If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where L.A.M. (Berry) Schoenmakers is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Fast secure comparison for medium-sized integers and its application in binarized neural networks

Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 1 Citation (Scopus)

    Secure simultaneous bit extraction from Koblitz curves

    Fan, X., Gong, G., Schoenmakers, B., Sica, F. & Sidorenko, A., 15 Jan 2019, In : Designs, Codes and Cryptography. 87, 1, p. 1-13 13 p.

    Research output: Contribution to journalArticleAcademicpeer-review

  • Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

    Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (eds.). Dordrecht: Springer, p. 346-366 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 4 Citations (Scopus)

    Guaranteeing correctness in privacy-friendly outsourcing by certificate validation

    Schoenmakers, B. & Veeningen, M. G., 2015, s.n. 20 p. (Cryptology ePrint Archive; vol. 2015/339)

    Research output: Book/ReportReportAcademic

    Open Access
    File
  • Trinocchio : privacy-friendly outsourcing by distributed verifiable computation

    Schoenmakers, B., Veeningen, M. G. & Vreede, de, N., 2015, s.n. 34 p. (Cryptology ePrint Archive; vol. 2015/480)

    Research output: Book/ReportReportAcademic

  • Courses

    Basic linear algebra

    1/09/17 → …

    Course

    Cryptographic protocols

    1/09/15 → …

    Course

    Data analytics for engineers

    1/09/17 → …

    Course

    Programming and modelling

    1/09/12 → …

    Course

    Set theory and algebra

    1/09/12 → …

    Course

    Press / Media

    Report on NSA 'payments' to RSA fuels controversy

    L.A.M. (Berry) Schoenmakers

    23/12/13

    2 items of Media coverage

    Press/Media: Expert Comment

    Report on NSA 'Payments' to RSA Fuels Controversy

    L.A.M. (Berry) Schoenmakers

    23/12/13

    2 items of Media coverage

    Press/Media: Expert Comment

    Report on NSA 'secret' payments to RSA fuels encryption controversy

    L.A.M. (Berry) Schoenmakers

    22/12/1323/12/13

    13 items of Media coverage

    Press/Media: Expert Comment

    Report on NSA 'secret' payments to RSA fuels encryption ...

    L.A.M. (Berry) Schoenmakers

    23/12/13

    1 item of Media coverage

    Press/Media: Expert Comment

    Student theses

    Achieving differential privacy in secure multiparty computation

    Author: Thissen, K., 15 May 2019

    Supervisor: Schoenmakers, B. (Supervisor 1), Koster, R. (. (External person) (External coach) & van Liesdonk, P. (External coach)

    Student thesis: Master

    File

    Analyzing trusted elements in mobile devices

    Author: Kulkarni, S., 30 Nov 2015

    Supervisor: Schoenmakers, L. (Supervisor 1)

    Student thesis: Master

    File

    An analysis and application of one-time pad in a group

    Author: Zijlstra, A., 30 Jan 2017

    Supervisor: Schoenmakers, L. (Supervisor 1) & van de Graaf, J. (External person) (External coach)

    Student thesis: Master

    File

    An assessment of Silage : a stream-oriented programming language

    Author: Schoenmakers, B., 31 Jan 1988

    Supervisor: Rem, M. (Supervisor 1) & van Berkel, C. (Supervisor 2)

    Student thesis: Master

    An information theoretical approach to quantum secret sharing schemes

    Author: Rietjens, K., 15 Dec 2006

    Supervisor: Schoenmakers, L. (Supervisor 1) & Tuyls, P. T. (External person) (External coach)

    Student thesis: Master

    File