Expanding Pseudorandom Functions at Bell Labs, USA. July 2002.
  • Invited talk at Dagstuhl seminar on Cryptography. 22.09.2002–27.09.2002.
  • Secure Multiparty Computation at 4th Interdisciplinary Seminar on Applied Mathematics, Aalborg University. 23.04.2009.
  • Tillid uden Trust, Secure Multiparty Computation, Danish Ministry of Science Technology and Innovation, Dansk Internet Governance Forum 2009 — Internettets Fremtid, Copenhagen, Denmark, 7.10.2009.
  • Privacy-Enhancing First-Price Auctions Using Rational Cryptography, Institute for Theoretical Computer Science, Beijing University, China, 23.3.2009.
  • A New Approach to Practical Active-Secure Two-Party Computation at 20th Tallinn-Tartu Theory Days. 2011.
  • Teaching one day at the School on Mathematics of Information-Theoretic Cryptography, Lorentz Centre, Leiden University, Holland, 13 May 2013 through 17 May 2013.
  • Fun with Oblivious Transfer, key note speaker at Workshop on Mathematics of Information-Theoretic Cryptography, Lorentz Centre, Leiden University, Holland, 21.05.2013–25.05.2013.
  • Tamper and leakage resilient von Neumann architectures from continuous non-malleable codes. Invited Speaker at 8th International Conference on Information-Theoretic Security (ICITS). 2015.
  • Introduction to MPC at Workshop on Future Directions in Computing on Encrypted Data hosted by the H2020 project ECRYPT-CSA. 2015.

%d bloggers like this:
search previous next tag category expand menu location phone mail time cart zoom edit close