×
Compute Distance To:
Author ID: laud.peeter Recent zbMATH articles by "Laud, Peeter"
Published as: Laud, Peeter
Documents Indexed: 15 Publications since 1998
Co-Authors: 13 Co-Authors with 10 Joint Publications
108 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

12 Publications have been cited 42 times in 32 Documents Cited by Year
Semantics and program analysis of computationally secure information flow. Zbl 0977.68524
Laud, Peeter
12
2001
Time-stamping with binary linking schemes. Zbl 0938.68040
Buldas, Ahto; Laud, Peeter; Lipmaa, Helger; Villemson, Jan
7
1998
Sound computational interpretation of formal encryption with composed keys. Zbl 1092.68600
Laud, Peeter; Corin, Ricardo
5
2004
Type systems equivalent to data-flow analyses for imperative languages. Zbl 1153.68351
Laud, Peeter; Uustalu, Tarmo; Vene, Varmo
4
2006
Handling encryption in an analysis for secure information flow. Zbl 1032.68076
Laud, Peeter
4
2003
A type system for computationally secure information flow. Zbl 1123.68034
Laud, Peeter; Vene, Varmo
2
2005
Threshold homomorphic encryption in the universally composable cryptographic library. Zbl 1204.94073
Laud, Peeter; Ngo, Long
2
2008
On the computational soundness of cryptographically masked flows. Zbl 1295.68152
Laud, Peeter
2
2008
Strong forward security in identity-based signcryption. Zbl 1348.94071
Muñiz, Madeline González; Laud, Peeter
1
2013
Securing the future – an information flow analysis of a distributed OO language. Zbl 1302.68051
Pettai, Martin; Laud, Peeter
1
2012
Universally composable time-stamping schemes with audit. Zbl 1159.68434
Buldas, Ahto; Laud, Peeter; Saarepera, Märt; Willemson, Jan
1
2005
Bounded pre-image awareness and the security of hash-tree keyless signatures. Zbl 1368.94089
Buldas, Ahto; Laanoja, Risto; Laud, Peeter; Truu, Ahto
1
2014
Bounded pre-image awareness and the security of hash-tree keyless signatures. Zbl 1368.94089
Buldas, Ahto; Laanoja, Risto; Laud, Peeter; Truu, Ahto
1
2014
Strong forward security in identity-based signcryption. Zbl 1348.94071
Muñiz, Madeline González; Laud, Peeter
1
2013
Securing the future – an information flow analysis of a distributed OO language. Zbl 1302.68051
Pettai, Martin; Laud, Peeter
1
2012
Threshold homomorphic encryption in the universally composable cryptographic library. Zbl 1204.94073
Laud, Peeter; Ngo, Long
2
2008
On the computational soundness of cryptographically masked flows. Zbl 1295.68152
Laud, Peeter
2
2008
Type systems equivalent to data-flow analyses for imperative languages. Zbl 1153.68351
Laud, Peeter; Uustalu, Tarmo; Vene, Varmo
4
2006
A type system for computationally secure information flow. Zbl 1123.68034
Laud, Peeter; Vene, Varmo
2
2005
Universally composable time-stamping schemes with audit. Zbl 1159.68434
Buldas, Ahto; Laud, Peeter; Saarepera, Märt; Willemson, Jan
1
2005
Sound computational interpretation of formal encryption with composed keys. Zbl 1092.68600
Laud, Peeter; Corin, Ricardo
5
2004
Handling encryption in an analysis for secure information flow. Zbl 1032.68076
Laud, Peeter
4
2003
Semantics and program analysis of computationally secure information flow. Zbl 0977.68524
Laud, Peeter
12
2001
Time-stamping with binary linking schemes. Zbl 0938.68040
Buldas, Ahto; Laud, Peeter; Lipmaa, Helger; Villemson, Jan
7
1998

Citations by Year