2008 |
32 | EE | Yvo Desmedt,
Helger Lipmaa,
Duong Hieu Phan:
Hybrid Damgård Is CCA1-Secure under the DDH Assumption.
CANS 2008: 18-30 |
31 | EE | Giovanni Di Crescenzo,
Helger Lipmaa:
Succinct NP Proofs from an Extractability Assumption.
CiE 2008: 175-185 |
30 | EE | Giovanni Di Crescenzo,
Helger Lipmaa:
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge.
ISAAC 2008: 615-627 |
29 | EE | Helger Lipmaa:
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings.
ISC 2008: 441-454 |
2007 |
28 | EE | Sven Laur,
Helger Lipmaa:
A New Protocol for Conditional Disclosure of Secrets and Its Applications.
ACNS 2007: 207-225 |
2006 |
27 | | Helger Lipmaa,
Moti Yung,
Dongdai Lin:
Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Springer 2006 |
26 | EE | Sven Laur,
Helger Lipmaa,
Taneli Mielikäinen:
Cryptographically private support vector machines.
KDD 2006: 618-624 |
25 | | Ammar Alkassar,
Elena Andreeva,
Helger Lipmaa:
SLC: Efficient Authenticated Encryption for Short Packages.
Sicherheit 2006: 270-278 |
2005 |
24 | EE | Edith Elkind,
Helger Lipmaa:
Small Coalitions Cannot Manipulate Voting.
Financial Cryptography 2005: 285-297 |
23 | EE | Helger Lipmaa,
Guilin Wang,
Feng Bao:
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
ICALP 2005: 459-471 |
22 | EE | Yong Li,
Helger Lipmaa,
Dingyi Pei:
On Delegatability of Four Designated Verifier Signatures.
ICICS 2005: 61-71 |
21 | EE | Sven Laur,
Helger Lipmaa,
Taneli Mielikäinen:
Private Itemset Support Counting.
ICICS 2005: 97-111 |
20 | EE | Edith Elkind,
Helger Lipmaa:
Hybrid Voting Protocols and Hardness of Manipulation.
ISAAC 2005: 206-215 |
19 | EE | Helger Lipmaa:
An Oblivious Transfer Protocol with Log-Squared Communication.
ISC 2005: 314-328 |
2004 |
18 | EE | Helger Lipmaa,
Johan Wallén,
Philippe Dumas:
On the Additive Differential Probability of Exclusive-Or.
FSE 2004: 317-331 |
17 | EE | Edith Elkind,
Helger Lipmaa:
Interleaving Cryptography and Mechanism Design: The Case of Online Auctions.
Financial Cryptography 2004: 117-131 |
16 | EE | Bart Goethals,
Sven Laur,
Helger Lipmaa,
Taneli Mielikäinen:
On Private Scalar Product Computation for Privacy-Preserving Data Mining.
ICISC 2004: 104-120 |
15 | EE | Andris Ambainis,
Markus Jakobsson,
Helger Lipmaa:
Cryptographic Randomized Response Techniques.
Public Key Cryptography 2004: 425-438 |
2003 |
14 | EE | Helger Lipmaa:
On Diophantine Complexity and Statistical Zero-Knowledge Arguments.
ASIACRYPT 2003: 398-415 |
13 | EE | Helger Lipmaa:
Verifiable Homomorphic Oblivious Transfer and Private Equality Test.
ASIACRYPT 2003: 416-433 |
12 | EE | Andris Ambainis,
Markus Jakobsson,
Helger Lipmaa:
Cryptographic Randomized Response Techniques
CoRR cs.CC/0302025: (2003) |
2002 |
11 | EE | Helger Lipmaa,
N. Asokan,
Valtteri Niemi:
Secure Vickrey Auctions without Threshold Trust.
Financial Cryptography 2002: 87-101 |
10 | EE | Helger Lipmaa:
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings.
INDOCRYPT 2002: 48-61 |
9 | EE | Helger Lipmaa:
On Optimal Hash Tree Traversal for Interval Time-Stamping.
ISC 2002: 357-371 |
8 | EE | Helger Lipmaa:
Fast Software Implementations of SC2000.
ISC 2002: 63-74 |
7 | | Ahto Buldas,
Peeter Laud,
Helger Lipmaa:
Eliminating Counterevidence with Applications to Accountable Certificate Management.
Journal of Computer Security 10(3): 273-296 (2002) |
2001 |
6 | EE | Helger Lipmaa,
Shiho Moriai:
Efficient Algorithms for Computing Differential Properties of Addition.
FSE 2001: 336-350 |
2000 |
5 | EE | Ahto Buldas,
Peeter Laud,
Helger Lipmaa:
Accountable certificate management using undeniable attestations.
ACM Conference on Computer and Communications Security 2000: 9-17 |
4 | | Kazumaro Aoki,
Helger Lipmaa:
Fast Implementations of AES Candidates.
AES Candidate Conference 2000: 106-120 |
3 | | Ahto Buldas,
Helger Lipmaa,
Berry Schoenmakers:
Optimally Efficient Accountable Time-Stamping.
Public Key Cryptography 2000: 293-305 |
1998 |
2 | EE | Ahto Buldas,
Peeter Laud,
Helger Lipmaa,
Jan Willemson:
Time-Stamping with Binary Linking Schemes.
CRYPTO 1998: 486-501 |
1 | EE | Helger Lipmaa:
IDEA: A Cipher For Multimedia Architectures?
Selected Areas in Cryptography 1998: 248-263 |