Name
Affiliation
Papers
BERRY SCHOENMAKERS
Eindhoven University of Technology
46
Collaborators
Citations 
PageRank 
71
1550
119.18
Referers 
Referees 
References 
2314
520
458
Search Limit
1001000
Title
Citations
PageRank
Year
Efficient Secure Ridge Regression from Randomized Gaussian Elimination.00.342021
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks.00.342019
Secure simultaneous bit extraction from Koblitz curves.10.372019
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming.30.402016
Attacks and parameter choices in HIMMO.00.342016
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems.50.412015
Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation.00.342015
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation30.392015
Practical Secure Decision Tree Learning in a Teletreatment Application.40.402014
New Security Notions And Relations For Public-Key Encryption00.342012
Sharp lower bounds on the extractable randomness from non-uniform sources40.532011
Anonymous Credential Schemes With Encrypted Attributes40.412010
Modulo reduction for paillier encryptions and application to secure statistical analysis150.762010
Verifiable Rotation of Homomorphic Encryptions60.462009
E-Voting and Identity, Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings110.942009
An efficient protocol for fair secure two-party computation80.542008
Revisiting the Karnin, Greene and Hellman Bounds00.342008
Practical and secure solutions for integer comparison491.802007
Smooth Renyi Entropy Of Ergodic Quantum Information Sources10.672007
Efficient committed oblivious transfer of bit strings70.472007
Efficient pseudorandom generators based on the DDH assumption00.342006
List signature schemes110.582006
Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator.90.712006
Efficient binary conversion for paillier encrypted values622.712006
Generic Security Proof Of Quantum Key Exchange Using Squeezed States00.342005
Quantum Information Theoretical Analysis Of Various Constructions For Quantum Secret Sharing20.602005
Concrete security of the blum-blum-shub pseudorandom generator160.942005
On second-order differential power analysis644.432005
Experiments with queries over encrypted data using secret sharing10.372005
State Recovery Attacks on Pseudorandom Generators40.582005
Practical Two-Party Computation Based on the Conditional Gate492.452004
A fair and efficient solution to the socialist millionaires’ problem646.512001
Optimally Efficient Accountable Time-Stamping271.722000
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic974.201999
A tight lower bound for top-down skew heaps10.341997
A Secure and Optimally Efficient Multi-Authority Election Scheme38530.181997
Security Aspects of the Ecash™ Payment System161.271997
Multi-Autority Secret-Ballot Elections with Linear Work.190.921996
Systolic arrays for the recognition of permutation-invariant segments00.341996
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols53836.871994
The ESPRIT Project CAFE - High Security Digital Payment Systems489.441994
A systematic analysis of splaying20.471993
Inorder Traversal of a Binary Heap and its Inversion in Optimal Time and Space80.711992
The derivation of a tighter bound for top-down skew heaps40.531991
A parallel program for the recognition of P-invariant segments00.341991
Searching by elimination20.711989