[ sulge aken ]

Elulookirjeldus (CV)
1.Eesnimi Peeter
2.Perekonnanimi Laud
3.Töökoht Tartu Ülikool
4.Ametikoht vanemteadur
5.Sünniaeg 06.04.1977 (päev.kuu.aasta)
6.Haridus 1997 - Tartu Ülikool, informaatikabakalaureus
1998 - Tartu Ülikool, informaatikamagister
2002 - Saarimaa Ülikool (Saksamaa), inseneriteaduste doktor
7.Teenistuskäik 1996 - 1998 HClub-Arvutitarkvara AS, programmeerija
1998 - 1999 Cybernetica AS, teadur
1999 - 2000 Saarimaa Ülikool, teaduslik töötaja
2002 - ... Cybernetica AS, vanemteadur
2002 - 2003 Tartu Ülikool, teadur
2003 - ... Tartu Ülikool, vanemteadur
8.Teaduskraad PhD
9.Teaduskraadi välja
andnud asutus, aasta
Saarimaa Ülikool, 2002
10.Tunnustused EAPLS-i (European Ass. of Prog. Lang. and Systems) auhind parima artikli eest kobarkonverentsil ETAPS '03
11.Teadusorganisatsiooniline
ja –administratiivne
tegevus
Tartu Ülikooli arvutiteaduse instituudi teadusseminari läbiviija (2003 sügis - ...)
9. (2004) ja 10. (2005) Eesti Arvutiteaduse Talvekooli üks organiseerijatest
CCS 2004 & 2005, 11th & 12th ACM conference on Computer and Communications Security programmkomiteede liige
NordSec 2005 programmkomitee liige
SecCo'05, 3rd International Workshop on Security Issues in Concurrency programmkomitee liige
12.Juhendamisel kaitstud
väitekirjad
13.Teadustöö põhisuunad krüptoloogia, programmide staatiline analüüs
14.Jooksvad grandid ETF 6095, Universaalselt komponeeritav turvalisus ja selle formaliseerimine
15.Teaduspublikatsioonid

A. Buldas, P. Laud, M. Saarepera, J. Villemson. Universally Composable Time-Stamping Schemes with Audit. In Information Security: 8th International Conference, ISC 2005, Volume 3650 of Lecture Notes in Computer Science, Singapore, September 20-23, 2005, pages 359-373.

I. Tšahhirov, P. Laud. Digital Signature in Automatic Analyses for Confidentiality against Active Adversaries. In proceedings of Nordsec 2005, 10th Nordic Workshop on Secure IT Systems, Tartu, Estonia, October 20-21, 2005, pages 29-41.

P. Laud. Secrecy Types for a Simulatable Cryptographic Library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, Alexandria, VA, USA, November 7-11, 2005.

P. Laud, V. Vene. A Type System for Computationally Secure Information Flow. In proceedings of the 15th Symposium on Fundamentals of Computation Theory (FCT) 2005 (LNCS 3623), Lübeck, Germany, pages 365-377, 2005.

P. Laud, R. Corin. Sound Computational Interpretation of Formal Encryption with Composed Keys. In Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 2003, Revised Papers (LNCS 2971), pages 55-66, 2004.

P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries, in proceedings of 2004 IEEE Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004. IEEE Computer Society Conference Publishing Services.

P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In Programming Languages and Systems, 12th European Symposium On Programming, ESOP 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003 Proceedings (LNCS 2618), pages 159-173, 2003.

A. Buldas, P. Laud, H. Lipmaa. Eliminating counterevidence with applications to accountable certificate management, Journal of Computer Security 10(2002), pages 273--296, IOS Press.

P. Laud. Encryption Cycles and Two Views of Cryptography. In NORDSEC 2002 - Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002.

P. Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In Programming Languages and Systems, 10th European Symposium On Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings (LNCS 2028), pages 77-91, 2001.

A. Buldas, P. Laud, H. Lipmaa. Accountable Certificate Management using Undeniable Attestations. In 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press.

A. Buldas, P. Laud, H. Lipmaa, J. Willemson. Time-Stamping with Binary Linking Schemes. In Advances in Cryptology --- proceedings of CRYPTO '98 (LNCS 1462), pages 486--501, 1998.

A. Buldas, P. Laud. New Linking Schemes for Digital Time-Stamping. In The 1st International Conference on Information Security and Cryptology, pages 3-14, Seoul, Korea, December 18-19, 1998.

viimati muudetud: 08.08.2005

Curriculum Vitae (CV)
1.First Name Peeter
2.Surname Laud
3.Institution Tartu University
4.Position senior researcher
5.Date of birth 06.04.1977 (day.month.year)
6.Education 1997 - Tartu University, BSc (computer science)
1998 - Tartu University, MSc (computer science)
2002 - University of Saarland, Dr. of engineering (Dr.-Ing.)
7.Research and
professional experience
1996 - 1998 HClub-Arvutitarkvara AS, programmer
1998 - 1999 Cybernetica AS, researcher
1999 - 2000 Saarimaa Ülikool, researcher
2002 - ... Cybernetica AS, senior researcher
2002 - 2003 Tartu Ülikool, researcher
2003 - ... Tartu Ülikool, senior researcher
8.Academic degree PhD
9.Dates and sites of
earning the degrees
University of Saarland, 2002
10.Honours/awards EAPLS (European Ass. of Prog. Lang. and Systems) best paper award at the joint conference ETAPS '03
11.Research-administrative
experience
Organizer of the scientific seminar of the institute of Computer Science of Tartu University (2003 fall - ...)
One of the organizers of the 9th (2004) and 10th (2005) Estonian Winter Schools on Computer Science
PC member of CCS 2004 & 2005, 11th & 12th ACM conference on Computer and Communications Security
PC member of NordSec 2005
PC member of SecCo'05, 3rd International Workshop on Security Issues in Concurrency
12.Supervised dissertations
13.Current research program cryptology, static analysis of programs
14.Current grant funding ETF 6095, Universally composable security and its formalization
15.List of most important publications

A. Buldas, P. Laud, M. Saarepera, J. Villemson. Universally Composable Time-Stamping Schemes with Audit. In Information Security: 8th International Conference, ISC 2005, Volume 3650 of Lecture Notes in Computer Science, Singapore, September 20-23, 2005, pages 359-373.

I. Tšahhirov, P. Laud. Digital Signature in Automatic Analyses for Confidentiality against Active Adversaries. In proceedings of Nordsec 2005, 10th Nordic Workshop on Secure IT Systems, Tartu, Estonia, October 20-21, 2005, pages 29-41.

P. Laud. Secrecy Types for a Simulatable Cryptographic Library. In 12th ACM Conference on Computer and Communications Security, pages 26-35, Alexandria, VA, USA, November 7-11, 2005.

P. Laud, V. Vene. A Type System for Computationally Secure Information Flow. In proceedings of the 15th Symposium on Fundamentals of Computation Theory (FCT) 2005 (LNCS 3623), Lübeck, Germany, pages 365-377, 2005.

P. Laud, R. Corin. Sound Computational Interpretation of Formal Encryption with Composed Keys. In Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 2003, Revised Papers (LNCS 2971), pages 55-66, 2004.

P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries, in proceedings of 2004 IEEE Symposium on Security and Privacy, pages 71-85, Oakland, CA, May 9-12, 2004. IEEE Computer Society Conference Publishing Services.

P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In Programming Languages and Systems, 12th European Symposium On Programming, ESOP 2003 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003 Warsaw, Poland, April 7-11, 2003 Proceedings (LNCS 2618), pages 159-173, 2003.

A. Buldas, P. Laud, H. Lipmaa. Eliminating counterevidence with applications to accountable certificate management, Journal of Computer Security 10(2002), pages 273--296, IOS Press.

P. Laud. Encryption Cycles and Two Views of Cryptography. In NORDSEC 2002 - Proceedings of the 7th Nordic Workshop on Secure IT Systems (Karlstad University Studies 2002:31), pages 85-100, Karlstad, Sweden, November 7-8, 2002.

P. Laud. Semantics and Program Analysis of Computationally Secure Information Flow. In Programming Languages and Systems, 10th European Symposium On Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genoa, Italy, April 2-6, 2001 Proceedings (LNCS 2028), pages 77-91, 2001.

A. Buldas, P. Laud, H. Lipmaa. Accountable Certificate Management using Undeniable Attestations. In 7th ACM Conference on Computer and Communications Security, pages 9--18, Athens, Greece, November 1--4, 2000. ACM Press.

A. Buldas, P. Laud, H. Lipmaa, J. Willemson. Time-Stamping with Binary Linking Schemes. In Advances in Cryptology --- proceedings of CRYPTO '98 (LNCS 1462), pages 486--501, 1998.

A. Buldas, P. Laud. New Linking Schemes for Digital Time-Stamping. In The 1st International Conference on Information Security and Cryptology, pages 3-14, Seoul, Korea, December 18-19, 1998.

last updated: 08.08.2005

[ sulge aken ]