scispace - formally typeset
S

Sven Laur

Researcher at University of Tartu

Publications -  62
Citations -  3261

Sven Laur is an academic researcher from University of Tartu. The author has contributed to research in topics: Secure multi-party computation & Cryptography. The author has an hindex of 22, co-authored 57 publications receiving 2720 citations. Previous affiliations of Sven Laur include Helsinki University of Technology & Aalto University.

Papers
More filters
Journal ArticleDOI

Robust rank aggregation for gene list integration and meta-analysis

TL;DR: This work proposes a novel robust rank aggregation (RRA) method that detects genes that are ranked consistently better than expected under null hypothesis of uncorrelated inputs and assigns a significance score for each gene.
Book ChapterDOI

Sharemind: A Framework for Fast Privacy-Preserving Computations

TL;DR: This paper presents a provably secure and efficient general-purpose computation system to address the problem of gathering and processing sensitive data and provides significantly increased privacy preservation when compared to standard centralised databases.
Book ChapterDOI

On private scalar product computation for privacy-preserving data mining

TL;DR: This work shows that two of the private scalar product protocols, one of which was proposed in a leading data mining conference, are insecure and describes a provably private Scalar product protocol that is based on homomorphic encryption and can be used on massive datasets.
Book ChapterDOI

Efficient mutual data authentication using manually authenticated strings

TL;DR: In this article, the authors propose an asymptotically optimal protocol family for data authentication that uses short manually authenticated out-of-band messages for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication.
Journal ArticleDOI

A new way to protect privacy in large-scale genome-wide association studies

TL;DR: This work shows how to conduct targeted studies over a large collection of data without violating privacy of individual donors and without leaking the data to third parties.