Töökindlate Arvutisüsteemide Uurimise Keskus
Infoturve
Kompetents:
krüptograafiliste protokollide projekteerimine, digitaalsed
ajatemplid ja avaliku võtme turvaliidesed, kvantkrüptograafia, samuti
kombinatoorika ja graafiteooria
Uurimisrühma põhikoosseis:
- Ahto Buldas, CybAS van.-tead.
/ TÜ arvutitead. inst. dots. (kuni aug. 2004), prof. (al. sept. 2004) /
TTÜ informaatika inst. prof.
(uurimisrühma juht)
-- tel. 654 2422, epost ahtbu (at) cyber . ee
- Peeter Laud,
TÜ arvutitead. inst. van.-tead. / CybAS van.-tead.
-
Helger Lipmaa, CybAS van.-tead. (apr. 2005-aug. 2006) / TÜ arvutitead. inst. erak. prof. (apr. 2005-aug. 2006)
- Jan Willemson, CybAS van.-tead.
(kuni okt. 2004, al. okt. 2005) /
TÜ arvutitead. inst. lektor (kuni aug. 2004),
dots. (al. sept. 2004)
Doktorandid:
- Dan Bogdanov, TÜ doktorant (al. sügis 2007)
-
Kristo Heero, TÜ doktorant (sügis 2002-kevad 2006, kaitsnud)
- Aivo Jürgenson, TTÜ doktorant (al. sügis 2006)
- Risto Laanoja, TTÜ doktorant (al. sügis 2007)
- Sven Laur, TÜ doktorant (al. sügis 2003)
-
Meelis Roos, TÜ doktorant (kuni kevad 2004)
Publikatsioone 2003:
- A. Ansper, A. Buldas, M. Freudenthal, J. Willemson. Scalable and
efficient PKI for inter-organizational communication. In Proc. of
19th Ann. Computer Security Applications Conf., ACSAC 2003 (Las Vegas, NV,
Dec. 2003), pp. 308-318. IEEE CS Press, 2003.
doi: 10.1109/csac.2003.1254335
- A. Buldas, P. Laud, J. Willemson. Graafid, 91 lk. TÜ Kirjastus,
2003.
- A. Buldas, M. Saarepera. Electronic signature system with small
number of private keys. In Pre-Proc. of 2nd Ann. PKI Research
Wksh. 2003 (Gaithersburg, MD, Apr. 2003), pp. 96-108. 2003.
- K. Heero, M. Kruusmaa, J. Willemson. Path selection for mobile
robots in dynamic environments. In Proc. of European Conf. on
Mobile Robots, ECMR 2003 (Warsaw, Sept. 2003). 2003
- S. Heiberg, U. Puus, P. Salumaa, A. Seeba. Pair-programming
effect on developers productivity. In M. Marchesi, G. Succi, eds.,
Proc. of 4th Int. Conf. on Extreme Programming and Agile Processes in
Software Engineering, XP 2003 (Genova, May 2003), v. 2675 of
Lect. Notes in Comput. Sci., pp. 215-224. Springer,
2003.
article at SpringerLink
- M. Kruusmaa, J. Willemson. Covering the path space: a casebase
analysis for mobile robot path planning. Knowledge Based
Systems, v. 16, n. 5-6, pp. 235-242, 2003.
doi: 10.1016/s0950-7051(03)00024-8
- M. Roos, P. Laud, J. Willemson. Improving the Gnutella protocol
against poisoning. In S. J. Knapskog, ed., Proc. of 8th Nordic
Wksh. on Secure IT Systems: Encouraging Cooperation, NordSec 2003
(Gjøvik, Oct. 2003), pp. 185-194. NTNU, Trondheim, 2003.
- J. Zaitseva, J. Willemson, J. Pöial. Tutorial environment for
cryptographic protocols. In S. J. Knapskog, ed., Proc. of 8th Nordic
Wksh. on Secure IT Systems: Encouraging Cooperation, NordSec 2003
(Gjøvik, Oct. 2003), pp. 175-184. NTNU, Trondheim, 2003.
Publikatsioone 2004:
- A. Buldas, M. Saarepera. On provably secure time-stamping
schemes. In P. J. Lee, ed., Proc. of 10th Int. Conf. on Theory and
Application of Cryptology and Information Security, ASIACRYPT 2004
(Jeju Island, Dec. 2004), v. 3329 of Lect. Notes in
Comput. Sci., pp. 500-514. Springer, 2004.
article at SpringerLink
- B. Goethals, S. Laur, H. Lipmaa, T. Mielikäinen. On private scalar
product computation for privacy-preserving data mining. In
Pre-Proc. of 7th Int. Conf. on Information Security and
Cryptology, ICISC 2004 (Seoul, Dec. 2004). 2004.
- K. Heero, J. Willemson, A. Aabloo, M. Kruusmaa. Robots find a
better way: a learning method for mobile robot navigation in partially
unknown environments. In F. Groen, N. Amato, A. Bonarini, E. Yoshida,
B. Kröse, eds., Proc. of 8th Conf. on Intelligent Autonomous
Systems, IAS-8 (Amsterdam, March 2004), pp. 559-566. IOS Press,
2004.
- S. Laur, H. Lipmaa. On private similarity search protocols. In
S. Liimatainen, T. Virtanen, eds., Proc. of 9th Nordic Wksh. on
Secure IT Systems, NordSec 2004 (Espoo, Nov. 2004),
pp. 73-77. 2004.
- U. Puus, A. Seeba, P. Salumaa, S. Heiberg. Analyzing
pair-programmer's satisfaction with the method, the result, and the
partner. In J. Eckstein, H. Baumeister, eds., Proc. of 5th
Int. Conf. on Extreme Programming and Agile Processes in Software
Engineering, XP 2004 (Garmisch-Partenkirchen, June 2004), v. 2971
of Lect. Notes in Comput. Sci., pp. 246-249. Springer,
2004.
article at SpringerLink
- J. Willemson, Y. Björnsson. SIX wins hex tournament. ICGA
J., v. 27, n. 3, p. 180, 2004.
Publikatsioone 2005:
- A. Buldas, P. Laud, M. Saarepera, J. Willemson. Universally
composable time-stamping schemes with audit. In J. Zhou, J. Lopez,
R. H. Deng, F. Bao, eds., Proc. of 8th Information Security Conf.,
ISC 2005 (Singapore, Sept. 2005), v. 3650 of Lect. Notes in
Comput. Sci., pp. 359-373. Springer, 2005.
doi: 10.1007/11556992_26
- E. Elkind, H. Lipmaa. Hybrid voting protocols and hardness of
manipulation. In X. Deng, D. Du, eds, Proc. of 16th
Int. Symp. on Algorithms and Computation, ISAAC 2005 (Sanya,
Dec. 2005), v. 3827 of Lect. Notes in Comput. Sci.,
pp. 206-215. Springer, 2005.
doi: 10.1007/11602613_22
- B. Goethals, S. Laur, H. Lipmaa, T. Mielikäinen. On secure scalar
product computation for privacy-preserving data mining. In C. Park,
S. Chee, eds, Revised Selected Papers from 7th Int. Conf. on
Information Security and Cryptology, ICISC 2004 (Seoul,
Dec. 2004), v. 3506 of Lect. Notes in Comput. Sci.,
pp. 104-120. Springer, 2005.
doi: 10.1007/11496618_9
- K. Heero, A. Aabloo, M. Kruusmaa. Learning innovative routes for
mobile robots in dynamic partially unknown environments. Int. J.
of Advanced Robotic Systems, v. 2, n. 3, pp. 209-222,
2005.
article at publisher's website
- K. Heero, A. Aabloo, M. Kruusmaa. On the utility of exploration on
time-critical mobile robots missions. In Proc. of 2nd
Europ. Conf. on Mobile Robots, ECMR '05 (Ancona, Sept. 2005),
pp. 152-157. 2005.
- S. Laur, H. Lipmaa, T. Mielikäinen. Private itemset support
counting. In S. Qing, W. Mao, J. Lopez, eds., Proc. of 5th
Int. Conf. on Information and Communications Security, ICICS 2005
(Beijing, Dec. 2005), v. 3783 of Lect. Notes in Comput.
Sci., pp. 97-111. Springer, 2005.
doi: 10.1007/11602897_9
- Y. Li, H. Lipmaa, D. Pei. On delegatability of four designated
verifier signatures. In S. Qing, W. Mao, J. Lopez, eds, Proc. of
5th Int. Conf. on Information and Communications Security, ICICS 2005
(Beijing, Dec. 2005), v. 3783 of Lect. Notes in Comput.
Sci., pp. 61-71. Springer, 2005.
doi: 10.1007/11602897_6
- H. Lipmaa. An oblivious transfer protocol with log-squared
communication. In J. Zhou, J. Lopez, R. H. Deng, F. Bao, eds.,
Proc. of 8th Information Security Conf., ISC 2005 (Singapore,
Sept. 2005), v. 3650 of Lect. Notes in Comput. Sci.,
pp. 314-328. Springer, 2005.
doi: 10.1007/11556992_23
- H. Lipmaa, D. Gollmann, eds. Proc. of 10th Nordic Wksh. on
Secure IT Systems, NordSec 2005 (Tartu, Oct. 2005), 167
pp. Univ. of Tartu, 2005.
- H. Lipmaa, G. Wang, F. Bao. Designated verifier signature
schemes: attacks, new security notions and a new construction. In
L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, M. Yung, eds.,
Proc. of 32nd Int. Coll. on Automata, Languages and Programming,
ICALP 2005 (Lisbon, July 2005), v. 3580 of Lect. Notes in
Comput. Sci., pp. 459-471. Springer, 2005.
doi: 10.1007/11523468_38
- I. Tšahhirov, P. Laud. Digital signature in automatic analyses
for confidentiality against active adversaries. In H. Lipmaa, D.
Gollmann, eds., Proc. of 10th Nordic Wksh. on Secure IT Systems,
NordSec 2005 (Tartu, Oct. 2005), pp. 29-41. Univ. of Tartu,
2005.
- J. Willemson. Computer-clobber tournament at Tartu
University. ICGA J., v. 28, n. 1, pp. 51-54, 2005.
- J. Willemson, M. Winands. MILA wins clobber tournament. ICGA
J., v. 28, n. 3, pp. 188-190, 2005.
Publikatsioone 2006:
- A. Alkassar, E. Andreeva, H. Lipmaa. SLC: efficient authenticated
encryption for short packets. In J. Dittmann, ed.,
Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der GI,
Sicherheit 2006 (Magdeburg, Feb. 2006), v. P-77 of Lect. Notes in
Informatics, pp. 270-278. Gesellschaft für Informatik (GI),
2006.
- A. Buldas, P. Laud, J. Priisalu, M. Saarepera,
J. Willemson. Rational choice of security measures via multi-parameter
attack trees. In J. López, ed., Proc. of 1st Int. Wksh. on Critical
Information Infrastructures Security, CRITIS '06 (Samos Island,
Aug./Sept. 2006), pp. 232-243. Univ. of the Aegean, 2006.
- A. Buldas, P. Laud, J. Priisalu, M. Saarepera,
J. Willemson. Rational choice of security measures via multi-parameter
attack trees. In J. López, ed., Revised Papers from 1st
Int. Wksh. on Critical Information Infrastructures Security,
CRITIS '06 (Samos Island, Aug./Sept. 2006), v. 4347 of
Lect. Notes in Comput. Sci., pp. 235-248. Springer,
2006.
doi: 10.1007/11962977_19
- A. Buldas, S. Laur. Do broken hash functions affect the security
of time-stamping schemes? In J. Zhou, M. Yung, F. Bao, eds.,
Proc. of 4th Int. Conf. on Applied Cryptography and Network
Security, ACNS 2006 (Singapore, June 2006), v. 3989 of
Lect. Notes in Comput. Sci., pp. 50-65. Springer, 2006.
doi: 10.1007/11767480_4
- H. Lipmaa. Secure electronic voting protocols. In H. Bidgoli,
ed., Handbook of Information Security, v. 2: Information Warfare,
Social, Legal, and International Issues and Security Foundations,
ch. 116. J. Wiley & Sons, 2006.
- S. Laur, H. Lipmaa, T. Mielikäinen. Cryptographically private
support vector machines. In Proc. of 12th ACM SIGKDD Int. Conf. on
Knowledge Discovery and Data Mining, KDD 2006 (Philadelphia, PA,
Aug. 2006), pp. 618-624. ACM Press, 2006.
doi: 10.1145/1150402.1150477
- S. Laur, K. Nyberg. Efficient mutual data authentication using
manually authenticated strings. In D. Pointcheval, Y. Mu, K. Chen,
eds., Proc. of 5th Int. Conf. on Cryptology and Network Security,
CANS 2006 (Suzhou, Dec. 2006), v. 4301 of
Lect. Notes in Comput. Sci., pp. 90-107. Springer,
2006.
doi: 10.1007/11935070_6
- H. Lipmaa, M. Yung, D. Lin, eds. Proc. of 2nd SKLOIS Conf. on
Information Security and Cryptology, Inscrypt 2006 (Beijing,
Nov./Dec. 2006), v. 4318 of Lect. Notes in Comput. Sci.,
Springer, 2006. doi:
10.1007/11937807
- J. Willemson. On the Gordon and Loeb model for information
security investment. In Proc. of 5th Wksh. on the Economics of
Information Security, WEIS 2006 (Cambridge, June 2006),
pp. 87-98. Cambridge Univ., 2006.
- J. Willemson, M. Kruusmaa. Algorithmic generation of path
fragment covers for mobile robot path planning. In Proc. of 3rd
IEEE Conf. on Intelligent Systems, IS 2006 (London, Sept. 2006),
pp. 673-678. IEEE, 2006.
doi: 10.1109/is.2006.348500
Publikatsioone 2007:
- A. Buldas, A. Jürgenson. Does secure time-stamping imply
collision-free hash functions? In W. Susilo, J. K. Liu, Y. Mu, eds.,
Proc. of 1st Int. Conf. on Provable Security, ProvSec 2007
(Wollongong, Oct/Nov. 2007), v. 4784 of Lect. Notes in
Comput. Sci., pp. 138-150. Springer, 2007.doi:
10.1007/978-3-540-75670-5_9
- A. Buldas, S. Laur. Knowledge-binding commitments with
applications in time-stamping. In T. Okamoto, X. Wang, eds.,
Proc. of 10th Int. Conf. on Practice and Theory in Public-Key
Cryptography, PKC 2007 (Beijing, Apr. 2007), v. 4450 of
Lect. Notes in Comput. Sci., pp. 150-165. Springer,
2007. doi:
10.1007/978-3-540-71677-8_11
- A. Buldas, T. Mägi. Practical analysis of e-voting systems. In A.
Miyaji, H. Kikuchi, K. Rannenberg, eds., Proc. of 2nd Int.
Wksh. on Security, IWSEC 2007 (Nara, Oct. 2007), v. 4752 of
Lect. Notes in Comput. Sci., pp. 320-335. Springer, 2007. doi:
10.1007/978-3-540-75651-4_22
- A. Jürgenson, J. Willemson. Processing multi-parameter attacktrees
with estimated parameter values. In A. Miyaji, H. Kikuchi,
K. Rannenberg, eds., Proc. of 2nd Int. Wksh. on Security, IWSEC
2007 (Nara, Oct. 2007), v. 4752 of Lect. Notes in
Comput. Sci., pp. 308-319. Springer, 2007. doi:
10.1007/978-3-540-75651-4_21
- S. Laur, H. Lipmaa. A new protocol for conditional disclosure of
secrets and its applications. In J. Katz, M. Yung, eds., Proc. of
5th Int. Conf. on Applied Cryptography and Network Security, ACNS 2007
(Zhuhai, June 2007), v. 4521 of Lect. Notes in
Comput. Sci., pp. 207-225. Springer, 2007. doi:
10.1007/978-3-540-72738-5_14
- S. Laur, S. Pasini. SAS-based group authentication and
key agreement protocols. In Proc. of 11th Int. Wksh. on
Practice and Theory in Public Key Cryptography, PKC 2008
(Barcelona, March 2008),
Lect. Notes in Comput. Sci., Springer, to appear.
- I. Tšahhirov, P. Laud. Application of dependency graphs to
security protocol analysis. In Proc. of 3rd Conf. on Global
Computing, TGC 2007 (Sophia Antipolis, Nov. 2007), Lect. Notes
in Comput. Sci., Springer, to appear.
Doktorikaitsmised 2006:
- K. Heero, Path planning and learning strategies for mobile robots
in dynamic partially unknown environment, TÜ, juhendajad
M. Kruusmaa ja J. Willemson, oponent P. Fiorini (Univ. di Verona),
19.6.2006. handle:
10062/1354
Viimane uuendus 18.1.2008