Cybernetica

Menu

Reports

Profile for High Performance Digital Signatures

Download PDF

Margus Freudenthal. Profile for High Performance Digital Signatures. 2017

13 pages

A general mechanism for implementing secure operations on secret shared data

Download PDF

Sander Siim, Dan Bogdanov. A general mechanism for implementing secure operations on secret shared data. 2014

26 pages

Using-Batch-Hashing-for-Signing-and-Time-Stamping

Download PDF

Margus Freudenthal. Using-Batch-Hashing-for-Signing-and-Time-Stamping. 2013

32 pages

Implementing Oberon0 Language with Simpl DSL Tool

Download PDF

Margus Freudenthal. Implementing Oberon0 Language with Simpl DSL Tool. 2013

18 pages

The design and implementation of a two party protocol suite for Sharemind 3

Download PDF

Pille Pullonen, Dan Bogdanov, Thomas Schneider. The design and implementation of a two party protocol suite for Sharemind 3. 2012

18 pages

Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings

Download PDF

Alisa Pankova, Peeter Laud. Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. 2012

37 pages

Yao Garbled Circuits in Secret Sharing-based Secure Multi-party Computation

Download PDF

Oleg Šelajev, Sven Laur. Yao Garbled Circuits in Secret Sharing-based Secure Multi-party Computation. 2011

14 pages

Securing the Future - an Information Flow Analysis of a Distributed OO Language

Download PDF

Martin Pettai, Peeter Laud. Securing the Future - an Information Flow Analysis of a Distributed OO Language. 2011

27 pages

Constructing Privacy-Preserving Information Systems Using Secure Multiparty Computation

Download PDF

Liina Kamm, Dan Bogdanov. Constructing Privacy-Preserving Information Systems Using Secure Multiparty Computation. 2011

18 pages

On the (Im)possibility of Perennial Message Recognition Protocols without Public-Key Cryptography

Download PDF

Madeline Gonzalez Muniz, Peeter Laud. On the (Im)possibility of Perennial Message Recognition Protocols without Public-Key Cryptography. 2011

24 pages

A Model for Automatically Evaluating Trust in X.509 Certificates

Download PDF

Abu Shohel Ahmed, Dan Bogdanov. A Model for Automatically Evaluating Trust in X.509 Certificates. 2010

18 pages

Improved protocols for the Sharemind virtual machine

Download PDF

Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson. Improved protocols for the Sharemind virtual machine. 2010

11 pages

Simplicitas Software Architecture Document

Download PDF

Margus Freudenthal. Simplicitas Software Architecture Document. 2010

24 pages

Privacy-preserving Histogram and Frequent Itemset Mining with Sharemind

Download PDF

Dan Bogdanov, Roman Jagomägis, Sven Laur. Privacy-preserving Histogram and Frequent Itemset Mining with Sharemind. 2009

15 pages

Kademlia-based distributed hash tables implementation for VirtualLife

Download PDF

Jaak Ristioja. Kademlia-based distributed hash tables implementation for VirtualLife. 2009

17 pages

Serial Model for Attack Tree Computations

Download PDF

Jan Willemson, Aivo Jürgenson. Serial Model for Attack Tree Computations. 2009

16 pages

An improved-method for privacy-preserving web based data collection

Download PDF

Riivo Talviste, Dan Bpgdanov. An improved-method for privacy-preserving web based data collection. 2009

16 pages

Ründepuud: pooladaptiivne mudel ja ligikaudsed arvutused

Download PDF

Jan Willemson, Aivo Jürgenson. Ründepuud: pooladaptiivne mudel ja ligikaudsed arvutused

27 pages

Privacy preserving collaborative filtering with Sharemind

Download PDF

Dan Bogdanov, Richard Sassoon. Privacy preserving collaborative filtering with Sharemind. 2008

27 pages

X-Road: complete solution for inter-organizational information exchange

Download PDF

Arne Ansper, Jan Willemson. X-Road: complete solution for inter-organizational information exchange. 2006

13 pages

Digitaalallkirja juurutamine riigiasutustes

Download PDF

Arne Ansper, Ahto Buldas, Sven Heiberg, Monika Oit jt. Digitaalallkirja juurutamine riigiasutustes. 2001

111 pages