Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Helger Lipmaa
@article{DBLP:journals/iacr/LipmaaPS24, author = {Helger Lipmaa and Roberto Parisella and Janno Siim}, title = {Constant-Size zk-SNARKs in {ROM} from Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2024}, url = {https://eprint.iacr.org/2024/173}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lipmaa23, author = {Helger Lipmaa}, editor = {Jian Guo and Ron Steinfeld}, title = {On Black-Box Knowledge-Sound Commit-And-Prove SNARKs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14439}, pages = {41--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8724-5\_2}, doi = {10.1007/978-981-99-8724-5\_2}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lipmaa23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/LipmaaP23, author = {Helger Lipmaa and Roberto Parisella}, editor = {Abdelrahaman Aly and Mehdi Tibouchi}, title = {Set (Non-)Membership NIZKs from Determinantal Accumulators}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference on Cryptology and Information Security in Latin America, {LATINCRYPT} 2023, Quito, Ecuador, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14168}, pages = {352--374}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44469-2\_18}, doi = {10.1007/978-3-031-44469-2\_18}, timestamp = {Fri, 06 Oct 2023 18:13:29 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/LipmaaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LipmaaPS23, author = {Helger Lipmaa and Roberto Parisella and Janno Siim}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Algebraic Group Model with Oblivious Sampling}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14372}, pages = {363--392}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48624-1\_14}, doi = {10.1007/978-3-031-48624-1\_14}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LipmaaPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa23, author = {Helger Lipmaa}, title = {On Black-Box Knowledge-Sound Commit-And-Prove SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1416}, year = {2023}, url = {https://eprint.iacr.org/2023/1416}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaPS23, author = {Helger Lipmaa and Roberto Parisella and Janno Siim}, title = {Algebraic Group Model with Oblivious Sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1504}, year = {2023}, url = {https://eprint.iacr.org/2023/1504}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CampanelliFFLL23, author = {Matteo Campanelli and Antonio Faonio and Dario Fiore and Tianyu Li and Helger Lipmaa}, title = {Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1518}, year = {2023}, url = {https://eprint.iacr.org/2023/1518}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CampanelliFFLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LipmaaSZ22, author = {Helger Lipmaa and Janno Siim and Michal Zajac}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Counting Vampires: From Univariate Sumcheck to Updatable {ZK-SNARK}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {249--278}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_9}, doi = {10.1007/978-3-031-22966-4\_9}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LipmaaSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Lipmaa22, author = {Helger Lipmaa}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {A Unified Framework for Non-universal SNARKs}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {553--583}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_20}, doi = {10.1007/978-3-030-97121-2\_20}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Lipmaa22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaSZ22, author = {Helger Lipmaa and Janno Siim and Michal Zajac}, title = {Counting Vampires: From Univariate Sumcheck to Updatable {ZK-SNARK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2022}, url = {https://eprint.iacr.org/2022/406}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaP22, author = {Helger Lipmaa and Roberto Parisella}, title = {Set (Non-)Membership NIZKs from Determinantal Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1570}, year = {2022}, url = {https://eprint.iacr.org/2022/1570}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdolmalekiLSZ21, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {On Subversion-Resistant SNARKs}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {17}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09379-y}, doi = {10.1007/S00145-021-09379-Y}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdolmalekiLSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LipmaaP21, author = {Helger Lipmaa and Kateryna Pavlyk}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Gentry-Wichs is Tight: a Falsifiable Non-adaptively Sound {SNARG}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {34--64}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_2}, doi = {10.1007/978-3-030-92078-4\_2}, timestamp = {Fri, 03 Dec 2021 17:36:40 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LipmaaP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CouteauLPO21, author = {Geoffroy Couteau and Helger Lipmaa and Roberto Parisella and Arne Tobias {\O}degaard}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Efficient NIZKs for Algebraic Sets}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {128--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_5}, doi = {10.1007/978-3-030-92078-4\_5}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CouteauLPO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FauziLSZO21, author = {Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac and Arne Tobias {\O}degaard}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {618--649}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_21}, doi = {10.1007/978-3-030-92068-5\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FauziLSZO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KripsL21, author = {Toomas Krips and Helger Lipmaa}, editor = {Kenneth G. Paterson}, title = {More Efficient Shuffle Argument from Unique Factorization}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {252--275}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_11}, doi = {10.1007/978-3-030-75539-3\_11}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KripsL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FauziLPS21, author = {Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Somewhere Statistically Binding Commitment Schemes with Applications}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {436--456}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8\_21}, doi = {10.1007/978-3-662-64322-8\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FauziLPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AbdolmalekiKL21, author = {Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Helger Lipmaa}, editor = {Avishek Adhikari and Ralf K{\"{u}}sters and Bart Preneel}, title = {Smooth Zero-Knowledge Hash Functions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13143}, pages = {510--535}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92518-5\_23}, doi = {10.1007/978-3-030-92518-5\_23}, timestamp = {Mon, 13 Dec 2021 16:43:06 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/AbdolmalekiKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KripsL21, author = {Toomas Krips and Helger Lipmaa}, title = {More Efficient Shuffle Argument from Unique Factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2021}, url = {https://eprint.iacr.org/2021/438}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KripsL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiKL21, author = {Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Helger Lipmaa}, title = {Smooth Zero-Knowledge Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2021}, url = {https://eprint.iacr.org/2021/653}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaP21, author = {Helger Lipmaa and Kateryna Pavlyk}, title = {Succinct Functional Commitment for a Large Class of Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2021}, url = {https://eprint.iacr.org/2021/932}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauLPO21, author = {Geoffroy Couteau and Helger Lipmaa and Roberto Parisella and Arne Tobias {\O}degaard}, title = {Efficient NIZKs for Algebraic Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1251}, year = {2021}, url = {https://eprint.iacr.org/2021/1251}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauLPO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziLSZO21, author = {Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac and Arne Tobias {\O}degaard}, title = {Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1264}, year = {2021}, url = {https://eprint.iacr.org/2021/1264}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziLSZO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa21, author = {Helger Lipmaa}, title = {A Unified Framework for Non-Universal SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1700}, year = {2021}, url = {https://eprint.iacr.org/2021/1700}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LipmaaP20, author = {Helger Lipmaa and Kateryna Pavlyk}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Succinct Functional Commitment for a Large Class of Arithmetic Circuits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {686--716}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_23}, doi = {10.1007/978-3-030-64840-4\_23}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LipmaaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdolmalekiLS020, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michal Zajac}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {On {QA-NIZK} in the {BPK} Model}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {590--620}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_20}, doi = {10.1007/978-3-030-45374-9\_20}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdolmalekiLS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Lipmaa20, author = {Helger Lipmaa}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Key-and-Argument-Updatable QA-NIZKs}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {645--669}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_32}, doi = {10.1007/978-3-030-57990-6\_32}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Lipmaa20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziLPS20, author = {Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim}, title = {Somewhere Statistically Binding Commitment Schemes with Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2020}, url = {https://eprint.iacr.org/2020/652}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziLPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiLSZ20, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {On Subversion-Resistant SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2020}, url = {https://eprint.iacr.org/2020/668}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiLSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbdolmalekiBLS019, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {DL-Extractable UC-Commitment Schemes}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {385--405}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_19}, doi = {10.1007/978-3-030-21568-2\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AbdolmalekiBLS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdolmalekiBLS019, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac}, editor = {Johannes Buchmann and Abderrahmane Nitaj and Tajje{-}eddine Rachidi}, title = {UC-Secure {CRS} Generation for SNARKs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11627}, pages = {99--117}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23696-0\_6}, doi = {10.1007/978-3-030-23696-0\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdolmalekiBLS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBLSZ19, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {DL-Extractable UC-Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2019}, url = {https://eprint.iacr.org/2019/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa19, author = {Helger Lipmaa}, title = {Key-and-Argument-Updatable QA-NIZKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2019}, url = {https://eprint.iacr.org/2019/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBLSZ19a, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {UC-Secure {CRS} Generation for SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2019}, url = {https://eprint.iacr.org/2019/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLSZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa19a, author = {Helger Lipmaa}, title = {Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2019}, url = {https://eprint.iacr.org/2019/612}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KiayiasKLS018, author = {Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias}, editor = {Dario Catalano and Roberto De Prisco}, title = {On the Security Properties of e-Voting Bulletin Boards}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {505--523}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_27}, doi = {10.1007/978-3-319-98113-0\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/KiayiasKLS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasKLSZ18, author = {Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias}, title = {On the Security Properties of e-Voting Bulletin Boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2018}, url = {https://eprint.iacr.org/2018/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasKLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiLSZ18, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {On {QA-NIZK} in the {BPK} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {877}, year = {2018}, url = {https://eprint.iacr.org/2018/877}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Lipmaa17, author = {Helger Lipmaa}, title = {Prover-efficient commit-and-prove zero-knowledge SNARKs}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {344--362}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010328}, doi = {10.1504/IJACT.2017.10010328}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Lipmaa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdolmalekiBL017, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {A Subversion-Resistant {SNARK}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {3--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_1}, doi = {10.1007/978-3-319-70700-6\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdolmalekiBL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FauziLS017, author = {Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {An Efficient Pairing-Based Shuffle Argument}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {97--127}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_4}, doi = {10.1007/978-3-319-70697-9\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FauziLS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Lipmaa17, author = {Helger Lipmaa}, editor = {Aggelos Kiayias}, title = {Optimally Sound Sigma Protocols Under {DCRA}}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {182--203}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_10}, doi = {10.1007/978-3-319-70972-7\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Lipmaa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LipmaaP17, author = {Helger Lipmaa and Kateryna Pavlyk}, editor = {Aggelos Kiayias}, title = {A Simpler Rate-Optimal {CPIR} Protocol}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {621--638}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_35}, doi = {10.1007/978-3-319-70972-7\_35}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/LipmaaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BenhamoudaBL17, author = {Fabrice Benhamouda and Florian Bourse and Helger Lipmaa}, editor = {Serge Fehr}, title = {CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {36--66}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_2}, doi = {10.1007/978-3-662-54388-7\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BenhamoudaBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nordsec/2017, editor = {Helger Lipmaa and Aikaterini Mitrokotsa and Raimundas Matulevicius}, title = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10674}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70290-2}, doi = {10.1007/978-3-319-70290-2}, isbn = {978-3-319-70289-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBL17, author = {Fabrice Benhamouda and Florian Bourse and Helger Lipmaa}, title = {CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2017}, url = {http://eprint.iacr.org/2017/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBLZ17, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac}, title = {A Subversion-Resistant {SNARK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2017}, url = {http://eprint.iacr.org/2017/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa17, author = {Helger Lipmaa}, title = {Optimally Sound Sigma Protocols Under {DCRA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2017}, url = {http://eprint.iacr.org/2017/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaP17, author = {Helger Lipmaa and Kateryna Pavlyk}, title = {A Simpler Rate-Optimal {CPIR} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2017}, url = {http://eprint.iacr.org/2017/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziLS017, author = {Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {An Efficient Pairing-Based Shuffle Argument}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2017}, url = {http://eprint.iacr.org/2017/894}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziLS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Lipmaa16, author = {Helger Lipmaa}, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, pages = {185--206}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1\_10}, doi = {10.1007/978-3-319-31517-1\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Lipmaa16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FauziLZ16, author = {Prastudy Fauzi and Helger Lipmaa and Michal Zajac}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {A Shuffle Argument Secure in the Generic Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {841--872}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_28}, doi = {10.1007/978-3-662-53890-6\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FauziLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FauziL16, author = {Prastudy Fauzi and Helger Lipmaa}, editor = {Kazue Sako}, title = {Efficient Culpably Sound {NIZK} Shuffle Argument Without Random Oracles}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {200--216}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_12}, doi = {10.1007/978-3-319-29485-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FauziL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaMS16, author = {Helger Lipmaa and Payman Mohassel and Seyed Saeed Sadeghian}, title = {Valiant's Universal Circuit: Improvements, Implementation, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2016}, url = {http://eprint.iacr.org/2016/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziL016, author = {Prastudy Fauzi and Helger Lipmaa and Michal Zajac}, title = {A Shuffle Argument Secure in the Generic Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {866}, year = {2016}, url = {http://eprint.iacr.org/2016/866}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KiayiasLLPT15, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, title = {Optimal Rate Private Information Retrieval from Homomorphic Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {2}, pages = {222--243}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0016}, doi = {10.1515/POPETS-2015-0016}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KiayiasLLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LipmaaP15, author = {Helger Lipmaa and Kateryna Pavlyk}, editor = {Michael K. Reiter and David Naccache}, title = {Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {160--175}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_12}, doi = {10.1007/978-3-319-26823-1\_12}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/LipmaaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KiayiasLLPT15, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, editor = {Kaisa Nyberg}, title = {Communication Optimal Tardos-Based Asymmetric Fingerprinting}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {469--486}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_25}, doi = {10.1007/978-3-319-16715-2\_25}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KiayiasLLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziL15, author = {Prastudy Fauzi and Helger Lipmaa}, title = {Efficient Culpably Sound {NIZK} Shuffle Argument without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1112}, year = {2015}, url = {http://eprint.iacr.org/2015/1112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FauziLZ14, author = {Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Efficient Non-Interactive Zero Knowledge Arguments for Set Operations}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {216--233}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_14}, doi = {10.1007/978-3-662-45472-5\_14}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/FauziLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcta/LipmaaS14, author = {Helger Lipmaa and Vitaly Skachek}, editor = {Raquel Pinto and Paula Rocha Malonek and Paolo Vettori}, title = {Linear Batch Codes}, booktitle = {Coding Theory and Applications, 4th International Castle Meeting, {ICMCTA} 2014, Palmela Castle, Portugal, September 15-18, 2014}, series = {{CIM} Series in Mathematical Sciences}, volume = {3}, pages = {245--253}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17296-5\_26}, doi = {10.1007/978-3-319-17296-5\_26}, timestamp = {Wed, 23 Aug 2017 10:30:53 +0200}, biburl = {https://dblp.org/rec/conf/icmcta/LipmaaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Lipmaa14, author = {Helger Lipmaa}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Efficient {NIZK} Arguments via Parallel Verification of Benes Networks}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {416--434}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_24}, doi = {10.1007/978-3-319-10879-7\_24}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/Lipmaa14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LipmaaS14, author = {Helger Lipmaa and Vitaly Skachek}, title = {Linear Batch Codes}, journal = {CoRR}, volume = {abs/1404.2796}, year = {2014}, url = {http://arxiv.org/abs/1404.2796}, eprinttype = {arXiv}, eprint = {1404.2796}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/LipmaaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziLZ14, author = {Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang}, title = {Efficient Non-Interactive Zero Knowledge Arguments for Set Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2014}, url = {http://eprint.iacr.org/2014/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa14, author = {Helger Lipmaa}, title = {A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2014}, url = {http://eprint.iacr.org/2014/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa14a, author = {Helger Lipmaa}, title = {Almost Optimal Short Adaptive Non-Interactive Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2014}, url = {http://eprint.iacr.org/2014/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLLPT14, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, title = {Near Optimal Rate Homomorphic Encryption for Branching Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2014}, url = {http://eprint.iacr.org/2014/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLLPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LipmaaZ13, author = {Helger Lipmaa and Bingsheng Zhang}, title = {A more efficient computationally sound non-interactive zero-knowledge shuffle argument}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {685--719}, year = {2013}, url = {https://doi.org/10.3233/JCS-130478}, doi = {10.3233/JCS-130478}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LipmaaZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lipmaa13, author = {Helger Lipmaa}, editor = {Kazue Sako and Palash Sarkar}, title = {Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {41--60}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_3}, doi = {10.1007/978-3-642-42033-7\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lipmaa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FauziLZ13, author = {Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang}, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {Efficient Modular {NIZK} Arguments from Shift and Product}, booktitle = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, pages = {92--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5\_6}, doi = {10.1007/978-3-319-02937-5\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/FauziLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhangLWR13, author = {Bingsheng Zhang and Helger Lipmaa and Cong Wang and Kui Ren}, editor = {Ahmad{-}Reza Sadeghi}, title = {Practical Fully Simulatable Oblivious Transfer with Sublinear Communication}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {78--95}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_8}, doi = {10.1007/978-3-642-39884-1\_8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ZhangLWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LipmaaT13, author = {Helger Lipmaa and Tomas Toft}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Secure Equality and Greater-Than Tests with Sublinear Online Complexity}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7966}, pages = {645--656}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39212-2\_56}, doi = {10.1007/978-3-642-39212-2\_56}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LipmaaT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa13, author = {Helger Lipmaa}, title = {Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2013}, url = {http://eprint.iacr.org/2013/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Lipmaa12, author = {Helger Lipmaa}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Secure Accumulators from Euclidean Rings without Trusted Setup}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {224--240}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_14}, doi = {10.1007/978-3-642-31284-7\_14}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/Lipmaa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChaabouniLZ12, author = {Rafik Chaabouni and Helger Lipmaa and Bingsheng Zhang}, editor = {Angelos D. Keromytis}, title = {A Non-interactive Range Proof with Constant Communication}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {179--199}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_14}, doi = {10.1007/978-3-642-32946-3\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChaabouniLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LipmaaZ12, author = {Helger Lipmaa and Bingsheng Zhang}, editor = {Ivan Visconti and Roberto De Prisco}, title = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {477--502}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_27}, doi = {10.1007/978-3-642-32928-9\_27}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/LipmaaZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Lipmaa12, author = {Helger Lipmaa}, editor = {Ronald Cramer}, title = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {169--189}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_10}, doi = {10.1007/978-3-642-28914-9\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Lipmaa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2011, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32747-6}, doi = {10.1007/978-3-642-32747-6}, isbn = {978-3-642-32746-9}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaZ12, author = {Helger Lipmaa and Bingsheng Zhang}, title = {New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2012}, url = {http://eprint.iacr.org/2012/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa11, author = {Helger Lipmaa}, title = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2011}, url = {http://eprint.iacr.org/2011/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa11a, author = {Helger Lipmaa}, title = {Two Simple Code-Verification Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2011}, url = {http://eprint.iacr.org/2011/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaZ11, author = {Helger Lipmaa and Bingsheng Zhang}, title = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2011}, url = {http://eprint.iacr.org/2011/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChaabouniLS10, author = {Rafik Chaabouni and Helger Lipmaa and Abhi Shelat}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Additive Combinatorics and Discrete Logarithm Based Range Protocols}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {336--351}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_21}, doi = {10.1007/978-3-642-14081-5\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChaabouniLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LipmaaZ10, author = {Helger Lipmaa and Bingsheng Zhang}, editor = {Jianying Zhou and Moti Yung}, title = {Two New Efficient PIR-Writing Protocols}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {438--455}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_26}, doi = {10.1007/978-3-642-13708-2\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LipmaaZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Lipmaa10, author = {Helger Lipmaa}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {18--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_2}, doi = {10.1007/978-3-642-21518-6\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Lipmaa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeibergLL10, author = {Sven Heiberg and Helger Lipmaa and Filip van Laenen}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {On E-Vote Integrity in the Case of Malicious Voter Computers}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {373--388}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_23}, doi = {10.1007/978-3-642-15497-3\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HeibergLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaurL10, author = {Sven Laur and Helger Lipmaa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {On the Feasibility of Consistent Computations}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {88--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_6}, doi = {10.1007/978-3-642-13013-7\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LaurL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GrothKL10, author = {Jens Groth and Aggelos Kiayias and Helger Lipmaa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Multi-query Computationally-Private Information Retrieval with Constant Communication Rate}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {107--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_7}, doi = {10.1007/978-3-642-13013-7\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GrothKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergLL10, author = {Sven Heiberg and Helger Lipmaa and Filip van Laenen}, title = {On E-Vote Integrity in the Case of Malicious Voter Computers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2010}, url = {http://eprint.iacr.org/2010/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LipmaaZ09, author = {Helger Lipmaa and Bingsheng Zhang}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {154--163}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_12}, doi = {10.1007/978-3-642-16342-5\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LipmaaZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Lipmaa09, author = {Helger Lipmaa}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {First {CPIR} Protocol with Data-Dependent Computation}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {193--210}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_14}, doi = {10.1007/978-3-642-14423-3\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Lipmaa09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/AnsperHLOL09, author = {Arne Ansper and Sven Heiberg and Helger Lipmaa and Tom Andr{\'{e}} {\O}verland and Filip van Laenen}, editor = {Audun J{\o}sang and Torleiv Maseng and Svein J. Knapskog}, title = {Security and Trust for the Norwegian E-Voting Pilot Project \emph{E-valg 2011}}, booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5838}, pages = {207--222}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04766-4\_15}, doi = {10.1007/978-3-642-04766-4\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/AnsperHLOL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa09, author = {Helger Lipmaa}, title = {First {CPIR} Protocol with Data-Dependent Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2009}, url = {http://eprint.iacr.org/2009/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaabouniLS09, author = {Rafik Chaabouni and Helger Lipmaa and Abhi Shelat}, title = {Additive Combinatorics and Discrete Logarithm Based Range Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2009}, url = {http://eprint.iacr.org/2009/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaabouniLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DesmedtLP08, author = {Yvo Desmedt and Helger Lipmaa and Duong Hieu Phan}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Hybrid Damg{\aa}rd Is CCA1-Secure under the {DDH} Assumption}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {18--30}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_2}, doi = {10.1007/978-3-540-89641-8\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DesmedtLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cie/CrescenzoL08, author = {Giovanni Di Crescenzo and Helger Lipmaa}, editor = {Arnold Beckmann and Costas Dimitracopoulos and Benedikt L{\"{o}}we}, title = {Succinct {NP} Proofs from an Extractability Assumption}, booktitle = {Logic and Theory of Algorithms, 4th Conference on Computability in Europe, CiE 2008, Athens, Greece, June 15-20, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5028}, pages = {175--185}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69407-6\_21}, doi = {10.1007/978-3-540-69407-6\_21}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/cie/CrescenzoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/CrescenzoL08, author = {Giovanni Di Crescenzo and Helger Lipmaa}, editor = {Seok{-}Hee Hong and Hiroshi Nagamochi and Takuro Fukunaga}, title = {3-Message {NP} Arguments in the {BPK} Model with Optimal Soundness and Zero-Knowledge}, booktitle = {Algorithms and Computation, 19th International Symposium, {ISAAC} 2008, Gold Coast, Australia, December 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5369}, pages = {615--627}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-92182-0\_55}, doi = {10.1007/978-3-540-92182-0\_55}, timestamp = {Thu, 27 Apr 2023 14:57:19 +0200}, biburl = {https://dblp.org/rec/conf/isaac/CrescenzoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Lipmaa08, author = {Helger Lipmaa}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {New Communication-Efficient Oblivious Transfer Protocols Based on Pairings}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {441--454}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_30}, doi = {10.1007/978-3-540-85886-7\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Lipmaa08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa08, author = {Helger Lipmaa}, title = {Private Branching Programs: On Communication-Efficient Cryptocomputing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2008}, url = {http://eprint.iacr.org/2008/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa08a, author = {Helger Lipmaa}, title = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2008}, url = {http://eprint.iacr.org/2008/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dmtcs/DumasLW07, author = {Philippe Dumas and Helger Lipmaa and Johan Wall{\'{e}}n}, title = {Asymptotic Behaviour of a Non-commutative Rational Series with a Nonnegative Linear Representation}, journal = {Discret. Math. Theor. Comput. Sci.}, volume = {9}, number = {1}, year = {2007}, url = {https://doi.org/10.46298/dmtcs.399}, doi = {10.46298/DMTCS.399}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dmtcs/DumasLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LaurL07, author = {Sven Laur and Helger Lipmaa}, editor = {Jonathan Katz and Moti Yung}, title = {A New Protocol for Conditional Disclosure of Secrets and Its Applications}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {207--225}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_14}, doi = {10.1007/978-3-540-72738-5\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LaurL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa07, author = {Helger Lipmaa}, title = {New Communication-Efficient Oblivious Transfer Protocols Based on Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2007}, url = {http://eprint.iacr.org/2007/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/LaurLM06, author = {Sven Laur and Helger Lipmaa and Taneli Mielik{\"{a}}inen}, editor = {Tina Eliassi{-}Rad and Lyle H. Ungar and Mark Craven and Dimitrios Gunopulos}, title = {Cryptographically private support vector machines}, booktitle = {Proceedings of the Twelfth {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006}, pages = {618--624}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1150402.1150477}, doi = {10.1145/1150402.1150477}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/LaurLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/AlkassarAL06, author = {Ammar Alkassar and Elena Andreeva and Helger Lipmaa}, editor = {Jana Dittmann}, title = {{SLC:} Efficient Authenticated Encryption for Short Packages}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {270--278}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24782}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/AlkassarAL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2006, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807}, doi = {10.1007/11937807}, isbn = {3-540-49608-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaurL06, author = {Sven Laur and Helger Lipmaa}, title = {On the Feasibility of Consistent Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2006}, url = {http://eprint.iacr.org/2006/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaurL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaurLM06, author = {Sven Laur and Helger Lipmaa and Taneli Mielik{\"{a}}inen}, title = {Cryptographically Private Support Vector Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2006}, url = {http://eprint.iacr.org/2006/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaurLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KasperLL06, author = {Emilia K{\"{a}}sper and Sven Laur and Helger Lipmaa}, title = {Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2006}, url = {http://eprint.iacr.org/2006/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KasperLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ElkindL05, author = {Edith Elkind and Helger Lipmaa}, editor = {Andrew S. Patrick and Moti Yung}, title = {Small Coalitions Cannot Manipulate Voting}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {285--297}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_25}, doi = {10.1007/11507840\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ElkindL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/LipmaaWB05, author = {Helger Lipmaa and Guilin Wang and Feng Bao}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {459--471}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_38}, doi = {10.1007/11523468\_38}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/LipmaaWB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLP05, author = {Yong Li and Helger Lipmaa and Dingyi Pei}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On Delegatability of Four Designated Verifier Signatures}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {61--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_6}, doi = {10.1007/11602897\_6}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LaurLM05, author = {Sven Laur and Helger Lipmaa and Taneli Mielik{\"{a}}inen}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Private Itemset Support Counting}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {97--111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_9}, doi = {10.1007/11602897\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LaurLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/ElkindL05, author = {Edith Elkind and Helger Lipmaa}, editor = {Xiaotie Deng and Ding{-}Zhu Du}, title = {Hybrid Voting Protocols and Hardness of Manipulation}, booktitle = {Algorithms and Computation, 16th International Symposium, {ISAAC} 2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3827}, pages = {206--215}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602613\_22}, doi = {10.1007/11602613\_22}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/ElkindL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Lipmaa05, author = {Helger Lipmaa}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {An Oblivious Transfer Protocol with Log-Squared Communication}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {314--328}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_23}, doi = {10.1007/11556992\_23}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Lipmaa05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaurL05, author = {Sven Laur and Helger Lipmaa}, title = {A New Protocol for Conditional Disclosure of Secrets And Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2005}, url = {http://eprint.iacr.org/2005/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaurL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ElkindL04, author = {Edith Elkind and Helger Lipmaa}, editor = {Ari Juels}, title = {Interleaving Cryptography and Mechanism Design: The Case of Online Auctions}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {117--131}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_16}, doi = {10.1007/978-3-540-27809-2\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ElkindL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LipmaaWD04, author = {Helger Lipmaa and Johan Wall{\'{e}}n and Philippe Dumas}, editor = {Bimal K. Roy and Willi Meier}, title = {On the Additive Differential Probability of Exclusive-Or}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {317--331}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_20}, doi = {10.1007/978-3-540-25937-4\_20}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LipmaaWD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GoethalsLLM04, author = {Bart Goethals and Sven Laur and Helger Lipmaa and Taneli Mielik{\"{a}}inen}, editor = {Choonsik Park and Seongtaek Chee}, title = {On Private Scalar Product Computation for Privacy-Preserving Data Mining}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {104--120}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_9}, doi = {10.1007/11496618\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GoethalsLLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AmbainisJL04, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Cryptographic Randomized Response Techniques}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {425--438}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_31}, doi = {10.1007/978-3-540-24632-9\_31}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AmbainisJL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa04, author = {Helger Lipmaa}, title = {An Oblivious Transfer Protocol with Log-Squared Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2004}, url = {http://eprint.iacr.org/2004/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lipmaa03, author = {Helger Lipmaa}, editor = {Chi{-}Sung Laih}, title = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {398--415}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_26}, doi = {10.1007/978-3-540-40061-5\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lipmaa03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lipmaa03a, author = {Helger Lipmaa}, editor = {Chi{-}Sung Laih}, title = {Verifiable Homomorphic Oblivious Transfer and Private Equality Test}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {416--433}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_27}, doi = {10.1007/978-3-540-40061-5\_27}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lipmaa03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CC-0302025, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, title = {Cryptographic Randomized Response Techniques}, journal = {CoRR}, volume = {cs.CC/0302025}, year = {2003}, url = {http://arxiv.org/abs/cs/0302025}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CC-0302025.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkindL03, author = {Edith Elkind and Helger Lipmaa}, title = {Interleaving Cryptography and Mechanism Design: The Case of Online Auctions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2003}, url = {http://eprint.iacr.org/2003/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkindL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbainisJL03, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, title = {Cryptographic Randomized Response Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2003}, url = {http://eprint.iacr.org/2003/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbainisJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa03, author = {Helger Lipmaa}, title = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2003}, url = {http://eprint.iacr.org/2003/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BuldasLL02, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa}, title = {Eliminating Counterevidence with Applications to Accountable Certificate Management}, journal = {J. Comput. Secur.}, volume = {10}, number = {3}, pages = {273--296}, year = {2002}, url = {https://doi.org/10.3233/jcs-2002-10304}, doi = {10.3233/JCS-2002-10304}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BuldasLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LipmaaAN02, author = {Helger Lipmaa and N. Asokan and Valtteri Niemi}, editor = {Matt Blaze}, title = {Secure Vickrey Auctions without Threshold Trust}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {87--101}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_7}, doi = {10.1007/3-540-36504-4\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LipmaaAN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Lipmaa02, author = {Helger Lipmaa}, editor = {Alfred Menezes and Palash Sarkar}, title = {On Differential Properties of Pseudo-Hadamard Transform and Related Mappings}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {48--61}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_5}, doi = {10.1007/3-540-36231-2\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Lipmaa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Lipmaa02, author = {Helger Lipmaa}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {Fast Software Implementations of {SC2000}}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {63--74}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_5}, doi = {10.1007/3-540-45811-5\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Lipmaa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Lipmaa02a, author = {Helger Lipmaa}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {On Optimal Hash Tree Traversal for Interval Time-Stamping}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {357--371}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_28}, doi = {10.1007/3-540-45811-5\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Lipmaa02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa02, author = {Helger Lipmaa}, title = {On Optimal Hash Tree Traversal for Interval Time-Stamping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2002}, url = {http://eprint.iacr.org/2002/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LipmaaM01, author = {Helger Lipmaa and Shiho Moriai}, editor = {Mitsuru Matsui}, title = {Efficient Algorithms for Computing Differential Properties of Addition}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {336--350}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_28}, doi = {10.1007/3-540-45473-X\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LipmaaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaM01, author = {Helger Lipmaa and Shiho Moriai}, title = {Efficient Algorithms for Computing Differential Properties of Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2001}, url = {http://eprint.iacr.org/2001/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa01, author = {Helger Lipmaa}, title = {Statistical Zero-Knowledge Proofs from Diophantine Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2001}, url = {http://eprint.iacr.org/2001/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaAN01, author = {Helger Lipmaa and N. Asokan and Valtteri Niemi}, title = {Secure Vickrey Auctions without Threshold Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2001}, url = {http://eprint.iacr.org/2001/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaAN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/AokiL00, author = {Kazumaro Aoki and Helger Lipmaa}, title = {Fast Implementations of {AES} Candidates}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {106--120}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/AokiL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BuldasLL00, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Accountable certificate management using undeniable attestations}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {9--17}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352604}, doi = {10.1145/352600.352604}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BuldasLL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BuldasLS00, author = {Ahto Buldas and Helger Lipmaa and Berry Schoenmakers}, editor = {Hideki Imai and Yuliang Zheng}, title = {Optimally Efficient Accountable Time-Stamping}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {293--305}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_20}, doi = {10.1007/978-3-540-46588-1\_20}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuldasLL00, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa}, title = {Accountable Certificate Management using Undeniable Attestations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2000}, url = {http://eprint.iacr.org/2000/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuldasLL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BuldasLLV98, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa and Jan Willemson}, editor = {Hugo Krawczyk}, title = {Time-Stamping with Binary Linking Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {486--501}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055749}, doi = {10.1007/BFB0055749}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BuldasLLV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Lipmaa98, author = {Helger Lipmaa}, editor = {Stafford E. Tavares and Henk Meijer}, title = {{IDEA:} {A} Cipher For Multimedia Architectures?}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {248--263}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_20}, doi = {10.1007/3-540-48892-8\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Lipmaa98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.