Berry Schoenmakers
Orcid: 0000-0001-6273-8930Affiliations:
- Eindhoven University of Technology, Netherlands
According to our database1,
Berry Schoenmakers
authored at least 82 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on github.com
-
on win.tue.nl
On csauthors.net:
Bibliography
2024
Proceedings of the Principles of Verification: Cycling the Probabilistic Landscape, 2024
2023
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation.
Cryptogr., September, 2023
Divisions and Square Roots with Tight Error Analysis from Newton-Raphson Iteration in Secure Fixed-Point Arithmetic.
Cryptogr., July, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2019
IACR Cryptol. ePrint Arch., 2019
2018
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks.
IACR Cryptol. ePrint Arch., 2018
2016
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems.
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2012
J. Math. Cryptol., 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
Proceedings of the Public Key Cryptography, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the Secure Data Management, 2005
Quantum information theoretical analysis of various constructions for quantum secret sharing.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2001
Discret. Appl. Math., 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Tenth Conference on Computers, 2000
1999
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic.
Proceedings of the Advances in Cryptology, 1999
1997
Eur. Trans. Telecommun., 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
Sci. Comput. Program., 1996
Proceedings of the Advances in Cryptology, 1996
1994
Proceedings of the Computer Security, 1994
Proceedings of the Advances in Cryptology, 1994
1993
1992
Proceedings of the Mathematics of Program Construction, Second International Conference, Oxford, UK, June 29, 1992
1991
A Parallel program for the recognition of P-Invariant segments.
Proceedings of the Algorithms and Parallel VLSI Architectures II, 1991
1990