Pille Pullonen
Pille Pullonen
Verified email at cyber.ee
Cited by
Cited by
Maturity and performance of programmable secure computation
DW Archer, D Bogdanov, B Pinkas, P Pullonen
IEEE security & privacy 14 (5), 48-56, 2016
Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations
P Pullonen, S Siim
International Conference on Financial Cryptography and Data Security, 172-183, 2015
From input private to universally composable secure multi-party computation primitives
D Bogdanov, P Laud, S Laur, P Pullonen
2014 IEEE 27th Computer Security Foundations Symposium, 184-198, 2014
PE-BPMN: privacy-enhanced business process model and notation
P Pullonen, R Matulevičius, D Bogdanov
International Conference on Business Process Management, 40-56, 2017
Use your brain! arithmetic 3pc for any modulus with active security
H Eerikson, M Keller, C Orlandi, P Pullonen, J Puura, M Simkin
1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020
The design and implementation of a two-party protocol suite for Sharemind 3
P Pullonen, D Bogdanov, T Schneider
CYBERNETICA Institute of Information Security, Tech. Rep 4, 17, 2012
Privacy-enhanced BPMN: Enabling data privacy analysis in business processes models
P Pullonen, J Tom, R Matulevičius, A Toots
Software and Systems Modeling 18 (6), 3235-3264, 2019
Actively secure two-party computation: Efficient Beaver triple generation
P Pullonen
Instructor, 2013
Business Process Privacy Analysis in Pleak
A Toots, R Tuuling, M Yerokhin, M Dumas, L García-Bañuelos, P Laud, ...
International Conference on Fundamental Approaches to Software Engineering …, 2019
Verification of Privacy-Enhanced Collaborations
S Belluccini, R De Nicola, M Dumas, P Pullonen, B Re, F Tiezzi
Proceedings of the 8th International Conference on Formal Methods in …, 2020
SUNFISH D2. 1–State of the Art and Legal Aspects
A Reiter, H Leitold, B Suzic, F Reimair, M Moffie, D Cordina, P Pullonen, ...
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
S Siim, P Pullonen
Applicability of Indistinguishability Obfuscation
P Pullonen
The system can't perform the operation now. Try again later.
Articles 1–13