His scientific interests lie mostly in Theoretical computer science, Computer security, Encryption, Protocol and Zero-knowledge proof. His studies in Theoretical computer science integrate themes in fields like Base, Algorithm and Designated verifier signature. Many of his research projects under Computer security are closely connected to NIST with NIST, tying the diverse disciplines of science together.
His research in Encryption intersects with topics in Computation, Data mining, Computer engineering and Section. His Protocol research incorporates elements of Cryptosystem, Upper and lower bounds, Extension and Public-key cryptography. His research integrates issues of Discrete mathematics, Quadratic equation and Representation in his study of Zero-knowledge proof.
His primary areas of study are Theoretical computer science, Computer security, Discrete mathematics, Cryptography and Zero-knowledge proof. His Theoretical computer science study combines topics in areas such as Homomorphic encryption, Gas meter prover, Construct, Protocol and Cryptosystem. His work on Hash function, Security properties and Security analysis as part of general Computer security study is frequently linked to Database transaction, therefore connecting diverse disciplines of science.
His Discrete mathematics study combines topics from a wide range of disciplines, such as Computational complexity theory, String, Combinatorics and Computation. The study incorporates disciplines such as Interleaving and Mechanism design in addition to Cryptography. His work is dedicated to discovering how Zero-knowledge proof, Argument are connected with Linear subspace and other disciplines.
Helger Lipmaa spends much of his time researching Theoretical computer science, Soundness, Argument, Zero-knowledge proof and Discrete mathematics. The various areas that he examines in his Theoretical computer science study include SNARK, Gas meter prover, Random oracle and Protocol, Commitment scheme. Helger Lipmaa has included themes like Rounding and Multivariable calculus in his Protocol study.
While the research belongs to areas of Zero-knowledge proof, Helger Lipmaa spends his time largely on the problem of Construct, intersecting his research to questions surrounding Universal composability and Integer. His Discrete mathematics research is multidisciplinary, relying on both Scheme, Class and Alpha. His study in Public-key cryptography is interdisciplinary in nature, drawing from both Homomorphic encryption, Cryptosystem, Prime factor, Prime and Plaintext.
His main research concerns Theoretical computer science, Argument, Soundness, Discrete mathematics and Zero-knowledge proof. His Theoretical computer science research is multidisciplinary, incorporating elements of Cryptographic protocol, Protocol, Multivariable calculus and Rounding. Helger Lipmaa connects Soundness with Gas meter prover in his study.
His Gas meter prover research includes themes of Structure, Permutation, Computational complexity theory, Random oracle and Server. His work carried out in the field of Discrete mathematics brings together such families of science as Multiple encryption, Functional encryption, Ciphertext indistinguishability, Probabilistic encryption and Plaintext-aware encryption. His Zero-knowledge proof research is multidisciplinary, incorporating perspectives in Generic group model and Permutation matrix.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
On private scalar product computation for privacy-preserving data mining
Bart Goethals;Sven Laur;Helger Lipmaa;Taneli Mielikäinen.
international conference on information security and cryptology (2004)
An oblivious transfer protocol with log-squared communication
international conference on information security (2005)
Multi-query computationally-private information retrieval with constant communication rate
Jens Groth;Aggelos Kiayias;Helger Lipmaa.
public key cryptography (2010)
Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments
theory of cryptography conference (2012)
Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption
Helger Lipmaa;Phillip Rogaway;David Wagner.
Secure Vickrey auctions without threshold trust
Helger Lipmaa;N. Asokan;Valtteri Niemi.
financial cryptography (2002)
Efficient Algorithms for Computing Differential Properties of Addition
Helger Lipmaa;Shiho Moriai.
fast software encryption (2001)
Time-Stamping with Binary Linking Schemes
Ahto Buldas;Peeter Laud;Helger Lipmaa;Jan Willemson.
international cryptology conference (1998)
On Diophantine Complexity and Statistical Zero-Knowledge Arguments
international conference on the theory and application of cryptology and information security (2003)
Designated verifier signature schemes: attacks, new security notions and a new construction
Helger Lipmaa;Guilin Wang;Feng Bao.
international colloquium on automata languages and programming (2005)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: