Berry Schoenmakers
Berry Schoenmakers
Associate Professor, TU Eindhoven
Verified email at - Homepage
Cited by
Cited by
Proofs of partial knowledge and simplified design of witness hiding protocols
R Cramer, I Damgård, B Schoenmakers
Annual International Cryptology Conference, 174-187, 1994
A Secure and Optimally Efficient Multi-Authority Election Scheme
R Cramer, R Gennaro, B Schoenmakers
European Transactions on Telecommunications 8, 1997
A simple publicly verifiable secret sharing scheme and its application to electronic voting
B Schoenmakers
Advances in Cryptology—CRYPTO'99, 148-164, 1999
Multi-Authority Secret Ballot Elections with Linear Work
R Cramer, M Franklin, B Schoenmakers, M Yung
Proceedings of EUROCRYPT, 72-83, 1996
The ESPRIT project CAFE—High security digital payment systems
JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ...
European Symposium on Research in Computer Security, 217-230, 1994
A Fair and Efficient Solution to the Socialist Millionaires’ Problem
F Boudot, B Schoenmakers, J Traoré
Discrete Applied Mathematics 111 (1-2), 2001
On second-order differential power analysis
M Joye, P Paillier, B Schoenmakers
Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005
Efficient binary conversion for Paillier encrypted values
B Schoenmakers, P Tuyls
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
Practical and secure solutions for integer comparison
J Garay, B Schoenmakers, J Villegas
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
Partitioned information storage systems with controlled retrieval
D Chaum, NT Ferguson, B Schoenmakers, EW Voskuil
US Patent 5,956,400, 1999
Practical two-party computation based on the conditional gate
B Schoenmakers, P Tuyls
International conference on the theory and application of cryptology and …, 2004
Basic security of the ecash payment system
B Schoenmakers
Computer Security and Industrial Cryptography 1528, 1997
Optimally Efficient Accountable Time-Stamping
A Buldas, H Lipmaa, B Schoenmakers
Public Key Cryptography, 293-305, 2000
Concrete Security of The Blum-Blum-Shub Pseudorandom Generator
A Sidorenko, B Schoenmakers
Cryptography and Coding: 10th IMA International Conference 3796, 355-375, 2005
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux 29 (4), 283-290, 2006
Practical Secure Decision Tree Learning in a Teletreatment Application
S de Hoogh, B Schoenmakers, P Chen, H op den Akker
Proceedings of the 18th International Conference on Financial Cryptography …, 2014
MPyC---Python package for secure multiparty computation
B Schoenmakers
Workshop on the Theory and Practice of MPC., 2018
Securely computing a similarity measure
PT Tuyls, E Verbitskiy, B Schoenmakers, ME Van Dijk
US Patent 8,281,148, 2012
Key extraction from general nondiscrete signals
EA Verbitskiy, P Tuyls, C Obi, B Schoenmakers, B Skoric
IEEE Transactions on Information Forensics and Security 5 (2), 269-279, 2010
Secure collaborative supply-chain management
F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S De Hoogh, ...
Computer 44 (9), 38-43, 2011
The system can't perform the operation now. Try again later.
Articles 1–20