Follow
Peeter Laud
Peeter Laud
Cybernetica AS
Verified email at cyber.ee - Homepage
Title
Cited by
Cited by
Year
Time-stamping with binary linking schemes
A Buldas, P Laud, H Lipmaa, J Villemson
Advances in Cryptology—CRYPTO'98, 486-501, 1998
2121998
Semantics and program analysis of computationally secure information flow
P Laud
European Symposium on Programming, 77-91, 2001
1772001
Accountable certificate management using undeniable attestations
A Buldas, P Laud, H Lipmaa
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
1402000
Rational choice of security measures via multi-parameter attack trees
A Buldas, P Laud, J Priisalu, M Saarepera, J Willemson
International Workshop on Critical Information Infrastructures Security, 235-248, 2006
1382006
Symmetric encryption in automatic analyses for confidentiality against active adversaries
P Laud
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 71-85, 2004
1252004
Combining differential privacy and secure multiparty computation
M Pettai, P Laud
Proceedings of the 31st annual computer security applications conference …, 2015
1142015
The application of i-voting for Estonian parliamentary elections of 2011
S Heiberg, P Laud, J Willemson
International Conference on E-Voting and Identity, 208-223, 2011
942011
Handling encryption in an analysis for secure information flow
P Laud
European Symposium on Programming, 159-173, 2003
802003
Secrecy types for a simulatable cryptographic library
P Laud
Proceedings of the 12th ACM conference on Computer and communications …, 2005
762005
Computationally sound secrecy proofs by mechanized flow analysis
M Backes, P Laud
Proceedings of the 13th ACM conference on Computer and communications …, 2006
712006
Eliminating counterevidence with applications to accountable certificate management
A Buldas, P Laud, H Lipmaa
Journal of Computer Security 10 (3), 273-296, 2002
632002
Domain-polymorphic programming of privacy-preserving applications
D Bogdanov, P Laud, J Randmets
Proceedings of the Ninth Workshop on Programming Languages and Analysis for …, 2014
562014
New linking schemes for digital time-stamping.
A Buldas, P Laud
ICISC 98, 3-14, 1998
561998
A type system for computationally secure information flow
P Laud, V Vene
International Symposium on Fundamentals of Computation Theory, 365-377, 2005
542005
On the computational soundness of cryptographically masked flows
P Laud
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2008
502008
Secure multi-party computation for inter-organizational process mining
G Elkoumy, SA Fahrenkrog-Petersen, M Dumas, P Laud, A Pankova, ...
Enterprise, Business-Process and Information Systems Modeling: 21st …, 2020
472020
Sound computational interpretation of formal encryption with composed keys
P Laud, R Corin
International Conference on Information Security and Cryptology, 55-66, 2003
412003
Encryption cycles and two views of cryptography
P Laud
Proceedings of the 7th Nordic Workshop on Secure IT Systems (NORDSEC) 31, 85-100, 2002
402002
Parallel oblivious array access for secure multiparty computation and privacy-preserving minimum spanning trees
P Laud
Proceedings on Privacy Enhancing Technologies, 2015
392015
Optimizing MPC for robust and scalable integer and floating-point arithmetic
L Kerik, P Laud, J Randmets
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
342016
The system can't perform the operation now. Try again later.
Articles 1–20