I've been interested in differential cryptanalysis ([LM01], [Lip02c], [LWD04]), fast implementations ([Lip98], [AL00], [TLT02], [Lip02b]), electronic auctions ([LAN02] and [EL04]), oblivious transfer ([Lip03b], [Lip05]), privacy-preserving data-mining and RRT ([AJL04], [LL04], [GLLM04], [Lip05], [LLM05], [LLM06]), electronic voting ([EL05a], [EL05b]), digital signatures ([LWB05], [LLP05]), time-stamping and certificate revocation ([BLLV98], PhD thesis, [BLS00], [BLL00], [BLL02],[Lip02a]), foundations and zero-knowledge ([Lip03a], [Lip04]), public key cryptography, block cipher modes ([LRW00], [AAL06]). I've been interested also in fast algorithms in general ([LM01], [Lip02a]), in the analysis of algorithms ([Lip02a]) and in mechanism design ([EL04], [EL05a], [EL05b]).
| 2008 | ||
|---|---|---|
| [dl08] | Giovanni Di Crescenzo and Helger Lipmaa. Succinct NP Proofs from An Extractability Assumption. In Arnold Beckmann, Costas Dimitracopoulos and Benedikt Löwe, editors, Computability in Europe, volume 5028 of Lecture Notes in Computer Science, pages 175--185, Athens, Greece, June 15--20, 2008. Springer-Verlag. | |
| 2007 | ||
| [dlw07] | Philippe Dumas, Helger Lipmaa and Johan Wallén. Asymptotic Behaviour of A Non-Commutative Rational Series With a Nonnegative Linear Representation. Discrete Mathematics and Theoretical Computer Science, 9(1):247--274, October 2007. | |
| [ll07] | Sven Laur and Helger Lipmaa. A New Protocol for Conditional Disclosure of Secrets And Its Applications. In Jonathan Katz and Moti Yung, editors, The Fifth International Conference on Applied Cryptography and Network Security (ACNS'07), volume 4521 of Lecture Notes in Computer Science, pages 207--225, Zhuhai, China, June 5--8, 2007. Springer-Verlag. | |
| 2006 | ||
| [llm06] | Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Cryptographically Private Support Vector Machines. In Lyle Ungar, Mark Craven, Dimitrios Gunopulos and Tina Eliassi-Rad, editors, The Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006, pages 618--624, Philadelphia, USA, August 20--23, 2006. ACM. | |
| [aal06] | Ammar Alkassar, Elena Andreeva and Helger Lipmaa. SLC: Efficient Authenticated Encryption for Short Packets. In Jana Dittmann, editor, Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), volume 77 of Lecture Notes in Informatics, pages 270--278, Magdeburg, Germany, February 20--22, 2006. Gesellschaft für Informatik e.v.. | |
| 2005 | ||
| [el05b] | Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In Xiaotie Deng and Dingzhu Du, editors, The 16th Annual International Symposium on Algorithms and Computation, ISAAC 2005, volume 3827 of Lecture Notes in Computer Science, pages 206--215, Sanya, Hainan, China, December 19--21, 2005. Springer-Verlag. | |
| [llm05] | Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Private Itemset Support Counting. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 97--111, Beijing, China, December 10--13, 2005. Springer-Verlag. | |
| [llp05] | Yong Li, Helger Lipmaa and Dingyi Pei. On Delegatability of Four Designated Verifier Signatures. In Sihan Qing, Wenbo Mao, Javier Lopez and Guilin Wang, editors, Information and Communications Security: 7th International Conference, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 61--71, Beijing, China, December 10--13, 2005. Springer-Verlag. | |
| [lip05] | Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In Jianying Zhou and Javier Lopez, editors, The 8th Information Security Conference (ISC'05), volume 3650 of Lecture Notes in Computer Science, pages 314--328, Singapore, September 20--23, 2005. Springer-Verlag. | |
| [lwb05] | Helger Lipmaa, Guilin Wang and Feng Bao. Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction. In Luis Caires, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi and Moti Yung, editors, The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, pages 459--471, Lisboa, Portugal, July 11--15, 2005. Springer-Verlag. | |
| [el05a] | Edith Elkind and Helger Lipmaa. Small Coalitions Cannot Manipulate Voting. In Andrew Patrick and Moti Yung, editors, Financial Cryptography and Data Security --- Ninth International Conference, volume 3570 of Lecture Notes in Computer Science, pages 285--297, Roseau, The Commonwealth Of Dominica, February 28--March 3, 2005. Springer-Verlag. | |
| 2004 | ||
| [gllm04] | Bart Goethals, Sven Laur, Helger Lipmaa and Taneli Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In Choonsik Park and Seongtaek Chee, editors, The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), volume 3506 of Lecture Notes in Computer Science, pages 104--120, Seoul, Korea, December 2--3, 2004. Springer-Verlag. To appear. | |
| [ll04] | Sven Laur and Helger Lipmaa. On Private Similarity Search Protocols. In Sanna Liimatainen and Teemupekka Virtanen, editors, Proceedings of the 9th Nordic Workshop on Secure IT Systems (NordSec 2004), pages 73--77, Espoo, Finland, November 4--5, 2004. ISBN 951-22-7348-9. | |
| [lip04] | Helger Lipmaa. Statistical Zero-Knowledge Arguments: Theory and Practice. In 4th European Congress on Computational Methods in Applied Sciences and Engineering (ECCOMAS 2004), Jyväskylä, Finland, July 24--28, 2004. Invited survey. | |
| [ajl04] | Andris Ambainis, Markus Jakobsson and Helger Lipmaa. Cryptographic Randomized Response Techniques. In Feng Bao, Robert H. Deng and Jianying Zhou, editors, Public Key Cryptography 2004, volume 2947 of Lecture Notes in Computer Science, pages 425--438, Singapore, March 1--4, 2004. Springer-Verlag. | |
| [el04] | Edith Elkind and Helger Lipmaa. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. In Ari Juels, editor, Financial Cryptography - Eighth International Conference, volume 3110 of Lecture Notes in Computer Science, pages 117--131, Key West, FL, USA, February 9--12, 2004. Springer-Verlag. | |
| [lwd04] | Helger Lipmaa, Johan Wallén and Philippe Dumas. On the Additive Differential Probability of Exclusive-Or. In Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004, volume 3017 of Lecture Notes in Computer Science, pages 317--331, Delhi, India, February 5--7, 2004. Springer-Verlag. | |
| 2003 | ||
| [lip03b] | Helger Lipmaa. Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In Chi Sung Laih, editor, Advances on Cryptology --- ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 416--433, Taipei, Taiwan, November 30--December 4, 2003. Springer-Verlag. | |
| [lip03a] | Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In Chi Sung Laih, editor, Advances on Cryptology --- ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398--415, Taipei, Taiwan, November 30--December 4, 2003. Springer-Verlag. | |
| 2002 | ||
| [lip02c] | Helger Lipmaa. On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. In Alfred Menezes and Palash Sarkar, editors, INDOCRYPT 2002, volume 2551 of Lecture Notes in Computer Science, pages 48--61, Hyderabad, India, December 15--18, 2002. Springer-Verlag. | |
| [lip02b] | Helger Lipmaa. Fast Software Implementations of SC2000. In Agnes Chan and Virgil Gligor, editors, Information Security Conference 2002, volume 2433 of Lecture Notes in Computer Science, pages 63--74, São Paulo, Brazil, September 30 --- October 2, 2002. Springer-Verlag. | |
| [lip02a] | Helger Lipmaa. On Optimal Hash Tree Traversal for Interval Time-Stamping. In Agnes Chan and Virgil Gligor, editors, Information Security Conference 2002, volume 2433 of Lecture Notes in Computer Science, pages 357--371, São Paulo, Brazil, September 30 --- October 2, 2002. Springer-Verlag. | |
| [tlt02] | Masahiko Takenaka, Helger Lipmaa and Naoya Torii. The Implementation of The Block Cipher SC2000 (III). In ISEC Technical group meeting, Tohoku University, Sendai, Japan, July 18--19, 2002. In Japanese. | |
| [BLL02] | Ahto Buldas, Peeter Laud, and Helger Lipmaa.
Eliminating Counterevidence with Applications to Accountable
Certificate Management. Journal of Computer Security, 10(3):273--296, 2002. Note: Special issue for ACM CCS 2000. One of the three invited papers. Supersedes [BLL00]. | RI |
| [lan02] | Helger Lipmaa, N. Asokan and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Matt Blaze, editor, Financial Cryptography 2002, volume 2357 of Lecture Notes in Computer Science, pages 85--101, Southampton Beach, Bermuda, March 11--14, 2002. Springer-Verlag. | |
| 2001 | ||
| [lm01] | Helger Lipmaa and Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In Mitsuru Matsui, editor, Fast Software Encryption: 8th International Workshop, FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 336--350, Yokohama, Japan, April 2--4, 2001. Springer-Verlag. ISBN 3-540-43869-6. | |
| 2000 | ||
| [bll00] | Ahto Buldas, Peeter Laud and Helger Lipmaa. Accountable Certificate Management using Undeniable Attestations. In Sushil Jajodia and Pierangela Samarati, editors, 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press. ISBN ACM ISBN 1-58113-203-4. | |
| [lrw00] | Helger Lipmaa, Phillip Rogaway and David Wagner. Comments to NIST Concerning AES-modes of Operations: CTR-mode Encryption. In Symmetric Key Block Cipher Modes of Operation Workshop, Baltimore, Maryland, USA, October 20, 2000. | |
| [AL00] | Kazumaro Aoki and Helger Lipmaa. Fast Implementations of AES Candidates. Third AES Candidate Conference, New York City, USA, 13--14 April 2000. | RI |
| [bls00] | Ahto Buldas, Helger Lipmaa and Berry Schoenmakers. Optimally Efficient Accountable Time-Stamping. In Yuliang Zheng and Hideki Imai, editors, Public Key Cryptography '2000, volume 1751 of Lecture Notes in Computer Science, pages 293--305, Melbourne, Australia, January 18--20, 2000. Springer-Verlag. | |
| 1998 | ||
| [bllv98] | Ahto Buldas, Peeter Laud, Helger Lipmaa and Jan Villemson. Time-Stamping with Binary Linking Schemes. In Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, volume 1462 of Lecture Notes in Computer Science, pages 486--501, Santa Barbara, CA, USA, August 23--27, 1998. Springer-Verlag. ISBN 3-540-64892-5. | |
| [lip98] | Helger Lipmaa. IDEA: A Cipher for Muldimedia Architectures? In Stafford Tavares and Henk Meijer, editors, Selected Areas in Cryptography '98, volume 1556 of Lecture Notes in Computer Science, pages 253--268, Kingston, Canada, August 17--18, 1998. Springer-Verlag. | |
| Andris Ambainis, Markus Jakobsson, Helger Lipmaa. Cryptographic Randomized Response Techniques. In DIMACS/PORTIA Workshop on Privacy-Preserving Data Mining. Rutgers University, Piscataway, NJ, USA, 15--16~March 2004. Program available at http://dimacs.rutgers.edu/Workshops/Privacy/ | |
| Edith Elkind and Helger Lipmaa. How Hard is it to Manipulate Voting?. In DIMACS Workshop on Electronic Voting, Rutgers U, NJ, USA, 26--27~May 2004. Program available at http://dimacs.rutgers.edu/Workshops/Voting/ | |
| Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. In The Past, Present and Future of Oblivious Transfer, Satellite workshop of the Fifth Haifa Workshop on Interdisciplinary Applications of Graph theory, Combinatorics, and Algorithms, Haifa, Israel, May 17, 2005. Webpage at http://cri.haifa.ac.il/events/2005/graph/oblivious.htm. | |
| Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In First Spain Italy Netherlands Meeting on Game Theory, Maastricht, The Netherlands, June 24--26, 2005. Webpage at http://www.fdewb.unimaas.nl/sing/ | |
| Edith Elkind and Helger Lipmaa. Hybrid Voting Protocols and Hardness of Manipulation. In 1st International Workshop on Computational Social Choice, Amsterdam, 6-8 December 2006. Webpage at http://staff.science.uva.nl/~ulle/COMSOC-2006. |
The following papers or their revised versions are submitted or will shortly be submitted to different journals/conferences:
| [KLLN0?] | Emilia Käsper, Sven Laur and Helger Lipmaa. XBlack-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds, submitted, 2006 |
| [LLP0?] | Sven Laur and Helger Lipmaa. Consistent Adaptive Two-Party Computations, to be submitted, 2006 |
Helger Lipmaa, Secure
Electronic Voting Protocols. Forthcoming chapter from The Handbook of
Information Security, Hossein Bidgoli, Editor-in-Chief. John Wiley & Sons,
Inc., 2005. [Invited, peer-reviewed.] [.pdf .ps.gz]
Buy it from Amazon |
| Helger Lipmaa, "Kvantarvutid", Eesti Füüsika Seltsi 9. aastaraamat, 1999, pp. 102--125 ["Quantum Computing", Ninth Annual of the Estonian Physical Society. Invited.] [in Estonian: ps.gz (64.4KB), ps.bz2 (55.9KB), pdf (167.8KB), html] |
Cryptography eprint Archive:
| 2008/107 | Helger Lipmaa. On Cryptocomputing with Log-Squared Communication And Sublinear Computation |
| 2007/133 | Helger Lipmaa. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. |
| 2006/356 | Emilia Käsper, Sven Laur and Helger Lipmaa. Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds |
| 2006/198 | Sven Laur, Helger Lipmaa and Taneli Mielikäinen. Cryptographically Private Support Vector Machines. (Short version published in KDD 2006) |
| 2006/088 | Sven Laur and Helger Lipmaa. Consistent Adaptive Two-Party Computations |
| 2005/378 | Sven Laur and Helger Lipmaa. Additive Conditional Disclosure of Secrets And Applications. (Final version published in ACNS 2007.) |
| 2004/063 | Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Total Communication. (Final version published in ISC 2005.) |
| 2003/105 | Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. (Final version published in ASIACRYPT 2003.) |
| 2003/027 | Andris Ambainis, Markus Jakobsson, Helger Lipmaa. Cryptographic Randomized Response Techniques. (Final version published in PKC 2004.) |
| 2003/021 | Edith Elkind, Helger Lipmaa. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. (Final version published in FC 2004.) |
| 2002/124 | Helger Lipmaa. On Optimal Hash Tree Traversal for Interval Time-Stamping. (Final version published in ISC 2002) |
| 2001/095 | Helger Lipmaa and N. Asokan and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. (Final version published in FC 2002) |
| 2001/086 | Helger Lipmaa. Statistical Zero-Knowledge Proofs from Diophantine Equations. (Superseded by eprint 2003/105) |
| 2001/001 | Helger Lipmaa, Shiho Moriai. Efficient Algorithms for Computing Differential Properties of Addition. (Final version published in FSE 2001) |
| 2000/027 | Ahto Buldas and Peeter Laud and Helger Lipmaa. Accountable Certificate Management using Undeniable Attestations. (Final version published in ACM CCS 2000) |
This section is incomplete:
See my CV. Some of the most important presentations (that do not have a corresponding publication):
There might several different chains of length 3. The first one of length 4 that I became aware of (early 2000) is: Helger Lipmaa -> Berry Schoenmakers -> Moti Yung -> Noga Alon -> Paul Erdös. The first one of length 3: Helger Lipmaa -> Andris Ambainis -> Leonard J. Schulman -> Paul Erdös.
You can check the updated information from the MR Collaboration Distance page.
So how worthy is a conference? One (and certainly not the most important! Caveat: it might actually give very wrong impression about the level of conference: some conferences get much more 'obviously bad submissions' than others. Some conferences and workshops---e.g., FSE---are very good even if the acceptance ratio is not that high.) way to measure it is to calculate the ratio of acceptance there. I've done it for the conferences my own papers were accepted to. Sorted by acceptance ratio. Note also that during the last years, the number of submissions has gone up in all conferences.
Impact factors according to citeseer. Includes crypto-related venues in top 400 (ranking updated 09.10.2004 but some papers added after that), with the number of papers I have there.
According to Scholar.Google, several of my publications are highly cited, and since Scholar is relatively incomplete, the actual citation index is probably (much) higher. My publications, ordered by non-self-citations, are, in the format citations=non-self-citations+self-citations (note that all publications are from 1998 or later, updated Nov 6 2006, Nov 20 2007 and Apr 7 2008):
71 -> 91 -> 94 [BLLV98]
19 -> 60 -> 70 [GLLM04]
36 -> 57 -> 64 [LRW00]
40 -> 54 -> 58 [AL00]
? -> 57 -> 57 [LAN02]
20 -> 53 -> 57 [Lip05] (ISC+TR)
37 -> 45 -> 48 [BLL00]
20 -> 30 -> 34 [LM01]
20 -> 28 -> 33 [Lip03:ASIACRYPT:SZKDE + 2001 TechReport]
22 -> 30 -> 31 [BLS00]
15 -> 28 -> 29 [BLL02] /* not shown in Scholar when queried by my name */
? -> 27 -> 28 [Lip99 - PhD] /* not shown in SCholar when queried by my name */
14 -> 25 -> 28 [Lip03:ASIACRYPT:OT]
? -> 22 -> 27 [LWB05]
24 -> 27 -> 26 [Lip98]
3 -> 12 -> 22 [EL05:ISAAC]
// H-index: 16
6 -> 12 -> 14 [EL05:FC]
? -> 10 -> 12 [LWD04]
9 -> 11 -> 11 [AJL04]
5 -> 4 -> 11 [LL07]
9 -> 7 -> 10 [Lip99] (Survey, TR)
4 -> 6 -> 8 [Lip02:INDOCRYPT]
4 -> 5 -> 6 [Lip02:ISC:TS]
4 -> 4 -> 4 [Lip02:ISC:SC2000]
2 -> 4 -> 4 [EL04]
1 -> 3 -> 4 [LLM05]
1 -> 2 -> 4 [LLM06]
3 -> 3 -> 3 [BL98] (TR)
? -> 2 -> 3 [LLP05]
2 -> 2 -> 2 [LL04]
1 -> 1 -> 1 [TLT02]
-> 1 [Lip06] - voting book chapter
...
(Total: 778 on Apr 7 2008, 700 on Nov 20 2007, 432 on Nov 6 2006)
For record, entries in the ISI database are worse than in Scholar.Google. The most annoying fact is that for certain publications, only the first author gets a reference. Moreover, they do not store for example ACM and IEEE publications, which means that [BLL00] and [BLL02] are not in the database, nor are many papers on ACM/IEEE conferences and journals that cite my papers.
My entries in:
Send you inqueries to <h.lipmaa>">cs.ucl.ac.uk.