Helger Lipmaa
Helger Lipmaa
Simula UiB
Verified email at ut.ee - Homepage
Title
Cited by
Cited by
Year
On private scalar product computation for privacy-preserving data mining
B Goethals, S Laur, H Lipmaa, T Mielikäinen
ICISC 2004, 104--120, 2004
5162004
An oblivious transfer protocol with log-squared communication
H Lipmaa
ISC 2005, 314-328, 2005
3502005
CTR-mode encryption
H Lipmaa, P Rogaway, D Wagner
First NIST Workshop on Modes of Operation 39, 2000
298*2000
Secure Vickrey auctions without threshold trust
H Lipmaa, N Asokan, V Niemi
FC 2002, 87-101, 2002
232*2002
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
H Lipmaa
TCC 2012, 2012
2122012
Efficient algorithms for computing differential properties of addition
H Lipmaa, S Moriai
Fast Software Encryption, 35-45, 2001
1982001
Time-stamping with binary linking schemes
A Buldas, P Laud, H Lipmaa, J Villemson
Advances in Cryptology—CRYPTO'98, 486-501, 1998
1951998
Designated verifier signature schemes: Attacks, new security notions and a new construction
H Lipmaa, G Wang, F Bao
ICALP 2005, 101-101, 2005
1762005
On diophantine complexity and statistical zero-knowledge arguments
H Lipmaa
ASIACRYPT 2003, 398-415, 2003
1712003
Cryptographically private support vector machines
S Laur, H Lipmaa, T Mielikäinen
Proceedings of the 12th ACM SIGKDD international conference on Knowledge …, 2006
1502006
Verifiable homomorphic oblivious transfer and private equality test
H Lipmaa
ASIACRYPT 2003, 416-433, 2003
1322003
Accountable certificate management using undeniable attestations
A Buldas, P Laud, H Lipmaa
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
1162000
Fast implementations of AES candidates
K Aoki, H Lipmaa
Third AES Candidate Conference, 13-14, 2000
1032000
Hybrid voting protocols and hardness of manipulation
E Elkind, H Lipmaa
ISAAC 2005, 206-215, 2005
1012005
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
H Lipmaa
ASIACRYPT 2013, 41--60, 2013
882013
Optimally efficient accountable time-stamping
A Buldas, H Lipmaa, B Schoenmakers
Public Key Cryptography, 293-305, 2000
852000
First CPIR protocol with data-dependent computation
H Lipmaa
ICISC 2009, 193-210, 2009
692009
Secure Equality and Greater-Than Tests with Sublinear Online Complexity
H Lipmaa, T Toft
ICALP(2) 2013, 645--656, 2013
642013
AES candidates: A survey of implementations
H Lipmaa
An on-line table. Information available from http://home. cyber. ee/helger/aes, 1999
62*1999
A subversion-resistant SNARK
B Abdolmaleki, K Baghery, H Lipmaa, M Zając
International Conference on the Theory and Application of Cryptology and …, 2017
602017
The system can't perform the operation now. Try again later.
Articles 1–20