If you made any changes in Pure these will be visible here soon.

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Fast secure comparison for medium-sized integers and its application in binarized neural networks

    Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • Secure simultaneous bit extraction from Koblitz curves

    Fan, X., Gong, G., Schoenmakers, B., Sica, F. & Sidorenko, A., 15 Jan 2019, In: Designs, Codes and Cryptography. 87, 1, p. 1-13 13 p.

    Research output: Contribution to journalArticleAcademicpeer-review

    3 Citations (Scopus)
  • Explicit optimal binary pebbling for one-way hash chain reversal

    Schoenmakers, B., 2017, Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers. Preneel, B. & Grossklags, J. (eds.). Springer, p. 299-320 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9603 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Certificate validation in secure computation and its use in verifiable linear programming

    de Hoogh, S., Schoenmakers, B. & Veeningen, M., 2016, Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings. Pointcheval, D., Rachidi, T. & Nitaj, A. (eds.). Springer, p. 265-284 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)
  • Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

    Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (eds.). Dordrecht: Springer, p. 346-366 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)