TCS / Research / Publications / Sven Laur
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Publications by Sven Laur

2009

15Sven Laur and Sylvain Pasini. User-aided data authentication. International Journal of Security and Networks, 4(1/2):69–86, 2009.
Info

2008

14Sven Laur and Sylvain Pasini. Sas-based group authentication and key agreement protocols. In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, volume 4939 of Lecture Notes in Computer Science, pages 197–213. Springer, 2008.
Info
13Sven Laur. Cryptographic Protocol Design. Doctoral dissertation, Helsinki University of Technology, 2008. TKK Dissertations in Information and Computer Science, TKK-ISC-D2.
PDF (2 MB)
Info

2007

12Ahto Buldas and Sven Laur. Knowledge-binding commitments with applications in time-stamping. In Public Key Cryptography - PKC 2007, 10th International Conferenc on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, volume 4450 of Lecture Notes in Computer Science, pages 150–165. Springer, 2007.
Info
11Sven Laur and Helger Lipmaa. A new protocol for conditional disclosure of secrets and its applications. In Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, volume 4521 of Lecture Notes in Computer Science, pages 207–225. Springer, 2007.
Info

2006

10Sven Laur and Helger Lipmaa. Consistent adaptive two-party computations. Cryptology ePrint Archive, Report 2006/088, 2006. Techical report.
Info
See eprint.iacr.org ...
9Ahto Buldas and Sven Laur. Do broken hash functions affect the security of time-stamping schemes?. In Jianying Zhou, Moti Yung, and Feng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, volume 3989 of Lecture Notes in Computer Science, pages 50–65. Springer, 2006.
Info
See dx.doi.org ...
8Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. Cryptographically private support vector machines. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 618–624, New York, NY, USA, 2006. ACM Press.
Info
See doi.acm.org ...
7Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. In The 5th International Conference on Cryptology and Network Security, CANS 2006, Suzhou, Dec. 8 - 10, 2006, volume 4301 of Lecture Notes in Computer Science, pages 90–107. Springer, 2006. A shortened version of ePrint Report 2005/424.
Info
6Sven Laur and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings: Extended version. Cryptology ePrint Archive, Report 2005/424, 2006. A shorter more compact version was published at CANS 2006.
PostScript (436 kB)
GZipped PostScript (182 kB)
PDF (422 kB)
Info
See eprint.iacr.org ...

2005

5Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. Private itemset support counting.. In Sihan Qing, Wenbo Mao, Javier Lopez, and Guilin Wang, editors, Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, volume 3783 of Lecture Notes in Computer Science, pages 97–111. Springer, 2005.
Info
See dx.doi.org ...
4Sven Laur and Helger Lipmaa. Additive conditional disclosure of secrets and applications. Cryptology ePrint Archive, Report 2005/378, 2005. Techical report.
Info
See eprint.iacr.org ...
3Sven Laur, N. Asokan, and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings: Preliminary version. Cryptology ePrint Archive, Report 2005/424, 2005. Shorter more compact version was published at CANS 2006.
Info
See eprint.iacr.org ...

2004

2Sven Laur and Helger Lipmaa. On private similarity search protocols. In Sanna Liimatainen and Teemupekka Virtanen, editors, Proceedings of the 9th Nordic Workshop on Secure IT Systems (NordSec 2004), pages 73–77, 2004.
PDF (155 kB)
Info
1Bart Goethals, Sven Laur, Helger Lipmaa, and Taneli Mielikäinen. On private scalar product computation for privacy-preserving data mining.. In Choonsik Park and Seongtaek Chee, editors, Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, volume 3506 of Lecture Notes in Computer Science, pages 104–120. Springer, 2004.
Info
See dx.doi.org ...

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.