• AddressShow on map

    Postbus 513, MF

    5600MB Eindhoven

    Netherlands

Filter
Chapter

Search results

  • 2007

    Client-server trade-offs in secure computation

    Schoenmakers, B. & Tuyls, P. T., 2007, Security, Privacy and Trust in Modern Data Management. Petkovic, M. & Jonker, W. (eds.). Berlin: Springer, p. 197-212 (Data-Centric Systems and Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • Computationally secure authentication with noisy data

    Schoenmakers, B. & Tuyls, P. T., 2007, Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting. Tuyls, P. T., Skoric, B. & Kevenaar, T. (eds.). New York: Springer, p. 141-149

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    16 Citations (Scopus)
  • Directed strongly regular graphs

    Brouwer, A. E. & Hobart, S. A., 2007, Handbook of Combinatorial Designs (2nd ed). Colbourn, C. J. & Dinitz, J. H. (eds.). Chapman & Hall/CRC Press, p. 868-875 (Discrete Mathematics and its Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Jan en differentiaalmeetkunde

    Draisma, J., 2007, Liber Amicorum Jan de Graaf. Meer, van der, J. C. (ed.). Eindhoven: Technische Universiteit Eindhoven, p. 40-43

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Strongly regular graphs

    Brouwer, A. E., 2007, Handbook of Combinatorial Designs (Second Edition). Colbourn, C. J. & Dinitz, J. H. (eds.). Chapman & Hall/CRC Press, p. 852-868 (Discrete Mathematics and its Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • 2006

    Algebraic realizations of DL systems

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 547-572 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Arithmetic of elliptic curves

    Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 267-302 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Arithmetic of hyperelliptic curves

    Duquesne, S. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 303-353 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Arithmetic of special curves

    Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 355-387 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Background on curves and Jacobians

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 45-85 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Background on Weil descent

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 125-132 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    4 Downloads (Pure)
  • Complex multiplication

    Frey, G. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 455-473 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • Elektronisch stemmen : cryptografie voor de democratie

    Schoenmakers, B. & Schippers, H., 2006, Gedreven door nieuwsgierigheid : een selectie uit 50 jaar TU/e-onderzoek. Lintsen, H. & Schippers, H. (eds.). Eindhoven: Stichting Historie der Techniek, p. 243-249

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Elliptische krommen in de cryptografie

    Tilborg, van, H. C. A., 2006, Actuele Wiskunde. Amsterdam: Centrum voor Wiskunde en Informatica, p. 7-20 208 p. (CWI Syllabus; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Introduction to public-key cryptography

    Avanzi, R. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 1-15 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • Key lengths

    Lenstra, A. K., 2006, Handbook of Information Security, Volume 1: Key Concepts, Infrastructure, Standards and Protocols. Bidgoli, H. (ed.). Wiley, 37 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • MathDox : mathematical documents on the web

    Cohen, A. M., Cuypers, H. & Reinaldo Barreiro, E., 2006, OMDoc : An Open Markup Format for Mathematical Documents [version 1.2]. Kohlhase, M. (ed.). Berlin: Springer, p. 262-265 (Lecture Notes in Computer Science; vol. 4180).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Downloads (Pure)
  • Mathematical countermeasures against side-channel attacks

    Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 687-714 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Pairing-based cryptography

    Duquesne, S. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 573-590 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Preface

    Barua, R. & Lange, T., 1 Jan 2006, Progress in Cryptology - INDOCRYPT 2006 : 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006 ; proceedings. Springer, 1 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • Private profile matching

    Schoenmakers, B. & Tuyls, P. T., 2006, Intelligent Algorithms in Ambient and Biomedical Computating. Verhaegh, W., Aarts, E. & Korst, J. (eds.). Dordrecht: Springer, p. 259-272 (Philips Research Book Series; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Citations (Scopus)
  • Transfer of discrete logarithmics

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 529-543 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Varieties over special fields

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 87-113 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • 2005

    Birthday paradox

    Lenstra, A. K., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 36-37

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Chinese remainder theorem

    Tilborg, van, H. C. A., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 75-76

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    2 Downloads (Pure)
  • Factoring circuits

    Lenstra, A. K., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 213-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Integer factoring

    Lenstra, A. K., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 290-297

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Interactive argument

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 297-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Interactive proof

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 297-298

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • L-notation

    Lenstra, A. K., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 358-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Multiparty computation

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 398-400

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Non-interactive proof

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 414-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Oblivious transfer

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 445-446

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Proof of knowledge vs. proof of membership

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 481-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Protocol

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 482-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Shannon's model

    Tilborg, van, H. C. A., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 568-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Smoothness probability

    Lenstra, A. K., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 593-

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Subgroup cryptosystems

    Lenstra, A. K., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 598-599

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Verifiable secret sharing

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 645-647

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Witness hiding

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 667-668

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Zero-knowledge

    Schoenmakers, B., 2005, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. (ed.). New York: Springer, p. 671-672

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • 2004

    Distance-transitive graphs

    Cohen, A. M., 2004, Topics in Algebraic Graph Theory. Beineke, L. W., Wilson, R. J. & Cameron, P. J. (eds.). Cambridge: Cambridge University Press, p. 222-249 290 p. (Encyclopedia of Mathematics and its Applications; vol. 102).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • On integral zeroes of binary Krawtchouk polynomials

    Stroeker, R. J. & Weger, de, B. M. M., 2004, Development of the mathematical ideas of Mykhailo Kravchuk (Krawtchouk). Virchenko, N., Katchanovksi, I., Haidey, V., Andrushkiw, R. & Voronka, R. (eds.). New York NY, USA: Shevchenko Scientific Society, p. 623-633

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • 2003

    Bounds on linear codes over a small alphabet

    Brouwer, A. E., 2003, Algebraic Geometry Codes : Basic Notions. Nogin, D., Tsfasman, M. A. & Vladuts, S. (eds.). Moscow: Independent University of Moscow, MCCME, p. 412-454

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • 2002

    Sloppy Alice attacks! Adaptive chosen ciphertext attacks on the McEliece cryptosystem

    Verheul, E. R., Doumen, J. M. & Tilborg, van, H. C. A., 2002, Information, Coding and Mathematics. Blaum, M., Farrell, P. G. & Tilborg, van, H. C. A. (eds.). Boston: Kluwer Academic Publishers, p. 99-119

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • What cryptology can mean for electronic commerce

    Schoenmakers, L. A. M. & Tilborg, van, H. C. A., 2002, Trust in electronic commerce. Prins, J. E. J., Ribbers, P. M. A., Tilborg, van, H. C. A., Veth, A. F. L. & Wees, van de, J. G. L. (eds.). The Hague: Kluwer law International, p. 45-54 (Law and Electronic Commerce; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • 2001

    Analytische berekeningen voor numerieke wiskunde

    Simons, F. H., 2001, Liber Amicorum Jos Jansen. Anthonissen, M. J. H. (ed.). Eindhoven: Technische Universiteit Eindhoven, p. 108-113

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Communicating mathematics across the web

    Cohen, A. M., 2001, Mathematics Unlimited: 2001 and beyond. Engquist, B. & Schmid, W. (eds.). Berlin: Springer, p. 283-300

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Downloads (Pure)
  • 2000

    Experimental mathematics

    Cohen, A. M., 2000, Encyclopeadia of mathematics. Supplement Volume II. Hazewinkel, M. (ed.). Dordrecht: Kluwer Academic Publishers, p. 209-209

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Shadow space of a Tits building

    Cohen, A. M., 2000, Encyclopedia of mathematics. Supplement Volume II. Hazewinkel, M. (ed.). Dordrecht: Kluwer Academic Publishers, p. 420-420

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)