Peeter Laud
Orcid: 0000-0002-9030-8142Affiliations:
- Cybernetica AS, Tartu, Estonia
According to our database1,
Peeter Laud
authored at least 96 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on orcid.org
-
on id.loc.gov
-
on ut.ee
On csauthors.net:
Bibliography
2024
Discov. Comput., December, 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
TEADAL: Trustworthy, Energy-Aware federated DAta Lakes along the computing continuum.
Proceedings of the Research Projects Exhibition Papers Presented at the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Int. J. Softw. Tools Technol. Transf., 2022
SN Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Privacy-preserving Parallel Computation of Shortest Path Algorithms with Low Round Complexity.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2021
Proceedings of the 29th Euromicro International Conference on Parallel, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Proceedings of the ICN '21: 8th ACM Conference on Information-Centric Networking, Paris, France, September 22, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2020
Proceedings of the Best Dissertation Award, 2020
2019
Inform. Spektrum, 2019
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Fundamental Approaches to Software Engineering, 2019
Mapping the Information Flows for the Architecture of a Nationwide Situation Awareness System : (Poster).
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2019
2018
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018
Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
2015
Parallel Oblivious Array Access for Secure Multiparty Computation and Privacy-Preserving Minimum Spanning Trees.
Proc. Priv. Enhancing Technol., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Efficient Oblivious Parallel Array Reads and Writes for Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
From Input Private to Universally Composable Secure Multiparty Computation Primitives.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
From Input Private to Universally Composable Secure Multi-party Computation Primitives.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
Universally composable privacy preserving finite automata execution with low online and offline complexity.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the PETShop'13, 2013
2012
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the E-Voting and Identity - Third International Conference, 2011
On the (im)possibility of perennial message recognition protocols without public-key cryptography.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the NASA Formal Methods, 2011
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011
Proceedings of the ICEGOV 2011, 2011
2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
2008
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008
2007
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007
2006
Theor. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Critical Information Infrastructures Security, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Fundamentals of Computation Theory, 15th International Symposium, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Programming Languages and Systems, 2003
2002
J. Comput. Secur., 2002
2001
Proceedings of the Programming Languages and Systems, 2001
2000
IACR Cryptol. ePrint Arch., 2000
1998
New linking schemes for digital time-stamping.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998