Berry Schoenmakers

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Explicit optimal binary pebbling for one-way hash chain reversal
Financial Cryptography and Data Security
2021-04-07Paper
Fast secure comparison for medium-sized integers and its application in binarized neural networks2020-01-28Paper
Secure simultaneous bit extraction from Koblitz curves
Designs, Codes and Cryptography
2019-01-11Paper
Binary pebbling algorithms for in-place reversal of one-way hash chains2018-01-09Paper
Binary pebbling algorithms for in-place reversal of one-way hash chains
(available as arXiv preprint)
2018-01-09Paper
Trinocchio: privacy-preserving outsourcing by distributed verifiable computation
Applied Cryptography and Network Security
2016-10-04Paper
Certificate validation in secure computation and its use in verifiable linear programming
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
A tight lower bound for top-down skew heaps
Information Processing Letters
2016-05-26Paper
Universally verifiable multiparty computation from threshold homomorphic cryptosystems
Applied Cryptography and Network Security
2016-03-10Paper
Multi-authority secret-ballot elections with linear work
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
New security notions and relations for public-key encryption
Journal of Mathematical Cryptology
2013-01-17Paper
Sharp lower bounds on the extractable randomness from non-uniform sources
Information and Computation
2011-10-10Paper
Anonymous credential schemes with encrypted attributes
Cryptology and Network Security
2010-12-07Paper
Verifiable Rotation of Homomorphic Encryptions
Public Key Cryptography – PKC 2009
2009-03-24Paper
On Second-Order Differential Power Analysis
Cryptographic Hardware and Embedded Systems – CHES 2005
2008-08-29Paper
An Efficient Protocol for Fair Secure Two-Party Computation
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Efficient Binary Conversion for Paillier Encrypted Values
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Efficient Pseudorandom Generators Based on the DDH Assumption
Public Key Cryptography – PKC 2007
2007-09-04Paper
Practical and Secure Solutions for Integer Comparison
Public Key Cryptography – PKC 2007
2007-09-04Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
List signature schemes
Discrete Applied Mathematics
2006-04-28Paper
Practical Two-Party Computation Based on the Conditional Gate2005-08-12Paper
A fair and efficient solution to the socialist millionaires' problem
Discrete Applied Mathematics
2001-10-30Paper
scientific article; zbMATH DE number 1504791 (Why is no real title available?)2000-09-12Paper
scientific article; zbMATH DE number 1418293 (Why is no real title available?)2000-07-26Paper
scientific article; zbMATH DE number 1440064 (Why is no real title available?)2000-05-07Paper
scientific article; zbMATH DE number 1406779 (Why is no real title available?)2000-03-01Paper
Systolic arrays for the recognition of permutation-invariant segments
Science of Computer Programming
1997-03-31Paper
scientific article; zbMATH DE number 883898 (Why is no real title available?)1997-01-06Paper
A systematic analysis of splaying
Information Processing Letters
1993-05-16Paper
scientific article; zbMATH DE number 54254 (Why is no real title available?)1993-01-23Paper
The derivation of a tighter bound for top-down skew heaps
Information Processing Letters
1991-01-01Paper
Searching by elimination
Science of Computer Programming
1990-01-01Paper


Research outcomes over time


This page was built for person: Berry Schoenmakers