Helger Lipmaa
Orcid: 0000-0001-8393-6821Affiliations:
- Simula UiB, Bergen, Norway
- University of Tartu, Estonia (former)
According to our database1,
Helger Lipmaa
authored at least 95 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on kodu.ut.ee
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
Proc. Priv. Enhancing Technol., 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Coding Theory and Applications, 4th International Castle Meeting, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments.
IACR Cryptol. ePrint Arch., 2012
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
2010
Proceedings of the Public Key Cryptography, 2010
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Information, Security and Cryptology, 2009
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Algorithms and Computation, 19th International Symposium, 2008
Proceedings of the Logic and Theory of Algorithms, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Asymptotic Behaviour of a Non-commutative Rational Series with a Nonnegative Linear Representation.
Discret. Math. Theor. Comput. Sci., 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006
2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Algorithms and Computation, 16th International Symposium, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Financial Cryptography, 2004
2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
J. Comput. Secur., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the CCS 2000, 2000
Fast Implementations of AES Candidates.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology, 1998