Follow
Pille Pullonen-Raudvere
Pille Pullonen-Raudvere
Cybernetica
Verified email at cyber.ee
Title
Cited by
Cited by
Year
Maturity and performance of programmable secure computation
DW Archer, D Bogdanov, B Pinkas, P Pullonen
IEEE security & privacy 14 (5), 48-56, 2016
722016
Privacy-enhanced BPMN: enabling data privacy analysis in business processes models
P Pullonen, J Tom, R Matulevičius, A Toots
Software and Systems Modeling 18, 3235-3264, 2019
652019
Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations
P Pullonen, S Siim
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
562015
PE-BPMN: privacy-enhanced business process model and notation
P Pullonen, R Matulevičius, D Bogdanov
Business Process Management: 15th International Conference, BPM 2017 …, 2017
442017
Use your brain! Arithmetic 3PC for any modulus with active security
H Eerikson, M Keller, C Orlandi, P Pullonen, J Puura, M Simkin
Cryptology ePrint Archive, 2019
372019
From input private to universally composable secure multi-party computation primitives
D Bogdanov, P Laud, S Laur, P Pullonen
2014 IEEE 27th Computer Security Foundations Symposium, 184-198, 2014
342014
The design and implementation of a two-party protocol suite for Sharemind 3
P Pullonen, D Bogdanov, T Schneider
CYBERNETICA Institute of Information Security, Tech. Rep 4, 17, 2012
262012
Actively secure two-party computation: Efficient Beaver triple generation
P Pullonen
Instructor, 2013
192013
Business Process Privacy Analysis in Pleak
A Toots, R Tuuling, M Yerokhin, M Dumas, L García-Bañuelos, P Laud, ...
Fundamental Approaches to Software Engineering: 22nd International …, 2019
142019
Multi-level privacy analysis of business processes: the Pleak toolset
M Dumas, L García-Bañuelos, J Jääger, P Laud, R Matulevičius, ...
International Journal on Software Tools for Technology Transfer 24 (2), 183-203, 2022
52022
Verification of privacy-enhanced collaborations
S Belluccini, R De Nicola, M Dumas, P Pullonen, B Re, F Tiezzi
Proceedings of the 8th International Conference on Formal Methods in …, 2020
52020
Foundations of programmable secure computation
S Laur, P Pullonen-Raudvere
Cryptography 5 (3), 22, 2021
42021
SUNFISH D2. 1–State of the Art and Legal Aspects
A Reiter, H Leitold, B Suzic, F Reimair, M Moffie, D Cordina, P Pullonen, ...
2015
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
S Siim, P Pullonen
2015
The system can't perform the operation now. Try again later.
Articles 1–14