Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
On Private Scalar Product Computation for Privacy-Preserving Data Mining
- Bart Goethals, S. Laur, H. Lipmaa, Taneli Mielikäinen
- Computer Science, MathematicsICISC
- 2 December 2004
TLDR
An Oblivious Transfer Protocol with Log-Squared Communication
- H. Lipmaa
- Computer Science, MathematicsISC
- 20 September 2005
We propose a one-round 1-out-of-n computationally-private information retrieval protocol for l-bit strings with low-degree polylogarithmic receiver-computation, linear sender-computation and…
Efficient Algorithms for Computing Differential Properties of Addition
TLDR
Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption
- H. Lipmaa, P. Rogaway, D. Wagner
- Computer Science
- 2000
TLDR
Secure Equality and Greater-Than Tests with Sublinear Online Complexity
TLDR
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
- H. Lipmaa
- Mathematics, Computer ScienceASIACRYPT
- 30 November 2003
TLDR
Secure Vickrey Auctions without Threshold Trust
- H. Lipmaa, N. Asokan, Valtteri Niemi
- EconomicsFinancial Cryptography
- 11 March 2002
TLDR
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction
- H. Lipmaa, Guilin Wang, F. Bao
- Computer Science, MathematicsICALP
- 11 July 2005
TLDR
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
- H. Lipmaa
- Mathematics, Computer ScienceTCC
- 19 March 2012
TLDR
Cryptographically private support vector machines
- S. Laur, H. Lipmaa, Taneli Mielikäinen
- Computer Science, MathematicsKDD '06
- 20 August 2006
TLDR
...
...