BibTeX records: Berry Schoenmakers

download as .bib file

@article{DBLP:journals/cryptography/KorziliusS23,
  author       = {Stan Korzilius and
                  Berry Schoenmakers},
  title        = {Divisions and Square Roots with Tight Error Analysis from Newton-Raphson
                  Iteration in Secure Fixed-Point Arithmetic},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {43},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030043},
  doi          = {10.3390/CRYPTOGRAPHY7030043},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KorziliusS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SchoenmakersS23,
  author       = {Berry Schoenmakers and
                  Toon Segers},
  title        = {Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty
                  Computation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {56},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040056},
  doi          = {10.3390/CRYPTOGRAPHY7040056},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SchoenmakersS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/SchoenmakersS23,
  author       = {Berry Schoenmakers and
                  Toon Segers},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Efficient Extended {GCD} and Class Groups from Secure Integer Arithmetic},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {32--48},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_3},
  doi          = {10.1007/978-3-031-34671-2\_3},
  timestamp    = {Thu, 29 Jun 2023 08:38:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/SchoenmakersS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/KorziliusS23,
  author       = {Stan Korzilius and
                  Berry Schoenmakers},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {307--319},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_22},
  doi          = {10.1007/978-3-031-34671-2\_22},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/KorziliusS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/BlomBSV21,
  author       = {Frank Blom and
                  Niek J. Bouman and
                  Berry Schoenmakers and
                  Niels de Vreede},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Efficient Secure Ridge Regression from Randomized Gaussian Elimination},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_23},
  doi          = {10.1007/978-3-030-78086-9\_23},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/BlomBSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanGSSS19,
  author       = {Xinxin Fan and
                  Guang Gong and
                  Berry Schoenmakers and
                  Francesco Sica and
                  Andrey Sidorenko},
  title        = {Secure simultaneous bit extraction from Koblitz curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {1--13},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0484-3},
  doi          = {10.1007/S10623-018-0484-3},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanGSSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbspoelBSV19,
  author       = {Mark Abspoel and
                  Niek J. Bouman and
                  Berry Schoenmakers and
                  Niels de Vreede},
  editor       = {Mitsuru Matsui},
  title        = {Fast Secure Comparison for Medium-Sized Integers and Its Application
                  in Binarized Neural Networks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {453--472},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_23},
  doi          = {10.1007/978-3-030-12612-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbspoelBSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomBSV19,
  author       = {Frank Blom and
                  Niek J. Bouman and
                  Berry Schoenmakers and
                  Niels de Vreede},
  title        = {Efficient Secure Ridge Regression from Randomized Gaussian Elimination},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {773},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/773},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomBSV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03748,
  author       = {Berry Schoenmakers},
  title        = {Binary Pebbling Algorithms for In-Place Reversal of One-Way Hash Chains},
  journal      = {CoRR},
  volume       = {abs/1802.03748},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03748},
  eprinttype    = {arXiv},
  eprint       = {1802.03748},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03748.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelBSV18,
  author       = {Mark Abspoel and
                  Niek J. Bouman and
                  Berry Schoenmakers and
                  Niels de Vreede},
  title        = {Fast Secure Comparison for Medium-Sized Integers and Its Application
                  in Binarized Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1236},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelBSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchoenmakersVV16,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen and
                  Niels de Vreede},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable
                  Computation},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {346--366},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_19},
  doi          = {10.1007/978-3-319-39555-5\_19},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchoenmakersVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HooghSV16,
  author       = {Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Meilof Veeningen},
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Certificate Validation in Secure Computation and Its Use in Verifiable
                  Linear Programming},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  pages        = {265--284},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1\_14},
  doi          = {10.1007/978-3-319-31517-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HooghSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Schoenmakers16,
  author       = {Berry Schoenmakers},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {299--320},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_18},
  doi          = {10.1007/978-3-662-54970-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Schoenmakers16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorchonRTTLG0S16,
  author       = {Oscar Garc{\'{\i}}a Morchon and
                  Ronald Rietman and
                  Ludo Tolhuizen and
                  Jose Luis Torre{-}Arce and
                  Moon Sung Lee and
                  Domingo G{\'{o}}mez{-}P{\'{e}}rez and
                  Jaime Gutierrez and
                  Berry Schoenmakers},
  title        = {Attacks and parameter choices in {HIMMO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorchonRTTLG0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchoenmakersV15,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Universally Verifiable Multiparty Computation from Threshold Homomorphic
                  Cryptosystems},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_1},
  doi          = {10.1007/978-3-319-28166-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchoenmakersV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoenmakersV15,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen},
  title        = {Universally Verifiable Multiparty Computation from Threshold Homomorphic
                  Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoenmakersV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoenmakersV15a,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen},
  title        = {Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate
                  Validation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoenmakersV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoenmakersVV15,
  author       = {Berry Schoenmakers and
                  Meilof Veeningen and
                  Niels de Vreede},
  title        = {Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoenmakersVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HooghSCA14,
  author       = {Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Ping Chen and
                  Harm op den Akker},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Secure Decision Tree Learning in a Teletreatment Application},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_12},
  doi          = {10.1007/978-3-662-45472-5\_12},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/HooghSCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schoenmakers14,
  author       = {Berry Schoenmakers},
  title        = {Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schoenmakers14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/SepahiPSS12,
  author       = {Reza Sepahi and
                  Josef Pieprzyk and
                  Siamak Fayyaz Shahandashti and
                  Berry Schoenmakers},
  title        = {New security notions and relations for public-key encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {3-4},
  pages        = {183--227},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2010-0099},
  doi          = {10.1515/JMC-2010-0099},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/SepahiPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KerschbaumSZPCHSCD11,
  author       = {Florian Kerschbaum and
                  Axel Schr{\"{o}}pfer and
                  Antonio Zilli and
                  Richard Pibernik and
                  Octavian Catrina and
                  Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {Secure Collaborative Supply-Chain Management},
  journal      = {Computer},
  volume       = {44},
  number       = {9},
  pages        = {38--43},
  year         = {2011},
  url          = {https://doi.org/10.1109/MC.2011.224},
  doi          = {10.1109/MC.2011.224},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/KerschbaumSZPCHSCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/SkoricOVS11,
  author       = {Boris Skoric and
                  Chibuzo Obi and
                  Evgeny A. Verbitskiy and
                  Berry Schoenmakers},
  title        = {Sharp lower bounds on the extractable randomness from non-uniform
                  sources},
  journal      = {Inf. Comput.},
  volume       = {209},
  number       = {8},
  pages        = {1184--1196},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ic.2011.06.001},
  doi          = {10.1016/J.IC.2011.06.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/SkoricOVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Designated-Verifier Proofs},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {330--331},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_4},
  doi          = {10.1007/978-1-4419-5906-5\_4},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11a,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Homomorphic Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {560--562},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_870},
  doi          = {10.1007/978-1-4419-5906-5\_870},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11b,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Interactive Argument},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {618--619},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_5},
  doi          = {10.1007/978-1-4419-5906-5\_5},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11c,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Interactive Proof},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {619},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_6},
  doi          = {10.1007/978-1-4419-5906-5\_6},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11d,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Multiparty Computation},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {812--815},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_7},
  doi          = {10.1007/978-1-4419-5906-5\_7},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11e,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Noninteractive Proof},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {846},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_8},
  doi          = {10.1007/978-1-4419-5906-5\_8},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11f,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Oblivious Transfer},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {884--885},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_9},
  doi          = {10.1007/978-1-4419-5906-5\_9},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11g,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Proof of Knowledge Versus Proof of Membership},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {983--984},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_10},
  doi          = {10.1007/978-1-4419-5906-5\_10},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11h,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Protocol},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {990},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_11},
  doi          = {10.1007/978-1-4419-5906-5\_11},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11i,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Threshold Homomorphic Cryptosystems},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1293--1294},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_13},
  doi          = {10.1007/978-1-4419-5906-5\_13},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11j,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Verifiable Secret Sharing},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1357--1358},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_14},
  doi          = {10.1007/978-1-4419-5906-5\_14},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11k,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Witness Hiding},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1391--1392},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_15},
  doi          = {10.1007/978-1-4419-5906-5\_15},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers11l,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Zero-Knowledge},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1401--1403},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_16},
  doi          = {10.1007/978-1-4419-5906-5\_16},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers11l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/VerbitskiyTOSS10,
  author       = {Evgeny A. Verbitskiy and
                  Pim Tuyls and
                  Chibuzo Obi and
                  Berry Schoenmakers and
                  Boris Skoric},
  title        = {Key extraction from general nondiscrete signals},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {2},
  pages        = {269--279},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2046965},
  doi          = {10.1109/TIFS.2010.2046965},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/VerbitskiyTOSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GuajardoMS10,
  author       = {Jorge Guajardo and
                  Bart Mennink and
                  Berry Schoenmakers},
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {Anonymous Credential Schemes with Encrypted Attributes},
  booktitle    = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  pages        = {314--333},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7\_22},
  doi          = {10.1007/978-3-642-17619-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GuajardoMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GuajardoMS10,
  author       = {Jorge Guajardo and
                  Bart Mennink and
                  Berry Schoenmakers},
  editor       = {Radu Sion},
  title        = {Modulo Reduction for Paillier Encryptions and Application to Secure
                  Statistical Analysis},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {375--382},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_32},
  doi          = {10.1007/978-3-642-14577-3\_32},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GuajardoMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HooghSSV09,
  author       = {Sebastiaan de Hoogh and
                  Berry Schoenmakers and
                  Boris Skoric and
                  Jos{\'{e}} Villegas},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Verifiable Rotation of Homomorphic Encryptions},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_22},
  doi          = {10.1007/978-3-642-00468-1\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HooghSSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/voteid/2009,
  editor       = {Peter Y. A. Ryan and
                  Berry Schoenmakers},
  title        = {E-Voting and Identity, Second International Conference, VoteID 2009,
                  Luxembourg, September 7-8, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5767},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04135-8},
  doi          = {10.1007/978-3-642-04135-8},
  isbn         = {978-3-642-04134-1},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VerbitskiyTOSS09,
  author       = {Evgeny A. Verbitskiy and
                  Pim Tuyls and
                  Chibuzo Obi and
                  Berry Schoenmakers and
                  Boris Skoric},
  title        = {Key extraction from general non-discrete signals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VerbitskiyTOSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KirazS08,
  author       = {Mehmet S. Kiraz and
                  Berry Schoenmakers},
  editor       = {Tal Malkin},
  title        = {An Efficient Protocol for Fair Secure Two-Party Computation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_6},
  doi          = {10.1007/978-3-540-79263-5\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KirazS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DesmedtKS08,
  author       = {Yvo Desmedt and
                  Brian King and
                  Berry Schoenmakers},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Revisiting the Karnin, Greene and Hellman Bounds},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_18},
  doi          = {10.1007/978-3-540-85093-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricOVS08,
  author       = {Boris Skoric and
                  Chibuzo Obi and
                  Evgeny A. Verbitskiy and
                  Berry Schoenmakers},
  title        = {Sharp lower bounds on the extractable randomness from non-uniform
                  sources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkoricOVS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/SchoenmakersTTV07,
  author       = {Berry Schoenmakers and
                  Jilles Tjoelker and
                  Pim Tuyls and
                  Evgeny A. Verbitskiy},
  title        = {Smooth R??nyi Entropy of Ergodic Quantum Information Sources},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {256--260},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557235},
  doi          = {10.1109/ISIT.2007.4557235},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/SchoenmakersTTV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KirazSV07,
  author       = {Mehmet S. Kiraz and
                  Berry Schoenmakers and
                  Jos{\'{e}} Villegas},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Efficient Committed Oblivious Transfer of Bit Strings},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_9},
  doi          = {10.1007/978-3-540-75496-1\_9},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/KirazSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GaraySV07,
  author       = {Juan A. Garay and
                  Berry Schoenmakers and
                  Jos{\'{e}} Villegas},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Practical and Secure Solutions for Integer Comparison},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {330--342},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_22},
  doi          = {10.1007/978-3-540-71677-8\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GaraySV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarashahiSS07,
  author       = {Reza Rezaeian Farashahi and
                  Berry Schoenmakers and
                  Andrey Sidorenko},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Efficient Pseudorandom Generators Based on the {DDH} Assumption},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {426--441},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_28},
  doi          = {10.1007/978-3-540-71677-8\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarashahiSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/SchoenmakersT07,
  author       = {Berry Schoenmakers and
                  Pim Tuyls},
  editor       = {Milan Petkovic and
                  Willem Jonker},
  title        = {Client-Server Trade-Offs in Secure Computation},
  booktitle    = {Security, Privacy, and Trust in Modern Data Management},
  series       = {Data-Centric Systems and Applications},
  pages        = {197--211},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69861-6\_14},
  doi          = {10.1007/978-3-540-69861-6\_14},
  timestamp    = {Tue, 16 May 2017 14:01:42 +0200},
  biburl       = {https://dblp.org/rec/books/sp/07/SchoenmakersT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0704-3504,
  author       = {Berry Schoenmakers and
                  Jilles Tjoelker and
                  Pim Tuyls and
                  Evgeny A. Verbitskiy},
  title        = {Smooth R{\'{e}}nyi Entropy of Ergodic Quantum Information Sources},
  journal      = {CoRR},
  volume       = {abs/0704.3504},
  year         = {2007},
  url          = {http://arxiv.org/abs/0704.3504},
  eprinttype    = {arXiv},
  eprint       = {0704.3504},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0704-3504.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/CanardSST06,
  author       = {S{\'{e}}bastien Canard and
                  Berry Schoenmakers and
                  Martijn Stam and
                  Jacques Traor{\'{e}}},
  title        = {List signature schemes},
  journal      = {Discret. Appl. Math.},
  volume       = {154},
  number       = {2},
  pages        = {189--201},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.dam.2005.08.003},
  doi          = {10.1016/J.DAM.2005.08.003},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/CanardSST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SchoenmakersT06,
  author       = {Berry Schoenmakers and
                  Pim Tuyls},
  editor       = {Serge Vaudenay},
  title        = {Efficient Binary Conversion for Paillier Encrypted Values},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {522--537},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_31},
  doi          = {10.1007/11761679\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SchoenmakersT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoenmakersS06,
  author       = {Berry Schoenmakers and
                  Andrey Sidorenko},
  title        = {Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoenmakersS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashahiSS06,
  author       = {Reza Rezaeian Farashahi and
                  Berry Schoenmakers and
                  Andrey Sidorenko},
  title        = {Efficient Pseudorandom Generators Based on the {DDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashahiSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Berry Schoenmakers},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {On Second-Order Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_22},
  doi          = {10.1007/11545262\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/SidorenkoS05,
  author       = {Andrey Sidorenko and
                  Berry Schoenmakers},
  editor       = {Nigel P. Smart},
  title        = {Concrete Security of the Blum-Blum-Shub Pseudorandom Generator},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {355--375},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_24},
  doi          = {10.1007/11586821\_24},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/SidorenkoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RietjensST05,
  author       = {Karin Rietjens and
                  Berry Schoenmakers and
                  Pim Tuyls},
  title        = {Quantum information theoretical analysis of various constructions
                  for quantum secret sharing},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1598--1602},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523614},
  doi          = {10.1109/ISIT.2005.1523614},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/RietjensST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/PoelsTS05,
  author       = {Karin Poels and
                  Pim Tuyls and
                  Berry Schoenmakers},
  title        = {Generic security proof of quantum key exchange using squeezed states},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1612--1616},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523617},
  doi          = {10.1109/ISIT.2005.1523617},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/PoelsTS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05,
  author       = {Richard Brinkman and
                  Berry Schoenmakers and
                  Jeroen Doumen and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Experiments with Queries over Encrypted Data Using Secret Sharing},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_3},
  doi          = {10.1007/11552338\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/SidorenkoS05,
  author       = {Andrey Sidorenko and
                  Berry Schoenmakers},
  editor       = {Christopher Wolf and
                  Stefan Lucks and
                  Po{-}Wah Yau},
  title        = {State Recovery Attacks on Pseudorandom Generators},
  booktitle    = {WEWoRC 2005 - Western European Workshop on Research in Cryptology,
                  July 5-7, 2005, Leuven, Belgium},
  series       = {{LNI}},
  volume       = {{P-74}},
  pages        = {53--63},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/24850},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/SidorenkoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Interactive Argument},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_201},
  doi          = {10.1007/0-387-23483-7\_201},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05a,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Interactive Proof},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_202},
  doi          = {10.1007/0-387-23483-7\_202},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05b,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Multiparty Computation},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_265},
  doi          = {10.1007/0-387-23483-7\_265},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05c,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Noninteractive Proof},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_273},
  doi          = {10.1007/0-387-23483-7\_273},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05d,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Oblivious Transfer},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_285},
  doi          = {10.1007/0-387-23483-7\_285},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05e,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Proof of Knowledge vs. Proof of Membership},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_321},
  doi          = {10.1007/0-387-23483-7\_321},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05f,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Protocol},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_323},
  doi          = {10.1007/0-387-23483-7\_323},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05g,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Verifiable Secret Sharing},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_452},
  doi          = {10.1007/0-387-23483-7\_452},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05h,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Witness Hiding},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_461},
  doi          = {10.1007/0-387-23483-7\_461},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Schoenmakers05i,
  author       = {Berry Schoenmakers},
  editor       = {Henk C. A. van Tilborg},
  title        = {Zero-knowledge},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_463},
  doi          = {10.1007/0-387-23483-7\_463},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Schoenmakers05i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SchoenmakersT04,
  author       = {Berry Schoenmakers and
                  Pim Tuyls},
  editor       = {Pil Joong Lee},
  title        = {Practical Two-Party Computation Based on the Conditional Gate},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_10},
  doi          = {10.1007/978-3-540-30539-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SchoenmakersT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/BoudotST01,
  author       = {Fabrice Boudot and
                  Berry Schoenmakers and
                  Jacques Traor{\'{e}}},
  title        = {A fair and efficient solution to the socialist millionaires' problem},
  journal      = {Discret. Appl. Math.},
  volume       = {111},
  number       = {1-2},
  pages        = {23--36},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0166-218X(00)00342-5},
  doi          = {10.1016/S0166-218X(00)00342-5},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/BoudotST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/Schoenmakers00,
  author       = {Berry Schoenmakers},
  editor       = {Lorrie Faith Cranor},
  title        = {Compensating for a lack of transparency},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {231--233},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.332288},
  doi          = {10.1145/332186.332288},
  timestamp    = {Mon, 23 May 2022 11:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/Schoenmakers00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BuldasLS00,
  author       = {Ahto Buldas and
                  Helger Lipmaa and
                  Berry Schoenmakers},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Optimally Efficient Accountable Time-Stamping},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {293--305},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_20},
  doi          = {10.1007/978-3-540-46588-1\_20},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Schoenmakers99,
  author       = {Berry Schoenmakers},
  editor       = {Michael J. Wiener},
  title        = {A Simple Publicly Verifiable Secret Sharing Scheme and Its Application
                  to Electronic},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {148--164},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_10},
  doi          = {10.1007/3-540-48405-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Schoenmakers99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/CramerGS97,
  author       = {Ronald Cramer and
                  Rosario Gennaro and
                  Berry Schoenmakers},
  title        = {A secure and optimally efficient multi-authority election scheme},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {8},
  number       = {5},
  pages        = {481--490},
  year         = {1997},
  url          = {https://doi.org/10.1002/ett.4460080506},
  doi          = {10.1002/ETT.4460080506},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/CramerGS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Schoenmakers97,
  author       = {Berry Schoenmakers},
  title        = {A Tight Lower Bound for Top-Down Skew Heaps},
  journal      = {Inf. Process. Lett.},
  volume       = {61},
  number       = {5},
  pages        = {279--284},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00028-8},
  doi          = {10.1016/S0020-0190(97)00028-8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Schoenmakers97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Schoenmakers97,
  author       = {Berry Schoenmakers},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Security Aspects of the Ecash\({}^{\mbox{TM}}\) Payment System},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {338--352},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_16},
  doi          = {10.1007/3-540-49248-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Schoenmakers97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerGS97,
  author       = {Ronald Cramer and
                  Rosario Gennaro and
                  Berry Schoenmakers},
  editor       = {Walter Fumy},
  title        = {A Secure and Optimally Efficient Multi-Authority Election Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_9},
  doi          = {10.1007/3-540-69053-0\_9},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerGS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/KatoenS96,
  author       = {Joost{-}Pieter Katoen and
                  Berry Schoenmakers},
  title        = {Systolic Arrays for the Recognition of Permutation-Invariant Segments},
  journal      = {Sci. Comput. Program.},
  volume       = {27},
  number       = {2},
  pages        = {119--137},
  year         = {1996},
  url          = {https://doi.org/10.1016/0167-6423(96)00009-3},
  doi          = {10.1016/0167-6423(96)00009-3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/KatoenS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96,
  author       = {Ronald Cramer and
                  Matthew K. Franklin and
                  Berry Schoenmakers and
                  Moti Yung},
  editor       = {Ueli M. Maurer},
  title        = {Multi-Autority Secret-Ballot Elections with Linear Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {72--83},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_7},
  doi          = {10.1007/3-540-68339-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CramerDS94,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Berry Schoenmakers},
  editor       = {Yvo Desmedt},
  title        = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding
                  Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {174--187},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_19},
  doi          = {10.1007/3-540-48658-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CramerDS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94,
  author       = {Jean{-}Paul Boly and
                  Antoon Bosselaers and
                  Ronald Cramer and
                  Rolf Michelsen and
                  Stig Fr. Mj{\o}lsnes and
                  Frank Muller and
                  Torben P. Pedersen and
                  Birgit Pfitzmann and
                  Peter de Rooij and
                  Berry Schoenmakers and
                  Matthias Schunter and
                  Luc Vall{\'{e}}e and
                  Michael Waidner},
  editor       = {Dieter Gollmann},
  title        = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_66},
  doi          = {10.1007/3-540-58618-0\_66},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BolyBCMMMPPRSSVW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Schoenmakers93,
  author       = {Berry Schoenmakers},
  title        = {A Systematic Analysis of Splaying},
  journal      = {Inf. Process. Lett.},
  volume       = {45},
  number       = {1},
  pages        = {41--50},
  year         = {1993},
  url          = {https://doi.org/10.1016/0020-0190(93)90249-9},
  doi          = {10.1016/0020-0190(93)90249-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Schoenmakers93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mpc/Schoenmakers92,
  author       = {Berry Schoenmakers},
  editor       = {Richard S. Bird and
                  Carroll Morgan and
                  Jim Woodcock},
  title        = {Inorder Traversal of a Binary Heap and its Inversion in Optimal Time
                  and Space},
  booktitle    = {Mathematics of Program Construction, Second International Conference,
                  Oxford, UK, June 29 - July 3, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {669},
  pages        = {291--301},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-56625-2\_19},
  doi          = {10.1007/3-540-56625-2\_19},
  timestamp    = {Fri, 17 Feb 2023 09:02:01 +0100},
  biburl       = {https://dblp.org/rec/conf/mpc/Schoenmakers92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KaldewaijS91,
  author       = {Anne Kaldewaij and
                  Berry Schoenmakers},
  title        = {The Derivation of a Tighter Bound for Top-Down Skew Heaps},
  journal      = {Inf. Process. Lett.},
  volume       = {37},
  number       = {5},
  pages        = {265--271},
  year         = {1991},
  url          = {https://doi.org/10.1016/0020-0190(91)90218-7},
  doi          = {10.1016/0020-0190(91)90218-7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KaldewaijS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc/KatoenS91,
  author       = {Joost{-}Pieter Katoen and
                  Berry Schoenmakers},
  editor       = {Patrice Quinton and
                  Yves Robert},
  title        = {A Parallel program for the recognition of P-Invariant segments},
  booktitle    = {Algorithms and Parallel {VLSI} Architectures II, Proceedings of the
                  International Workshop Algorithms and Parallel {VLSI} Architectures
                  II, Ch{\^{a}}teau de Bonas, Gers, France, June 3-6, 1991},
  pages        = {79--84},
  publisher    = {Elsevier},
  year         = {1991},
  timestamp    = {Wed, 04 Sep 2002 15:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc/KatoenS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/KaldewaijS90,
  author       = {Anne Kaldewaij and
                  Berry Schoenmakers},
  title        = {Searching by Elimination},
  journal      = {Sci. Comput. Program.},
  volume       = {14},
  number       = {2-3},
  pages        = {243--254},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-6423(90)90022-6},
  doi          = {10.1016/0167-6423(90)90022-6},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/KaldewaijS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mpc/KaldewaijS89,
  author       = {Anne Kaldewaij and
                  Berry Schoenmakers},
  editor       = {Jan L. A. van de Snepscheut},
  title        = {Searching by Elimination},
  booktitle    = {Mathematics of Program Construction, 375th Anniversary of the Groningen
                  University, International Conference, Groningen, The Netherlands,
                  June 26-30, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {375},
  pages        = {297--306},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-51305-1\_17},
  doi          = {10.1007/3-540-51305-1\_17},
  timestamp    = {Fri, 17 Jul 2020 16:12:47 +0200},
  biburl       = {https://dblp.org/rec/conf/mpc/KaldewaijS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics