Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Berry Schoenmakers
@article{DBLP:journals/cryptography/KorziliusS23, author = {Stan Korzilius and Berry Schoenmakers}, title = {Divisions and Square Roots with Tight Error Analysis from Newton-Raphson Iteration in Secure Fixed-Point Arithmetic}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {43}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030043}, doi = {10.3390/CRYPTOGRAPHY7030043}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KorziliusS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SchoenmakersS23, author = {Berry Schoenmakers and Toon Segers}, title = {Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {56}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040056}, doi = {10.3390/CRYPTOGRAPHY7040056}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SchoenmakersS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/SchoenmakersS23, author = {Berry Schoenmakers and Toon Segers}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {Efficient Extended {GCD} and Class Groups from Secure Integer Arithmetic}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {32--48}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_3}, doi = {10.1007/978-3-031-34671-2\_3}, timestamp = {Thu, 29 Jun 2023 08:38:21 +0200}, biburl = {https://dblp.org/rec/conf/cscml/SchoenmakersS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/KorziliusS23, author = {Stan Korzilius and Berry Schoenmakers}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {307--319}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_22}, doi = {10.1007/978-3-031-34671-2\_22}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/KorziliusS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/BlomBSV21, author = {Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Efficient Secure Ridge Regression from Randomized Gaussian Elimination}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {301--316}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_23}, doi = {10.1007/978-3-030-78086-9\_23}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/BlomBSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanGSSS19, author = {Xinxin Fan and Guang Gong and Berry Schoenmakers and Francesco Sica and Andrey Sidorenko}, title = {Secure simultaneous bit extraction from Koblitz curves}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0484-3}, doi = {10.1007/S10623-018-0484-3}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanGSSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbspoelBSV19, author = {Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, editor = {Mitsuru Matsui}, title = {Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {453--472}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_23}, doi = {10.1007/978-3-030-12612-4\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbspoelBSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomBSV19, author = {Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, title = {Efficient Secure Ridge Regression from Randomized Gaussian Elimination}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2019}, url = {https://eprint.iacr.org/2019/773}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomBSV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03748, author = {Berry Schoenmakers}, title = {Binary Pebbling Algorithms for In-Place Reversal of One-Way Hash Chains}, journal = {CoRR}, volume = {abs/1802.03748}, year = {2018}, url = {http://arxiv.org/abs/1802.03748}, eprinttype = {arXiv}, eprint = {1802.03748}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03748.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelBSV18, author = {Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, title = {Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1236}, year = {2018}, url = {https://eprint.iacr.org/2018/1236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelBSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchoenmakersVV16, author = {Berry Schoenmakers and Meilof Veeningen and Niels de Vreede}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {346--366}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_19}, doi = {10.1007/978-3-319-39555-5\_19}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchoenmakersVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HooghSV16, author = {Sebastiaan de Hoogh and Berry Schoenmakers and Meilof Veeningen}, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, pages = {265--284}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1\_14}, doi = {10.1007/978-3-319-31517-1\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/HooghSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Schoenmakers16, author = {Berry Schoenmakers}, editor = {Jens Grossklags and Bart Preneel}, title = {Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {299--320}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_18}, doi = {10.1007/978-3-662-54970-4\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Schoenmakers16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorchonRTTLG0S16, author = {Oscar Garc{\'{\i}}a Morchon and Ronald Rietman and Ludo Tolhuizen and Jose Luis Torre{-}Arce and Moon Sung Lee and Domingo G{\'{o}}mez{-}P{\'{e}}rez and Jaime Gutierrez and Berry Schoenmakers}, title = {Attacks and parameter choices in {HIMMO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2016}, url = {http://eprint.iacr.org/2016/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorchonRTTLG0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchoenmakersV15, author = {Berry Schoenmakers and Meilof Veeningen}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {3--22}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_1}, doi = {10.1007/978-3-319-28166-7\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchoenmakersV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchoenmakersV15, author = {Berry Schoenmakers and Meilof Veeningen}, title = {Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2015}, url = {http://eprint.iacr.org/2015/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchoenmakersV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchoenmakersV15a, author = {Berry Schoenmakers and Meilof Veeningen}, title = {Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2015}, url = {http://eprint.iacr.org/2015/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchoenmakersV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchoenmakersVV15, author = {Berry Schoenmakers and Meilof Veeningen and Niels de Vreede}, title = {Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2015}, url = {http://eprint.iacr.org/2015/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchoenmakersVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HooghSCA14, author = {Sebastiaan de Hoogh and Berry Schoenmakers and Ping Chen and Harm op den Akker}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Practical Secure Decision Tree Learning in a Teletreatment Application}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {179--194}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_12}, doi = {10.1007/978-3-662-45472-5\_12}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/HooghSCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schoenmakers14, author = {Berry Schoenmakers}, title = {Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2014}, url = {http://eprint.iacr.org/2014/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schoenmakers14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/SepahiPSS12, author = {Reza Sepahi and Josef Pieprzyk and Siamak Fayyaz Shahandashti and Berry Schoenmakers}, title = {New security notions and relations for public-key encryption}, journal = {J. Math. Cryptol.}, volume = {6}, number = {3-4}, pages = {183--227}, year = {2012}, url = {https://doi.org/10.1515/jmc-2010-0099}, doi = {10.1515/JMC-2010-0099}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/SepahiPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KerschbaumSZPCHSCD11, author = {Florian Kerschbaum and Axel Schr{\"{o}}pfer and Antonio Zilli and Richard Pibernik and Octavian Catrina and Sebastiaan de Hoogh and Berry Schoenmakers and Stelvio Cimato and Ernesto Damiani}, title = {Secure Collaborative Supply-Chain Management}, journal = {Computer}, volume = {44}, number = {9}, pages = {38--43}, year = {2011}, url = {https://doi.org/10.1109/MC.2011.224}, doi = {10.1109/MC.2011.224}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/KerschbaumSZPCHSCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/SkoricOVS11, author = {Boris Skoric and Chibuzo Obi and Evgeny A. Verbitskiy and Berry Schoenmakers}, title = {Sharp lower bounds on the extractable randomness from non-uniform sources}, journal = {Inf. Comput.}, volume = {209}, number = {8}, pages = {1184--1196}, year = {2011}, url = {https://doi.org/10.1016/j.ic.2011.06.001}, doi = {10.1016/J.IC.2011.06.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/SkoricOVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Designated-Verifier Proofs}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {330--331}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_4}, doi = {10.1007/978-1-4419-5906-5\_4}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11a, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Homomorphic Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {560--562}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_870}, doi = {10.1007/978-1-4419-5906-5\_870}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11b, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Interactive Argument}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {618--619}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_5}, doi = {10.1007/978-1-4419-5906-5\_5}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11c, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Interactive Proof}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {619}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_6}, doi = {10.1007/978-1-4419-5906-5\_6}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11d, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Multiparty Computation}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {812--815}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_7}, doi = {10.1007/978-1-4419-5906-5\_7}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11e, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Noninteractive Proof}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {846}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_8}, doi = {10.1007/978-1-4419-5906-5\_8}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11f, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Oblivious Transfer}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {884--885}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_9}, doi = {10.1007/978-1-4419-5906-5\_9}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11g, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Proof of Knowledge Versus Proof of Membership}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {983--984}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_10}, doi = {10.1007/978-1-4419-5906-5\_10}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11h, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Protocol}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {990}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_11}, doi = {10.1007/978-1-4419-5906-5\_11}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11i, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Threshold Homomorphic Cryptosystems}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1293--1294}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_13}, doi = {10.1007/978-1-4419-5906-5\_13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11j, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Verifiable Secret Sharing}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1357--1358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_14}, doi = {10.1007/978-1-4419-5906-5\_14}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11k, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Witness Hiding}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1391--1392}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_15}, doi = {10.1007/978-1-4419-5906-5\_15}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers11l, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Zero-Knowledge}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1401--1403}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_16}, doi = {10.1007/978-1-4419-5906-5\_16}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers11l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/VerbitskiyTOSS10, author = {Evgeny A. Verbitskiy and Pim Tuyls and Chibuzo Obi and Berry Schoenmakers and Boris Skoric}, title = {Key extraction from general nondiscrete signals}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {2}, pages = {269--279}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2046965}, doi = {10.1109/TIFS.2010.2046965}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/VerbitskiyTOSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GuajardoMS10, author = {Jorge Guajardo and Bart Mennink and Berry Schoenmakers}, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {Anonymous Credential Schemes with Encrypted Attributes}, booktitle = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, pages = {314--333}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7\_22}, doi = {10.1007/978-3-642-17619-7\_22}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/GuajardoMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuajardoMS10, author = {Jorge Guajardo and Bart Mennink and Berry Schoenmakers}, editor = {Radu Sion}, title = {Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {375--382}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_32}, doi = {10.1007/978-3-642-14577-3\_32}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GuajardoMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HooghSSV09, author = {Sebastiaan de Hoogh and Berry Schoenmakers and Boris Skoric and Jos{\'{e}} Villegas}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Verifiable Rotation of Homomorphic Encryptions}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {393--410}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_22}, doi = {10.1007/978-3-642-00468-1\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HooghSSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/voteid/2009, editor = {Peter Y. A. Ryan and Berry Schoenmakers}, title = {E-Voting and Identity, Second International Conference, VoteID 2009, Luxembourg, September 7-8, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5767}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04135-8}, doi = {10.1007/978-3-642-04135-8}, isbn = {978-3-642-04134-1}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/voteid/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VerbitskiyTOSS09, author = {Evgeny A. Verbitskiy and Pim Tuyls and Chibuzo Obi and Berry Schoenmakers and Boris Skoric}, title = {Key extraction from general non-discrete signals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2009}, url = {http://eprint.iacr.org/2009/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VerbitskiyTOSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KirazS08, author = {Mehmet S. Kiraz and Berry Schoenmakers}, editor = {Tal Malkin}, title = {An Efficient Protocol for Fair Secure Two-Party Computation}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {88--105}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_6}, doi = {10.1007/978-3-540-79263-5\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KirazS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DesmedtKS08, author = {Yvo Desmedt and Brian King and Berry Schoenmakers}, editor = {Reihaneh Safavi{-}Naini}, title = {Revisiting the Karnin, Greene and Hellman Bounds}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {183--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_18}, doi = {10.1007/978-3-540-85093-9\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DesmedtKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkoricOVS08, author = {Boris Skoric and Chibuzo Obi and Evgeny A. Verbitskiy and Berry Schoenmakers}, title = {Sharp lower bounds on the extractable randomness from non-uniform sources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2008}, url = {http://eprint.iacr.org/2008/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkoricOVS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/SchoenmakersTTV07, author = {Berry Schoenmakers and Jilles Tjoelker and Pim Tuyls and Evgeny A. Verbitskiy}, title = {Smooth R??nyi Entropy of Ergodic Quantum Information Sources}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {256--260}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557235}, doi = {10.1109/ISIT.2007.4557235}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/SchoenmakersTTV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KirazSV07, author = {Mehmet S. Kiraz and Berry Schoenmakers and Jos{\'{e}} Villegas}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Efficient Committed Oblivious Transfer of Bit Strings}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {130--144}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_9}, doi = {10.1007/978-3-540-75496-1\_9}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/KirazSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GaraySV07, author = {Juan A. Garay and Berry Schoenmakers and Jos{\'{e}} Villegas}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Practical and Secure Solutions for Integer Comparison}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {330--342}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_22}, doi = {10.1007/978-3-540-71677-8\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GaraySV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FarashahiSS07, author = {Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Efficient Pseudorandom Generators Based on the {DDH} Assumption}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {426--441}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_28}, doi = {10.1007/978-3-540-71677-8\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FarashahiSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/SchoenmakersT07, author = {Berry Schoenmakers and Pim Tuyls}, editor = {Milan Petkovic and Willem Jonker}, title = {Client-Server Trade-Offs in Secure Computation}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {197--211}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_14}, doi = {10.1007/978-3-540-69861-6\_14}, timestamp = {Tue, 16 May 2017 14:01:42 +0200}, biburl = {https://dblp.org/rec/books/sp/07/SchoenmakersT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0704-3504, author = {Berry Schoenmakers and Jilles Tjoelker and Pim Tuyls and Evgeny A. Verbitskiy}, title = {Smooth R{\'{e}}nyi Entropy of Ergodic Quantum Information Sources}, journal = {CoRR}, volume = {abs/0704.3504}, year = {2007}, url = {http://arxiv.org/abs/0704.3504}, eprinttype = {arXiv}, eprint = {0704.3504}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0704-3504.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/CanardSST06, author = {S{\'{e}}bastien Canard and Berry Schoenmakers and Martijn Stam and Jacques Traor{\'{e}}}, title = {List signature schemes}, journal = {Discret. Appl. Math.}, volume = {154}, number = {2}, pages = {189--201}, year = {2006}, url = {https://doi.org/10.1016/j.dam.2005.08.003}, doi = {10.1016/J.DAM.2005.08.003}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/CanardSST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SchoenmakersT06, author = {Berry Schoenmakers and Pim Tuyls}, editor = {Serge Vaudenay}, title = {Efficient Binary Conversion for Paillier Encrypted Values}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {522--537}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_31}, doi = {10.1007/11761679\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SchoenmakersT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchoenmakersS06, author = {Berry Schoenmakers and Andrey Sidorenko}, title = {Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2006}, url = {http://eprint.iacr.org/2006/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchoenmakersS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashahiSS06, author = {Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko}, title = {Efficient Pseudorandom Generators Based on the {DDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2006}, url = {http://eprint.iacr.org/2006/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashahiSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePS05, author = {Marc Joye and Pascal Paillier and Berry Schoenmakers}, editor = {Josyula R. Rao and Berk Sunar}, title = {On Second-Order Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {293--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_22}, doi = {10.1007/11545262\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/SidorenkoS05, author = {Andrey Sidorenko and Berry Schoenmakers}, editor = {Nigel P. Smart}, title = {Concrete Security of the Blum-Blum-Shub Pseudorandom Generator}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {355--375}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_24}, doi = {10.1007/11586821\_24}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/SidorenkoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RietjensST05, author = {Karin Rietjens and Berry Schoenmakers and Pim Tuyls}, title = {Quantum information theoretical analysis of various constructions for quantum secret sharing}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1598--1602}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523614}, doi = {10.1109/ISIT.2005.1523614}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/RietjensST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/PoelsTS05, author = {Karin Poels and Pim Tuyls and Berry Schoenmakers}, title = {Generic security proof of quantum key exchange using squeezed states}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1612--1616}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523617}, doi = {10.1109/ISIT.2005.1523617}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/PoelsTS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05, author = {Richard Brinkman and Berry Schoenmakers and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Experiments with Queries over Encrypted Data Using Secret Sharing}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {33--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_3}, doi = {10.1007/11552338\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/SidorenkoS05, author = {Andrey Sidorenko and Berry Schoenmakers}, editor = {Christopher Wolf and Stefan Lucks and Po{-}Wah Yau}, title = {State Recovery Attacks on Pseudorandom Generators}, booktitle = {WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium}, series = {{LNI}}, volume = {{P-74}}, pages = {53--63}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/24850}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/SidorenkoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Interactive Argument}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_201}, doi = {10.1007/0-387-23483-7\_201}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05a, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Interactive Proof}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_202}, doi = {10.1007/0-387-23483-7\_202}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05b, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Multiparty Computation}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_265}, doi = {10.1007/0-387-23483-7\_265}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05c, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Noninteractive Proof}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_273}, doi = {10.1007/0-387-23483-7\_273}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05d, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Oblivious Transfer}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_285}, doi = {10.1007/0-387-23483-7\_285}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05e, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Proof of Knowledge vs. Proof of Membership}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_321}, doi = {10.1007/0-387-23483-7\_321}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05f, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Protocol}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_323}, doi = {10.1007/0-387-23483-7\_323}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05g, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Verifiable Secret Sharing}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_452}, doi = {10.1007/0-387-23483-7\_452}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05h, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Witness Hiding}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_461}, doi = {10.1007/0-387-23483-7\_461}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Schoenmakers05i, author = {Berry Schoenmakers}, editor = {Henk C. A. van Tilborg}, title = {Zero-knowledge}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_463}, doi = {10.1007/0-387-23483-7\_463}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Schoenmakers05i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SchoenmakersT04, author = {Berry Schoenmakers and Pim Tuyls}, editor = {Pil Joong Lee}, title = {Practical Two-Party Computation Based on the Conditional Gate}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {119--136}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_10}, doi = {10.1007/978-3-540-30539-2\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SchoenmakersT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/BoudotST01, author = {Fabrice Boudot and Berry Schoenmakers and Jacques Traor{\'{e}}}, title = {A fair and efficient solution to the socialist millionaires' problem}, journal = {Discret. Appl. Math.}, volume = {111}, number = {1-2}, pages = {23--36}, year = {2001}, url = {https://doi.org/10.1016/S0166-218X(00)00342-5}, doi = {10.1016/S0166-218X(00)00342-5}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/BoudotST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/Schoenmakers00, author = {Berry Schoenmakers}, editor = {Lorrie Faith Cranor}, title = {Compensating for a lack of transparency}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {231--233}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332288}, doi = {10.1145/332186.332288}, timestamp = {Mon, 23 May 2022 11:52:54 +0200}, biburl = {https://dblp.org/rec/conf/cfp/Schoenmakers00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BuldasLS00, author = {Ahto Buldas and Helger Lipmaa and Berry Schoenmakers}, editor = {Hideki Imai and Yuliang Zheng}, title = {Optimally Efficient Accountable Time-Stamping}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {293--305}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_20}, doi = {10.1007/978-3-540-46588-1\_20}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BuldasLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Schoenmakers99, author = {Berry Schoenmakers}, editor = {Michael J. Wiener}, title = {A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {148--164}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_10}, doi = {10.1007/3-540-48405-1\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Schoenmakers99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/CramerGS97, author = {Ronald Cramer and Rosario Gennaro and Berry Schoenmakers}, title = {A secure and optimally efficient multi-authority election scheme}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {481--490}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080506}, doi = {10.1002/ETT.4460080506}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/CramerGS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Schoenmakers97, author = {Berry Schoenmakers}, title = {A Tight Lower Bound for Top-Down Skew Heaps}, journal = {Inf. Process. Lett.}, volume = {61}, number = {5}, pages = {279--284}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00028-8}, doi = {10.1016/S0020-0190(97)00028-8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Schoenmakers97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Schoenmakers97, author = {Berry Schoenmakers}, editor = {Bart Preneel and Vincent Rijmen}, title = {Security Aspects of the Ecash\({}^{\mbox{TM}}\) Payment System}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {338--352}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_16}, doi = {10.1007/3-540-49248-8\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Schoenmakers97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerGS97, author = {Ronald Cramer and Rosario Gennaro and Berry Schoenmakers}, editor = {Walter Fumy}, title = {A Secure and Optimally Efficient Multi-Authority Election Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {103--118}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_9}, doi = {10.1007/3-540-69053-0\_9}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerGS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/KatoenS96, author = {Joost{-}Pieter Katoen and Berry Schoenmakers}, title = {Systolic Arrays for the Recognition of Permutation-Invariant Segments}, journal = {Sci. Comput. Program.}, volume = {27}, number = {2}, pages = {119--137}, year = {1996}, url = {https://doi.org/10.1016/0167-6423(96)00009-3}, doi = {10.1016/0167-6423(96)00009-3}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/KatoenS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerFSY96, author = {Ronald Cramer and Matthew K. Franklin and Berry Schoenmakers and Moti Yung}, editor = {Ueli M. Maurer}, title = {Multi-Autority Secret-Ballot Elections with Linear Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {72--83}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_7}, doi = {10.1007/3-540-68339-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerFSY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CramerDS94, author = {Ronald Cramer and Ivan Damg{\aa}rd and Berry Schoenmakers}, editor = {Yvo Desmedt}, title = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {174--187}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_19}, doi = {10.1007/3-540-48658-5\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CramerDS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94, author = {Jean{-}Paul Boly and Antoon Bosselaers and Ronald Cramer and Rolf Michelsen and Stig Fr. Mj{\o}lsnes and Frank Muller and Torben P. Pedersen and Birgit Pfitzmann and Peter de Rooij and Berry Schoenmakers and Matthias Schunter and Luc Vall{\'{e}}e and Michael Waidner}, editor = {Dieter Gollmann}, title = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {217--230}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_66}, doi = {10.1007/3-540-58618-0\_66}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BolyBCMMMPPRSSVW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Schoenmakers93, author = {Berry Schoenmakers}, title = {A Systematic Analysis of Splaying}, journal = {Inf. Process. Lett.}, volume = {45}, number = {1}, pages = {41--50}, year = {1993}, url = {https://doi.org/10.1016/0020-0190(93)90249-9}, doi = {10.1016/0020-0190(93)90249-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Schoenmakers93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mpc/Schoenmakers92, author = {Berry Schoenmakers}, editor = {Richard S. Bird and Carroll Morgan and Jim Woodcock}, title = {Inorder Traversal of a Binary Heap and its Inversion in Optimal Time and Space}, booktitle = {Mathematics of Program Construction, Second International Conference, Oxford, UK, June 29 - July 3, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {669}, pages = {291--301}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-56625-2\_19}, doi = {10.1007/3-540-56625-2\_19}, timestamp = {Fri, 17 Feb 2023 09:02:01 +0100}, biburl = {https://dblp.org/rec/conf/mpc/Schoenmakers92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KaldewaijS91, author = {Anne Kaldewaij and Berry Schoenmakers}, title = {The Derivation of a Tighter Bound for Top-Down Skew Heaps}, journal = {Inf. Process. Lett.}, volume = {37}, number = {5}, pages = {265--271}, year = {1991}, url = {https://doi.org/10.1016/0020-0190(91)90218-7}, doi = {10.1016/0020-0190(91)90218-7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KaldewaijS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc/KatoenS91, author = {Joost{-}Pieter Katoen and Berry Schoenmakers}, editor = {Patrice Quinton and Yves Robert}, title = {A Parallel program for the recognition of P-Invariant segments}, booktitle = {Algorithms and Parallel {VLSI} Architectures II, Proceedings of the International Workshop Algorithms and Parallel {VLSI} Architectures II, Ch{\^{a}}teau de Bonas, Gers, France, June 3-6, 1991}, pages = {79--84}, publisher = {Elsevier}, year = {1991}, timestamp = {Wed, 04 Sep 2002 15:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ccc/KatoenS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/KaldewaijS90, author = {Anne Kaldewaij and Berry Schoenmakers}, title = {Searching by Elimination}, journal = {Sci. Comput. Program.}, volume = {14}, number = {2-3}, pages = {243--254}, year = {1990}, url = {https://doi.org/10.1016/0167-6423(90)90022-6}, doi = {10.1016/0167-6423(90)90022-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/KaldewaijS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mpc/KaldewaijS89, author = {Anne Kaldewaij and Berry Schoenmakers}, editor = {Jan L. A. van de Snepscheut}, title = {Searching by Elimination}, booktitle = {Mathematics of Program Construction, 375th Anniversary of the Groningen University, International Conference, Groningen, The Netherlands, June 26-30, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {375}, pages = {297--306}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-51305-1\_17}, doi = {10.1007/3-540-51305-1\_17}, timestamp = {Fri, 17 Jul 2020 16:12:47 +0200}, biburl = {https://dblp.org/rec/conf/mpc/KaldewaijS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.