• AddressShow on map

    Postbus 513, MF

    5600MB Eindhoven

    Netherlands

Filter
Chapter

Search results

  • 2021

    An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families

    Ashur, T. & Luykx, A., 1 Jan 2021, Security of Ubiquitous Computing Systems: (Selected Topics). Springer, p. 63-78 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    Open Access
    File
    4 Citations (Scopus)
    66 Downloads (Pure)
  • 2020

    Algorithms for NP-Hard Problems via Rank-Related Parameters of Matrices

    Nederlof, J., 2020, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, p. 145-164 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12160 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    6 Citations (Scopus)
  • 2019

    Matrix codes and rook theory

    Ravagnani, A., 2019, Oberwolfach Report of the conference "Contemporary Coding Theory".

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 2018

    The Poincaré polynomial of a linear code

    Galindo, C., Hernando, F., Montserrat, F. & Pellikaan, G. R., 18 Sept 2018, Singularities, Algebraic Geometry, Commutative Algebra, and Related Topics: Festschrift for Antonio Campillo on the Occasion of his 65th Birthday. Greuel, G.-M., Narváez Macarro, L. & Xambó-Descamps, S. (eds.). Cham: Springer, p. 525-535 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Downloads (Pure)
  • 2017

    Approximation-friendly discrepancy rounding

    Bansal, N. & Nagarajan, V., 1 Jan 2017, A Journey Through Discrete Mathematics: A Tribute to Jiri Matousek. Loebl, M., Thomas, R. & Nešetřil, J. (eds.). Dordrecht: Springer, p. 89-114 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    2 Citations (Scopus)
  • Isogenies for point counting on genus two hyperelliptic curves with maximal real multiplication

    Ballentine, S., Guillevic, A., Lorenzo-Garcia, E., Martindale, C. R., Maisserer, M., Smith, B. & Top, J., 2017, Algebraic geometry for coding theory and cryptography. Howe, E. W., Lauter, K. E. & Walker, J. L. (eds.). Cham: Springer, p. 63-94 32 p. (Association for Women in Mathematics Series; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    5 Citations (Scopus)
  • Montgomery curves and the Montgomery ladder

    Bernstein, D. J. & Lange, T., 2017, Topics in Computational Number Theory Inspired by Peter L. Montgomery. Bos, J. W. ,. & Lenstra, A. K. (eds.). Cambridge: Cambridge University Press, p. 82-115

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    File
    759 Downloads (Pure)
  • 2016

    Dual EC: a standardized back door

    Bernstein, D. J., Lange, T. & Niederhagen, R., 2016, The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J. J. (eds.). Dordrecht: Springer, p. 256-281 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    50 Citations (Scopus)
  • Exact algorithms and time/space tradeoffs

    Nederlof, J., 2016, Encyclopedia of Algorithms. M.-Y., K. (ed.). Dordrecht: Springer, p. 661-664 4 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Downloads (Pure)
  • 2015

    Basic constructions of secure multiparty computation

    Laud, P., Pankova, A., Kamm, L. & Veeningen, M. G., 2015, Applications of Secure Multiparty Computation. Laud, P. & Kamm, L. (eds.). Amsterdam: IOS Press, p. 1-25 (Cryptology and Information Security Series; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Citations (Scopus)
    13 Downloads (Pure)
  • Universally verifiable outsourcing and application to linear programming

    Hoogh, de, S. J. A., Schoenmakers, B. & Veeningen, M. G., 30 Jul 2015, Applications of Secure Multiparty Computation. Laud, P. & Kamm, L. (eds.). Amsterdam: IOS Press, p. 186-215 30 p. (Cryptology and Information Security Series; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Downloads (Pure)
  • 2014

    Algorithmic aspects of combinatorial discrepancy

    Bansal, N., 2014, A Panorama of Discrepancy Theory. Chen, W., Srivastav, A. & Travaglini, G. (eds.). Cham: Springer, p. 425-457 (Lecture Notes in Mathematics; vol. 2107).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Citations (Scopus)
  • Embeddings of cotriangular spaces

    Cuypers, H. & Panhuis, in 't, J. C. H. W., 2014, Groups of Exceptional Type, Coxeter Groups and Related Geometries. Narasimha Sastry, N. S. (ed.). New Delhi: Springer, p. 135-145 (Springer Proceedings in Mathematics & Statistics; vol. 82).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 'Houtje-touwtje'-wiskunde

    Bakker, M. C. M., Klerx, M. & Sterk, H. J. M., 2014, Weer 10 jaar NWD. Een lichtbundel. Doorman, M., Heiden, van der, A. & Kuijpers, N. (eds.). Utrecht: Freudenthal Instituut, p. 161-169

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Noetherianity up to symmetry

    Draisma, J., 2014, Combinatorial Algebraic Geometry (Levico Terme, Italy, June 10-15 2013). Di Rocco, S. & Sturmfels, B. (eds.). Cham/Firenze: Springer, p. 33-61 (Lecture Notes in Mathematics; vol. 2108).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    25 Citations (Scopus)
    2 Downloads (Pure)
  • Preface

    Lange, T., Lauter, K. & Lisoněk, P., 1 Jan 2014, Selected areas in cryptography - SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers. Berlin: Springer, p. V-VI 2 p. (Lecture Notes in Computer Science; vol. 8282).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • vo en wo: samen verder in het kader van wiskunde D?

    Sterk, H. J. M., 2014, Weer 10 jaar NWD. Een lichtbundel. Doorman, M., Heiden, van der, A. & Kuijpers, N. (eds.). Utrecht: Freudenthal Instituut, p. 28-29

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • 2013

    Addition formulas for elliptic curves

    Bernstein, D. J. & Lange, T., 2013, Handbook of Finite Fields. Mullen, G. L. & Panario, D. (eds.). London: Chapman & Hall/CRC Press, p. 440-446 (Discrete Mathematics and Its Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    4 Downloads (Pure)
  • Codes, arrangements and matroids

    Jurrius, R. P. M. J. & Pellikaan, G. R., 2013, Algebraic geometry modeling in information theory. Martínez-Moro, E. (ed.). London: World Scientific, p. 219-325 336 p. (Series on Coding Theory and Cryptology; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • Het 3n+1-vermoeden

    Weger, de, B. M. M., 2013, Wiskunde in wording. Wiegerinck, J. J. O. O. (ed.). Amsterdam: Platform Wiskunde Nederland (PWN), p. 1-30 (Syllabus Vakantiecursus 2013).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    Open Access
    File
    122 Downloads (Pure)
  • Lacunary polynomials over finite fields

    Ball, S. M. & Blokhuis, A., 2013, Handbook of Finite Fields. Mullen, G. L. & Panario, D. (eds.). London: Chapman & Hall/CRC Press, p. 556-563 (Discrete Mathematics and Its Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • The way forward

    Custers, B. H. M., Calders, T. G. K., Zarsky, T. Z. & Schermer, B. W., 2013, Discrimination and Privacy in the Information Society: Effects of Data Mining and Profiling Large Databases. Custers, B. H. M., Calders, T. G. K., Schermer, B. W. & Zarsky, T. Z. (eds.). Berlin: Springer, p. 341-357 (Studies in Applied Philosophy, Epistemology and Rational Ethics; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    7 Citations (Scopus)
  • What is data mining and how does it work?

    Calders, T. G. K. & Custers, B. H. M., 2013, Discrimination and Privacy in the Information Society: Effects of Data Mining and Profiling Large Databases. Custers, B. H. M., Calders, T. G. K., Schermer, B. W. & Zarsky, T. Z. (eds.). Berlin: Springer, p. 27-42 (Studies in Applied Philosophy, Epistemology and Rational Ethics; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    8 Citations (Scopus)
  • 2012

    Blocking sets in projective spaces

    Blokhuis, A., Sziklai, P. & Szonyi, T., 2012, Current research topics in Galois geometry. Storme, L. & De Beule, J. (eds.). New York: Nova Science, p. 61-84 24 p. Chapter 3

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Downloads (Pure)
  • Graph spectrum

    Brouwer, A. E. & Haemers, W. H., 2012, Spectra of Graphs. Brouwer, A. E. & Haemers, W. H. (eds.). New York: Springer, p. 1-20 (Universitext).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 2011

    Bohrification

    Heunen, C., Landsman, N. P. & Spitters, B. A. W., 2011, Deep beauty : understanding the quantum world through mathematical innovation. Halvorson, H. (ed.). Cambridge: Cambridge University Press, p. 271-313 486 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    20 Citations (Scopus)
    1 Downloads (Pure)
  • Chinese remainder theorem

    Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 201-202

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Decoding algorithms

    Peters, C. P., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 319-322

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Designated-verifier proofs

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 330-331

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Hash-based signatures

    Lange, T., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 540-542

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Interactive argument

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 618-619

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Interactive proof

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 619-619

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Mathematics bridging education using an online, adaptive e-tutorial : preparing international students for higher education

    Tempelaar, D. T., Rienties, B., Kaper, W., Giesbers, B., Schim van der Loeff, S., Gastel, van, L. J., Vrie, van de, E. M., Kooij, van der, H. & Cuypers, H., 2011, Teaching mathematics online : emergent technologies and methodologies. Juan, A. A., Huertas, M. A., Trenholm, S. & Steegmann, C. (eds.). IGI Global, p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    5 Citations (Scopus)
    2 Downloads (Pure)
  • Multiparty computation

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 812-815

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Noninteractive proof

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 846-846

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    2 Downloads (Pure)
  • Oblivious transfer

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 884-885

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Proof of knowledge vs. Proof of membership

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 983-984

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Protocol

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 990-990

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Shannon's model

    Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. & Jajodia, S. (eds.). 2nd ed. New York: Springer, p. 1194-1195

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Threshold homomorphic cryptosystems

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1293-1294

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Vector space

    Lange, T., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1356-1356

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Verifiable secret sharing

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1357-1358

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Witness hiding

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1391-1392

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Zero-knowledge

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1401-1403

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • 2010

    Decoding and finding the minimum distance with Gröbner bases : history and new insights

    Bulygin, S. & Pellikaan, G. R., 2010, Selected topics in information and coding theory. Woungang, I., Misra, S. & Misra, S. C. (eds.). London: World Scientific, p. 585-622 (Series on coding theory and cryptology; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Citations (Scopus)
    1 Downloads (Pure)
  • Hoe je het cryptosysteem RSA soms kunt kraken

    Weger, de, B. M. M., 2010, Wiskunde: de uitdaging (Vakantiecursus 2010). Wiegerinck, J. J. O. O. (ed.). Amsterdam: Centrum voor Wiskunde en Informatica, p. 83-100 (CWI Syllabus; vol. 60).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Preface

    Bernstein, D. J. & Lange, T., 18 Jun 2010, Progress in cryptology - Africacrypt 2010: third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings. 1 p. (Lecture Notes in Computer Science; vol. 6055).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • 2009

    Authentication codes from error-correcting codes; an overview

    Tilborg, van, H. C. A., 2009, Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. Preneel, B., Dodunekov, S., Rijmen, V. & Nikova, S. (eds.). Amsterdam: IOS Press, p. 3-16 (NATO Science for Peace and Security Series - D: Information and Communication Security; vol. 23).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases

    Bulygin, S. & Pellikaan, G. R., 2009, Gröbner Bases, Coding, and Cryptography. Sala, M., Mora, T., Perret, L., Sakata, S. & Traverso, C. (eds.). Berlin: Springer, p. 361-365 (Texts and Monographs in Symbolic Computation).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Citations (Scopus)
    1 Downloads (Pure)
  • Voting schemes

    Schoenmakers, B., 2009, Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques. Atallah, M. J. & Blanton, M. (eds.). Boca Raton FL: CRC Press, 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic