Publications
2020
- Anagreh, M., Vainikko, E., Laud, P. Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM. The International Conference on Information Systems Security and Privacy, ICISSP 2021
- Belluccini, S., De Nicola, R., Dumas, M., Pullonen, P., Re, B., Tiezzi, F. Verification of privacy-enhanced collaborations. FORMALISE 2020 8th Conference on Formal Methods in Software Engineering, May 25-26 2020, Seoul, South Korea. ACM Digital Library
- Bogdanov, D., Siil, T. Infotehnoloogilised võimalused põhiõiguste kaitsel. Juridica, 2020/6, lk 474-481. Tartu Ülikool (PDF)
- Eerikson, H., Keller, M., Orlandi, C., Pullonen, P., Puura, J., Simkin, M. Use your Brain! Arithmetic 3PC For Any Modulus with Active Security. 1st Conference on Information-Theoretic Cryptography (ITC 2020) (PDF, DOI)
- Fatima, I., Malik, S.U. R., Anjum, A., Ahmad, N. Cyber Physical Systems and IoT: Architectural Practices, Interoperability, and Transformation. IT Professional, Volume: 22 , Issue: 3 , May-June 1 2020 (PDF, DOI)
- Heiberg, S., Krips, K., Willemson, J. Planning the next steps for Estonian Internet voting. In Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ardita Driza Maurer, David Dueñas-Cid, Stéphane Glondu, Iuliia Krivonosova, Oksana Kulyk, Ralf Küsters, Beata Martin-Rozumilowicz, Peter Rønne, Mihkel Solvak, Oliver Spycher, Proceedings of the Fifth International Joint Conference on Electronic Voting, E-Vote-ID 2020. TALTECH Press 2020, pp. 82-97.
- Khan, R., Tao, X., Anjum, A., Kanwal, T., Malik, S.U.R., Khan, A., Rehman, W., Maple, C. θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records. Electronics 2020, Volume 9, Issue 5, 716 (PDF, DOI)
- Khan, R., Tao, X., Anjum, A., Sajjad, H., Malik, S.U.R., Khan, A., Amiri, F. Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity. Hindawi Wireless Communications and Mobile Computing Volume 2020, Article ID 8416823, 18 pages (DOI)
- Khan, O.A., Malik, S.U. R., Baig, F.M., Islam, S.U., Pervaiz, H., Malik, H., Ahmed, S.A. A Cache-Based Approach Towards Improved Scheduling in Fog Computing. Journal of Software: Practice and Experience, 12.04.2020 (PDF, DOI)
- Malik, S.U.R. Moving Toward 5G: Significance, Differences, and Impact on Quality of Experience (QoE). IEEE Consumer Electronics Magazine (Early Access) (PDF, DOI)
- Malik, S.U. R., Akram, H., Gill, S.S., Pervaiz, H., Malik, H. EFFORT : Energy efficient framework for offload communication in mobile cloud computing. Journal of Software: Practice and Experience, 31.05.2020 (PDF, DOI)
- Oruaas, M., Willemson, J. Developing requirements for the new encryption mechanisms in the Estonian eID infrastructure. Keynote paper at Baltic DB&IS 2020. Communications in Computer and Information Science vol. 1243, pp. 13-20, Springer 2020.
- Shahid, F., Khan, A., Malik, S.U.R., Choo, K.K.R. WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger. Information Sciences Volume 539, October 2020, Pages 229-249 (DOI)
- Saleem, A., Khan, A., Malik, S.U.R., Pervaiz, H., Malik, H., Alam, M., Jindal, A. FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet of Things Journal Volume: 7 , Issue: 7 , July 2020 (PDF, DOI)
2019
- Ahmed, I., Khan, A., Ahmed, M., Malik, S.U.R. Order preserving secure provenance scheme for distributed networks. Computers & Security, vol. 82, 2019, pp: 99-117. (DOI)
- Anagreh, M., Vainikko, E., Laud, P. Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing. 1: the 5th International Conference on Information Systems Security and Privacy,February 23-25, 2019, in Prague, Czech Republic. Ed. Paolo Mori; Steven Furnell; and Olivier Camp. Citepress Digital Library , 238−245. (PDF, DOI)
- Anjum, A., Farooq, N., Malik, S.U.R., Khan, A., Ahmed, M., Gohar, M. An effective privacy preserving mechanism for 1: M microdata with high utility. Sustainable cities and society, vol. 45, 2019.(DOI)
- Akbar, S., Malik, S.U.R., Khan, S.U., Choo, R., Anjum, A., Ahmad, N. A Game-based Thermal-aware Resource Allocation Strategy for Data Centers. IEEE Transactions on Cloud Computing, Feb 14, 2019. (DOI).
- Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., Trujillo-Rasua, R. Attribute Evaluation on Attack Trees with Incomplete Information. Computers & Security, 88, 101630, 1−17.10.1016/j.cose.2019.101630. (PDF, DOI)
- Dumas, M., Garcı́a-Bañuelos, L., Laud, P. Disclosure Analysis of SQL Workflows. Proceedings of GraMSec 2018 The Fifth International Workshop on Graphical Models for Security: GraMSec 2018 The Fifth International Workshop on Graphical Models for Security. Oxford, UK. July 8, 2018. Springer,. (DOI)
- Ghosh, A., Khalid, O., Rais, R.N.B., Rehman, A., Malik, S.U.R., Khan, I.A. Data offloading in IoT environments: modeling, analysis, and verification. EURASIP Journal on Wireless Communications and Networking, Mar. 2019. (DOI).
- Krips, K., Willemson, J., Värv, S-S. Is your vote overhead? A new scalable side-channel attack against paper voting. In 4th IEEE European Symposium on Security and Privacy, June 17-19, 2019, Stockholm, Sweden, IEEE, pp. 621-634.
- Krips K., Willemson J. On Practical Aspects of Coercion-Resistant Remote Voting Systems. In: Krimmer R. et al. (eds) Electronic Voting. E-Vote-ID 2019. Lecture Notes in Computer Science, vol 11759. Springer, Cham (DOI)
- Pullonen, P., Tom, J., Matulevičius, R., Toots, A. Privacy-enhanced BPMN: enabling data privacy analysis in business processes models. Software & Systems Modeling, Springer 2019. (DOI)
- Toots, A., Tuuling, R., Yerokhin, M., Dumas, M., García-Bañuelos, L., Laud, P., Matulevičius, R., Pankova, A., Pettai, M., Pullonen, P., Tom, J. Business Process Privacy Analysis in Pleak. In: R. Hahnle and W. van der Aalst (Ed.). Fundamental Approaches to Software Engineering (306−312). Springer Nature Switzerland AG. (Lecture Notes in Computer Science). (PDF, DOI, Extended abstract)
- Willemson, J. How not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application. In Computer Security (CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019, 26-27 September, 2019, Luxembourg), Lecture Notes in Computer Science, volume 11980, pp. 111-121, Springer 2020.
2018
- Archer, D.W., Bogdanov, D., Lindell, Y., Kamm, L., Nielsen, K., Pagter, J.I., Smart, N.P. Wright, R. N. (2018). From Keys to Databases – Real-World Applications of Secure Multi-Party Computation. The Computer Journal. (PDF, DOI)
- Bogdanov, D., Kamm, L., Laur, S., Sokk, V. Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data. IEEE / ACM Transactions on Computational Biology and Bioinformatics, 1−8. (DOI)
- Buldas, A., Laanoja, R., Truu, A. A Blockchain-Assisted Hash-Based Signature Scheme. Secure IT Systems: 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Ed. Gruschka, Nils. Cham: Springer, 138−153. (DOI)
- Dumas M., García-Bañuelos L., Laud P. Disclosure Analysis of SQL Workflows. In: Cybenko G., Pym D., Fila B. (eds) Graphical Models for Security. GraMSec 2018. Lecture Notes in Computer Science, vol 11086. Springer, Cham. (DOI)
- Heiberg, S., Kubjas, I., Siim, J., Willemson, J. On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 259-276.
- Krips, K., Kubjas, I., Willemson, J. An Internet Voting Protocol with Distributed Verification Receipt Generation. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, David Duenas-Cid, Rajeev Goré, Manik Hapsara, Reto Koenig, Steven Martin, Ronan McDermott, Peter Roenne, Uwe Serdült, Tomasz Truderung, editors, proceedings of the Third International Joint Conference on Electronic Voting E-Vote-ID 2018, 2–5 October 2018, Lochau/Bregenz, Austria, TUT press, pp. 128-146
- Krips, K., Willemson, J., Värv, S. Implementing an audio side channel for paper voting. In Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült, David Duenas-Cid, editors, Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings, Springer LNCS, volume 11143, pp. 132-145. (DOI)
- Laud, P., Pankova, A. Bit Decomposition Protocols in Secure Multiparty Computation. Proceedings of WAHC 2018 – 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, January 2018 Pages 37–48. (DOI)
- Laud, P., Pankova, A. Privacy-preserving record linkage in large databases using secure multiparty computation. BMC Medical Genomics, 2018. BMC Med Genomics 11, 84 (2018). (PDF, DOI)
- Laud, P., Pettai, M., Randmets, J. Sensitivity Analysis of SQL Queries. PLAS ‘18: Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, January 2018 Pages 2–12. (PDF, DOI)
2017
- Alexopoulos, N., Kiayias, A., Talviste, R., Zacharias, T. MCMix: Anonymous Messaging via Secure Multiparty Computation. Proceedings of the 26th USENIX Security Symposium. Vancouver, BC: USENIX Association, 1217−1234.
- Buldas, A., Lenin, A., Willemson, J., Charnamord, A. Simple Infeasibility Certificates for Attack Trees. In: Obana S., Chida K. (eds) Advances in Information and Computer Security. IWSEC 2017. Lecture Notes in Computer Science, vol 10418. Springer, Cham (DOI)
- Buldas, A,. Saarepera, M. Are the current system engineering practices sufficient to meet cyber crime? Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Ed. Tryfonas,Theo. Springer, 451−463. (Lecture Notes in Computer Science ; 10292). (DOI)
- Buldas, A; Geihs, M. Buchmann, J. Long-term secure commitments via extractable-binding commitments. Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I. Ed. Pieprzyk, Josef; Suriadi, Suriadi. Cham: Springer, 65−81. (Lecture Notes in Computer Science; 10342).10.1007/978-3-319-60055-0_4. (DOI)
- Buldas, A., Kalu, A., Laud, P., Oruaas, M. Server-Supported RSA Signatures for Mobile Devices. Computer Security – ESORICS 2017 – 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I: Oslo, Norway, 11.-15.09.2017. Ed. Foley, S.N. et al. Springer,. (Lecture Notes in Computer Science; 10492).(DOI)
- Freudenthal, M., Willemson, J. Challenges of Federating National Data Access Infrastructures. In Pooya Farshim, Emil Simion, editors, SecITC 2017: Innovative Security Solutions for Information Technology and Communications, June 8-9 2017, Bucharest, Romania, Springer LNCS 10543, pp. 104-114. (DOI)
- Kubjas, I., Pikma, T., Willemson, J. Estonian Voting Verification Mechanism Revisited Again. In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, LNCS, volume 10615, pp. 306-317, Springer 2017. (DOI)
- Laud, P. Pankova, A. Jagomägis, R. Preprocessing Based Verification of Multiparty Protocols with Honest Majority. Proceedings on Privacy Enhancing Technologies. Volume 2017, Issue 4, Pages 19-72. Presented at the 17th Privacy Enhancing Technologies Symposium, PETS 2017, Minneapolis, MN, USA, July 18-21, 2017. (PDF, DOI)
- Pettai, M., Laud, P. Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. In proceedings of the 6th International Conference on Principles of Security and Trust (POST), Uppsala, Sweden, April 24-25, 2017. © Springer. (DOI)
- Pullonen, P.; Matulevičius, R.; Bogdanov, D. (2017). PE-BPMN: Privacy-Enhanced Business Process Model and Notation. International Conference on Business Process Management (BPM 2017), 10445: International Conference on Business Process Management (BPM 2017), Barcelona. Ed. Carmona J., Engels G., Kumar A. Springer, 40−56. (DOI)
- Willemson, J. Bits or Paper: which should get to carry your vote? In Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann, editors, Proceedings of the Second International Joint Conference E-Vote-ID 2017, LNCS, volume 10615, pp. 292-305, Springer 2017 (DOI)
- Cybernetica researchers. Cryptographic Algorithms Lifecycle Report 2017. (PDF)
2016
- Archer, D.W., Bogdanov, D., Pinkas, B., Pullonen, P. Maturity and Performance of Programmable Secure Computation. In IEEE Security & Privacy, vol. 14, no. 5, pp. 48-56, Sept.-Oct. 2016. (DOI)
- Bogdanov, D., Kamm, L., Kubo, B., Rebane, R., Sokk, V., Talviste, R. Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation. In Proceedings on Privacy Enhancing Technologies, PoPETs, 2016 (3), pp 117–135, 2016. (PDF)
- Bogdanov, D. Kamm, L., Laur, S., Sokk, V. Rmind: a tool for cryptographically secure statistical analysis. IEEE Transactions on Dependable and Secure Computing. 2016 (PDF, DOI)
- Buchmann, J.A., Büscher, N., Göpfert, F., Katzenbeisser, S., Krämer, J., Micciancio, D., Siim, S., van Vredendaal, C., Walter, M. Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. In Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, China, May 30 – June 03, 2016, pp 11-20. ACM, 2016 (DOI)
- Dimitrov, V., Kerik, L., Krips, T., Randmets, J., Willemson, J. Alternative Implementations of Secure Real Numbers. In Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi, editors, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), Vienna, Austria, October 24-28, 2016, pp. 553-564, ACM 2016 (DOI)
- Dumas, M., Bañuelos, L, G., Laud, P. Differential Privacy Analysis of Data Processing Workflows. In proceedings of the Third International Workshop on Graphical Models for Security (GraMSec 2016) Lisbon, Portugal, June 27th, 2016. © Springer. (DOI)
- Heiberg, S., Martens, T., Vinkel, P., Willemson, J. Improving the verifiability of the Estonian Internet Voting scheme. In: Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole Goodman, Peter Y.A. Ryan, Oliver Spycher, Vanessa Teague, Gregor Wenda (Eds.), The International Conference on Electronic Voting E-Vote-ID 2016, 18-21 October 2016, Lochau/Bregenz, Austria, TUT Press, pp. 213-229, ISBN 978-9949-83-022-0 (DOI)
- Kerik, L., Laud, P., Randmets, J. Optimizing MPC for robust and scalable integer and floating-point arithmetic. In proceedings of the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC 2016), Barbados, February 26th, 2016. © Springer. (DOI)
- Probst C.W., Willemson, J., Pieters, W. The Attack Navigator. In Sjouke Mauw, Barbara Kordy, Sushil Jajodia, editors, Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Volume 9390 of LNCS, Springer, 2016, pp. 1-17. (DOI)
- Krips, T., Willemson, J. Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation. In Joaquin Garcia-Alfaro, Evangelos Kranakis and Guillaume Bonfante, editors, oundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. Volume 9482 of the Lecture Notes in Computer Science, Springer 2016, pp. 66-82. 8 (DOI)
- Laud, P. Pankova, A. Securing Multiparty Protocols against the Exposure of Data to Honest Parties. In proceedings of the 11th DPM International Workshop on Data Privacy Management (DPM 2016), Heraklion, Greece, September 26-27, 2016. © Springer. (DOI)
- Laud, P., Pankova, A. Optimizing Secure Computation Programs with Private Conditionals. In proceedings of the 18th International Conference on Information and Communications Security (ICICS2016), Singapore, November 29th — December 2nd, 2016. © Springer (DOI)
- Laud, P., Pettai, M. Secure Multiparty Sorting Protocols with Covert Privacy. In proceedings of the 21st Nordic Conference on Secure IT Systems (NordSec 2016), Oulu, Finland, November 2-4, 2016. © Springer. (DOI)
- Yi, X., Bouguettaya, A., Georgakopoulos, D., Song, A., Willemson, J. Privacy Protection for Wireless Medical Sensor Data. IEEE Transactions on Dependable and Secure Computing 13(3): 369-380 (2016) (DOI)
- Cybernetica researchers (procured by RIA). Cryptographic Algorithms Lifecycle Report 2016. (PDF)
2015
- Bogdanov, D., Jõemets, M., Vaht, M., Siim, S.How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. Financial Cryptography and Data Security – 19th International Conference, 2015, San Juan, Puerto Rico, January 26-30, 2015
- Freudenthal, M. Simpl DSL toolkit, Science of Computer Programming, Volume 114, 15 December 2015, Pages 85-91, ISSN 0167-6423
- Gurov, D; Laud, P; Guanciale, R. Privacy Preserving Business Process Matching. 13th Annual Conference on Privacy, Security and Trust, Izmir, Turkey, July 21-23, 2015. IEEE Computer Society Press, 36 – 43.
- Heiberg, S., Parsovs, A., Willemson, J. Log Analysis of Estonian Internet Voting 2013-2014. In Rolf Haenni, Reto E. Koenig and Douglas Wikström (editors) E-Voting and Identity, Lecture Notes in Computer Science Volume 9269, pp 19-34, Springer 2015.
- Kamm, L., Willemson, J. Secure floating point arithmetic and private satellite collision analysis, in International Journal of Information Security, November 2015, Volume 14, Issue 6, pp 531-548, Springer (link.springer.com)
- Laud, P. Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees. Proceedings on Privacy Enhancing Technologies, 2015(2), 188–205.
- Laud, P., Kamm, L. Applications of Secure Multiparty Computation. IOS Press 2015 (ebooks/iospress)
- Laud, P; Randmets, J. A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols. 22nd ACM Conference on Computer and Communications Security, Denver, CO, USA, October 12th–16th, 2015. (Toim.) Kruegel, Christopher; Li, Ninghui. ACM, 1492 – 1503.
- Laud, P., Willemson, J. Composable Oblivious Extended Permutations. In Frdédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood and Philip W. L. Fong (editors) Foundations and Practice of Security, Lecture Notes in Computer Science Volume 8930, pp 294-310, Springer 2015
- Lenin, A., Willemson, J., Charnamord A. Genetic Approximations for the Failure-Free Security Games. In Khouzani, MHR, Panaousis, Emmanouil, Theodorakopoulos, George, editors, Decision and Game Theory for Security, 6th International Conference, GameSec 2015, Lecture Notes in Computer Science Volume 9406, pp 311-321, Springer 2015.
- Pettai, M., Laud, P. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries. 28th IEEE Computer Security Foundations Symposium, Verona, Italy, July 13th–17th, 2015. (Toim.) Fournet, Cedric; Hicks, Michael. IEEE Computer Society Press, 75–89.
- Pettai, M., Laud, P. Combining Differential Privacy and Secure Multiparty Computation. 2015 Annual Computer Security Applications Conference, (ACSAC 31), Los Angeles, CA, USA, December 7th–11th, 2015. (Toim.) Sherr, Micah; Robertson, Wil. ACM.
- Pullonen, P., Siim, S. Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations. Financial Cryptography and Data Security – 2015 Workshops, San Juan, Puerto Rico, January 30, 2015
- Willemson, J. Elliptkõverate krüptograafia. Seminar “E-Narnia is a fairytale: The real cyber security resides in Estonia”, Tallinn, 13. mai 2015
- Cybernetica researchers. Krüptograafiliste algorütmide elutsükli uuring. 2015 (Link to PDF)
2014
- Bogdanov, D., Emura, K., Jagomägis, R., Kanaoka, A., Matsuo, S., Willemson, J. A Secure Genetic Algorithm for the Subset Cover Problem and its Application to Privacy Protection. In David Naccache and Damien Sauveron, editors, Information Security Theory and Practice, 8th IFIP WG 11.2 International Workshop, WISTP 2014, June 30 – July 2 2014; Heraklion, Greece, LNCS 8501, pp. 108-123, Springer 2014.
- Bogdanov, D., Laud, P., Randmets, J. Domain-Polymorphic Programming of Privacy-Preserving Applications. Ninth Workshop on Programming Languages and Analysis for Security (PLAS 2014), Uppsala, Sweden, July 29th, 2014. (Toim.) Russo, Alejandro; Tripp, Omer. ACM, 2014, lk 53 – 65.
- Bogdanov, D., Laud, P., Laur, S., Pullonen, P. From Input Private to Universally Composable Secure Multi-party Computation Primitives. 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, July 19-22, 2014. (Toim.) Datta, Anupam; Fournet, Cedric. IEEE Computer Society, 2014, lk 184-198.
- Bogdanov D., Laur S., Talviste R. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation. In Karin Bernsmed, Simone Fischer-Hübner (editors), Secure IT Systems. 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, LNCS 8788, pp. 59-74, Springer 2014.
- Bogdanov, D., Kamm, L., Laur, A., Pruulmann-Vengerfeldt, P., Talviste, R., Willemson, J. Privacy-preserving statistical data analysis on federated databases. In Bart Preneel, Demosthenes Ikonomou (Editors), Privacy Technologies and Policy. Second Annual Privacy Forum APF 2014, May 20-21, Athens, Greece, LNCS 8450, pp. 30-55, Springer 2014.
- Bogdanov, D., Pruulmann-Vengerfeldt, P. Adoption Barriers of Secure Computation for Decision Making in a Defence Application. Proceedings of the STO-MP-SAS-106 – Analysis Support to Decision Making in Cyber Defence and Security. NATO STO. 2014
- Buldas, A., Laanoja, R., Truu, A., Laud, P. Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures . In: Provable Security, 8th International Conference: ProvSec 2014, Hong Kong, 09.10-10.10.2014. Springer, 2014, (Lecture Notes in Computer Science; 8782), 130 – 145.
- Guanciale, R., Gurov, D., Laud, P. Private intersection of regular languages. In: Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on: Twelfth Annual International Conference on Privacy, Security and Trust (PST), Toronto, Canada, 23.-24.07.2014. IEEE, 2014, 112 – 120.
- Heiberg, S., Willemson, J. Modeling Threats of a Voting Method. Chapter 7 of Dimitrios Zissis and Dimitrios Lekkas (editors) Design, Development, and Use of Secure Electronic Voting Systems. IGI Global, 2014, pages 128-148.
- Heiberg, S., Willemson, J. Verifiable Internet Voting in Estonia. In: Krimmer, R., Volkamer, M.: Proceedings of Electronic Voting 2014 (EVOTE2014), TUT Press, Tallinn, p. 23-29.
- Kamm, L., Willemson, J. Secure floating point arithmetic and private satellite collision analysis. International Journal of Information Security. 2014.
- Krips, T., Willemson, J. Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations. In Proceedings of ISC 2014, LNCS 8783, pp. 179-197, Springer 2014.
- Laud, P. A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation. In: ICICS 2014: The 16th International Conference on Information and Communications Security, Hong Kong, 16.-17.12.2014. (Toim.) Shi, Elaine; Yiu, S.M. Springer, 2014, (Lecture Notes in Computer Science). [ilmumas]
- Laud, P., Pankova, A. Verifiable Computation in Multiparty Protocols with Honest Majority. In: Provable Security, 8th International Conference: ProvSec 2014, Hong Kong, 09.10-10.10.2014. (Toim.) Lucas C.K. Hui, S.M. Yiu, Sherman S. M. Chow, Joseph K. Liu. Springer, 2014, (Lecture Notes in Computer Science; 8782), 146 – 161.
- Lenin, A., Buldas, A. Limiting adversarial budget in quantitative security assessment.In Decision and Game Theory for Security – 5th International Conference, GameSec 2014,Los Angeles, CA, USA, November 6-7, 2014. Proceedings, pages 153–172, 2014.
- Lenin, A., Willemson, J., Sari, D.P. Attacker profiling in quantitative security assessment based on attack trees. In Karin Bernsmed and Simone Fischer-Hübner, editors, Secure IT Systems, 19th Nordic Conference, NordSec 2014, LNCS 8988, pp. 199-212, Springer 2014.
- Pieters, W., Hadžiosmanovich, D., Lenin, A., Montoya, L., Willemson, J. TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (poster and extended abstract). Proceedings of the 35th IEEE Symposium on Security and Privacy, San Jose, CA, 2014.
2013
- Ansper, A., Buldas, A., Freudenthal, M., Willemson, J. High-Performance Qualified Digital Signatures for X-Road. In Hanne Riis Nielson and Dieter Gollmann, editors, Secure IT Systems. 18th Nordic Conference, NordSec 2013, LNCS 8208, pp. 123-138, Springer 2013.
- Ansper, A., Buldas, A., Freudenthal, M., Willemson, J. Protecting a Federated Database Infrastructure Against Denial-of-Service Attacks. CRITIS 2013, LNCS 8328, pp 26-37, Springer 2013.
- Ansper, A., Buldas, A., Heiberg, S., Willemson, J. Digitaalallkirjade jätkusuutlikkuse analüüs.Link to PDF
- Bogdanov, D., Kalu, A. Pushing Back the Rain—How to Create Trustworthy Services in the Cloud. ISACA Journal, Volume 3, 2013, 49-51. (isaca.org/journal)
- Buldas, A. Laanoja, R. Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. Proceedings of the 18th Australasian Conference, ACIP 2013, LNCS 7959, pp 235-250. Springer 2013.
- Buldas, A., Lenin, A. New Ecient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees. M. Kantarcioglu, C. Nita-Rotaru (Eds.), GameSec 2013.
- Buldas, A., Niitsoo, M. Black-Box Separations and Their Adaptability to the Non-uniform Model. Proceedings of the 18th Australasian Conference, ACIP 2013, LNCS 7959, pp 152-167. Springer 2013
- Heiberg, S. New Technologies for Democratic Elections. Business Process Management Workshops. Lecture Notes in Business Information Processing Volume 132, 2013, pp 630-635. Springer 2013
- Kamm, L., Bogdanov, D. Laur, S., Vilo, J. A new way to protect privacy in large-scale genome-wide association studies. Bioinformatics 29 (7): 886-893, 2013. (oxfordjournals.org)
- Laud, P., Pankova, A. On the (Im)possibility of Privately Outsourcing Linear. In proceedings of the 2013 ACM Cloud Computing Security Workshop (CCSW), November 8th, 2013, Berlin, Germany
- Laud, P., Pankova, A., Pettai, M., Randmets, J. Specifying Sharemind’s Arithmetic Black Box. PETShop: The Workshop on Language Support for Privacy Enhancing Technologies, Berlin, Germany, November 4th, 2013. Association for Computing Machinery (ACM) , 2013, 19 – 21.
- Pettai, M., Laud, P. Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus . 18th Nordic Conference on Secure IT Systems (Nordsec 2013), Ilulissat, Greenland, October 18-21, 2013. (Toim.) Gollmann, Dieter; Nielson, Hanne Riis. Springer, 2013, (Lecture Notes in Computer Science; 8208), 100 – 115.
- Laur, S., Talviste, R., Willemson, J. From oblivious AES to efficient and secure database join in the multiparty setting. 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), LNCS 7954, pp. 84-101. Springer, 2013
- Cybernetica researchers. Krüptograafiliste algoritmide elutsükli uuring. 2013 Link to PDF
2012
- Bogdanov, D., Jagomägis, R., Laur, S. A universal toolkit for cryptographically secure privacy-preserving data mining. Michael Chau et al (Toim.). Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics 2012 (112 – 126). Heidelberg: Springer
- Bogdanov, D., Talviste, R., Willemson, J. Deploying Secure Multi-Party Computation for Financial Data Analysis (Short Paper). In Angelos Keromytis, editor, Financial Cryptography and Data Security, LNCS 7397, pp. 57-64. Springer, 2012.
- Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J. High-performance secure multi-party computation for data mining applications, in International Journal of Information Security, Springer, 2012, DOI: 10.1007/s10207-012-0177-2.
- Buldas, A. Stepanenko, R. Upper Bounds for Adversaries’ Utility in Attack Trees. Proceedings of the Third International Conference, Gamesec 2012. LNCS 7638, pp 98-117. Springer 2012.
- Moorits, E., Jervan, G. Profiling in Deeply Embedded Systems. In: Proceedings of the 13th Biennial Baltic Electronic Conference: 2012 13th Biennial Baltic Electronics Conference (BEC2012), Tallinn, Estonia, October 3-5, 2012. IEEE, 2012, 127 – 130.
- Moorits, E. Usk, A. Buoy Collision Detection. In: Proceedings ELMAR-2012: 54th International Symposium ELMAR-2012, 12-14 September 2012, Zadar, Croatia. (Toim.) Jelena Bozek, Mislav Grgic. Zagreb, Coratia: Croatian Society Electronics in Marine, 2012, 109 – 112.
- Pettai, M., Laud, P. Securing the Future — an Information Flow Analysis of a Distributed OO Language . In: Proceedings: SOFSEM 2012: 38th International Conference on Current Trends in Theory and Practice of Computer Science,Špindlerův Mlýn, Czech Rep., January 21-27, 2012. (Toim.) Gottlob, Georg; Turán, György; Bieliková, Mária; Katzenbeisser, Stefan; Friedrich, Gerhard. Springer, 2012, (Lecture Notes in Computer Science; 7147), 576 – 587.
2011
- Ansper, A. Designing a Governmental Backbone. In proceedings of Nordsec 2011, 16th Nordic Conference in Secure IT Systems (LNCS 7161), Tallinn, Estonia, October 26-28, 2011, pp 1-3. Springer-Verlag
- Freudenthal, M., Pugal, D. Simpl: a Toolkit for Rapid DSL Implementation. 12th Symposium on Programming Languages and Software Tools. October 5-7, 2011, Tallinn, Estonia.
- Gonzalez, M., Laud, P. On the (Im)possibility of Perennial Message Recognition Protocols without Public-Key Cryptography. In Proceedings of the 2011 ACM Symposium on Applied Computing (SAC 2011).
- Gonzalez, M., Steinwandt, R. Security of message authentication codes in the presence of key-dependent messages. In Designs, Codes and Cryptography, pp. 1-9, Springer Netherlands 2011.
- Heiberg, S., Laud, P., Villemson, J. The Application of I-voting for Estonian Parliamentary Elections of 2011. In: Postproceedings: 3rd international conference on e-voting and identity, Tallinn, Sep 29th-30th, 2011. (Toim.) Kiyaias, Aggelos; Lipmaa, Helger. Springer-Verlag, 2012, (Lecture Notes in Computer Science; 7187).
- Heiberg, S., Laud, P., Masson, S., Larsen, C.P. Secure Mobile Access to Homecare Patients’ Data. In: Proceedings: 5th International Conference on Theory and Practice of Electronic Governance (ICEGOV2011), Tallinn, Sep 26th-28th, 2011. (Toim.) Estevez, Elsa; Janssen, Marijn. ACM, 2011, 363 – 364.
- Laud, P. Implementing Cryptographic Primitives in the Symbolic Model. 3rd NASA Formal Methods Symposium, Pasadena, CA, April 18th-20th 2011. (Toim.) Bobaru, Mihaela; Havelund, Klaus; Holzmann, Gerard; Joshi, Rajeev. Springer Verlag, 2011, (Lecture Notes in Computer Science; 6617), 267 – 281.
- Laur, S., Willemson, J., Zhang, B. Round-efficient Oblivious Database Manipulation. In Xuejia Lai, Jianying Zhou and Hui Li, editors, ISC 2011. Springer LNCS 7001, pp. 262-277
- Moorits, E. Usk, A. Kõuts, T. Wave Height Measurement as a Secondary Function of Navigational Buoys. OCEANS ’11 MTS/IEEE KONA, Hilton Waikoloa Village, Kona, Hawai‘i, USA, September 19-22 2011. IEEE, 2011.
- Willemson, J., Laud, P., Jürgenson, A., Laur, M. Krüptograafiliste algoritmide kasutusvaldkondade ja elutsükli uuring. (Link to PDF)
2010
- Buldas, A., Niitsoo, M. Optimally tight security proofs for hash-then-publish time-stamping. In: Steinfeld, R., Hawkes, P. (Eds.): ACISP 2010. LNCS 6168, pp.318-335, Springer-Verlag 2010.
- Chaabouni, R., Lipmaa, H., Shelat, A. Additive combinatorics and discrete logarithm based range protocols. In: Hawkes, P., Steinfeld, R. (Eds.): ACISP 2010, LNCS 6168, pp. 336-351, Springer-Verlag 2010.
- Freudenthal, M. Domain-Specific Languages in a Customs Information System. Ieee Software, 2, 65 – 71, 2010
- Freudenthal, M. Using DSLs for Developing Enterprise Systems. Language Descriptions Tools and Applications, Paphos, Cyprus. March 27-28, 2010.
- Gonzalez, M., Steinwandt, R. Cryptanalysis of a message recognition protocol by Mashatan and Stinson. In: Lee, D., Hong, S. (Eds.): ICISC 2009, LNCS 5984, pp. 362-373, Springer-Verlag 2010.
- Groth, J., Kiayias, A., Lipmaa, H. Multi-Query Computationally-Private Information Retrieval with Constant Communication Rate. In Phong Q. Nguyen and David Pointcheval, editors, PKC 2010, volume 6056 of Lecture Notes in Computer Science, pages 107–123, Paris, France, May 26–28, 2010. Springer-Verlag.
- Heiberg, S. Internet Voting – the Estonian Experience. In: Information Security Summit, From Technology to Management: Information Security Summit, 11th International Conference, Prague, 26.03 – 27.03 2010. Praha: Tate International, S.R.O., 2010, 133 – 138.
- Heiberg, S., Lipmaa, H., van Laenen, F. On e-vote integrity in the case of malicious voter computers. In: Gritzalis, D., Preneel, B., Theoharidou, M. (Eds.): ESORICS 2010, LNCS 6345, pp. 373-388, Springer-Verlag 2010.
- Jürgenson, A., Willemson, J. On fast and approximate attack tree computations. In: Kwak, J. et al. (Eds.): ISPEC 2010, LNCS 6047, pp. 56-66, Springer-Verlag 2010.
- Lipmaa, H., Zhang, B. Two new efficient PIR-writing protocols. In: Zhou, J., Young, M. (Eds.): ACNS 2010, LNCS 6123, pp.438-455, Springer-Verlag 2010.
- Laur, S., Lipmaa, H. On the feasibility of consistent computations. In: Nguyen, P.Q., Pointcheval, D. (Eds.): PKC 2010, LNCS 6056, pp. 88-106, Springer-Verlag 2010.
- Lipmaa, H. On the CCA1-Security of Elgamal and Damgård’s Elgamal. In Xuejia Lai, Moti Yung and Dongdai Lin, editors, Inscrypt 2010, volume 6584 of Lecture Notes in Computer Science, pages 18–35, Shanghai, China, October 20–23, 2010. Springer-Verlag.
- Miškinis, R., Smirnov, D., Urba, E., Burokas, A., Malyško, B., Laud, P., Zuliani, F. Digital Time Stamping System Based on Open Source Technologies. IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, 57(3), 721 – 727, 2010.
- Moorits, E. Usk, A. A Numerically Efficient Method for Calculation of the Angle of Heel of a Navigational Buoy. In: Proceedings of the 12th Biennial Baltic Electronic Conference BEC2010: Tallinn: TTU Press, 2010, 357 – 360.
- Moorits, E. Jervan, G. Low Resource Demanding FOTA Method For Remote AtoN Site Equipment. OCEANS 2010 MTS/IEEE Seattle, Seattle, Washington, USA September 20-23, 2010. IEEE, 2010.
- Niitsoo, M. Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. In: IWSEC 2010: IWSEC 2010, 22-24. Nov. Kobe, Jaapan. (Toim.) Echizen, I., Kunihiro. Springer, 2010, (LNCS).
- Willemson, J. Extending the Gordon Loeb model for information security investment. In: ARES 2010. IEEE Computer Society Press, pp. 258-261, 2010.
2009
- Ansper, A., Heiberg, S., Lipmaa, H.: Øverland, T.A., van Laenen, F.: Security and trust for the Norwegian e-voting pilot project E-valg 2011. In: Jøsang, A., Maseng, T., Knapskog, S.J. (Eds.): NordSec 2009, LNCS 5838, pp. 207-222, 4th Nordic Conference on Secure IT Systems, NordSec 2009, Springer-Verlag 2009.
- Buldas, A., Jürgenson, A., Niitsoo, M. Efficiency bounds for adversary constructions in black-box reductions. In C. Boyd, J. González Nieto, eds., Proc. of 14th Australasian Conf. on Information Security and Privacy, ACISP 2009 (Brisbane, July 2009), v. 5594 of Lect. Notes in Comput. Sci., pp. 264-275. Springer, 2009.
- Buldas, A., Niitsoo, M., Laur, S. Oracle separation in the non-uniform model. In Proc. of 3rd Int. Conf. on Provable Security, ProvSec 2009. November 11-13, 2009, Guangzhou, China. LNCS 5848, pp. 230-244, 2009.
- Jürgenson, A., Willemson, J. Serial Model for Attack Tree Computations. In D. Lee and S. Hong (Eds.): ICISC 2009, Lecture Notes in Computer Science, volume 5984, pp. 118-128, Springer 2010.
- Laud, P., Roos, M. Analysis of the Estonian Mobile-ID protocol. In proceedings of Nordsec 2009, 14th Nordic Workshop on Secure IT Systems (LNCS 5838), Oslo, Norway, October 15-16, 2009, pp. 271-286. Springer-Verlag.
- Laud, P., Tšahhirov, I. A user interface for a game-based protocol verification tool. In proceedings of the sixth International Workshop on Formal Aspects in Security and Trust (FAST2009), Eindhoven, Netherlands, November 5-6, 2009.
- Lipmaa, H., Zhang, B. Efficient generalized selective private function evaluation with applications in biometric authentication. In: Bao, F., Young, M. (Eds.): Inscrypt 2009, LNCS 6151, pp.154-163, Inscrypt 2009, Springer-Verlag 2009.
- Lipmaa, H. First CPIR Protocol with Data-Dependent Computation. In Donghoon Lee and Seokhie Hong, editors, ICISC 2009, volume 5984 of Lecture Notes in Computer Science, pages 193–210, Seoul, Korea, December 2–4, 2009. Springer-Verlag.
- Nakahara, J. Jr., Seperhdad, P., Zhang, B., Wang, M.: Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. In: Garay, J.A., Miyaji, A., Otsuka, A. (Eds.): CANS 2009, LNCS 5888, pp. 58-75, Springer-Verlag 2009.
- Ose P.E., Usk, A. A new generation of aids to navigation with indirect illumination in Norwegian coastal waters, IALA Bulletin 2009/2, p.38-40
2008
- Bogdanov, D., Laur, S., Willemson, J. Sharemind: a framework for fast privacy-preserving computations. In Esorics 2008.
- Buldas, A., Niitsoo, M. Can we Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions? Joonsang Baek, Feng Bao, Kefei Chen (Toim.). Provable Security – Second International Conference, ProvSec 2008 (254 – 267).Springer
- Crescenzo, G., Lipmaa, H. Succinct NP Proofs from An Extractability Assumption. In Arnold Beckmann, Costas Dimitracopoulos and Benedikt Löwe, editors, Computability in Europe, volume 5028 of Lecture Notes in Computer Science, pages 175–185, Athens, Greece, June 15–20, 2008. Springer-Verlag.
- Crescenzo, G., Lipmaa, H. 3-Message NP Arguments in The BPK Model with Optimal Soundness And Zero-Knowledge. In Seok-Hee Hong, Hiroshi Nagamochi and Takuro Fukunaga, editors, The 19th International Symposium on Algorithm and Computation, ISAAC 2008, volume 5369 of Lecture Notes in Computer Science, pages 616–628, Gold Coast, Australia, December 15–17, 2008. Springer-Verlag.
- Tšahhirov, I., Laud, P . Application of Dependency Graphs to Security Protocol Analysis. Barthe, Gilles; Fournet, Cedric (Toim.). Trustworthy Global Computing (TGC 2007), Post-proceedings, lk. 294 – 311.
- Haav, L., Laud, P. Typing Computationally Secure Information Flow in Jif. In NordSec 2008.
- Haavel, R., Oit, M., Usk, A. Maritime Surveillance Information Availability in Estonia. Shahbasian, Elisa; Rogova, Galina; J. de Weert, Michael (Toim.). Harbour Protection Through Data Fusion Technologies (53 – 60), 2008. Springer
- Jürgenson, A., Willemson, J. Computing exact outcomes of multi-parameter attack trees. Jong Hyuk Park, Bart Preneel, Ravi Sandhu, André Zúquete (Toim.). Proc. of 3rd Int. Symp. on Information Security, IS 2008 (1036 – 1051).Springer
- Laud, P. On the computational soundness of cryptographically masked flows. In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2008), 10.-12.01.2008, San Francisco, CA, USA. (Toim.) George C. Necula, Philip Wadler. ACM, 2008, lk. 337 – 348.
- Laud, P., Ngo, L. Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. In ProvSec 2008.
- Laud, P. On the computational soundness of cryptographically masked flows. POPL 2008: 337-348
- Lipmaa, H. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. In Tzong-Chen Wu and Chin-Laung Lei, editors, 11th Information Security Conference, ISC 2008, volume 5222 of Lecture Notes in Computer Science, pages 441–454, Taipei, Taiwan, September 15–18, 2008. Springer-Verlag.
- Oit, M. Security from the practioners point of view. E.Kranakis, E.Haroutunian and E.Shahbasian (Toim.). Aspects of Network and Information Security (110 – 118) 2008. Holland: IOS Press
- Pruulmann, J., Willemson, J. Implementing a Knowledge-Driven Hierarchical Context Model in a Medical Laboratory Information System. In: Proceedings of The Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008): Third International Multi-Conference on Computing in the Global Information Technology (ICCGI 2008). IEEE, 2008, 62 – 67.
- Willemson, J., Ansper, A. A Secure and Scalable Infrastructure for Inter-Organizational Data Exchange and eGovernment Applications. In The Third International Conference on Availability, Reliability and Security, ARES 2008.
2007
- Buldas, A., Jürgenson, A. Does secure time-stamping imply collision-free hash functions? In W. Susilo, J. K. Liu, Y. Mu, eds., Proc. of 1st Int. Conf. on Provable Security, ProvSec 2007 (Wollongong, Oct/Nov. 2007), v. 4784 of Lect. Notes in Comput. Sci., pp. 138-150. Springer, 2007.
- Buldas, A., Laur, S. Knowledge-binding commitments with applications in time-stamping. In T. Okamoto, X. Wang, eds., Proc. of 10th Int. Conf. on Practice and Theory in Public-Key Cryptography, PKC 2007 (Beijing, Apr. 2007), v. 4450 of Lect. Notes in Comput. Sci., pp. 150-165. Springer, 2007.
- Buldas, A., Mägi, T. Practical analysis of e-voting systems. In A. Miyaji, H. Kikuchi, K. Rannenberg, eds., Proc. of 2nd Int. Wksh. on Security, IWSEC 2007 (Nara, Oct. 2007), v. 4752 of Lect. Notes in Comput. Sci., pp. 320-335. Springer, 2007.
- Dumas, P., Lipmaa, H., Wallén, J. Asymptotic behaviour of a non-commutative rational series with a nonnegative linear representation. Discr. Math. and Theor. Comput. Sci., v. 9, n. 1, pp. 247-274, 2007.
- Jürgenson, A., Willemson, J. Processing multi-parameter attacktrees with estimated parameter values. In A. Miyaji, H. Kikuchi, K. Rannenberg, eds., Proc. of 2nd Int. Wksh. on Security, IWSEC 2007 (Nara, Oct. 2007), v. 4752 of Lect. Notes in Comput. Sci., pp. 308-319. Springer, 2007.
- Karus, S., Dumas, M. Enforcing policies and guidelines in web portals: a case study. In M. Weske, M.-S. Hacid, C. Godart, eds., Proc. of Web Information Systems Engineering, WISE 2007, Int.\ Wkshs. (Nancy, Dec. 2007), v. 4832 of Lect. Notes in Comput. Sci., pp. 154-165. Springer, 2007.
- Laur, S., Lipmaa, H. A new protocol for conditional disclosure of secrets and its applications. In J. Katz, M. Yung, eds., Proc. of 5th Int. Conf. on Applied Cryptography and Network Security, ACNS 2007 (Zhuhai, June 2007), v. 4521 of Lect. Notes in Comput. Sci., pp. 207-225. Springer, 2007.
- Prank, R., Issakova, M., Lepp, D., Tõnisson, E., Vaiksaar, V. Integrating rule-based and input-based approaches for better error diagnosis in expression manipulation tasks. In S. Li, D. Wang, J.-Z. Zhang, eds., Symbolic Computation and Education, pp. 174-191. World Scientific, 2007.
- Tshahhirov, I., Laud, P. Application of dependency graphs to security protocol analysis. In G. Barthe, C. Fournet, eds., Proc. of 3rd Symp. on Trustworthy Global Computing, TGC 2007 (Sophia Antipolis, Nov. 2007).
2006
- Alkassar, A., Andreeva, E., Lipmaa, H. SLC: Efficient Authenticated Encryption for Short Packets. In Jana Dittmann, editor, Sicherheit 2006: Sicherheit – Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), volume 77 of Lecture Notes in Informatics, pages 270-278, Magdeburg, Germany, February 20–22, 2006. Gesellschaft für Informatik e.v.
- Backes, M., Laud, P. Computationally Sound Secrecy Proofs by Mechanized Flow Analysis . In 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, pages 370-379, October 30th – November 3rd, 2006.
- Backes, M., Laud, P. Computationally Sound Secrecy Proofs by Mechanized Flow Analysis . In 2nd workshop on Formal and Computational Cryptography, pages 1-6, July 9th, 2006, Venice, Italy.
- Buldas, A., Laur, S. Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? In Jianying Zhou, Moti Yung, Feng Bao, editors, 4th International Conference on Applied Cryptography and Network Security – ACNS’06, volume 3989 of Lecture Notes in Computer Science, pages 50–65, Singapore, 2006. Springer-Verlag.
- Buldas, A., Laud, P., Priisalu, J., Saarepera, M., Willemson, J. Rational Choice of Security Measures via Multi-Parameter Attack Trees . In 1st International Workshop on Critical Information Infrastructures Security (CRITIS’06), August 30 – September 2, 2006, Samos Island, Greece.
- Laud, P., Uustalu, T., Vene, V. Type Systems Equivalent to Data-Flow Analyses of Imperative Languages. Theoretical Computer Science, vol 364, no. 3, pages 292-310, 2006.
- Laur, S., Lipmaa, H., Mielikäinen, T. Cryptographically Private Support Vector Machines. In Mark Craven and Dimitrios Gunopulos, editors, The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, Philadelphia, USA, August 20-23, 2006. ACM.
- Prank, R., Issakova, M., Lepp, D., Vaiksaar, V. Using Action-Object-Input Scheme for Better Error Diagnosis and Assessment in Expression Manipulation Tasks. Maths, Stats and OR Network. Maths CAA Series: March 2006.
- Prank, R., Issakova, M., Lepp, D., Vaiksaar, V. Designing Next-Generation Training and Testing Environment for Expression Manipulation. V.N. Alexandrov et al. (Eds.): ICCS 2006, Part I, LNCS 3991, pp. 928-931, Springer-Verlag Berlin Heidelberg 2006.
- Willemson, J., Kruusmaa, M. Algorithmic Generation of Path Fragment Covers for Mobile Robot Path Planning, accepted to 3rd IEEE Conference on Intelligent Systems, 4-6 September 2006, University of Westminster, London, UK.
- Willemson, J. On the Gordon and Loeb Model for Information Security Investment, accepted to The Fifth Workshop on the Economics of Information Security (WEIS 2006), University of Cambridge, England, UK, 26-28 June 2006.
2005
- Buldas, A., Laud, P., Saarepera, M, Willemson, J. Universally Compisable Time-Stamping Schemes with Audit. In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC’05), volume 3650 of Lecture Notes in Computer Science, pages 359-373, Singapore, September 20-23, 2005. Springer-Verlag.
- Elkind, E., Lipmaa, H. Hybrid Voting Protocols and Hardness of Manipulation. In Xiaotie Deng and Dingzhu Du, editors, The 16th Annual International Symposium on Algorithms and Computation, ISAAC 2005, volume 3827 of Lecture Notes in Computer Science, pages 206-215, Sanya, Hainan, China, December 19-21, 2005. Springer-Verlag
- Elkind, E., Lipmaa, H. Small Coalitions Cannot Manipulate Voting. In Andrew Patrick and Moti Yung, editors, Financial Cryptography and Data Security — Ninth International Conference, volume 3570 of Lecture Notes in Computer Science, pages 285–297, Roseau, The Commonwealth Of Dominica, February 28-March 3, 2005. Springer-Verlag.
- Heero, K., Aabloo, A., Kruusmaa, M. On the Utility of Exploration on Time-Critical Mobile Robot Missions. In Proc. of the 2nd European Conference on Mobile Robots (ECMR05), Sept. 7-10, 2005, Ancona, Italy, pp. 152-157.
- Heero, K., Aabloo, A., Kruusmaa, M. Learning Innovative Routes for Mobile Robots in Dynamic Partially Unknown Environments. Int. Journal of Robots and Autonomous Systems, pp. 209 – 222, Vol. 2, No.3, (2005).
- Laud, P., Vene, V. A Type System for Computationally Secure Information Flow. In Maciej Liskiewicz, Rüdiger Reischuk, editors, Fundamentals of Computation Theory: 15th International Symposium, FCT 2005, volume 3623 of Lecture Notes in Computer Science, pages 365-377. Lübeck, Germany, August 17-20, 2005. Springer-Verlag
- Laud, P. Secrecy Types for a Simulatable Cryptographic Library. In Vijay Aluri, Catherine Meadows and Ari Juels, editors, proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pages 26-35, Alexandria, VA, USA, November 7-11, 2005. ACM.
- Laud, P., Uustalu, T., Vene, V. Type Systems Equivalent to Data-Flow Analyses of Imperative Languages (Extended Abstract). In Martin Hofmann, editor, In proceedings of the Third Workshop on Applied Semantics (APPSEM05), Frauenchiemsee, Germany, Septermber 12-15, 2005.
- Laur, S., Lipmaa, H., Mielikäinen, T. Private Itemset Support Counting. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 97-111, Beijing, China, December 10-13, 2005. Springer-Verlag.
- Li, Y., Lipmaa, H., Pei, D. On Delegatability of Four Designated Verifier Signatures. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 61-71, Beijing, China, December 10-13, 2005. Springer-Verlag.
- Lipmaa, H. Secure Electronic Voting Protocols. Chapter in The Handbook of Information Security, Hossein Bidgoli, Editor-in-Chief. John Wiley & Sons, Inc., 2005.
- Lipmaa, H. An Oblivious Transfer Protocol with Log-Squared Communication. In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC’05), volume 3650 of Lecture Notes in Computer Science, pages 314-328, Singapore, September 20-23, 2005. Springer-Verlag.
- Lipmaa, H., Wang, G., Bao, F. Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction. In Moti Yung, editor, The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, pages 459–471, Lisboa, Portugal, July 11-15, 2005. Springer-Verlag. Accepted (Track C).
- Tšahhirov, I., Laud, P. Digital Signature in Automatic Analyses for Confidentiality against Active Adversaries. In Helger Lipmaa and Dieter Gollmann, editors, proceedings of Nordsec 2005, 10th Nordic Workshop on Secure IT Systems, pages 29-41, Tartu, Estonia, October 20-21, 2005.
- Willemson, J. Setting up a Computer Clobber Tournament at Tartu University, in IC Journal, Vol. 28, No. 1, pp 51-54.
2004
- Aabloo, A., Heero, K., Kruusmaa, M., Willemson, J. Robots Find a Better Way: A Learning Method for Mobile Robot Navigation in Partially Unknown Environemnts. In F.Groen, N. Amoto, A. Bonarini, E. Yoshida and B. Kröse, editors, Proceedings of the 8th Conference on Intelligent Autonomous Systems (IAS8), Amsterdam, The Netherlands, 2004. IOS Press.
- Buldas, A., Saarepera, M. On Provably Secure Time-Stamping Schemes. In Pil Joong Lee (Ed.): Advances in Cryptology – ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings (LNCS 3329), pp 500-514, 2004.
- Jaeger, J., Villemson, J. Ülevaade VRP ja TSP ülesannete lahendusmeetoditest, Tartu Ülikooli Tehnoloogiainstituut, august 2004.
- Laud, P., Corin, R. Sound Computational Interpretation of Formal Encryption with Composed Keys. In Information Security and Cryptology – ICISC 2003, 6th International Conference, Seoul, Korea, November 2003, Revised Papers (LNCS 2971), pages 55-66, 2004.
- Laud, P. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In proceedings of 2004 IEEE Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004. IEEE Computer Society.
- Puus, U., Seeba, A., Salumaa, P., Heiberg, S. Analyzing Pair-Programmer’s Satisfaction with the Method, the Result, and the Partner. In Jutta Eckstein, Hubert Baumeister (Eds.): Extreme Programming and Agile Processes in Software Engineering, 5th International Conference, XP 2004, Garmisch-Partenkirchen, Germany, June 6-10, 2004, Proceedings (LNCS 3092), pages 246-249, 2004.
- Willemson, J., Björnsson, Y. Six wins hex tournament, in ICGA Journal, Vol. 27, No. 3, September 2004, pg 180.
2003
- Ansper, A., Buldas, A., Freudenthal, M., Villemson, J. Scalable and Efficient PKI for Inter-Organizational Communication. 19th Annual Computer Security Applications Conference ACSAC 2003, Las Vegas, USA, December 8-12, 2003. Proceedings, pages 308-318, 2003.
- Buldas, A., Saarepera, M. Electronic Signature System with Small Number of Private Keys. In proceedings of the 2nd Annual PKI Research Workshop.
- Heiberg, S., Puus, U., Salumaa, P., Seeba, A. Pair-Programming Effect on Developers Productivity. In “Extreme Programming and Agile Processes in Software Engineering, 4th International Conference, XP 2003, Genova, Italy, May 2003, Proceedings” (LNCS 2675), pages 215-224, 2003.
- Kruusmaa, M., Willemson, J., Heero, K. Path Selection for Mobile Robots in Dynamic Environments. ECMR’03 Proceedings of the 1st European Conference on Mobile Robots, September 4-6, 2003, Radziejowice, Poland
- Kruusmaa, M., Willemson, J. Covering the path space: a casebase analysis for mobile robot path planning, in Knowledge Based Systems, Volume 16, Issues 5-6, Pages 235-242 (July 2003), Elsevier.
- Laud, P. Handling Encryption in an Analysis for Secure Information Flow . In “Programming Languages and Systems, 12th European Symposium On Programming, ESOP 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003. Proceedings (LNCS 2618), pages 159-173, 2003.
- Roos, M., Willemson, J., Laud, P. Improving the Gnutella protocol against poisoning . Nordic Workshop on Secure IT Systems NordSec 2003.
- Villemson, J. Development orientations for OSS. UNDP/UNESCO Free and Open Source Software (FOSS) Consultation, UNESCO HQ, Paris, France, November 24-25, 2003.
2002
- Buldas, A., Laud, P., Lipmaa, H. Eliminating counterevidence with applications to accountable certificate management , Journal of Computer Security 10 (2002), pages 273–296, IOS Press
- Buldas, A., Roos, M., Willemson, J. Undeniable replies for database queries, in Proceedings of the Fifth International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia, edited by Hele-Mai Haav and Ahto Kalja, Vol. 2, pp. 215-226.
- Heero, K., Puus, U., Willemson, J. XML based document management in Estonian legislative system, presented in Fifth International Baltic Conference on DB and IS, June 2002, Tallinn, Estonia. Proceedings of the Fifth International Baltic Conference, BalticDB&IS 2002. Edited by Hele-Mai Haav and Ahto Kalja.
- Kruusmaa, M., Willemson, J. Covering the Path Space: A Casebase Analysis for Mobile Robot Path Planning. Research and Development in Intelligent Systems XIX, Proceedings The Twenty-second SGAI International Conference on Knowledge Based Systems and Applied Artificial Intelligence, BCS Conference Series, Springer, pp. 1-16. 2001
- Laud, P. Encryption Cycles and Two Views of Cryptography. In NORDSEC 2002 – Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002.
- Laud, P. Pseudorandom permutations and equivalence of formal expressions(abstract). In the 14th Nordic Workshop on Programming Theory, NWPT’02, pages 63-65, Tallinn, Estonia, November 20-22.
2001/2000
- Ansper, A., Buldas, A., Saarepera, M., Willemson, J. Improving the availability of time-stamping services, ACISP 2001, 11.-13. July 2001, Sydney, Australia.
- Ansper, A., Buldas, A., Roos, M., Willemson, J. Efficient long-term validation of digital signatures . Advances in Cryptology – PKC 2001, Springer-Verlag, LNCS 1992, pp 402-415, presented on PKC 2001, February 2001, Cheju Island, Korea
- Buldas, A., Laud, P., Lipmaa, H. Certificate Management using Undeniable Attestations. 7th ACM Conference on Computer and Communications Security, pages 9-18, Athens, Greece, November 1-4, 2000.
- Buldas, A., Praust, V., Roos, M., Villemson, J. Long-Term Validation of E-Documents, International Conference “Information Technologies and Telecommunications in the Baltic States – Baltic IT&T ‘2000”, April 6-7, Radisson SAS Daugava Hotel, Riga, Latvia
- Buldas, A., Lipmaa, H., Schoenmakers, B. Optimally Efficient Accountable Time-Stamping. In Yuliang Zheng and Hideki Imai, editors, Public Key Cryptography ‘2000, volume 1751 of Lecture Notes in Computer Science, pages 293-305, Melbourne, Australia, 18-20 January 2000. Springer Verlag.
- Freudenthal, M., Heiberg, S., Willemson, J. Security Environment on Palm PDA. Annual Computer Security Applications Conference, 11-15 Dec 2000, Sheraton New Orleans, Louisiana, USA.
- Laud, P. Semantics and Program Analysis of Computationally Secure Information Flow. In “Programming Languages and Systems, 10th European Symposium On Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings” (LNCS 2028), pages 77-91, 2001.
- Laud, P. Analysis for Object Inlining in Java. In JOSES: Java Optimization Strategies for Embedded Systems, Genoa, Italy, April 1, 2001.
1999/1998
- Buldas, A., Oit, M., Sarv, M. Data Security in State Registers: Theory and Practice. International Conference and Exhibition “Information Technologies and Telecommunications in the Baltic States”, Riga, April 28-30 1999, p.69-72.
- Buldas, A., Lipmaa, H. Digital Signatures, Timestamps and the corresponding Infrastructure. Küberneetika AS, Technical Report 1998-21, Jan 1998, 7 pages.
- Buldas, A., Laud, P. New linking schemes for digital time-stamping. In The 1st International Conference on Information Security and Cryptology, pages 3-14, Seoul, Korea, 18-19 December 1998. © by Korea Institute of Information Security and Cryptology.
- Buldas, A., Laud, P., Lipmaa, H., Willemson, J. Time-Stamping with Binary Linking Schemes. In Hugo Krawczyk, editor, Advances in Cryptology – CRYPTO ’98, volume 1462 of Lecture Notes in Computer Science, pages 486-501. Springer-Verlag, 1998.
- Buldas, A., Roos, M., Villemson, J. Notarizing Digital Signatures – Elimination of Certificate Revocation Lists. Cybernetica, Technical Report DO-UA-X-22-1299
- Laud, P. Automata accepting coupled-context-free languages. Research Report CS 102/99. Institute of Cybernetics of Tallinn Technical University . Tartu. 15 pages. 1999.
- Laud, P. Ogden’s lemma for coupled-context-free languages; the set of Lyndon words is not coupled-context-free. Research Report CS 103/99. Institute of Cybernetics of Tallinn Technical University . Tartu. 15 pages. 1999.
- Lipmaa, H. AES Candidates: A Survey of Implementations, Technical Report. 8 pages, 1999
- Lipmaa, H. Security in On-Line Governance. Survey prepared under UNESCO project “Developing Telematics and Information Networks for On-Line Governance”, June 1999.
- Lipmaa, H. IDEA: A cipher for multimedia architectures?. In Stafford Tavares and Henk Meijer, editors, Selected Areas in Cryptography ’98, volume 1556 of Lecture Notes in Computer Science, pages 248-263, Kingston, Canada, 17–18 August 1998. Springer-Verlag
- Lipmaa, H. Kvantarvutid. Eesti Füüsika Seltsi 9. aastaraamat, 1999. Pp. 102-125 [“Quantum Computing”, Ninth Annual of the Estonian Physical Society]
- Willemson, J. Revocation Paradigms. April 15, 1999.