BibTeX records: Helger Lipmaa

download as .bib file

@article{DBLP:journals/iacr/LipmaaPS24,
  author       = {Helger Lipmaa and
                  Roberto Parisella and
                  Janno Siim},
  title        = {Constant-Size zk-SNARKs in {ROM} from Falsifiable Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/173},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lipmaa23,
  author       = {Helger Lipmaa},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {On Black-Box Knowledge-Sound Commit-And-Prove SNARKs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  pages        = {41--76},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5\_2},
  doi          = {10.1007/978-981-99-8724-5\_2},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lipmaa23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/LipmaaP23,
  author       = {Helger Lipmaa and
                  Roberto Parisella},
  editor       = {Abdelrahaman Aly and
                  Mehdi Tibouchi},
  title        = {Set (Non-)Membership NIZKs from Determinantal Accumulators},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference
                  on Cryptology and Information Security in Latin America, {LATINCRYPT}
                  2023, Quito, Ecuador, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14168},
  pages        = {352--374},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44469-2\_18},
  doi          = {10.1007/978-3-031-44469-2\_18},
  timestamp    = {Fri, 06 Oct 2023 18:13:29 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/LipmaaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LipmaaPS23,
  author       = {Helger Lipmaa and
                  Roberto Parisella and
                  Janno Siim},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Algebraic Group Model with Oblivious Sampling},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14372},
  pages        = {363--392},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48624-1\_14},
  doi          = {10.1007/978-3-031-48624-1\_14},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LipmaaPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa23,
  author       = {Helger Lipmaa},
  title        = {On Black-Box Knowledge-Sound Commit-And-Prove SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1416},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1416},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaPS23,
  author       = {Helger Lipmaa and
                  Roberto Parisella and
                  Janno Siim},
  title        = {Algebraic Group Model with Oblivious Sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1504},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1504},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CampanelliFFLL23,
  author       = {Matteo Campanelli and
                  Antonio Faonio and
                  Dario Fiore and
                  Tianyu Li and
                  Helger Lipmaa},
  title        = {Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge
                  Decision Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1518},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1518},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CampanelliFFLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LipmaaSZ22,
  author       = {Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Counting Vampires: From Univariate Sumcheck to Updatable {ZK-SNARK}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {249--278},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_9},
  doi          = {10.1007/978-3-031-22966-4\_9},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LipmaaSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Lipmaa22,
  author       = {Helger Lipmaa},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {A Unified Framework for Non-universal SNARKs},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {553--583},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_20},
  doi          = {10.1007/978-3-030-97121-2\_20},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Lipmaa22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaSZ22,
  author       = {Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {Counting Vampires: From Univariate Sumcheck to Updatable {ZK-SNARK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/406},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaP22,
  author       = {Helger Lipmaa and
                  Roberto Parisella},
  title        = {Set (Non-)Membership NIZKs from Determinantal Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1570},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1570},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdolmalekiLSZ21,
  author       = {Behzad Abdolmaleki and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {On Subversion-Resistant SNARKs},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {17},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09379-y},
  doi          = {10.1007/S00145-021-09379-Y},
  timestamp    = {Tue, 11 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdolmalekiLSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LipmaaP21,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Gentry-Wichs is Tight: a Falsifiable Non-adaptively Sound {SNARG}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_2},
  doi          = {10.1007/978-3-030-92078-4\_2},
  timestamp    = {Fri, 03 Dec 2021 17:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LipmaaP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CouteauLPO21,
  author       = {Geoffroy Couteau and
                  Helger Lipmaa and
                  Roberto Parisella and
                  Arne Tobias {\O}degaard},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Efficient NIZKs for Algebraic Sets},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {128--158},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_5},
  doi          = {10.1007/978-3-030-92078-4\_5},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CouteauLPO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FauziLSZO21,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac and
                  Arne Tobias {\O}degaard},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {618--649},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_21},
  doi          = {10.1007/978-3-030-92068-5\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FauziLSZO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KripsL21,
  author       = {Toomas Krips and
                  Helger Lipmaa},
  editor       = {Kenneth G. Paterson},
  title        = {More Efficient Shuffle Argument from Unique Factorization},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {252--275},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_11},
  doi          = {10.1007/978-3-030-75539-3\_11},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KripsL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FauziLPS21,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Zaira Pindado and
                  Janno Siim},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Somewhere Statistically Binding Commitment Schemes with Applications},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  pages        = {436--456},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8\_21},
  doi          = {10.1007/978-3-662-64322-8\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/FauziLPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AbdolmalekiKL21,
  author       = {Behzad Abdolmaleki and
                  Hamidreza Khoshakhlagh and
                  Helger Lipmaa},
  editor       = {Avishek Adhikari and
                  Ralf K{\"{u}}sters and
                  Bart Preneel},
  title        = {Smooth Zero-Knowledge Hash Functions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference
                  on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13143},
  pages        = {510--535},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92518-5\_23},
  doi          = {10.1007/978-3-030-92518-5\_23},
  timestamp    = {Mon, 13 Dec 2021 16:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AbdolmalekiKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KripsL21,
  author       = {Toomas Krips and
                  Helger Lipmaa},
  title        = {More Efficient Shuffle Argument from Unique Factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/438},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KripsL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiKL21,
  author       = {Behzad Abdolmaleki and
                  Hamidreza Khoshakhlagh and
                  Helger Lipmaa},
  title        = {Smooth Zero-Knowledge Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/653},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaP21,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  title        = {Succinct Functional Commitment for a Large Class of Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/932},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauLPO21,
  author       = {Geoffroy Couteau and
                  Helger Lipmaa and
                  Roberto Parisella and
                  Arne Tobias {\O}degaard},
  title        = {Efficient NIZKs for Algebraic Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1251},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1251},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauLPO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziLSZO21,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac and
                  Arne Tobias {\O}degaard},
  title        = {Verifiably-Extractable OWFs and Their Applications to Subversion Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1264},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1264},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziLSZO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa21,
  author       = {Helger Lipmaa},
  title        = {A Unified Framework for Non-Universal SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1700},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1700},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LipmaaP20,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Succinct Functional Commitment for a Large Class of Arithmetic Circuits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {686--716},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_23},
  doi          = {10.1007/978-3-030-64840-4\_23},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LipmaaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdolmalekiLS020,
  author       = {Behzad Abdolmaleki and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {On {QA-NIZK} in the {BPK} Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {590--620},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_20},
  doi          = {10.1007/978-3-030-45374-9\_20},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdolmalekiLS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Lipmaa20,
  author       = {Helger Lipmaa},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Key-and-Argument-Updatable QA-NIZKs},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {645--669},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_32},
  doi          = {10.1007/978-3-030-57990-6\_32},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Lipmaa20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziLPS20,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Zaira Pindado and
                  Janno Siim},
  title        = {Somewhere Statistically Binding Commitment Schemes with Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/652},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziLPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiLSZ20,
  author       = {Behzad Abdolmaleki and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {On Subversion-Resistant SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/668},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiLSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbdolmalekiBLS019,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {DL-Extractable UC-Commitment Schemes},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {385--405},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_19},
  doi          = {10.1007/978-3-030-21568-2\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AbdolmalekiBLS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AbdolmalekiBLS019,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  editor       = {Johannes Buchmann and
                  Abderrahmane Nitaj and
                  Tajje{-}eddine Rachidi},
  title        = {UC-Secure {CRS} Generation for SNARKs},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
                  on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11627},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23696-0\_6},
  doi          = {10.1007/978-3-030-23696-0\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AbdolmalekiBLS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiBLSZ19,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {DL-Extractable UC-Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa19,
  author       = {Helger Lipmaa},
  title        = {Key-and-Argument-Updatable QA-NIZKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiBLSZ19a,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {UC-Secure {CRS} Generation for SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLSZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa19a,
  author       = {Helger Lipmaa},
  title        = {Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable
                  ZK-SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/612},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KiayiasKLS018,
  author       = {Aggelos Kiayias and
                  Annabell Kuldmaa and
                  Helger Lipmaa and
                  Janno Siim and
                  Thomas Zacharias},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {On the Security Properties of e-Voting Bulletin Boards},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {505--523},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_27},
  doi          = {10.1007/978-3-319-98113-0\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/KiayiasKLS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasKLSZ18,
  author       = {Aggelos Kiayias and
                  Annabell Kuldmaa and
                  Helger Lipmaa and
                  Janno Siim and
                  Thomas Zacharias},
  title        = {On the Security Properties of e-Voting Bulletin Boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasKLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiLSZ18,
  author       = {Behzad Abdolmaleki and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {On {QA-NIZK} in the {BPK} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {877},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/877},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Lipmaa17,
  author       = {Helger Lipmaa},
  title        = {Prover-efficient commit-and-prove zero-knowledge SNARKs},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {344--362},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010328},
  doi          = {10.1504/IJACT.2017.10010328},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Lipmaa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdolmalekiBL017,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Michal Zajac},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {A Subversion-Resistant {SNARK}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_1},
  doi          = {10.1007/978-3-319-70700-6\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdolmalekiBL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FauziLS017,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {An Efficient Pairing-Based Shuffle Argument},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {97--127},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_4},
  doi          = {10.1007/978-3-319-70697-9\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FauziLS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Lipmaa17,
  author       = {Helger Lipmaa},
  editor       = {Aggelos Kiayias},
  title        = {Optimally Sound Sigma Protocols Under {DCRA}},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {182--203},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_10},
  doi          = {10.1007/978-3-319-70972-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Lipmaa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LipmaaP17,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  editor       = {Aggelos Kiayias},
  title        = {A Simpler Rate-Optimal {CPIR} Protocol},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {621--638},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_35},
  doi          = {10.1007/978-3-319-70972-7\_35},
  timestamp    = {Tue, 02 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/LipmaaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BenhamoudaBL17,
  author       = {Fabrice Benhamouda and
                  Florian Bourse and
                  Helger Lipmaa},
  editor       = {Serge Fehr},
  title        = {CCA-Secure Inner-Product Functional Encryption from Projective Hash
                  Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {36--66},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_2},
  doi          = {10.1007/978-3-662-54388-7\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BenhamoudaBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2017,
  editor       = {Helger Lipmaa and
                  Aikaterini Mitrokotsa and
                  Raimundas Matulevicius},
  title        = {Secure {IT} Systems - 22nd Nordic Conference, NordSec 2017, Tartu,
                  Estonia, November 8-10, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10674},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70290-2},
  doi          = {10.1007/978-3-319-70290-2},
  isbn         = {978-3-319-70289-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBL17,
  author       = {Fabrice Benhamouda and
                  Florian Bourse and
                  Helger Lipmaa},
  title        = {CCA-Secure Inner-Product Functional Encryption from Projective Hash
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiBLZ17,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Helger Lipmaa and
                  Michal Zajac},
  title        = {A Subversion-Resistant {SNARK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiBLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa17,
  author       = {Helger Lipmaa},
  title        = {Optimally Sound Sigma Protocols Under {DCRA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaP17,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  title        = {A Simpler Rate-Optimal {CPIR} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziLS017,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {An Efficient Pairing-Based Shuffle Argument},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/894},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziLS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Lipmaa16,
  author       = {Helger Lipmaa},
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Prover-Efficient Commit-and-Prove Zero-Knowledge SNARKs},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1\_10},
  doi          = {10.1007/978-3-319-31517-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Lipmaa16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FauziLZ16,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Michal Zajac},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {A Shuffle Argument Secure in the Generic Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {841--872},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_28},
  doi          = {10.1007/978-3-662-53890-6\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FauziLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FauziL16,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa},
  editor       = {Kazue Sako},
  title        = {Efficient Culpably Sound {NIZK} Shuffle Argument Without Random Oracles},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {200--216},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_12},
  doi          = {10.1007/978-3-319-29485-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FauziL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaMS16,
  author       = {Helger Lipmaa and
                  Payman Mohassel and
                  Seyed Saeed Sadeghian},
  title        = {Valiant's Universal Circuit: Improvements, Implementation, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziL016,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Michal Zajac},
  title        = {A Shuffle Argument Secure in the Generic Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {866},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/866},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KiayiasLLPT15,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Helger Lipmaa and
                  Kateryna Pavlyk and
                  Qiang Tang},
  title        = {Optimal Rate Private Information Retrieval from Homomorphic Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2015},
  number       = {2},
  pages        = {222--243},
  year         = {2015},
  url          = {https://doi.org/10.1515/popets-2015-0016},
  doi          = {10.1515/POPETS-2015-0016},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/KiayiasLLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LipmaaP15,
  author       = {Helger Lipmaa and
                  Kateryna Pavlyk},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {Analysis and Implementation of an Efficient Ring-LPN Based Commitment
                  Scheme},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_12},
  doi          = {10.1007/978-3-319-26823-1\_12},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/LipmaaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KiayiasLLPT15,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Helger Lipmaa and
                  Kateryna Pavlyk and
                  Qiang Tang},
  editor       = {Kaisa Nyberg},
  title        = {Communication Optimal Tardos-Based Asymmetric Fingerprinting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {469--486},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_25},
  doi          = {10.1007/978-3-319-16715-2\_25},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KiayiasLLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziL15,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa},
  title        = {Efficient Culpably Sound {NIZK} Shuffle Argument without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1112},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FauziLZ14,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Bingsheng Zhang},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient Non-Interactive Zero Knowledge Arguments for Set Operations},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_14},
  doi          = {10.1007/978-3-662-45472-5\_14},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/FauziLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcta/LipmaaS14,
  author       = {Helger Lipmaa and
                  Vitaly Skachek},
  editor       = {Raquel Pinto and
                  Paula Rocha Malonek and
                  Paolo Vettori},
  title        = {Linear Batch Codes},
  booktitle    = {Coding Theory and Applications, 4th International Castle Meeting,
                  {ICMCTA} 2014, Palmela Castle, Portugal, September 15-18, 2014},
  series       = {{CIM} Series in Mathematical Sciences},
  volume       = {3},
  pages        = {245--253},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17296-5\_26},
  doi          = {10.1007/978-3-319-17296-5\_26},
  timestamp    = {Wed, 23 Aug 2017 10:30:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcta/LipmaaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Lipmaa14,
  author       = {Helger Lipmaa},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Efficient {NIZK} Arguments via Parallel Verification of Benes Networks},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {416--434},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_24},
  doi          = {10.1007/978-3-319-10879-7\_24},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Lipmaa14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LipmaaS14,
  author       = {Helger Lipmaa and
                  Vitaly Skachek},
  title        = {Linear Batch Codes},
  journal      = {CoRR},
  volume       = {abs/1404.2796},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.2796},
  eprinttype    = {arXiv},
  eprint       = {1404.2796},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LipmaaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziLZ14,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Bingsheng Zhang},
  title        = {Efficient Non-Interactive Zero Knowledge Arguments for Set Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa14,
  author       = {Helger Lipmaa},
  title        = {A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart
                  Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa14a,
  author       = {Helger Lipmaa},
  title        = {Almost Optimal Short Adaptive Non-Interactive Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLLPT14,
  author       = {Aggelos Kiayias and
                  Nikos Leonardos and
                  Helger Lipmaa and
                  Kateryna Pavlyk and
                  Qiang Tang},
  title        = {Near Optimal Rate Homomorphic Encryption for Branching Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLLPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LipmaaZ13,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  title        = {A more efficient computationally sound non-interactive zero-knowledge
                  shuffle argument},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {685--719},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130478},
  doi          = {10.3233/JCS-130478},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LipmaaZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lipmaa13,
  author       = {Helger Lipmaa},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Succinct Non-Interactive Zero Knowledge Arguments from Span Programs
                  and Linear Error-Correcting Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_3},
  doi          = {10.1007/978-3-642-42033-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lipmaa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FauziLZ13,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Bingsheng Zhang},
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {Efficient Modular {NIZK} Arguments from Shift and Product},
  booktitle    = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  pages        = {92--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5\_6},
  doi          = {10.1007/978-3-319-02937-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/FauziLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhangLWR13,
  author       = {Bingsheng Zhang and
                  Helger Lipmaa and
                  Cong Wang and
                  Kui Ren},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Practical Fully Simulatable Oblivious Transfer with Sublinear Communication},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_8},
  doi          = {10.1007/978-3-642-39884-1\_8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ZhangLWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LipmaaT13,
  author       = {Helger Lipmaa and
                  Tomas Toft},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {Secure Equality and Greater-Than Tests with Sublinear Online Complexity},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7966},
  pages        = {645--656},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39212-2\_56},
  doi          = {10.1007/978-3-642-39212-2\_56},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LipmaaT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa13,
  author       = {Helger Lipmaa},
  title        = {Succinct Non-Interactive Zero Knowledge Arguments from Span Programs
                  and Linear Error-Correcting Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Lipmaa12,
  author       = {Helger Lipmaa},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Secure Accumulators from Euclidean Rings without Trusted Setup},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {224--240},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_14},
  doi          = {10.1007/978-3-642-31284-7\_14},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Lipmaa12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChaabouniLZ12,
  author       = {Rafik Chaabouni and
                  Helger Lipmaa and
                  Bingsheng Zhang},
  editor       = {Angelos D. Keromytis},
  title        = {A Non-interactive Range Proof with Constant Communication},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {179--199},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_14},
  doi          = {10.1007/978-3-642-32946-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChaabouniLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LipmaaZ12,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge
                  Shuffle Argument},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {477--502},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_27},
  doi          = {10.1007/978-3-642-32928-9\_27},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LipmaaZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Lipmaa12,
  author       = {Helger Lipmaa},
  editor       = {Ronald Cramer},
  title        = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive
                  Zero-Knowledge Arguments},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {169--189},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_10},
  doi          = {10.1007/978-3-642-28914-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Lipmaa12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2011,
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32747-6},
  doi          = {10.1007/978-3-642-32747-6},
  isbn         = {978-3-642-32746-9},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaZ12,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  title        = {New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And
                  Range Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa11,
  author       = {Helger Lipmaa},
  title        = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive
                  Zero-Knowledge Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa11a,
  author       = {Helger Lipmaa},
  title        = {Two Simple Code-Verification Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaZ11,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  title        = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge
                  Shuffle Argument},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChaabouniLS10,
  author       = {Rafik Chaabouni and
                  Helger Lipmaa and
                  Abhi Shelat},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Additive Combinatorics and Discrete Logarithm Based Range Protocols},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {336--351},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_21},
  doi          = {10.1007/978-3-642-14081-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChaabouniLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LipmaaZ10,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Two New Efficient PIR-Writing Protocols},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {438--455},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_26},
  doi          = {10.1007/978-3-642-13708-2\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LipmaaZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Lipmaa10,
  author       = {Helger Lipmaa},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_2},
  doi          = {10.1007/978-3-642-21518-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Lipmaa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeibergLL10,
  author       = {Sven Heiberg and
                  Helger Lipmaa and
                  Filip van Laenen},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {On E-Vote Integrity in the Case of Malicious Voter Computers},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {373--388},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_23},
  doi          = {10.1007/978-3-642-15497-3\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HeibergLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaurL10,
  author       = {Sven Laur and
                  Helger Lipmaa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {On the Feasibility of Consistent Computations},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {88--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_6},
  doi          = {10.1007/978-3-642-13013-7\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LaurL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GrothKL10,
  author       = {Jens Groth and
                  Aggelos Kiayias and
                  Helger Lipmaa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Multi-query Computationally-Private Information Retrieval with Constant
                  Communication Rate},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_7},
  doi          = {10.1007/978-3-642-13013-7\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GrothKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergLL10,
  author       = {Sven Heiberg and
                  Helger Lipmaa and
                  Filip van Laenen},
  title        = {On E-Vote Integrity in the Case of Malicious Voter Computers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LipmaaZ09,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Efficient Generalized Selective Private Function Evaluation with Applications
                  in Biometric Authentication},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {154--163},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_12},
  doi          = {10.1007/978-3-642-16342-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LipmaaZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Lipmaa09,
  author       = {Helger Lipmaa},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {First {CPIR} Protocol with Data-Dependent Computation},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_14},
  doi          = {10.1007/978-3-642-14423-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Lipmaa09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/AnsperHLOL09,
  author       = {Arne Ansper and
                  Sven Heiberg and
                  Helger Lipmaa and
                  Tom Andr{\'{e}} {\O}verland and
                  Filip van Laenen},
  editor       = {Audun J{\o}sang and
                  Torleiv Maseng and
                  Svein J. Knapskog},
  title        = {Security and Trust for the Norwegian E-Voting Pilot Project \emph{E-valg
                  2011}},
  booktitle    = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
                  Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5838},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04766-4\_15},
  doi          = {10.1007/978-3-642-04766-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/AnsperHLOL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa09,
  author       = {Helger Lipmaa},
  title        = {First {CPIR} Protocol with Data-Dependent Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaabouniLS09,
  author       = {Rafik Chaabouni and
                  Helger Lipmaa and
                  Abhi Shelat},
  title        = {Additive Combinatorics and Discrete Logarithm Based Range Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaabouniLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DesmedtLP08,
  author       = {Yvo Desmedt and
                  Helger Lipmaa and
                  Duong Hieu Phan},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Hybrid Damg{\aa}rd Is CCA1-Secure under the {DDH} Assumption},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_2},
  doi          = {10.1007/978-3-540-89641-8\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DesmedtLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cie/CrescenzoL08,
  author       = {Giovanni Di Crescenzo and
                  Helger Lipmaa},
  editor       = {Arnold Beckmann and
                  Costas Dimitracopoulos and
                  Benedikt L{\"{o}}we},
  title        = {Succinct {NP} Proofs from an Extractability Assumption},
  booktitle    = {Logic and Theory of Algorithms, 4th Conference on Computability in
                  Europe, CiE 2008, Athens, Greece, June 15-20, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5028},
  pages        = {175--185},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69407-6\_21},
  doi          = {10.1007/978-3-540-69407-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/cie/CrescenzoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/CrescenzoL08,
  author       = {Giovanni Di Crescenzo and
                  Helger Lipmaa},
  editor       = {Seok{-}Hee Hong and
                  Hiroshi Nagamochi and
                  Takuro Fukunaga},
  title        = {3-Message {NP} Arguments in the {BPK} Model with Optimal Soundness
                  and Zero-Knowledge},
  booktitle    = {Algorithms and Computation, 19th International Symposium, {ISAAC}
                  2008, Gold Coast, Australia, December 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5369},
  pages        = {615--627},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-92182-0\_55},
  doi          = {10.1007/978-3-540-92182-0\_55},
  timestamp    = {Thu, 27 Apr 2023 14:57:19 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/CrescenzoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Lipmaa08,
  author       = {Helger Lipmaa},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {New Communication-Efficient Oblivious Transfer Protocols Based on
                  Pairings},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_30},
  doi          = {10.1007/978-3-540-85886-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Lipmaa08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa08,
  author       = {Helger Lipmaa},
  title        = {Private Branching Programs: On Communication-Efficient Cryptocomputing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa08a,
  author       = {Helger Lipmaa},
  title        = {On the CCA1-Security of Elgamal and Damg{\aa}rd's Elgamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dmtcs/DumasLW07,
  author       = {Philippe Dumas and
                  Helger Lipmaa and
                  Johan Wall{\'{e}}n},
  title        = {Asymptotic Behaviour of a Non-commutative Rational Series with a Nonnegative
                  Linear Representation},
  journal      = {Discret. Math. Theor. Comput. Sci.},
  volume       = {9},
  number       = {1},
  year         = {2007},
  url          = {https://doi.org/10.46298/dmtcs.399},
  doi          = {10.46298/DMTCS.399},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dmtcs/DumasLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LaurL07,
  author       = {Sven Laur and
                  Helger Lipmaa},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {A New Protocol for Conditional Disclosure of Secrets and Its Applications},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {207--225},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_14},
  doi          = {10.1007/978-3-540-72738-5\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LaurL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa07,
  author       = {Helger Lipmaa},
  title        = {New Communication-Efficient Oblivious Transfer Protocols Based on
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/LaurLM06,
  author       = {Sven Laur and
                  Helger Lipmaa and
                  Taneli Mielik{\"{a}}inen},
  editor       = {Tina Eliassi{-}Rad and
                  Lyle H. Ungar and
                  Mark Craven and
                  Dimitrios Gunopulos},
  title        = {Cryptographically private support vector machines},
  booktitle    = {Proceedings of the Twelfth {ACM} {SIGKDD} International Conference
                  on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August
                  20-23, 2006},
  pages        = {618--624},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1150402.1150477},
  doi          = {10.1145/1150402.1150477},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/LaurLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/AlkassarAL06,
  author       = {Ammar Alkassar and
                  Elena Andreeva and
                  Helger Lipmaa},
  editor       = {Jana Dittmann},
  title        = {{SLC:} Efficient Authenticated Encryption for Short Packages},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {270--278},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24782},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/AlkassarAL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2006,
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807},
  doi          = {10.1007/11937807},
  isbn         = {3-540-49608-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurL06,
  author       = {Sven Laur and
                  Helger Lipmaa},
  title        = {On the Feasibility of Consistent Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurLM06,
  author       = {Sven Laur and
                  Helger Lipmaa and
                  Taneli Mielik{\"{a}}inen},
  title        = {Cryptographically Private Support Vector Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KasperLL06,
  author       = {Emilia K{\"{a}}sper and
                  Sven Laur and
                  Helger Lipmaa},
  title        = {Black-Box Knowledge Extraction Revisited: Universal Approach with
                  Precise Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KasperLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ElkindL05,
  author       = {Edith Elkind and
                  Helger Lipmaa},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Small Coalitions Cannot Manipulate Voting},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_25},
  doi          = {10.1007/11507840\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ElkindL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/LipmaaWB05,
  author       = {Helger Lipmaa and
                  Guilin Wang and
                  Feng Bao},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Designated Verifier Signature Schemes: Attacks, New Security Notions
                  and a New Construction},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {459--471},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_38},
  doi          = {10.1007/11523468\_38},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/LipmaaWB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiLP05,
  author       = {Yong Li and
                  Helger Lipmaa and
                  Dingyi Pei},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {On Delegatability of Four Designated Verifier Signatures},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {61--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_6},
  doi          = {10.1007/11602897\_6},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LaurLM05,
  author       = {Sven Laur and
                  Helger Lipmaa and
                  Taneli Mielik{\"{a}}inen},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Private Itemset Support Counting},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_9},
  doi          = {10.1007/11602897\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LaurLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/ElkindL05,
  author       = {Edith Elkind and
                  Helger Lipmaa},
  editor       = {Xiaotie Deng and
                  Ding{-}Zhu Du},
  title        = {Hybrid Voting Protocols and Hardness of Manipulation},
  booktitle    = {Algorithms and Computation, 16th International Symposium, {ISAAC}
                  2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3827},
  pages        = {206--215},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602613\_22},
  doi          = {10.1007/11602613\_22},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/ElkindL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Lipmaa05,
  author       = {Helger Lipmaa},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {An Oblivious Transfer Protocol with Log-Squared Communication},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {314--328},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_23},
  doi          = {10.1007/11556992\_23},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Lipmaa05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurL05,
  author       = {Sven Laur and
                  Helger Lipmaa},
  title        = {A New Protocol for Conditional Disclosure of Secrets And Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ElkindL04,
  author       = {Edith Elkind and
                  Helger Lipmaa},
  editor       = {Ari Juels},
  title        = {Interleaving Cryptography and Mechanism Design: The Case of Online
                  Auctions},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_16},
  doi          = {10.1007/978-3-540-27809-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ElkindL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LipmaaWD04,
  author       = {Helger Lipmaa and
                  Johan Wall{\'{e}}n and
                  Philippe Dumas},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {On the Additive Differential Probability of Exclusive-Or},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {317--331},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_20},
  doi          = {10.1007/978-3-540-25937-4\_20},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LipmaaWD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GoethalsLLM04,
  author       = {Bart Goethals and
                  Sven Laur and
                  Helger Lipmaa and
                  Taneli Mielik{\"{a}}inen},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On Private Scalar Product Computation for Privacy-Preserving Data
                  Mining},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {104--120},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_9},
  doi          = {10.1007/11496618\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GoethalsLLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AmbainisJL04,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Cryptographic Randomized Response Techniques},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {425--438},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_31},
  doi          = {10.1007/978-3-540-24632-9\_31},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AmbainisJL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa04,
  author       = {Helger Lipmaa},
  title        = {An Oblivious Transfer Protocol with Log-Squared Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lipmaa03,
  author       = {Helger Lipmaa},
  editor       = {Chi{-}Sung Laih},
  title        = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {398--415},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_26},
  doi          = {10.1007/978-3-540-40061-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lipmaa03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Lipmaa03a,
  author       = {Helger Lipmaa},
  editor       = {Chi{-}Sung Laih},
  title        = {Verifiable Homomorphic Oblivious Transfer and Private Equality Test},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {416--433},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_27},
  doi          = {10.1007/978-3-540-40061-5\_27},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Lipmaa03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CC-0302025,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  title        = {Cryptographic Randomized Response Techniques},
  journal      = {CoRR},
  volume       = {cs.CC/0302025},
  year         = {2003},
  url          = {http://arxiv.org/abs/cs/0302025},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CC-0302025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkindL03,
  author       = {Edith Elkind and
                  Helger Lipmaa},
  title        = {Interleaving Cryptography and Mechanism Design: The Case of Online
                  Auctions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkindL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbainisJL03,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  title        = {Cryptographic Randomized Response Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbainisJL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa03,
  author       = {Helger Lipmaa},
  title        = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BuldasLL02,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Helger Lipmaa},
  title        = {Eliminating Counterevidence with Applications to Accountable Certificate
                  Management},
  journal      = {J. Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {273--296},
  year         = {2002},
  url          = {https://doi.org/10.3233/jcs-2002-10304},
  doi          = {10.3233/JCS-2002-10304},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BuldasLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LipmaaAN02,
  author       = {Helger Lipmaa and
                  N. Asokan and
                  Valtteri Niemi},
  editor       = {Matt Blaze},
  title        = {Secure Vickrey Auctions without Threshold Trust},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_7},
  doi          = {10.1007/3-540-36504-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LipmaaAN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Lipmaa02,
  author       = {Helger Lipmaa},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {On Differential Properties of Pseudo-Hadamard Transform and Related
                  Mappings},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {48--61},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_5},
  doi          = {10.1007/3-540-36231-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Lipmaa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Lipmaa02,
  author       = {Helger Lipmaa},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {Fast Software Implementations of {SC2000}},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {63--74},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_5},
  doi          = {10.1007/3-540-45811-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Lipmaa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Lipmaa02a,
  author       = {Helger Lipmaa},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {On Optimal Hash Tree Traversal for Interval Time-Stamping},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_28},
  doi          = {10.1007/3-540-45811-5\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Lipmaa02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa02,
  author       = {Helger Lipmaa},
  title        = {On Optimal Hash Tree Traversal for Interval Time-Stamping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LipmaaM01,
  author       = {Helger Lipmaa and
                  Shiho Moriai},
  editor       = {Mitsuru Matsui},
  title        = {Efficient Algorithms for Computing Differential Properties of Addition},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {336--350},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_28},
  doi          = {10.1007/3-540-45473-X\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LipmaaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaM01,
  author       = {Helger Lipmaa and
                  Shiho Moriai},
  title        = {Efficient Algorithms for Computing Differential Properties of Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa01,
  author       = {Helger Lipmaa},
  title        = {Statistical Zero-Knowledge Proofs from Diophantine Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaAN01,
  author       = {Helger Lipmaa and
                  N. Asokan and
                  Valtteri Niemi},
  title        = {Secure Vickrey Auctions without Threshold Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaAN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/AokiL00,
  author       = {Kazumaro Aoki and
                  Helger Lipmaa},
  title        = {Fast Implementations of {AES} Candidates},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {106--120},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/AokiL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BuldasLL00,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Helger Lipmaa},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Accountable certificate management using undeniable attestations},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {9--17},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352604},
  doi          = {10.1145/352600.352604},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BuldasLL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BuldasLS00,
  author       = {Ahto Buldas and
                  Helger Lipmaa and
                  Berry Schoenmakers},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Optimally Efficient Accountable Time-Stamping},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {293--305},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_20},
  doi          = {10.1007/978-3-540-46588-1\_20},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuldasLL00,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Helger Lipmaa},
  title        = {Accountable Certificate Management using Undeniable Attestations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuldasLL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BuldasLLV98,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Helger Lipmaa and
                  Jan Willemson},
  editor       = {Hugo Krawczyk},
  title        = {Time-Stamping with Binary Linking Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {486--501},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055749},
  doi          = {10.1007/BFB0055749},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BuldasLLV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Lipmaa98,
  author       = {Helger Lipmaa},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {{IDEA:} {A} Cipher For Multimedia Architectures?},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_20},
  doi          = {10.1007/3-540-48892-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Lipmaa98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics