Berry Schoenmakers
Berry Schoenmakers
Associate Professor, TU Eindhoven
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Proofs of partial knowledge and simplified design of witness hiding protocols
R Cramer, I Damgård, B Schoenmakers
Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 2001
A Secure and Optimally Efficient Multi-Authority Election Scheme
R Cramer, R Gennaro, B Schoenmakers
European Transactions on Telecommunications 8, 1997
A simple publicly verifiable secret sharing scheme and its application to electronic voting
B Schoenmakers
Advances in Cryptology—CRYPTO'99, 148-164, 1999
Multi-Authority Secret Ballot Elections with Linear Work
R Cramer, M Franklin, B Schoenmakers, M Yung
Proceedings of EUROCRYPT, 72-83, 1996
The ESPRIT project CAFE—High security digital payment systems
JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ...
European Symposium on Research in Computer Security, 217-230, 1994
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
A Fair and Efficient Solution to the Socialist Millionaires’ Problem
F Boudot, B Schoenmakers, J Traoré
Discrete Applied Mathematics 111 (1-2), 2001
Partitioned information storage systems with controlled retrieval
D Chaum, NT Ferguson, B Schoenmakers, EW Voskuil
US Patent 5,956,400, 1999
Efficient binary conversion for Paillier encrypted values
B Schoenmakers, P Tuyls
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
Practical and secure solutions for integer comparison
J Garay, B Schoenmakers, J Villegas
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
Practical Two-Party Computation Based on the Conditional Gate.
B Schoenmakers, P Tuyls
Asiacrypt 4, 119-136, 2004
Basic security of the ecash payment system
B Schoenmakers
Computer Security and Industrial Cryptography 1528, 1997
Optimally Efficient Accountable Time-Stamping
A Buldas, H Lipmaa, B Schoenmakers
Public Key Cryptography, 293-305, 2000
Concrete Security of The Blum-Blum-Shub Pseudorandom Generator
A Sidorenko, B Schoenmakers
Cryptography and Coding: 10th IMA International Conference 3796, 355-375, 2005
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux 29 (4), 283-290, 2006
Secure collaborative supply-chain management
F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S de Hoogh, ...
Computer 44 (9), 38-43, 2011
Key extraction from general nondiscrete signals
EA Verbitskiy, P Tuyls, C Obi, B Schoenmakers, B Skoric
IEEE Transactions on Information Forensics and Security 5 (2), 269-279, 2010
Securely computing a similarity measure
PT Tuyls, E Verbitskiy, B Schoenmakers, ME Van Dijk
US Patent 8,281,148, 2012
A new algorithm for the recognition of series parallel graphs
B Schoenmakers
CWI report. CS-R. CWI, 1995
List signature schemes
S Canard, B Schoenmakers, M Stam, J Traoré
Discrete Applied Mathematics 154 (2), 189-201, 2006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20