List of all publications in cryptography
- Sven Laur and Sylvain Pasini. User-aided data
authentication. International Journal of
Security and Networks, volume 4(1/2), pages 69-86, 2009
[PDF]
[DOI]
- Dan Bogdanov, Sven Laur, Jan Willemson. Sharemind:
A Framework for Fast Privacy-Preserving
Computations. In Computer Security - ESORICS 2008,
13th European Symposium on Research in Computer Security,
Málaga, Spain, October 6-8, 2008, volume 5283 of Lecture
Notes in Computer Science, pages 192-206. Springer,
2008.
[PDF]
[DOI]
- Sven Laur and Sylvain Pasini. SAS-based group
authentication and key agreement protocols. In Public Key
Cryptography - PKC 2008, 11th International Workshop on
Practice and Theory in Public-Key Cryptography, Barcelona,
Spain, March 9-12, 2008, volume 4939 of Lecture Notes in
Computer Science, pages 197-213. Springer, 2008.
[PDF]
[DOI]
-
Sven Laur. Cryptographic Protocol Design. Doctoral
dissertation, Helsinki University of Technology, 2008. TKK
Dissertations in Information and Computer Science,
TKK-ISC-D2.
[PDF]
[DOI]
- Ahto Buldas and Sven Laur. Knowledge-binding
commitments with applications in time-stamping. In
Public Key Cryptography - PKC 2007, 10th International
Conferenc on Practice and Theory in Public-Key
Cryptography, Beijing, China, April 16-20, 2007, volume
4450 of Lecture Notes in Computer Science, pages
150-165. Springer, 2007.
[PDF]
[DOI]
- Sven Laur and Helger Lipmaa. A new protocol for
conditional disclosure of secrets and its applications. In
Applied Cryptography and Network Security, 5th
International Conference, ACNS 2007, Zhuhai, China, June
5-8, 2007, volume 4521 of Lecture Notes in Computer
Science, pages 207-225. Springer, 2007.
[PDF]
[DOI]
- Ahto Buldas and Sven Laur. Do broken hash
functions affect the security of time-stamping
schemes? In Applied Cryptography and Network
Security, 4th International Conference, ACNS 2006,
Singapore, June 6-9, 2006, Proceedings, volume 3989 of
Lecture Notes in Computer Science, pages 50-65. Springer,
2006.
[PDF]
[DOI]
- Sven Laur, Helger Lipmaa, and Taneli
Mielikäinen. Cryptographically private support vector
machines. In KDD '06: Proceedings of the 12th ACM SIGKDD
international conference on Knowledge discovery and data
mining, pages 618-624, New York, NY, USA, 2006. ACM Press.
[PDF]
[DOI]
- Sven Laur and Kaisa
Nyberg. Efficient mutual data authentication using
manually authenticated strings. In The 5th International
Conference on Cryptology and Network Security, CANS 2006,
Suzhou, Dec. 8 - 10, 2006, volume 4301 of Lecture Notes in
Computer Science, pages 90-107. Springer, 2006. A
shortened version of ePrint Report 2005/424.
[PDF]
[DOI]
- Sven Laur, Helger Lipmaa, and Taneli Mielikäinen.
Private itemset support counting. In Information
and Communications Security, 7th International Conference,
ICICS 2005, Beijing, China, December 10-13, 2005,
Proceedings, volume 3783 of Lecture Notes in Computer
Science, pages 97-111. Springer, 2005.
[PDF]
[DOI]
- Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli
Mielikäinen. On private scalar product computation for
privacy-preserving data mining. In Information
Security and Cryptology - ICISC 2004, 7th International
Conference, Seoul, Korea, December 2-3, 2004, Revised
Selected Papers, volume 3506 of Lecture Notes in Computer
Science, pages 104120. Springer, 2004.
[PDF]
[DOI]