List of all publications in cryptography
- Sven Laur and Sylvain Pasini. User-aided data authentication. International Journal of Security and Networks, volume 4(1/2), pages 69-86, 2009 [PDF] [DOI]
- Dan Bogdanov, Sven Laur, Jan Willemson. Sharemind: A Framework for Fast Privacy-Preserving Computations. In Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008, volume 5283 of Lecture Notes in Computer Science, pages 192-206. Springer, 2008. [PDF] [DOI]
- Sven Laur and Sylvain Pasini. SAS-based group authentication and key agreement protocols. In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, volume 4939 of Lecture Notes in Computer Science, pages 197-213. Springer, 2008. [PDF] [DOI]
- Sven Laur. Cryptographic Protocol Design. Doctoral dissertation, Helsinki University of Technology, 2008. TKK Dissertations in Information and Computer Science, TKK-ISC-D2. [PDF] [DOI]
- Ahto Buldas and Sven Laur. Knowledge-binding commitments with applications in time-stamping. In Public Key Cryptography - PKC 2007, 10th International Conferenc on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, volume 4450 of Lecture Notes in Computer Science, pages 150-165. Springer, 2007. [PDF] [DOI]
- Sven Laur and Helger Lipmaa. A new protocol for conditional disclosure of secrets and its applications. In Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, volume 4521 of Lecture Notes in Computer Science, pages 207-225. Springer, 2007. [PDF] [DOI]
- Ahto Buldas and Sven Laur. Do broken hash functions affect the security of time-stamping schemes? In Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, volume 3989 of Lecture Notes in Computer Science, pages 50-65. Springer, 2006. [PDF] [DOI]
- Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. Cryptographically private support vector machines. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 618-624, New York, NY, USA, 2006. ACM Press. [PDF] [DOI]
- Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. In The 5th International Conference on Cryptology and Network Security, CANS 2006, Suzhou, Dec. 8 - 10, 2006, volume 4301 of Lecture Notes in Computer Science, pages 90-107. Springer, 2006. A shortened version of ePrint Report 2005/424. [PDF] [DOI]
- Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. Private itemset support counting. In Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, volume 3783 of Lecture Notes in Computer Science, pages 97-111. Springer, 2005. [PDF] [DOI]
- Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. On private scalar product computation for privacy-preserving data mining. In Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, volume 3506 of Lecture Notes in Computer Science, pages 104120. Springer, 2004. [PDF] [DOI]