2019
Toomas Krips.
Improving performance of secure real-number operations.
PhD thesis. University of Tartu. 2019.
(PDF, BibTeX)
@phdthesis{UT:Krips19,
author = {Toomas Krips},
title = {Improving performance of secure real-number operations},
school = {University of Tartu},
year = {2019},
url = {https://dspace.ut.ee/handle/10062/63763}
}
Jan Willemson.
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application.
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Lecture Notes in Computer Science, vol. 11980, pp. 111--121, Springer, 2020.
(PDF, BibTeX)
@inproceedings{DBLP:conf/esorics/Willemson19,
author = {Jan Willemson},
editor = {Sokratis K. Katsikas and
Fr{\'{e}}d{\'{e}}ric Cuppens and
Nora Cuppens and
Costas Lambrinoudakis and
Christos Kalloniatis and
John Mylopoulos and
Annie I. Ant{\'{o}}n and
Stefanos Gritzalis and
Frank Pallas and
J{\"{o}}rg Pohle and
M. Angela Sasse and
Weizhi Meng and
Steven Furnell and
Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
title = {{How Not to Use a Privacy-Preserving Computation Platform: Case Study
of a Voting Application}},
booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
2019 Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {11980},
pages = {111--121},
publisher = {Springer},
year = {2020},
url = {https://link.springer.com/chapter/10.1007%2F978-3-030-42048-2_8}
}
2018
Peeter Laud, Alisa Pankova.
Privacy-preserving record linkage in large databases using secure multiparty computation.
BMC Medical Genomics, Volume 11, Supplement 4, 35–55, 2018.
(PDF, BibTeX)
@article{Laud2018,
author = {Laud, Peeter and Pankova, Alisa},
doi = {10.1186/s12920-018-0400-8},
issn = {1755-8794},
journal = {BMC Medical Genomics},
number = {4},
pages = {35–55},
title = {Privacy-preserving record linkage in large databases using secure multiparty computation},
url = {https://doi.org/10.1186/s12920-018-0400-8},
volume = {11},
year = {2018}
}
Peeter Laud, Alisa Pankova.
Bit Decomposition Protocols in Secure Multiparty Computation.
In Proceedings of WAHC 2018 – 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 37-48, 2018.
(PDF, BibTeX)
@inproceedings{Laud:2018:BDP:3267973.3267979,
acmid = {3267979},
address = {New York, NY, USA},
author = {Laud, Peeter and Pankova, Alisa},
booktitle = {Proceedings of the 6th Workshop on Encrypted Computing \&\#38; Applied Homomorphic Cryptography},
doi = {10.1145/3267973.3267979},
isbn = {978-1-4503-5987-0},
location = {Toronto, Canada},
pages = {37–48},
publisher = {ACM},
series = {WAHC '18},
title = {Bit Decomposition Protocols in Secure Multiparty Computation},
url = {http://doi.acm.org/10.1145/3267973.3267979},
year = {2018}
}
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk.
Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data.
IEEE/ACM Transactions on Computational Biology and Bioinformatics, Volume 15, Issue 5, 1427-1432, 2018.
(PDF, BibTeX)
@article{8417961,
author = {{Bogdanov}, Dan and {Kamm}, Liina and {Laur}, Sven and {Sokk}, Ville},
doi = {10.1109/TCBB.2018.2858818},
issn = {1545-5963},
journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics},
number = {5},
pages = {1427–1432},
title = {Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data},
volume = {15},
year = {2018}
}
David W. Archer and Dan Bogdanov and Y. Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright.
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation.
The Computer Journal, Volume 61, Issue 12, 1 December 2018, Pages 1749–1771.
(PDF, BibTeX)
@misc{CJ:ABLKNPSW18,
author="David W. Archer and Dan Bogdanov and Y. Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright.",
title="{{From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation}}",
journal = {The Computer Journal},
volume = {61},
number = {12},
pages = {1749-1771},
year = {2018},
doi = {10.1093/comjnl/bxy090},
URL = {http://dx.doi.org/10.1093/comjnl/bxy090},
eprint = {/oup/backfile/content_public/journal/comjnl/61/12/10.1093_comjnl_bxy090/1/bxy090.pdf}
}
2017
Peeter Laud, Alisa Pankova, Roman Jagomägis.
Preprocessing Based Verification of Multiparty Protocols with Honest Majority
In Proceedings on Privacy Enhancing Technologies, Volume 2017, Issue 4, 23-76, 2017.
(PDF, BibTeX)
@article{LaPaJa17,
author = {Laud, Peeter and Pankova, Alisa and Jagomägis, Roman},
doi = {10.1515/popets-2017-0038},
issn = {2299-0984},
journal = {Proceedings on Privacy Enhancing Technologies},
number = {4},
pages = {23–76},
title = {Preprocessing Based Verification of Multiparty Protocols with Honest Majority},
url = {https://doi.org/10.1515/popets-2017-0038},
volume = {2017},
year = {2017}
}
Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, Thomas Zacharias.
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In proceedings of USENIX Security Symposium. USENIX Association, Vancouver, BC, 1217–1234. 2017.
(PDF, BibTeX)
@inproceedings {Alexopoulos17,
author = {Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias},
title = {{MCMix}: Anonymous Messaging via Secure Multiparty Computation},
booktitle = {26th {USENIX} Security Symposium ({USENIX} Security 17)},
year = {2017},
isbn = {978-1-931971-40-9},
address = {Vancouver, BC},
pages = {1217--1234},
url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/alexopoulos},
publisher = {{USENIX} Association},
}
Alisa Pankova.
Efficient multiparty computation secure against covert and active adversaries.
PhD thesis. University of Tartu. 2017.
(PDF, BibTeX)
@phdthesis{UT:Pankova17,
author = {Alisa Pankova},
title = {Efficient multiparty computation secure against covert and active adversaries},
school = {University of Tartu},
year = {2017},
url = {http://hdl.handle.net/10062/56359}
}
Jaak Randmets.
Programming Languages for Secure Multi-party Computation Application Development.
PhD thesis. University of Tartu. 2017.
(PDF, BibTeX)
@phdthesis{UT:Randmets17,
author = {Jaak Randmets},
title = {Programming Languages for Secure Multi-party Computation Application Development},
school = {University of Tartu},
year = {2017},
url = {http://hdl.handle.net/10062/56298}
}
2016
Peeter Laud, Alisa Pankova.
Optimizing Secure Computation Programs with Private Conditionals.
In Proceedings of 18th International Conference on Information and Communications Security. 2017.
(Extended version, PDF, BibTeX)
@inproceedings{Laud2016,
author="Peeter Laud, Alisa Pankova",
editor="Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing",
title="Optimizing Secure Computation Programs with Private Conditionals",
bookTitle="Information and Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 -- December 2, 2016, Proceedings",
year="2016",
publisher="Springer International Publishing",
address="Cham",
pages="418--430",
isbn="978-3-319-50011-9",
doi="10.1007/978-3-319-50011-9_32",
url="http://dx.doi.org/10.1007/978-3-319-50011-9_32"
}
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk.
Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data.
Proceedings of the 3rd International Workshop on Genome Privacy and Security.
(PDF, BibTeX)
@inproceedings{BKLS16b,
author = {Bogdanov, Dan and Kamm, Liina and Laur, Sven and Sokk, Ville},
title = {Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data},
booktitle = {Proceedings of the 3rd International Workshop on Genome Privacy and Security (GenoPri'16)},
series = {GenoPri '16},
year = {2016},
location = {Chicago, USA},
pages = {1--8},
numpages = {8},
url = {http://2016.genopri.org/uploads/3/9/9/9/39999711/genopri16_paper_10.pdf}
}
Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson.
Alternative Implementations of Secure Real Numbers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS).
(Extended version, PDF, BibTeX)
@inproceedings{DKKRW16,
author = {Dimitrov, Vassil and Kerik, Liisi and Krips, Toomas and Randmets, Jaak and Willemson, Jan},
title = {Alternative Implementations of Secure Real Numbers},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '16},
year = {2016},
isbn = {978-1-4503-4139-4},
location = {Vienna, Austria},
pages = {553--564},
numpages = {12},
url = {http://doi.acm.org/10.1145/2976749.2978348},
doi = {10.1145/2976749.2978348},
acmid = {2978348},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {privacy-preserving data analysis, secure computations, secure fixed- and floating-point arithmetic},
}
David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen.
Maturity and Performance of Programmable Secure Computation.
IEEE Security and Privacy. 2016.
(Extended version, PDF, BibTeX)
@article{ArcherBPP16,
title={Maturity and Performance of Programmable Secure Computation},
author={David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen},
journal={IEEE Security and Privacy},
volume={14},
number={5},
pages={48--56},
year={2016},
publisher={IEEE Computer Society},
keywords={Computer security;Cryptography;Performance evaluation;Privacy;homomorphic cryptography;performance;privacy;secure computing;security},
doi={10.1109/MSP.2016.97},
ISSN={1540-7993},
month={Sept},
}
Dan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht.
Privacy-preserving tax fraud detection in the cloud with realistic data volumes.
Cybernetica research report T-4-24. 2016.
(PDF, BibTeX)
@TECHREPORT{CYBER:BJSV16,
author = {Dan Bogdanov and Marko J\~oemets and Sander Siim and Meril Vaht},
title = {Privacy-preserving tax fraud detection in the cloud with realistic data volumes},
institution = {Cybernetica AS},
year = {2016},
number = {T-4-24},
address = {\url{https://cyber.ee/research/reports/}}
}
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk.
Rmind: a tool for cryptographically secure statistical analysis.
IEEE Transactions on Dependable and Secure Computing. 2016.
(Extended version, PDF, BibTeX)
@article{tdsc:BKLS16,
author = {Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk},
title = {{Rmind: a tool for cryptographically secure statistical analysis}},
journal={IEEE Transactions on Dependable and Secure Computing},
year={2016},
volume={PP},
number={99},
pages={1-14},
doi={10.1109/TDSC.2016.2587623},
}
Liisi Kerik, Peeter Laud, Jaak Randmets
Optimizing for Robust and Scalable Integer and Floating-Point Arithmetic.
Financial Cryptography and Data Security - Workshops, BITCOIN, VOTING, and WAHC. 2016.
(PDF, BibTeX)
@inproceedings{KerikLR16,
author = {Liisi Kerik and Peeter Laud and Jaak Randmets},
title = {Optimizing {MPC} for Robust and Scalable Integer and Floating-Point Arithmetic},
booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops,
BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers},
pages = {271--287},
year = {2016},
publisher = {Springer},
url = {http://dx.doi.org/10.1007/978-3-662-53357-4_18},
doi = {10.1007/978-3-662-53357-4_18},
}
Johannes A. Buchmann, Niklas Büscher, Florian Göpfert, Stefan Katzenbeisser, Juliane Krämer, Daniele Micciancio, Sander Siim, Christine van Vredendaal, Michael Walter.
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016.
(PDF, BibTeX)
@inproceedings{BuchmannBGKMSV16,
author = {Johannes A. Buchmann and Niklas B{\"{u}}scher and Florian G{\"{o}}pfert and
Stefan Katzenbeisser and Juliane Kr{\"{a}}mer and Daniele Micciancio and
Sander Siim and Christine van Vredendaal and Michael Walter},
title = {Creating Cryptographic Challenges Using Multi-Party Computation: The {LWE} Challenge},
booktitle = {Proceedings of the 3rd {ACM} International Workshop on {ASIA} Public-Key Cryptography,
AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016},
pages = {11--20},
publisher = {{ACM}},
year = {2016},
url = {http://doi.acm.org/10.1145/2898420.2898422},
doi = {10.1145/2818000.2818027},
}
Sander Siim.
A Comprehensive Protocol Suite for Secure Two-Party Computation.
Master's Thesis. University of Tartu. 2016.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Siim16,
author = {Sander Siim},
title = {{A Comprehensive Protocol Suite for Secure Two-Party Computation}},
school = {Institute of Computer Science, University of Tartu},
year = {2016}
}
Ville Sokk.
An improved type system for a privacy-aware programming language and its practical applications.
Master's Thesis. University of Tartu. 2016.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Sokk16,
author = {Ville Sokk},
title = {{An improved type system for a privacy-aware programming language and its practical applications}},
school = {Institute of Computer Science, University of Tartu},
year = {2016}
}
Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste.
Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation.
In Proceedings on Privacy Enhancing Technologies, PoPETs, 2016 (3), pp 117–135, 2016.
(Extended version, PDF, BibTeX)
@article{PoPETS16:BKKRST16,
author = {Dan Bogdanov and Liina Kamm and Baldur Kubo and Reimo Rebane and Ville Sokk and Riivo Talviste},
title = {{Students and Taxes: a Privacy-Preserving
Study Using Secure Computation}},
journal = {PoPETs},
volume = {2016},
number = {3},
pages = {117–135},
year = {2016},
url = {http://www.degruyter.com/view/j/popets.2016.2016.issue-3/popets-2015-0019/popets-2016-0019.xml},
}
Toomas Krips, Jan Willemson.
Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation.
In Foundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, LNCS, vol. 9482, pp. 66--82, Springer 2016.
(PDF, BibTeX)
@inproceedings{KrWi16,
author={Krips, Toomas and Willemson, Jan},
editor={Garcia-Alfaro, Joaquin and Kranakis, Evangelos and Bonfante, Guillaume},
title={{Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation}},
booktitle={Foundations and Practice of Security: 8th International Symposium, FPS 2015,
Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers},
year={2016},
series={LNCS},
volume={9482},
publisher="Springer",
pages={66--82},
doi="10.1007/978-3-319-30303-1_5",
url="http://dx.doi.org/10.1007/978-3-319-30303-1_5"
}
Riivo Talviste.
Applying Secure Multi-party Computation in Practice.
PhD thesis. University of Tartu. 2016.
(PDF, BibTeX)
@phdthesis{UT:Talviste16,
author = {Riivo Talviste},
title = {Applying Secure Multi-party Computation in Practice},
school = {University of Tartu},
year = {2016},
url = {http://dspace.ut.ee/handle/10062/50510}
}
2015
Liina Kamm, Jan Willemson.
Secure floating point arithmetic and private satellite collision analysis.
International Journal of Information Security. 2015.
(PDF, BibTeX)
@article{IJIS:KW15,
author = {Liina Kamm and Jan Willemson},
title = {{Secure Floating-Point Arithmetic and Private Satellite Collision Analysis}},
journal={International Journal of Information Security},
year = {2015},
month="Nov",
day="01",
volume="14",
number="6",
pages="531--548",
publisher={Springer Berlin Heidelberg},
url={http://dx.doi.org/10.1007/s10207-014-0271-8}
}
Martin Pettai, Peeter Laud.
Combining Differential Privacy and Secure Multiparty Computation.
In Proceedings of the 31st Annual Computer Security Applications Conference. 2015.
(Extended version, PDF, BibTeX)
@inproceedings{DBLP:conf/acsac/PettaiL15,
author = {Martin Pettai and
Peeter Laud},
title = {Combining Differential Privacy and Secure Multiparty Computation},
booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference,
Los Angeles, CA, USA, December 7-11, 2015},
pages = {421--430},
publisher = {{ACM}},
year = {2015},
url = {http://doi.acm.org/10.1145/2818000.2818027},
doi = {10.1145/2818000.2818027},
}
Peeter Laud, Jaak Randmets.
A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols.
In Proceedings of 22nd ACM Conference on Computer and Communications Security. 2015.
(PDF, BibTeX)
@inproceedings{DBLP:conf/ccs/LaudR15,
author = {Peeter Laud and
Jaak Randmets},
title = {A Domain-Specific Language for Low-Level Secure Multiparty Computation
Protocols},
booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
Communications Security, Denver, CO, USA, October 12-6, 2015},
pages = {1492--1503},
publisher = {{ACM}},
year = {2015},
url = {http://doi.acm.org/10.1145/2810103.2813664},
doi = {10.1145/2810103.2813664},
}
Martin Pettai, Peeter Laud.
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.
In Proceedings of the 28th IEEE Computer Security Foundations Symposium. 2015.
(Extended version, PDF, BibTeX)
@inproceedings{DBLP:conf/csfw/PettaiL15,
author = {Martin Pettai and
Peeter Laud},
title = {Automatic Proofs of Privacy of Secure Multi-party Computation Protocols
against Active Adversaries},
booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
Italy, 13-17 July, 2015},
pages = {75--89},
publisher = {{IEEE}},
year = {2015},
url = {http://dx.doi.org/10.1109/CSF.2015.13},
doi = {10.1109/CSF.2015.13},
}
Peeter Laud.
Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees.
In Proceedings of Privacy Enhancing Technologies. 2015.
(PDF, BibTeX)
@article{DBLP:journals/popets/Laud15,
author = {Peeter Laud},
title = {Parallel Oblivious Array Access for Secure Multiparty Computation
and Privacy-Preserving Minimum Spanning Trees},
journal = {PoPETs},
volume = {2015},
number = {2},
pages = {188--205},
year = {2015},
url = {http://www.degruyter.com/view/j/popets.2015.2015.issue-2/popets-2015-0011/popets-2015-0011.xml},
}
David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen.
Maturity and Performance of Programmable Secure Computation.
Cryptology ePrint Archive: Report 2015/1039. 2015.
(PDF, BibTeX)
@misc{cryptoeprint:2015:1039,
author = {David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen},
title = {Maturity and Performance of Programmable Secure Computation},
howpublished = {Cryptology ePrint Archive, Report 2015/1039},
year = {2015},
note = {\url{http://eprint.iacr.org/}},
}
Annett Saarik.
Privacy Risks and Data Protection Controls in Passenger Name Record Processing.
Diploma Thesis. Estonian Aviation Academy. 2015.
(Extended version, PDF, BibTeX)
@MISC{Dipl:Saarik15,
author = {Annett Saarik},
title = {{Privacy Risks and Data Protection Controls in Passenger Name Record Processing}},
howpublished = {Diploma thesis (In Estonian, English summary). Estonian Aviation Academy},
year = {2015}
}
Meril Vaht.
The Analysis and Design of a Privacy-Preserving Survey System.
Master's Thesis. University of Tartu. 2015.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Vaht15,
author = {Meril Vaht},
title = {{The Analysis and Design of a Privacy-Preserving Survey System}},
school = {Institute of Computer Science, University of Tartu},
year = {2015}
}
Pille Pullonen, Sander Siim.
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations.
Financial Cryptography and Data Security - Workshops on BITCOIN, WAHC and Wearable. 2015.
(Extended version, PDF, BibTeX)
@incollection{WAHC15:PS15,
author = {Pille Pullonen and Sander Siim},
title = {Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations},
booktitle = {Financial Cryptography and Data Security - {FC} 2015 Workshops, {BITCOIN}, {WAHC} and {Wearable} 2015,
San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers},
series = {LNCS},
volume = {8976},
year= {2015},
pages={172-183},
publisher = {Springer},
isbn={978-3-662-48050-2},
url={http://dx.doi.org/10.1007/978-3-662-48051-9_13}
}
Dan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht.
How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation.
Financial Cryptography and Data Security - 19th International Conference. 2015.
(PDF, BibTeX)
@incollection{FC15:BJSV15,
author = {Dan Bogdanov and Marko J\~oemets and Sander Siim and Meril Vaht},
title = {{How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation}},
booktitle = {Financial Cryptography and Data Security - 19th International Conference,
{FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers},
series = {LNCS},
volume = {8975},
year = {2015},
pages = {227-234},
publisher = {Springer},
isbn = {978-3-662-47853-0},
url = {http://dx.doi.org/10.1007/978-3-662-47854-7_14}
}
Liina Kamm.
Privacy-preserving statistical analysis using secure multi-party computation.
PhD thesis. University of Tartu. 2015.
(PDF, BibTeX)
@phdthesis{UT:Kamm15,
author = {Liina Kamm},
title = {Privacy-preserving statistical analysis using secure multi-party computation},
school = {University of Tartu},
year = {2015},
url = {http://hdl.handle.net/10062/45343}
}
2014
Peeter Laud.
A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation.
In Proceedings of 16th International Conference on Information and Communications Security. 2014.
(PDF, BibTeX)
@inproceedings{DBLP:conf/icics/Laud14,
author = {Peeter Laud},
title = {A Private Lookup Protocol with Low Online Complexity for Secure Multiparty
Computation},
booktitle = {Information and Communications Security - 16th International Conference,
{ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
Papers},
series = {Lecture Notes in Computer Science},
volume = {8958},
pages = {143--157},
publisher = {Springer},
year = {2014},
url = {http://dx.doi.org/10.1007/978-3-319-21966-0_11},
doi = {10.1007/978-3-319-21966-0_11},
}
Peeter Laud, Jan Willemson.
Composable Oblivious Extended Permutations.
In Proceedings of the 7th International Symposium on Foundations and Practice of Security. 2014.
(Extended version, PDF, BibTeX)
@inproceedings{DBLP:conf/fps/LaudW14,
author = {Peeter Laud and
Jan Willemson},
title = {Composable Oblivious Extended Permutations},
booktitle = {Foundations and Practice of Security - 7th International Symposium,
{FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
Papers},
series = {Lecture Notes in Computer Science},
volume = {8930},
pages = {294--310},
publisher = {Springer},
year = {2014},
url = {http://dx.doi.org/10.1007/978-3-319-17040-4_19},
doi = {10.1007/978-3-319-17040-4_19},
}
Peeter Laud, Alisa Pankova.
Verifiable Computation in Multiparty Protocols with Honest Majority.
In Proceedings of the 8th International Conference on Provable Security. 2014.
(Extended version, PDF, BibTeX)
@inproceedings{DBLP:conf/provsec/LaudP14,
author = {Peeter Laud and
Alisa Pankova},
editor = {Sherman S. M. Chow and
Joseph K. Liu and
Lucas Chi Kwong Hui and
Siu{-}Ming Yiu},
title = {Verifiable Computation in Multiparty Protocols with Honest Majority},
booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong
Kong, China, October 9-10, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8782},
pages = {146--161},
publisher = {Springer},
year = {2014},
url = {http://dx.doi.org/10.1007/978-3-319-12475-9_11},
doi = {10.1007/978-3-319-12475-9_11},
}
Dan Bogdanov, Peeter Laud, Jaak Randmets.
Domain-Polymorphic Programming of Privacy-Preserving Applications.
In Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security, PLAS'14, ACM Digital Library. 2014.
(PDF, BibTeX)
@inproceedings{PLAS14:BLR14,
author = {Dan Bogdanov and Peeter Laud and Jaak Randmets},
title = {Domain-Polymorphic Programming of Privacy-Preserving Applications},
booktitle = {Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security},
series = {PLAS'14},
year = {2014},
location = {Uppsala, Sweden},
pages = {53--65},
articleno = {53},
url = {http://doi.acm.org/10.1145/2637113.2637119},
publisher = {ACM}
}
Dan Bogdanov, Peeter Laud, Sven Laur, Pille Pullonen.
From Input Private to Universally Composable Secure Multi-party Computation Primitives.
In Proceedings of the 27th IEEE Computer Security Foundations Symposium, CSF 2014, pp. 184-198. 2014.
(PDF, BibTeX)
@inproceedings{CSF14:BLLP14,
author = {Dan Bogdanov and
Peeter Laud and
Sven Laur and
Pille Pullonen},
title = {From Input Private to Universally Composable Secure Multi-party Computation
Primitives},
booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014},
pages = {184--198},
year = {2014},
month = {July},
publisher = {{IEEE}}
}
Toomas Krips, Jan Willemson.
Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations.
In Proceedings of the 17th International Information Security Conference, ISC 2014, LNCS, vol. 8783, pp. 179-197. Springer. 2014.
(Extended version, PDF, BibTeX)
@incollection{ISC14:KW14,
author={Toomas Krips and Jan Willemson},
title={Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations},
booktitle={{Proceedings of the 17th International Information Security Conference, ISC 2014}},
series={LNCS},
volume={8783},
year={2014},
pages={179-197},
publisher={Springer}
}
Tiit Pikma.
Auditing of Secure Multiparty Computations.
Master's thesis. University of Tartu. 2014.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Pikma14,
author = {Tiit Pikma},
title = {{Auditing of Secure Multiparty Computations}},
school = {Institute of Computer Science, University of Tartu},
year = {2014}
}
Dan Bogdanov, Liina Kamm, Sven Laur, Ville Sokk.
Rmind: a tool for cryptographically secure statistical analysis.
Cryptology ePrint Archive, Report 2014/512. 2014.
(PDF, BibTeX)
@misc{eprint:BKLS14,
author = {Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk},
title = {{Rmind: a tool for cryptographically secure statistical analysis}},
howpublished = {Cryptology ePrint Archive, Report 2014/512},
year = {2014},
note = {\url{http://eprint.iacr.org/}},
}
Dan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht.
Turvalist ühisarvutust kasutava käibemaksudeklaratsioonide riskianalüüsi süsteemi prototüüp (Secure multi-party computation system prototype for analyzing risks in value added tax declarations).
Cybernetica research report T-4-22. 2014.
(PDF, BibTeX)
@TECHREPORT{CYBER:BJSV14,
author = {Dan Bogdanov and Marko J\~oemets and Sander Siim and Meril Vaht},
title = {{Turvalist \"uhisarvutust kasutava k\"aibemaksudeklaratsioonide riskianal\"u\"usi s\"usteemi protot\"u\"up (Secure multi-party computation system prototype for analyzing risks in value added tax declarations)}},
institution = {Cybernetica},
year = {2014},
number = {T-4-22},
address = {\url{https://cyber.ee/research/reports/}}
}
Dan Bogdanov, Pille Pruulmann-Vengerfeldt.
Adoption Barriers of Secure Computation for Decision Making in a Defence Application.
Proceedings of the STO-MP-SAS-106 - Analysis Support to Decision Making in Cyber Defence and Security. NATO STO. 2014.
(BibTeX)
@inproceedings{SAS-106:BP14,
author = {Dan Bogdanov and Pille Pruulmann-Vengerfeldt},
title = {Adoption Barriers of Secure Computation for Decision Making in a Defence Application},
booktitle = {STO-MP-SAS-106 - Analysis Support to Decision Making in Cyber Defence and Security},
year= {2014},
location = {Tallinn, Estonia},
publisher = {NATO STO}
}
Dan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson.
A secure genetic algorithm for the subset cover problem and its application to privacy protection.
In Proceedings of the 8th International Workshop on Information Security Theory and Practice, WISTP 2014, LNCS, vol 8501, pp. 108-123. Springer. 2014.
(PDF, BibTeX)
@inproceedings{WISTP14:BEJKMW14,
author = {Dan Bogdanov and
Keita Emura and
Roman Jagom{\"{a}}gis and
Akira Kanaoka and
Shin'ichiro Matsuo and
Jan Willemson},
title = {A Secure Genetic Algorithm for the Subset Cover Problem and Its Application
to Privacy Protection},
booktitle = {Information Security Theory and Practice. Securing the Internet of
Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
pages = {108--123},
year = {2014},
url = {http://dx.doi.org/10.1007/978-3-662-43826-8_8},
doi = {10.1007/978-3-662-43826-8_8},
}
Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt, Riivo Talviste, Jan Willemson.
Privacy-preserving statistical data analysis on federated databases.
In Proceedings of the 2nd Annual Privacy Forum 2014, APF 2014, LNCS, vol. 8450, pp. 30-55. Springer. 2014.
(PDF, BibTeX)
@inproceedings{APF14:BKL14,
author = {Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt and Riivo Talviste and Jan Willemson},
title = {Privacy-preserving statistical data analysis on federated databases},
booktitle = {Proceedings of the Annual Privacy Forum. APF'14},
series = {LNCS},
volume={8450},
pages={30-55},
year= {2014},
location = {Athens, Greece},
publisher = {Springer}
}
Sander Siim, Dan Bogdanov.
A general mechanism for implementing secure operations on secret shared data.
Cybernetica research report T-4-21. 2014.
(PDF, BibTeX)
@TECHREPORT{CYBER:SB14,
author = {Sander Siim and Dan Bogdanov},
title = {{A general mechanism for implementing secure operations on secret shared data}},
institution = {Cybernetica},
year = {2014},
number = {T-4-21},
address = {\url{https://cyber.ee/research/reports/}}
}
Dan Bogdanov, Sven Laur, Riivo Talviste.
A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation.
In Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014, LNCS, vol. 8788, pp. 59-74. Springer (2014).
(PDF, BibTeX)
@incollection{NordSec14:BLT14,
author={Dan Bogdanov and Sven Laur and Riivo Talviste},
title={{A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation}},
booktitle={{Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014}},
series={LNCS},
volume={8788},
year={2014},
pages={59-74},
publisher={Springer}
}
Tiina Turban.
Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme.
Master's thesis. University of Tartu. 2014.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Turban14,
author = {Tiina Turban},
title = {{Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme}},
school = {Institute of Computer Science, University of Tartu},
year = {2014}
}
2013
Liina Kamm, Jan Willemson.
Secure Floating-Point Arithmetic and Private Satellite Collision Analysis.
Cryptology ePrint Archive, Report 2013/850. 2013.
(PDF, BibTeX)
@misc{eprint:Kamm13,
author = {Liina Kamm and Jan Willemson},
title = {{Secure Floating-Point Arithmetic and Private Satellite Collision Analysis}},
howpublished = {Cryptology ePrint Archive, Report 2013/850},
year = {2013},
note = {\url{http://eprint.iacr.org/}},
}
Dan Bogdanov, Liina Kamm, Sven Laur, Pille Pruulmann-Vengerfeldt.
Secure multi-party data analysis: end user validation and practical experiments.
Cryptology ePrint Archive, Report 2013/826. 2013.
(PDF, BibTeX)
@misc{eprint:Bogdanov13b,
author = {Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt},
title = {{Secure multi-party data analysis: end user validation and practical experiments}},
howpublished = {Cryptology ePrint Archive, Report 2013/826},
year = {2013},
note = {\url{http://eprint.iacr.org/}},
}
Dan Bogdanov, Sven Laur, Riivo Talviste.
Oblivious Sorting of Secret-Shared Data.
Cybernetica research report T-4-19. 2013.
(PDF, BibTeX)
@TECHREPORT{CYBER:BLT13,
author = {Dan Bogdanov and Sven Laur and Riivo Talviste},
title = {{Oblivious Sorting of Secret-Shared Data}},
institution = {Cybernetica},
year = {2013},
number = {T-4-19},
address = {\url{https://cyber.ee/research/reports/}}
}
Peeter Laud, Alisa Pankova, Martin Pettai, Jaak Randmets.
Specifying Sharemind's Arithmetic Black Box.
In Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies, PETShop 2013, ACM Digital Library. 2013.
(PDF, BibTeX)
@inproceedings{PETSHOP13:LPPR13,
author = {Peeter Laud and Alisa Pankova and Martin Pettai and Jaak Randmets},
booktitle = {{Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies, PETShop '13}},
title = {{Specifying Sharemind's Arithmetic Black Box}},
series = {ACM Digital Library},
publisher = {ACM},
year = {2013},
pages = {19-22},
doi = {10.1145/2517872.2517874},
url = {http://doi.acm.org/10.1145/2517872.2517874}
}
Dan Bogdanov, Peeter Laud, Jaak Randmets.
Domain-Polymorphic Programming of Privacy-Preserving Applications.
In Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies, PETShop 2013, ACM Digital Library. 2013.
(Extended version, PDF, BibTeX)
@inproceedings{PETSHOP13:BLR13,
author = {Dan Bogdanov and Peeter Laud and Jaak Randmets},
booktitle = {{Proceedings of the First ACM Workshop on Language Support for Privacy-enhancing Technologies, PETShop '13}},
title = {{Domain-Polymorphic Programming of Privacy-Preserving Applications}},
series = {ACM Digital Library},
publisher = {ACM},
year = {2013},
pages = {23-26},
doi = {10.1145/2517872.2517875},
url = {http://doi.acm.org/10.1145/2517872.2517875}
}
Pille Pullonen.
Actively Secure Two-Party Computation: Efficient Beaver Triple Generation.
Master's thesis. University of Tartu. 2013.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Pullonen13,
author = {Pille Pullonen},
title = {{Actively Secure Two-Party Computation: Efficient Beaver Triple Generation}},
school = {Institute of Computer Science, University of Tartu},
year = {2013}
}
Dan Bogdanov, Aivo Kalu.
Pushing Back the Rain—How to Create Trustworthy Services in the Cloud.
ISACA Journal, Issue 3 - Big Data, 49 - 51, 2013.
(Extended version, BibTeX)
@article{ISACA:Bogdanov13,
author = {Dan Bogdanov and Aivo Kalu},
title = {Pushing Back the Rain---How to Create Trustworthy Services in the Cloud},
number = {3},
pages = {49-51},
year = {2013},
URL = {http://www.isaca.org/Journal/Past-Issues/2013/Volume-3/Pages/Pushing-Back-the-Rain-How-to-Create-Trust-worthy-Services-in-the-Cloud.aspx},
journal = {ISACA Journal}
}
Liina Kamm, Dan Bogdanov, Sven Laur, Jaak Vilo.
A new way to protect privacy in large-scale genome-wide association studies.
Bioinformatics 29 (7): 886-893, 2013.
(Extended version, BibTeX)
@article{BI:Kamm13,
author = {Kamm, Liina and Bogdanov, Dan and Laur, Sven and Vilo, Jaak},
title = {A new way to protect privacy in large-scale genome-wide association studies},
volume = {29},
number = {7},
pages = {886-893},
year = {2013},
URL = {http://bioinformatics.oxfordjournals.org/content/29/7/886.abstract},
eprint = {http://bioinformatics.oxfordjournals.org/content/29/7/886.full.pdf+html},
journal = {Bioinformatics}
}
Sven Laur, Riivo Talviste, Jan Willemson.
From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting.
In Proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, LNCS, vol. 7954, pp. 84-101. Springer. 2013.
(Extended version, BibTeX)
@incollection{ACNS13:Laur13,
author={Sven Laur and Riivo Talviste and Jan Willemson},
title={{From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting}},
year={2013},
booktitle={Applied Cryptography and Network Security},
volume={7954},
series={LNCS},
publisher={Springer},
pages={84-101}
}
Dan Bogdanov.
Sharemind: programmable secure computations with practical applications.
PhD thesis. University of Tartu. 2013.
(PDF, BibTeX)
@phdthesis{UT:Bogdanov13,
author = {Dan Bogdanov},
title = {Sharemind: programmable secure computations with practical applications},
school = {University of Tartu},
year = {2013},
url = {http://hdl.handle.net/10062/29041}
}
2012
Pille Pullonen, Dan Bogdanov, Thomas Schneider.
The design and implementation of a two-party protocol suite for Sharemind 3.
Cybernetica research report T-4-17. 2012.
(PDF, BibTeX)
@TECHREPORT{CYBER:PBS12,
author = {Pille Pullonen and Dan Bogdanov and Thomas Schneider.},
title = {{The design and implementation of a two-party protocol suite for Sharemind 3}},
institution = {Cybernetica},
year = {2012},
number = {T-4-17},
address = {\url{https://cyber.ee/research/reports/}}
}
Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson.
High-performance secure multi-party computation for data mining applications.
International Journal of Information Security 11(6), pp 403-418. Springer. 2012.
(PDF, BibTeX)
@article {IJIS12:Bogdanov12,
author = {Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan Willemson},
title = {High-performance secure multi-party computation for data mining applications},
journal = {International Journal of Information Security},
publisher = {Springer},
issn = {1615-5262},
pages = {403-418},
volume = {11},
number = {6},
year = {2012},
url = {http://dx.doi.org/10.1007/s10207-012-0177-2}
}
Reimo Rebane.
A Feasibility Analysis of Secure Multiparty Computation Deployments.
Master's thesis. University of Tartu. 2012.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Rebane12,
author = {Reimo Rebane},
title = {{A Feasibility Analysis of Secure Multiparty Computation Deployments}},
school = {Institute of Computer Science, University of Tartu},
year = {2012}
}
Dan Bogdanov, Riivo Talviste, Jan Willemson.
Deploying secure multi-party computation for financial data analysis (Short Paper).
In Proceedings of the Sixteenth International Conference on Financial Cryptography and Data Security 2012, FC 2012, LNCS, vol 7397, pp 57-64. Springer. 2012.
(Extended version, PDF, BibTeX)
@inproceedings{FC12:BTW12,
author = {Dan Bogdanov and Riivo Talviste and Jan Willemson},
title = {Deploying secure multi-party computation for financial data analysis (short paper)},
booktitle = {Proceedings of the 16th International Conference on Financial Cryptography and Data Security. FC'12},
year = {2012},
pages = {57-64},
ee = {http://dx.doi.org/10.1007/11745853_30},
}
Dan Bogdanov, Roman Jagomägis, Sven Laur.
A universal toolkit for cryptographically secure privacy-preserving data mining.
In Proceedings of Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012, LNCS, vol. 7299, pp. 112-126. Springer. 2012.
(PDF, BibTeX)
@inproceedings{PAISI12:BJL12,
author = {Dan Bogdanov and
Roman Jagom{\"a}gis and
Sven Laur},
editor = {Michael Chau and
G. Alan Wang and
Wei Thoo Yue and
Hsinchun Chen},
booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop,
PAISI'12, Kuala Lumpur, Malaysia, May 29, 2012. Proceedings},
title = {{A Universal Toolkit for Cryptographically Secure Privacy-Preserving
Data Mining}},
series = {Lecture Notes in Computer Science},
publisher = {Springer},
volume = {7299},
year = {2012},
pages = {112-126},
}
2011
Risto Saar.
A new database layer for the Sharemind privacy preserving computer.
Bachelor's thesis. University of Tartu. 2011.
(PDF, BibTeX)
@MISC{BSc:Saar11,
author = {Risto Saar},
title = {{A new database layer for the Sharemind privacy preserving computer}},
howpublished = {Bachelor's thesis. University of Tartu},
year = {2011}
}
Riivo Talviste.
Deploying secure multiparty computation for joint data analysis — a case study.
Master's thesis. University of Tartu. 2011.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Talviste11,
author = {Riivo Talviste},
title = {{Deploying secure multiparty computation for joint data analysis---a case study}},
school = {Institute of Computer Science, University of Tartu},
year = {2011}
}
Dan Bogdanov, Liina Kamm.
Constructing Privacy-Preserving Information Systems Using Secure Multiparty Computation.
Cybernetica research report T-4-13. 2011.
(PDF, BibTeX)
@TECHREPORT{CYBER:BK11,
author = {Dan Bogdanov and Liina Kamm},
title = {{Constructing Privacy-Preserving Information Systems Using Secure Multiparty Computation}},
institution = {Cybernetica},
year = {2011},
number = {T-4-13},
address = {\url{https://cyber.ee/research/reports/}}
}
Sven Laur, Bingsheng Zhang, Jan Willemson.
Round-efficient Oblivious Database Manipulation.
In Proceedings of the 14th International Conference on Information Security, ISC 2011, LNCS, vol. 7001, pp. 262-277. Springer, Heidelberg. 2011.
(Extended version, BibTeX)
@inproceedings{ISC11:LWZ11,
author = {Sven Laur and
Jan Willemson and
Bingsheng Zhang},
title = {{Round-Efficient Oblivious Database Manipulation}},
booktitle = {Proceedings of the 14th International Conference on Information Security. ISC'11},
year = {2011},
pages = {262-277},
ee = {http://dx.doi.org/10.1007/978-3-642-24861-0_18},
}
Oleg Šelajev.
The Use of Circuit Evaluation Techniques for Secure Computation.
Master's thesis. University of Tartu. 2011.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Shelajev11,
author = {Oleg \v{S}elajev},
title = {{The Use of Circuit Evaluation Techniques for Secure Computation}},
school = {Institute of Computer Science, University of Tartu},
year = {2011}
}
Oleg Šelajev, Sven Laur.
Yao Garbled Circuits in Secret Sharing-based Secure Multi-party Computation.
Cybernetica research report T-4-15. 2011.
(PDF, BibTeX)
@TECHREPORT{CYBER:SL11,
author = {Oleg \v{S}elajev and Sven Laur},
title = {{Yao Garbled Circuits in Secret Sharing-based Secure Multi-party Computation}},
institution = {Cybernetica},
year = {2011},
number = {T-4-15},
address = {\url{https://cyber.ee/research/reports/}}
}
Kristján Valur Jónsson, Gunnar Kreitz, Abu Hamed Mohammad Misbah Uddin.
Secure Multi-Party Sorting and Applications.
Cryptology ePrint Archive, Report 2011/122. 2011.
(PDF, BibTeX)
@misc{eprint:Valur11,
author = {Kristj{\'a}n Valur J{\'o}nsson and Gunnar Kreitz and Misbah Uddin},
title = {{Secure Multi-Party Sorting and Applications}},
howpublished = {Cryptology ePrint Archive, Report 2011/122},
year = {2011},
note = {\url{http://eprint.iacr.org/}},
}
2010
Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson.
Improved protocols for the Sharemind virtual machine.
Cybernetica research report T-4-10. 2010.
(PDF, BibTeX)
@TECHREPORT{CYBER:BNTW10,
author = {Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan Willemson},
title = {{Improved protocols for the Sharemind virtual machine}},
institution = {Cybernetica},
year = {2010},
number = {T-4-10},
address = {\url{https://cyber.ee/research/reports/}}
}
Abu Hamed Mohammad Misbah Uddin.
Privacy Preserving Collaborative Anomaly Detection Using Secure Multi-party Computation.
Master's thesis. School of Computer Science and Communication, KTH Royal Institute of Technology. 2010.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Uddin10,
author = {Misbah Uddin},
title = {{Privacy Preserving Collaborative Anomaly Detection Using Secure Multi-party Computation}},
school = {School of Computer Science and Communication, KTH Royal Institute of Technology},
year = {2010}
}
Jaak Ristioja.
An analysis framework for an imperative privacy-preserving programming language.
Master's thesis. University of Tartu. 2010.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Ristioja10,
author = {Jaak Ristioja},
title = {{An analysis framework for an imperative privacy-preserving programming language}},
school = {Institute of Computer Science, University of Tartu},
year = {2010}
}
Reimo Rebane.
An integrated development environment for the SecreC programming language.
Bachelor's thesis. University of Tartu. 2010.
(PDF, BibTeX)
@MISC{BSc:Rebane10,
author = {Reimo Rebane},
title = {{An integrated development environment for the SecreC programming language}},
howpublished = {Bachelor's thesis. University of Tartu},
year = {2010}
}
Roman Jagomägis.
SecreC: a Privacy-Aware Programming Language with Applications in Data Mining.
Master's thesis. University of Tartu. 2010.
(PDF, BibTeX)
@MASTERSTHESIS{MSc:Jagomagis10,
author = {Roman Jagom\"agis},
title = {{SecreC: a Privacy-Aware Programming Language with Applications in Data Mining}},
school = {Institute of Computer Science, University of Tartu},
year = {2010}
}
Dan Bogdanov, Sven Laur.
The design of a privacy-preserving distributed virtual machine.
In the Collection of AEOLUS theoretical findings. Deliverable D1.0.6. AEOLUS project IP-FP6-015964. 2010.
(PDF, BibTeX)
@INCOLLECTION{AEOLUS:BL10,
author = {Dan Bogdanov and Sven Laur},
title = {The design of a privacy-preserving distributed virtual machine},
booktitle = {Collection of AEOLUS theoretical findings. Deliverable 1.0.6},
year = {2010},
editor = {Christos Kaklamanis},
publisher = {Published online at \url{http://aeolus.ceid.upatras.gr/deliverables}},
pages = {269-280}
}
2009
Katharina Kahrs.
Share Computing Protocols over Fields and Rings.
Master's thesis. University of Tartu. 2009.
(PDF, BibTeX)
@MASTERSTHESIS{UT:Kahrs09,
author = {Katharina Kahrs},
title = {{Share Computing Protocols over Fields and Rings}},
school = {University of Tartu},
year = {2009},
}
Dan Bogdanov, Riivo Talviste.
An improved method for privacy-preserving web-based data collection.
Cybernetica research report T-4-5. 2009.
(PDF, BibTeX)
@TECHREPORT{CYBER:BT09,
author = {Dan Bogdanov and Riivo Talviste},
title = {An improved method for privacy-preserving web-based data collection},
institution = {Cybernetica},
year = {2009},
number = {T-4-5},
address = {\url{https://cyber.ee/research/reports/}}
}
Riivo Talviste.
Web-based data entry in privacy-preserving applications.
Bachelor's thesis. University of Tartu. 2009.
(PDF, BibTeX)
@MISC{BSc:Talviste09,
author = {Riivo Talviste},
title = {Web-based data entry in privacy-preserving applications},
howpublished = {Bachelor's thesis. University of Tartu},
year = {2009}
}
Dan Bogdanov, Roman Jagomägis, Sven Laur.
Privacy-preserving Histogram Computation and Frequent Itemset Mining with Sharemind.
Cybernetica research report T-4-8. 2009.
(PDF, BibTeX)
@TECHREPORT{CYBER:BJL09,
author = {Dan Bogdanov and Roman Jagom\"agis and Sven Laur},
title = {{Privacy-preserving Histogram Computation and Frequent Itemset Mining with Sharemind}},
institution = {Cybernetica},
year = {2009},
number = {T-4-8},
address = {\url{https://cyber.ee/research/reports/}}
}
Dan Bogdanov, Riivo Talviste.
A Comparison of Software Pseudorandom Number Generators.
In Proceedings of Third Baltic Conference on Advanced Topics in Telecommunication, Tartu, Estonia 2009 (61 - 71). Rostock: Universität Rostock, Wissenschaftsverbund Iu. 2009.
(BibTeX)
@inproceedings {BASOTI09:BT09,
author = {Dan Bogdanov and Riivo Talviste},
title = {{A Comparison of Software Pseudorandom Number Generators}},
booktitle = {Proceedings of Third Baltic Conference on Advanced Topics in Telecommunication - BaSoTi 2009},
editor = {Clemens Cap},
publisher = {Rostock: Universit{\"a}t Rostock, Wissenschaftsverbund IuK},
pages = {61--71},
year = {2009}
}
2008
Dan Bogdanov, Richard Sassoon.
Privacy preserving collaborative filtering with Sharemind.
Cybernetica research report T-4-2. 2008.
(PDF, BibTeX)
@TECHREPORT{CYBER:BS08,
author = {Dan Bogdanov and Richard Sassoon},
title = {{Privacy preserving collaborative filtering with Sharemind}},
institution = {Cybernetica},
year = {2008},
number = {T-4-2},
address = {\url{https://cyber.ee/research/reports/}}
}
Roman Jagomägis.
A programming language for creating privacy-preserving applications.
Bachelor's thesis. University of Tartu. 2008.
(PDF, BibTeX)
@MISC{BSc:Jagomagis08,
author = {Roman Jagom\"agis},
title = {A programming language for creating privacy-preserving applications},
howpublished = {Bachelor's thesis. University of Tartu},
year = {2008}
}
Yanjun Yao.
Automated Security Proofs of Secret Shared Protocols.
Master's thesis. University of Tartu. 2008.
(PDF, BibTeX)
@MASTERSTHESIS{UT:Yao08,
author = {Yanjun Yao},
title = {{Automated Security Proofs of Secret Shared Protocols}},
school = {University of Tartu},
year = {2008},
}
Dan Bogdanov, Sven Laur, Jan Willemson.
Sharemind: a framework for fast privacy-preserving computations.
In Proceedings of 13th European Symposium on Research in Computer Security, ESORICS 2008, LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg. 2008.
(Extended version, PDF, BibTeX)
@inproceedings {ESORICS08:BLW08,
author = {Dan Bogdanov and Sven Laur and Jan Willemson},
title = {{Sharemind: A Framework for Fast Privacy-Preserving Computations}},
booktitle = {Proceedings of the 13th European Symposium on Research in Computer Security - ESORICS'08},
series = {Lecture Notes in Computer Science},
editor = {Jajodia, Sushil and Lopez, Javier},
publisher = {Springer Berlin / Heidelberg},
isbn = {978-3-540-88312-8},
keyword = {Computer Science},
pages = {192-206},
volume = {5283},
year = {2008}
}