On private scalar product computation for privacy-preserving data mining B Goethals, S Laur, H Lipmaa, T Mielikäinen ICISC 2004, 104--120, 2004 | 562 | 2004 |
An oblivious transfer protocol with log-squared communication H Lipmaa ISC 2005, 314-328, 2005 | 398 | 2005 |
CTR-mode encryption H Lipmaa, P Rogaway, D Wagner First NIST Workshop on Modes of Operation 39, 2000 | 377* | 2000 |
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments H Lipmaa TCC 2012, 2012 | 305 | 2012 |
Efficient algorithms for computing differential properties of addition H Lipmaa, S Moriai Fast Software Encryption, 35-45, 2001 | 267 | 2001 |
Secure Vickrey auctions without threshold trust H Lipmaa, N Asokan, V Niemi FC 2002, 87-101, 2002 | 263* | 2002 |
On diophantine complexity and statistical zero-knowledge arguments H Lipmaa ASIACRYPT 2003, 398-415, 2003 | 220 | 2003 |
Time-stamping with binary linking schemes A Buldas, P Laud, H Lipmaa, J Villemson Advances in Cryptology—CRYPTO'98, 486-501, 1998 | 213 | 1998 |
Designated verifier signature schemes: Attacks, new security notions and a new construction H Lipmaa, G Wang, F Bao ICALP 2005, 101-101, 2005 | 199 | 2005 |
Cryptographically private support vector machines S Laur, H Lipmaa, T Mielikäinen Proceedings of the 12th ACM SIGKDD international conference on Knowledge …, 2006 | 179 | 2006 |
Verifiable homomorphic oblivious transfer and private equality test H Lipmaa ASIACRYPT 2003, 416-433, 2003 | 144 | 2003 |
Accountable certificate management using undeniable attestations A Buldas, P Laud, H Lipmaa Proceedings of the 7th ACM Conference on Computer and Communications …, 2000 | 138 | 2000 |
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes H Lipmaa ASIACRYPT 2013, 41--60, 2013 | 137 | 2013 |
On subversion-resistant SNARKs B Abdolmaleki, H Lipmaa, J Siim, M Zając Journal of Cryptology 34 (3), 1-42, 2021 | 116 | 2021 |
Hybrid voting protocols and hardness of manipulation E Elkind, H Lipmaa ISAAC 2005, 206-215, 2005 | 111 | 2005 |
Fast implementations of AES candidates K Aoki, H Lipmaa Third AES Candidate Conference, 13-14, 2000 | 108 | 2000 |
Optimally efficient accountable time-stamping A Buldas, H Lipmaa, B Schoenmakers Public Key Cryptography, 293-305, 2000 | 99 | 2000 |
Secure Accumulators from Euclidean Rings without Trusted Setup H Lipmaa ACNS 2012, 2012 | 93 | 2012 |
Secure Equality and Greater-Than Tests with Sublinear Online Complexity H Lipmaa, T Toft ICALP(2) 2013, 645--656, 2013 | 92 | 2013 |
First CPIR protocol with data-dependent computation H Lipmaa ICISC 2009, 193-210, 2009 | 89 | 2009 |