Estonian Cryptography
Papers
Does not include theses.
1997
- Ahto Buldas
and Jüri Põldre. A VLSI implementation of RSA and IDEA
encryption engine. In NORCHIP'97, Tallinn 1997.
1998
- Helger Lipmaa. IDEA: A Cipher for Muldimedia Architectures? In Stafford Tavares and Henk Meijer, editors, Selected Areas in Cryptography '98, volume 1556 of Lecture Notes in Computer Science, pages 253--268, Kingston, Canada, August 17--18, 1998. Springer, Heidelberg.
- Ahto Buldas, Peeter Laud, Helger Lipmaa and Jan Villemson. Time-Stamping with Binary Linking Schemes. In Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, volume 1462 of Lecture Notes in Computer Science, pages 486--501, Santa Barbara, CA, USA, August 23--27, 1998. Springer, Heidelberg. ISBN 3-540-64892-5.
- Ahto Buldas, Peeter Laud. New Linking Schemes
for Digital Time-Stamping. In The 1st International Conference on
Information Security and Cryptology, pages 3--14, Seoul, Korea, December
18--19, 1998. © Korea Institute of Information Security and Cryptology.
1999
- Ahto Buldas, Monika Oit, Maris Sarv. "Data Security
in State Registers: Theory and Practice ", International Conference and
Exhibition "Information Technologies and Telecommunications in the Baltic
States", Riga, April 28-30 1999, p.69-72.
2000
- Ahto Buldas, Helger Lipmaa and Berry Schoenmakers. Optimally Efficient Accountable Time-Stamping. In Yuliang Zheng and Hideki Imai, editors, PKC 2000, volume 1751 of Lecture Notes in Computer Science, pages 293--305, Melbourne, Australia, January 18--20, 2000. Springer, Heidelberg.
- Kazumaro Aoki and Helger Lipmaa. Fast Implementations of AES
Candidates. Third AES Candidate Conference, New York City, USA, 13--14
April 2000.
- Ahto Buldas, Valdo Praust, Meelis Roos, Jan Willemson, On Long-Term
Validation of E-Documents, International Conference "Information
Technologies and Telecommunications in the Baltic States - Baltic IT&T
2000", April 6-7, Radisson SAS Daugava Hotel, Riga, Latvia, pp. 104-108.
- Helger Lipmaa, Phillip Rogaway and David Wagner. Comments to NIST Concerning AES-modes of Operations: CTR-mode Encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, USA, October 20, 2000.
- Ahto Buldas, Peeter Laud and Helger Lipmaa. Accountable Certificate Management using Undeniable Attestations. In Sushil Jajodia and Pierangela Samarati, editors, 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press. ISBN ACM ISBN 1-58113-203-4.
- Margus Freudenthal, Sven Heiberg, Jan
Willemson, Personal Security Environment on Palm PDA, in Proceedings of
16th Annual Computer Security Applications Confererence ACSAC'00, pp
366-372. December 2000, New Orleans, Louisiana, USA.
2001
- Arne Ansper, Ahto Buldas, Meelis
Roos, Jan Willemson, Efficient
long-term validation of digital signatures, Advances in Cryptology - PKC
2001, Springer, Heidelberg, LNCS 1992, pp 402-415, February 2001, Cheju Island, Korea.
- Peeter Laud. Analysis for Object Inlining in Java. In JOSES: Java Optimization
Strategies for Embedded Systems, Genoa, Italy, April 1, 2001.
- Peeter Laud. Semantics and
Program Analysis of Computationally Secure Information Flow. In Programming
Languages and Systems, 10th European Symposium On Programming, ESOP 2001
Held as Part of the Joint European Conferences on Theory and Practice of
Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings (LNCS 2028),
pages 77-91, 2001. © Springer, Heidelberg
- Helger Lipmaa and Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In Mitsuru Matsui, editor, Fast Software Encryption: 8th International Workshop, FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 336--350, Yokohama, Japan, April 2--4, 2001. Springer, Heidelberg. ISBN 3-540-43869-6.
- Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable replies for database
queries, in Proceedings of the Fifth International Baltic Conference on DB
and IS, June 2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto Kalja,
Vol. 2, pp. 215-226.
- Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson, Improving the
availability of time-stamping services, in Information Security and Privacy,
6th Australasian Conference, ACISP 2001, July 11.-13. 2001, Sydney,
Australia. Springer, LNCS 2119, pp. .360-375.
2002
- Helger Lipmaa, N. Asokan and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Matt Blaze, editor, Financial Cryptography 2002, volume 2357 of Lecture Notes in Computer Science, pages 85--101, Southampton Beach, Bermuda, March 11--14, 2002. Springer, Heidelberg. 10.1007/3-540-36504-4_7.
- Masahiko Takenaka, Helger Lipmaa, Naoya Torii. The Implementation of The
Block Cipher SC2000 (III). In ISEC Technical group meeting, Tohoku
University, Sendai, Japan, 18--19 July 2002. (In Japanese.)
- Ahto Buldas, Peeter Laud and Helger Lipmaa. Eliminating Counterevidence with Applications to Accountable Certificate Management. Journal of Computer Security, 10 (3):273--296, 2002.
- Helger Lipmaa. On Optimal Hash Tree Traversal for Interval Time-Stamping. In Agnes Chan and Virgil Gligor, editors, Information Security Conference 2002, volume 2433 of Lecture Notes in Computer Science, pages 357--371, São Paulo, Brazil, September 30 --- October 2, 2002. Springer-Verlag.
- Helger Lipmaa. Fast Software Implementations of SC2000. In Agnes Chan and Virgil Gligor, editors, Information Security Conference 2002, volume 2433 of Lecture Notes in Computer Science, pages 63--74, São Paulo, Brazil, September 30 --- October 2, 2002. Springer, Heidelberg.
- Ahto Buldas, Meelis Roos, Jan Willemson, Undeniable database queries,
in H-M. Haav, A. Kalja (Eds), Databases and Information Systems II, Selected
Papers from the Fifth International Baltic Conference, BalticDB&IS 2002,
Kluwer Academic Publishers, 2002, ISBN 1-4020-1038-9, pp 43-54.
- Kristo Heero, Uuno Puus, Jan Willemson, XML based document
management in Estonian legislative system, in Proceedings of the Fifth
International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia,
edited by Hele-Mai Haav and Ahto Kalja, Vol. 1, pp. 321-330.
- Peeter Laud. Encryption
Cycles and Two Views of Cryptography. In NORDSEC 2002 - Proceedings of the
7th Nordic Workshop on Secure IT Systems (Karlstad University Studies
2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002.
- Peeter Laud. Pseudorandom
permutations and equivalence of formal expressions (abstract). In the 14th
Nordic Workshop on Programming Theory, NWPT'02, pages 63-65, Tallinn,
Estonia, November 20-22, 2002.
- Helger Lipmaa. On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. In Alfred Menezes and Palash Sarkar, editors, INDOCRYPT 2002, volume 2551 of Lecture Notes in Computer Science, pages 48--61, Hyderabad, India, December 15--18, 2002. Springer, Heidelberg.
2003
- Peeter Laud. Handling
Encryption in an Analysis for Secure Information Flow. In Programming
Languages and Systems, 12th European Symposium On Programming, ESOP 2003
Held as Part of the Joint European Conferences on Theory and Practice of
Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003 Proceedings (LNCS
2618), pages 159-173, 2003. © Springer, Heidelberg
- Maarja Kruusmaa, Jan Willemson, Covering the path space: a casebase
analysis for mobile robot path planning, in Knowledge Based Systems, Volume
16, Issues 5-6, Pages 235-242 (July 2003), Elsevier.
- Ahto Buldas, Märt Saarepera,
Electronic Signature System with Small Number of Private Keys. In
proceedings of the 2nd Annual PKI Research Workshop, 2003.
- Meelis Roos, Peeter Laud, Jan Willemson. Improving
the Gnutella protocol against poisoning. In proceedings of NORDSEC 2003,
Gjøvik, Norway, October 15-17, 2003.
- Jelena Zaitseva, Jan Willemson,
Jaanus Pöial, Tutorial Environment for Cryptographic Protocols. Accepted to
Nordic Workshop on Secure IT Systems NordSec 2003.
- Maarja Kruusmaa, Jan Willemson, Covering the Path Space: A Casebase
Analysis for Mobile Robot Path Planning. Research and Development in
Intelligent Systems XIX, Proceedings The Twenty-second SGAI International
Conference on Knowledge Based Systems and Applied Artificial Intelligence,
BCS Conference Series, Springer, pp. 1-16.
- Kristo Heero, Maarja Kruusmaa, Jan Willemson, Path Selection for Mobile
Robots in Dynamic Environments. European Conference on Mobile Robots 2003.
- Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In Chi Sung Laih, editor, Advances on Cryptology --- ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398--415, Taipei, Taiwan, November 30--December 4, 2003. Springer, Heidelberg.
- Helger Lipmaa. Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In Chi Sung Laih, editor, Advances on Cryptology --- ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 416--433, Taipei, Taiwan, November 30--December 4, 2003. Springer, Heidelberg.
- Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson, Scalable
and Efficient PKI for Inter-Organizational Communication. Accepted to Annual
Computer Security Applications Conference ACSAC 2003.
- Peeter Laud,
Ricardo Corin.
Sound
Computational Interpretation of Formal Encryption with Composed Keys,
ICISC03.
2004
- Helger Lipmaa, Johan Wallén and Philippe Dumas. On the Additive Differential Probability of Exclusive-Or. In Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004, volume 3017 of Lecture Notes in Computer Science, pages 317--331, Delhi, India, February 5--7, 2004. Springer, Heidelberg.
- Edith Elkind and Helger Lipmaa. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. In Ari Juels, editor, Financial Cryptography - Eighth International Conference, volume 3110 of Lecture Notes in Computer Science, pages 117--131, Key West, FL, USA, February 9--12, 2004. Springer, Heidelberg.
- Andris Ambainis, Markus Jakobsson and Helger Lipmaa. Cryptographic Randomized Response Techniques. In Feng Bao, Robert H. Deng and Jianying Zhou, editors, PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 425--438, Singapore, March 1--4, 2004. Springer, Heidelberg.
- Peeter Laud. Symmetric encryption in automatic analyses for
confidentiality against active adversaries. In proceedings of 2004 IEEE
Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004
- Helger Lipmaa. Statistical Zero-Knowledge Arguments: Theory and Practice. In 4th European Congress on Computational Methods in Applied Sciences and Engineering (ECCOMAS 2004), Jyväskylä, Finland, July 24--28, 2004. Invited survey.
- Sven Laur and Helger Lipmaa. On Private Similarity Search Protocols. In Sanna Liimatainen and Teemupekka Virtanen, editors, Proceedings of the 9th Nordic Workshop on Secure IT Systems (NordSec 2004), pages 73--77, Espoo, Finland, November 4--5, 2004. ISBN 951-22-7348-9.
- Ahto Buldas, Märt Saarepera "On Provably Secure Time-Stamping Schemes." In Pil Joong Lee (Ed.): Advances in Cryptology
- ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island,
Korea, December 5-9, 2004, Proceedings (LNCS 3329), pp 500-514, 2004.
- Alvo Aabloo, Kristo Heero, Maarja Kruusmaa, Jan Willemson, Robots
Find a Better Way: A Learning Method for Mobile Robot Navigation in
Partially Unknown Environemnts. In F.Groen, N. Amoto, A. Bonarini, E.
Yoshida and B. Krvse, editors, Proceedings of the 8th Conference on
Intelligent Autonomous Systems (IAS8), Amsterdam, The Netherlands, 2004. IOS
Press.
- Bart Goethals, Sven Laur, Helger Lipmaa and Taneli Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In Choonsik Park and Seongtaek Chee, editors, The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), volume 3506 of Lecture Notes in Computer Science, pages 104--120, Seoul, Korea, December 2--3, 2004. Springer, Heidelberg. 10.1007/11496618_9.
2005
- Edith Elkind and Helger Lipmaa. Small Coalitions Cannot Manipulate Voting. In Andrew Patrick and Moti Yung, editors, Financial Cryptography and Data Security --- Ninth International Conference, volume 3570 of Lecture Notes in Computer Science, pages 285--297, Roseau, The Commonwealth Of Dominica, February 28--March 3, 2005. Springer, Heidelberg.
- Helger Lipmaa, Guilin Wang and Feng Bao. Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction. In Luis Caires, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi and Moti Yung, editors, The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, pages 459--471, Lisboa, Portugal, July 11--15, 2005. Springer, Heidelberg. 10.1007/11523468_38.
- Peeter Laud, Varmo Vene "A Type System for Computationally
Secure Information Flow." In 15th International Symposium on Fundamentals of
Computation Theory (FCT) 2005, 17-20 August 2005.
- Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC'05), volume 3650 of Lecture Notes in Computer Science, pages 314--328, Singapore, September 20--23, 2005. Springer, Heidelberg. 10.1007/11556992_23.
- Ahto Buldas, Peeter Laud, Märt Saarepera, Jan
Willemson. Universally Composable Time-Stamping Schemes with Audit. In
Jianying Zhou and Javier Lopez, editors, The 8th Information Security
Conference (ISC'05), volume 3650 of Lecture Notes in Computer
Science, pages 359--373, Singapore, September 20--23, 2005.
Springer, Heidelberg. Accepted.
- Ilja Tsahhirov, Peeter Laud. Digital signature in
automatic analyses for confidentiality against active adversaries. In Helger
Lipmaa and Dieter Gollmann, editors, NordSec 2005, pages 29--41,
Tartu, Estonia, October 20--21, 2005.
- Peeter Laud. Secrecy Types for a Simulatable Cryptographic
Library. Accepted to ACM CCS 2005.
- Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In Xiaotie Deng and Dingzhu Du, editors, The 16th Annual International Symposium on Algorithms and Computation, ISAAC 2005, volume 3827 of Lecture Notes in Computer Science, pages 206--215, Sanya, Hainan, China, December 19--21, 2005. Springer, Heidelberg.
- Yong Li, Helger Lipmaa and Dingyi Pei. On Delegatability of Four Designated Verifier Signatures. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 61--71, Beijing, China, December 10--13, 2005. Springer, Heidelberg. 10.1007/11602897_6.
- Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Private Itemset Support Counting. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 97--111, Beijing, China, December 10--13, 2005. Springer, Heidelberg. 10.1007/11602897_9.
2006
- Ammar Alkassar, Elena Andreeva and Helger Lipmaa. SLC: Efficient Authenticated Encryption for Short Packets. In Jana Dittmann, editor, Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), volume 77 of Lecture Notes in Informatics, pages 270--278, Magdeburg, Germany, February 20--22, 2006. Gesellschaft für Informatik e.v..
- Ahto Buldas and Sven Laur, Do Broken Hash Functions Affect
the Security of Time-Stamping Schemes? In ?, editor, ACNS 2006, volume 3989 of
LNCS, pages 50--65, Singapore, 2006.
Springer, Heidelberg.
- Jan Willemson, On the Gordon and Loeb Model for Information Security
Investment, accepted to The Fifth Workshop on the Economics of Information
Security (WEIS 2006), University of Cambridge, England, UK, 26-28 June 2006.
Available at http://research.cyber.ee/~jan/publ/economics.ps.
- Michael Backes and Peeter Laud, A Mechanized, Cryptographically Sound Type Inference Checker.
In Workshop on Formal and Computational Cryptography --- FCC
2006,
July 9 2006, Venice, Italy.
-
Michael Backes, Peeter Laud. Computationally Sound Secrecy Proofs by Mechanized Flow Analysis. In:Abstracts: 2nd workshop on Formal and Computational Cryptography; Venice, Italy; 09.07.2006. Editors: Cortier, Veronique; Kremer, Steve. Venice: 2006, 1 - 6.
- Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Cryptographically Private Support Vector Machines. In Lyle Ungar, Mark Craven, Dimitrios Gunopulos and Tina Eliassi-Rad, editors, The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pages 618--624, Philadelphia, USA, August 20--23, 2006. ACM.
- Jan Willemson, Maarja Kruusmaa, Algorithmic Generation of Path Fragment
Covers for Mobile Robot Path Planning, accepted to 3rd IEEE Conference on
Intelligent Systems, 4-6 September 2006, University of Westminster, London,
UK. Available at http://research.cyber.ee/~jan/publ/robotfrag10.ps.
- Ahto Buldas, Peeter Laud, Jaan Priisalu, Märt Saarepera,
Jan Willemson, Rational Choice of Security Measures via
Multi-Parameter Attack Trees, accepted to 1st International Workshop on
Critical Information Infrastructures Security (CRITIS'06), August 30 -
September 2, 2006, Samos Island, Greece. Available at
http://research.cyber.ee/~jan/publ/attacks9.pdf.
-
Michael Backes, Peeter Laud. Computationally Sound Secrecy Proofs by Mechanized Flow Analysis. 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30.10.-03.11.2006. Editors: Ari Juels, Rebecca Wright, Sabrina De Capitani di Vimercati. ACM, 2006,
- Peeter Laud, Tarmo Uustalu, Varmo Vene. Type Systems Equivalent to Data-Flow
Analyses of Imperative Languages. Accepted to Theor. Comp. Sci.
- Sebastian Faust, Emilia Käsper and Stefan Lucks, A
Protocol for the Distributed Generation of Random Values and Some
Applications, In 1st Benelux Workshop on Information and System
Security (WISSec 2006), 12 pages, 2006.
2007
- Ahto Buldas, Sven Laur. Knowledge-Binding Commitments with Applications in Time-Stamping.
In PKC 2007.
- Sven Laur and Helger Lipmaa. A New Protocol for Conditional Disclosure of Secrets And Its Applications. In Jonathan Katz and Moti Yung, editors, ACNS 2007, volume 4521 of Lecture Notes in Computer Science, pages 207--225, Zhuhai, China, June 5--8, 2007. Springer, Heidelberg.
- Emilia Käsper, Ventzislav Nikov and Svetla Nikova. "Strongly
Multiplicative Hierarchical Threshold Secret Sharing," In 2nd
International Conference on Information Theoretic Security - ICITS 2007,
LNCS, Springer, Heidelberg, 16 pages, 2007
- George Danezis, Claudia Diaz, Sebastian Faust, Emilia
Käsper, Carmela Troncoso and Bart Preneel. "Efficient
Negative Databases from Cryptographic Hash Functions," In
Proceedings of the 10th Information Security Conference (ISC 2007),
LNCS 4779, J. A. Garay, A. K. Lenstra, and
M. Mambo (eds.), Springer, Heidelberg, pp. 423-436, 2007.
- Aivo Jürgenson, Jan Willemson: Processing Multi-parameter Attacktrees with
Estimated Parameter Values. IWSEC 2007
- Ahto Buldas, Triinu Mägi: Practical Security Analysis of E-Voting Systems. IWSEC 2007
- Ahto Buldas, Aivo Jürgenson: Does Secure Time-Stamping Imply Collision-Free Hash Functions?
ProvSec 2007
- Ilja Tshahhirov, Peeter Laud. Application of dependency graphs to
security protocol analysis. In G. Barthe, C. Fournet, eds., Revised Selected
Papers from 3rd Conf. on Global Computing, TGC 2007 (Sophia Antipolis, Nov.
2007), v. 4912 of Lect. Notes in Comput. Sci., pp. 294-311. Springer, 2008.
- Philippe Dumas, Helger Lipmaa and Johan Wallén. Asymptotic Behaviour of A Non-Commutative Rational Series With a Nonnegative Linear Representation. Discrete Mathematics and Theoretical Computer Science, 9(1):247--274, October 2007.
2008
- Dan Bogdanov, Sven Laur, and Jan Willemson. Sharemind: a framework for fast privacy-preserving computations.
In Esorics 2008. [online]
- Yvo Desmedt, Helger Lipmaa and Duong Hieu Phan. Hybrid Damgård Is CCA1-Secure under The DDH Assumption. In Matthew K. Franklin, Lucas Chi Kwong Hui and Duncan S. Wong, editors, The 7th International Conference on Cryptology And Network Security (CANS 2008), volume 5339 of Lecture Notes in Computer Science, pages 18--30, Hong Kong, China, December 2--4, 2008. Springer, Heidelberg.
- Giovanni Di Crescenzo and Helger Lipmaa. Succinct NP Proofs from An Extractability Assumption. In Arnold Beckmann, Costas Dimitracopoulos and Benedikt Löwe, editors, Computability in Europe, volume 5028 of Lecture Notes in Computer Science, pages 175--185, Athens, Greece, June 15--20, 2008. Springer, Heidelberg.
- Giovanni Di Crescenzo and Helger Lipmaa. 3-Message NP Arguments in The BPK Model with Optimal Soundness And Zero-Knowledge. In Seok-Hee Hong, Hiroshi Nagamochi and Takuro Fukunaga, editors, The 19th International Symposium on Algorithm and Computation, ISAAC 2008, volume 5369 of Lecture Notes in Computer Science, pages 616--628, Gold Coast, Australia, December 15--17, 2008. Springer, Heidelberg.
- Sebastian Faust, Emilia Käsper and Stefan Lucks. "Efficient
Simultaneous Broadcast," In PKC 2008, R. Cramer
(ed.), ??? pages, 2008.
- Sven Laur and Sylvain Pasini, SAS-Based Group Authentication and Key Agreement Protocols, PKC 2008
- Liisi Haav and Peeter Laud. Typing Computationally Secure Information
Flow in Jif. In NordSec 2008.
- Aivo Jürgenson, Jan Willemson. Computing exact outcomes of multi-parameter attack trees. In Proc. of 3rd Int. Symp. on Information Security, IS 2008 (Monterrey, Nov. 2008), to appear.
- J. Kivimaa, A. Ojamaa, E. Tyugu. Graded security expert system. In Proc. of 3rd Int. Wksh. on Critical Information Infrastructures Security, CRITIS 2008 (Frascati near Rome, Oct. 2008), to appear.
- Emilia Käsper, Vincent Rijmen, Tor E. Bjorstad, Christian
Rechberger, Matt Robshaw, Gautham Sekar. Correlated
Keystreams in MOUSTIQUE. In Proceedings of AfricaCrypt 2008,
LNCS, S. Vaudenay (ed.), Springer, Heidelberg,
12 pages, 2008. Preliminary version appeared in SASC 2008 - The State of
the Art of Stream Ciphers.
- Peeter Laud. On the computational soundness of cryptographically masked flows. POPL 2008: 337-348
- Peeter Laud. On the computational soundness of cryptographically
masked flows. ACM SIGPLAN Notices, v. 43, n. 1, pp. 337-348, 2008
- Ahto Buldas and Margus Niitsoo. Can we Construct
Unbounded Time-Stamping Schemes from Collision-Free Hash Functions? In
ProvSec 2008, Shanghai, China.
- Peeter Laud and Long Ngo. Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library.
In ProvSec 2008.
- Helger Lipmaa. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. In Tzong-Chen Wu and Chin-Laung Lei, editors, 11th Information Security Conference, ISC 2008, volume 5222 of Lecture Notes in Computer Science, pages 441--454, Taipei, Taiwan, September 15--18, 2008. Springer, Heidelberg.
- A. Ojamaa, E. Tyugu, J. Kivimaa. Pareto-optimal situation analysis for selection of security measures. In Proc. of MILCOM 2008 (San Diego, CA, Nov. 2008), to appear.
- Jin Tamura, Kazukuni Kobara, Ryo Nojima, Hideki Imai and Helger Lipmaa. A note on the error of Optimized LFC Private Information Retrieval Scheme. In Hirosuke Yamamoto (?), editor, 2008 International Symposium on Information Theory and its Applications, ISITA 2008, volume ? of ?, pages ?--?, Auckland, New Zealand, December 7--10, 2008. IEEE.
- Jan Willemson, Arne Ansper. A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange
and eGovernment Applications. In The Third International Conference on Availability, Reliability and Security, ARES 2008.
2009
- Sven Laur and Sylvain Pasini. User-aided data authentication.
International Journal of Security and Networks, volume 4(1/2), pages
69-86, 2009
- Ahto Buldas, Aivo Jürgenson, Margus Niitsoo. Efficiency Bounds for
Adversary Constructions in Black-Box Reductions. In C. Boyd and J.
González Nieto (Eds.): ACISP 2009, LNCS 5594, pp.264-275, 2009
- Emilia Käsper and Peter Schwabe. Faster and Timing-Attack Resistant
AES-GCM. 11th Workshop on Cryptographic Hardware and Embedded Systems
(CHES 2009), LNCS, Springer, Heidelberg (to
appear). [pdf]
- Bogdanov, Dan; Crispino, Maria Vittoria; Èyras, Vytautas; Lapin,
Kristina; Panebarco, Marianna; Zuliani, Francesco (2009). Virtual World
Platform VirtualLife: P2P, Security, Rule of Law and Learning Support. In:
Proceedings of 2009 NEM Summit "Towards Future Media Internet": 2009 NEM
Summit "Towards Future Media Internet", Saint-Malo, France, 28-30 September
2009.. digital distribution:, 2009.
- Ahto Buldas, Margus Niitsoo, and Sven Laur. Oracle Separation in the
Non-Uniform Model. ProvSec 2009, pages 230--244.
- Peeter Laud and Meelis Roos. Analysis of the Estonian Mobile-ID protocol. Pages 271--286.
- Jorge Nakahara Jr, Pouyan Seperhdad, Bingsheng Zhang, Meiqin
Wang. Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT.
Accepted to CANS 2009.
- Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland and Filip van Laenen. Security and Trust for the Norwegian E-voting Pilot Project E-valg 2011. In Audun Jøsang, Torleiv Maseng and Svein J. Knapskog, editors, 4th Nordic Conference on Secure IT Systems, NordSec 2009, volume 5838 of Lecture Notes in Computer Science, pages 207--222, Oslo, Norway, October 14--16, 2009. Springer, Heidelberg. 10.1007/978-3-642-04766-4_15.
- George Danezis, Claudia Diaz, Emilia Käsper and Carmela Troncoso.
The Wisdom of Crowds: Attacks and Optimal Constructions. In ESORICS
2009, volume ? of LNCS,
Springer, Heidelberg (to appear). [pdf]
- Peeter Laud, Ilja Tðahhirov. A user interface for a
game-based protocol verification tool. In FAST 2009, Eindhoven,
Netherlands, November 5-6, 2009.
- Helger Lipmaa. First CPIR Protocol with Data-Dependent Computation. In Donghoon Lee and Seokhie Hong, editors, ICISC 2009, volume 5984 of Lecture Notes in Computer Science, pages 193--210, Seoul, Korea, December 2--4, 2009. Springer, Heidelberg.
- Aivo Jürgenson and Jan Willemson. Serial Model for Attack Tree
Computations. In Donghoon Lee? and Seokhie Hong?, editors, ICISC 2009,
volume ? of LNCS, pages ?--?, Seoul, Korea,
December 2--4, 2009. Springer, Heidelberg. Accepted.
- Bogdanov, Dan; Livenson, Ilja (2009). VirtualLife: Secure Identity
Management in Peer-to-Peer Systems . 1st International ICST Conference on
User Centric Media, Venice, 9-11 December 2009. Springer, 2009, (LNICST).
- Helger Lipmaa and Bingsheng Zhang. Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. In Feng Bao, Moti Yung, Dongdai Lin and Jiwu Jing, editors, Inscrypt 2009, volume 6151 of Lecture Notes in Computer Science, pages 154--163, Beijing, China, December 11--15, 2009. Springer, Heidelberg.
2010
- Jan Willemson. Extending the Gordon-Loeb model for information
security investment. In Proc. of 5th Int. Conf. on Availability, Reliability
and Security, ARES 2010 (Kraków, Feb. 2010), IEEE, appear.
- Sven Laur and Helger Lipmaa. On the Feasibility of Consistent Computations. In Phong Q. Nguyen and David Pointcheval, editors, PKC 2010, volume 6056 of Lecture Notes in Computer Science, pages 88--106, Paris, France, May 26--28, 2010. Springer, Heidelberg.
- Jens Groth, Aggelos Kiayias and Helger Lipmaa. Multi-Query Computationally-Private Information Retrieval with Constant Communication Rate. In Phong Q. Nguyen and David Pointcheval, editors, PKC 2010, volume 6056 of Lecture Notes in Computer Science, pages 107--123, Paris, France, May 26--28, 2010. Springer, Heidelberg.
- Aivo Jürgenson and Jan Willemson. On Fast and Approximate
Attack Tree Computations. In J. Kwak, R. H. Deng, G. Wang, Y. Won, eds.,
Proc. of 6th Int. Conf. on Security, Practice and Experience Conf.,
ISPEC 2010 (Seoul, May 2010), v. 6047 of Lect. Notes in Comput. Sci.,
pp. 56-66. Springer, 2010.
- Helger Lipmaa and Bingsheng Zhang. Two New Efficient PIR-Writing Protocols. In Jianying Zhou and Moti Yung?, editors, ACNS 2010, volume 6123 of Lecture Notes in Computer Science, pages 438--455, Beijing, China, June 22--25, 2010. Springer, Heidelberg.
- Rafik Chaabouni, Helger Lipmaa and abhi shelat. Additive Combinatorics and Discrete Logarithm Based Range Protocols. In Ron Steinfeld and Philip Hawkes, editors, ACISP 2010, volume 6168 of Lecture Notes in Computer Science, pages 336--351, Sydney, Australia, July 5--7, 2010. Springer, Heidelberg.
- Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian
Matusiewicz, Rune Ødegård, Thomas Peyrin and Martin Schläffer.
Distinguishers for the Compression Function and Output Transformation of
Hamsi-256. 15th Australasian Conference on Information Security and
Privacy (ACISP 2010), LNCS, vol. 6168,
Springer, Heidelberg, 2010 (to appear).
- Ahto Buldas, Aivo Jürgenson and Margus Niitsoo.
Optimally Tight Security Proofs for Hash-then-Publish Time-Stamping.
Philip Hawkes and Ron Steinfeld, editors, ACISP 2010, volume ? of
LNCS, pages ?--?, Sydney, Australia, July
5--7, 2010. Springer, Heidelberg. Accepted.
- R. Miðkinis, D. Smirnov, E. Urba, A. Burokas, B. Malyðko, Peeter Laud, F.
Zuliani. Digital time stamping system based on open source technologies. In
IEEE Trans. on Ultrasonics, Ferroelectrics and Frequency Control, v. 57, n.
3, pp. 721-727, 2010
- Sven Heiberg, Helger Lipmaa and Filip van Laenen. On E-Vote Integrity in the Case of Malicious Voter Computers. In Dimitris Gritzalis, Bart Preneel and Marianthi Theoharidou, editors, Esorics 2010, volume 6345 of Lecture Notes in Computer Science, pages 373--388, Athens, Greece, September 20--22, 2010. Springer, Heidelberg.
- Helger Lipmaa. On the CCA1-Security of Elgamal and Damgård's Elgamal. In Xuejia Lai, Moti Yung and Dongdai Lin, editors, Inscrypt 2010, volume 6584 of Lecture Notes in Computer Science, pages 18--35, Shanghai, China, October 20--23, 2010. Springer, Heidelberg.
- Gregory Bard, Nicolas Courtois, Jorge Nakahara Jr., Pouyan Sepehrdad, and Bingsheng Zhang. Algebraic, AIDA/Cube and
Side Channel Analysis of KATAN Family of Block Ciphers. Indocrypt 2010.
- Jan De Beule, Yves Edel, Emilia Käsper, Andreas Klein, Svetla Nikova,
Bart Preneel, Jeroen Schillewaert, Leo Storme: Galois geometries and
applications. Des. Codes Cryptography 56(2-3): 85-86 (2010)
- J. Tepandi, S. Vassiljev, I. Tðahhirov. Wireless PKI security and mobile voting. Computer, v. 43, n. 6, pp. 54-60, 2010.
2011
- A. Andrusenko, Aivo Jürgenson, Jan Willemson.
Serial model for attack tree computations. KSII Trans. on Internet and
Information Systems, to appear.
- Madeline González Muñiz and Peeter Laud. On the (Im)possibility of
Perennial Message Recognition Protocols without Public-Key Cryptography. ACM
SAC 2011.
- Emilia Käsper. Fast Elliptic Curve Cryptography in OpenSSL. RLCPS 2011, March
4 2011, St. Lucia.
- Dominique Unruh. Concurrent composition in the bounded quantum storage model. Accepted to Eurocrypt 2011
- Madeline González Muñiz, Rainer Steinwandt. Security of signature
schemes in the presence of key-dependent messages. Tatra Mountains Math.
Publications, to appear.
- Peeter Laud. Implementing Cryptographic Primitives in the Symbolic
Model. In proceedings of the 3rd NASA Formal Methods Symposium, Pasadena,
CA, USA, April 18-20, 2011. © Springer, Heidelberg.
- Abu Shohel Ahmed and Peeter Laud. Formal Security analysis of OpenID
with GBA protocol. In proceedings of the 3rd International ICST Conference
on Security and Privacy in Mobile Information and Communication Systems,
Aalborg, Denmark, May 17-19, 2011. © Springer, Heidelberg
- Sanjam Garg (UCLA), Vanishree Rao (UCLA), Amit Sahai (UCLA), Dominique
Schröder (University of Maryland, USA), and Dominique Unruh (University of
Tartu, Estonia). Round Optimal Blind Signatures. CRYPTO 2011, to appear.
- Sven Heiberg, Peeter Laud, Sigurður Másson and Claus Popp Larsen.
Secure Mobile Access to Homecare Patients' Data. Accepted to ICEGOV 2011. [POSTER]
- Sven Heiberg, Peeter Laud, Jan Willemson. On applying i-voting for
Estonian Parliamentary elections in 2011. Accepted to VOTEID 2011.
- Sven Laur, Jan Willemson, Bingsheng Zhang. Round-efficient oblivious
database manipulation. Accepted to ISC 2011.
- Bingsheng Zhang. Generic Constant-Round Oblivious Sorting Algorithm for
MPC. Accepted to ProvSec 2011.
- Bingsheng Zhang. Simulatable Adaptive Oblivious Transfer with
Statistical Receiver's Privacy. Accepted to ProvSec 2011.
- Jan Willemson: Pseudonymization Service for X-Road eGovernment Data Exchange Layer. EGOVIS 2011: 135-145
2012
- A. S. Ahmed, Peeter Laud. Formal security analysis of OpenID with GBA protocol. In A. Lioy, G. Russello, F. Luccio, eds., Proc. of 3rd Int. ICST Conf. on Security and Privacy in Mobile Information and Communication Systems, Mobisec 2011 (Aalborg, May 2011), Lect. Notes of ICST, Springer, to appear.
- Michael Backes, A. Malik, Dominique Unruh. Computational soundness without protocol restrictions. In Proc. of 19th ACM Conf. on Computer and Communications Security, CCS 2012 (Raleigh, NC, Oct. 2012), pp. 699-711. ACM Press, 2012.
- Dan Bogdanov, Roman Jagomägis and Sven Laur. A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining. In Intelligence and Security Informatics, 2012.
- Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson. High-performance secure multi-party computation for data mining applications. Int. J. of Information Security, v. 11, n. 6, pp. 403-418, 2012.
- Dan Bogdanov, Riivo Talviste, Jan Willemson. Deploying secure multi-party computation for financial data analysis. In Proc. of 16th Int. Conf. on Financial Cryptography, FC 2012 (Bonaire, Feb./March 2012), Lect. Notes in Comput. Sci., Springer, to appear.
- Ahto Buldas, R. Stepanenko. Upper bounds for adversaries' utility in attack trees. In J. Grossklags, J. Walrand, eds, Proc. of 3rd Int. Conf. on Decision and Game Theory for Security, GameSec 2012 (Budapest, Nov. 2012), v. 7638 of Lect. Notes in Comput. Sci., pp. 98-117. Springer, 2012
- Rafik Chaabouni, Helger Lipmaa and Bingsheng Zhang. A Non-Interactive Range Proof with Constant Communication. In Angelos Keromytis, editor, FC 2012, volume 7397 of Lecture Notes in Computer Science, pages 179--199, Bonaire, The Netherlands, February 27--March 2, 2012. Springer, Heidelberg.
- George Danezis, Emilia Käsper. The Dangers of Composing Anonymity Channels. In Information Hiding 2012
- Sven Heiberg. New technologies for democratic elections. In M. La Rosa, P. Soffer, eds., Revised Papers from BPM 2012 Int. Wkshs. (Tallinn, Sept. 2012), v. 132 of Lect. Notes in Business Inform. Process., pp. 630-635. Springer, 2013.
- Peeter Laud. Secure implementation of asynchronous method calls and futures. In C. Mitchell, A. Tomlinson, eds., Proc. of 4th Int. Conf. on Trusted Systems, InTrust 2012 (London, Dec. 2012), v. 7711 of Lect. Notes in Comput. Sci., pp. 25-47. Springer, 2012. doi: 10.1007/978-3-642-35371-0_3
- Helger Lipmaa. Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. In Ronald Cramer, editor, TCC 2012, volume 7194 of Lecture Notes in Computer Science, pages 169--189, Taormina, Italy, March 18--21, 2012. Springer, Heidelberg.
- Helger Lipmaa. Secure Accumulators from Euclidean Rings without Trusted Setup. In Feng Bao, Pierangela Samarati and Jianying Zhou, editors, ACNS 2012, volume 7341 of Lecture Notes in Computer Science, pages 224--240, Singapore, June 26--29, 2012. Springer, Heidelberg.
- Helger Lipmaa and Bingsheng Zhang. A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. In Ivan Visconti and Roberto De Prisco, editors, SCN 2012, volume 7485 of Lecture Notes in Computer Science, pages 477--502, Amalfi, Italy, September 5--7, 2012. Springer, Heidelberg.
- Madeline González Muñiz, Rainer Steinwandt. Security of message authentication codes in the presence of key-dependent messages. Design, Codes and Cryptography, to appear. doi: 10.1007/s10623-011-9523-z
- Margus Niitsoo. Deterministic Random Oracles. ProvSec 2012.
- A. Ojamaa, K. Düüna. Assessing the security of Node.js platform. In Proc. of 2012 Conf. on Internet Technology and Secured Transactions, ICITST '12 (London, Dec. 2012), pp. 348-355. IEEE, 2012. article in IEEE Xplore
- A. Ojamaa, K. Düüna. Security assessment of Node.js platform. In V. Venkatakrishnan, D. Goswami, eds., Proc. of 8th Int. Conf. on Information Systems Security, ICISS 2012 (Guwahati, Dec. 2012), v. 7671 of Lect. Notes in Comput. Sci., pp. 35-43. Springer, 2012. doi: 10.1007/978-3-642-35130-3_3
- A. Ojamaa, U.-R. Lind. Securing customer email communication in e-commerce. In Proc. of 5th Int. Conf. on Developments in e-Systems Engineering, DeSE '12 (Bucharest, Sept. 2012), CPS, to appear.
- Alisa Pankova, Peeter Laud. Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. CSF 2012.
- Martin Pettai, Peeter Laud. Securing the future - an information flow analysis of a distributed OO language. In M. Bieliková, G. Friedrich, G. Gottlob, S. Katzenbeisser, G. Turán, eds., Proc. of 38th Int. Conf. on Current Trends in Theory and Practice of Computer Science, SOFSEM 2012 (Špindleruv Mlýn, Jan. 2012), v. 7147 of Lect. Notes in Comput. Sci., pp. 576-587. Springer, 2012. doi: 10.1007/978-3-642-27660-6_47
- Dominique Schröder, Dominique Unruh. Security of Blind Signature Revisited. PKC 2012.
- E. Tyugu. Command and control of cyber weapons. In C. Czosseck, R. Ottis, K. Ziolkowski, eds., Proc. of 4th Int. Conf. on Cyber Conflict, CyCon 2012 (Tallinn, June 2012), pp. 95-105. CCD COE Publications, 2012. article in IEEE Xplore
- Dominique Unruh. Quantum Proofs of Knowledge. In David Pointcheval and Thomas Johansson, editors, EUROCRYPT 2012, volume ? of Lectures Notes in Computer Science, pages ?--?, Cambridge, UK, April 15--19, 2012. Springer, Heidelberg
2013
- Arne Ansper, Ahto Buldas, Freudenthal, Jan Willemson. High-performance qualified digital signatures for X-Road. Nordsec 2013, Oct 2013
- Arne Ansper, Ahto Buldas, Margus Freudenthal and Jan Willemson:Protecting a Federated Database Infrastructure Against Denial-of Service Attacks. In CRITIS 2013, Sept 2013.
- M. Backes, F. Bendun, Dominique Unruh. Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification. In D. Basin, J. C. Mitchell, eds., Proc. of 2nd Int. Conf. on Principles of Security and Trust, POST 2013 (Rome, March 2013), v. 7796 of Lect. Notes in Comput. Sci., pp. 206-225. Springer, 2013.
- L. Kamm, D. Bogdanov, S. Laur, J. Vilo. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics, v. 29, n. 7, pp. 886-893, 2013.
- F. Böhl, Dominique Unruh. Symbolic universal composability. In Proc. of 26th IEEE Computer Security Foundations Symp., CSF '13 (Tulane, LA, June 2013), IEEE CS Press, to appear.
- Ahto Buldas, Kroonmaa, Risto Laanoja. Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees. Nordsec 2013, Oct 2013
- Ahto Buldas, Risto Laanoja: Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. In ACISP 2013, July 2013.
- Ahto Buldas, Margus Niitsoo: Black-Box Separations and Their Adaptability to the Non-uniform Model. In ACISP 2013, July 2013.
- Rafik Chaabouni. Solving Terminal Revocation in EAC by Augmenting Terminal Authentication. BIOSIG 2013, Sep 2013.
- Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang. Efficient Modular NIZK Arguments from Shift and Product. In Michel Abdalla, Cristina Nita-Rotaru and Ricardo Dahab, editors, CANS 2013, volume 8257 of Lecture Notes in Computer Science, pages 92--121, Paraty, Brazil, November 20--22, 2013. Springer, Heidelberg.
- M. González Muñiz, Peeter Laud. Strong forward security in identity-based signcryption. J. of Discrete Mathematical Sciences and Cryptography, to appear.
- S. Heiberg. New technologies for democratic elections. In M. La Rosa, P. Soffer, eds., Revised Papers from BPM 2012 Int. Wkshs. (Tallinn, Sept. 2012), v. 132 of Lect. Notes in Business Inform. Process., pp. 630-635. Springer, 2013.
- D. Hofheinz, Dominique Unruh, J. Müller-Quade. Polynomial runtime and composability. J. of Cryptol., to appear.
- L. Klingler, R. Steinwandt, Dominique Unruh. On using probabilistic Turing machines to model participants in cryptographic protocols. Theor. Comput. Sci., to appear.
- Peeter Laud and Alisa Pankova. New Attacks against Transformation-Based Privacy-Preserving Linear Programming. STM 2013.
- Sven Laur, Riivo Talviste, Jan Willemson, From oblivious AES to efficient and secure database join in the multiparty setting. Accepted to ACNS 2013.
- Aleksandr Lenin and Ahto Buldas. New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees. In GameSec 2013, Nov 2013.
- Helger Lipmaa. Succinct Non-interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes. In Kazue Sako and Palash Sarkar, editors, ASIACRYPT 2013, volume 8269 of Lecture Notes in Computer Science, pages 41--60, Bangalore, India, December 1--5, 2013. Springer, Heidelberg.
- Helger Lipmaa and Tomas Toft. Secure Equality and Greater-Than Tests with Sublinear Online Complexity. In Fedor V. Fomin, Rusins Freivalds, Marta Kwiatkowska and David Peleg, editors, ICALP 2013, volume 7966 of Lecture Notes in Computer Science, pages 645--656, Riga, Latvia, July 8--12, 2013. Springer, Heidelberg.
- Helger Lipmaa and Bingsheng Zhang. A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. Journal of Computer Security, ? (?):?--?, ? ?.
- Martin Pettai, Peeter Laud. Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus. In Nordsec 2013, Oct 2013.
- E. Tyugu. Situation awareness and control errors of cyber weapons. In Proc. of 2013 IEEE Int. Multi-Disciplinary Conf. on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA '13 (San Diego, CA, Feb. 2013), pp. 146-151. IEEE, 2013.
- Dominique Unruh. Everlasting quantum security. In Proc. of 33rd Int. Cryptology Conf., CRYPTO 2013 (Santa Barbara, CA, Aug. 2013), Lect. Notes in Comput. Sci., Springer, to appear.
- Bingsheng Zhang, Helger Lipmaa, Cong Wang and Kui Ren. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. In Ahmad-Reza Sadeghi, editor, FC 2013, volume 7859 of Lecture Notes in Computer Science, pages ?--?, Okinawa, Japan, April 1--5, 2013. Springer, Heidelberg.
2014
- Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo and Jan Willemson, A Secure Genetic Algorithm for the Subset Cover Problem and its Application to Privacy Protection. WISTP 2014.
- Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt, Riivo Talviste and Jan Willemson, Privacy-preserving statistical data analysis on federated databases. APF 2014.
- Dan Bogdanov, Peeter Laud, Sven Laur and Pille Pullonen. From Input Private to Universally Composable Secure Multiparty Computation Primitives. CSF 2014
- Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang. Efficient Non-Interactive Zero Knowledge Arguments for Set Operations. In Nicolas Christin and Rei Safavi-Naini, editors, FC 2014, volume ? of Lecture Notes in Computer Science, pages ?--?, Barbados, March 3--7, 2014. Springer, Heidelberg.
- Dominique Unruh. Revocable quantum timed-release encryption. Eurocrypt 2014
|

Main page ●○
History ●○
People ●○
Research ●○
Publications ●○
Best cited papers ●○
Teaching ●○
Seminars ●○
Links ●○
|