If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where L.A.M. (Berry) Schoenmakers is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Outsourcing Engineering & Materials Science
Cryptography Engineering & Materials Science
Probability distributions Engineering & Materials Science
voting Social Sciences
Pseudorandom number Generator Mathematics
Non-malleability Mathematics
Second International Social Sciences
Privacy Preserving Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1989 2019

Fast secure comparison for medium-sized integers and its application in binarized neural networks

Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Legendre
Neural Networks
Neural networks
Integer
Multilayer neural networks

Secure simultaneous bit extraction from Koblitz curves

Fan, X., Gong, G., Schoenmakers, B., Sica, F. & Sidorenko, A., 15 Jan 2019, In : Designs, Codes and Cryptography. 87, 1, p. 1-13 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Pseudorandom number Generator
Curve
Cryptography
Output
Diffie-Hellman
4 Citations (Scopus)

Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (eds.). Dordrecht: Springer, p. 346-366 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Distributed Computation
Outsourcing
Privacy Preserving
Proof of correctness
Computing

Guaranteeing correctness in privacy-friendly outsourcing by certificate validation

Schoenmakers, B. & Veeningen, M. G., 2015, s.n. 20 p. (Cryptology ePrint Archive; vol. 2015/339)

Research output: Book/ReportReportAcademic

Open Access
File
Outsourcing
Cryptography
Linear programming

Trinocchio : privacy-friendly outsourcing by distributed verifiable computation

Schoenmakers, B., Veeningen, M. G. & Vreede, de, N., 2015, s.n. 34 p. (Cryptology ePrint Archive; vol. 2015/480)

Research output: Book/ReportReportAcademic

Outsourcing

Courses

Basic linear algebra

1/09/17 → …

Course

Cryptographic protocols

1/09/15 → …

Course

Data analytics for engineers

1/09/17 → …

Course

Programming and modelling

1/09/12 → …

Course

Set theory and algebra

1/09/12 → …

Course

Press / Media

Report on NSA 'payments' to RSA fuels controversy

L.A.M. (Berry) Schoenmakers

23/12/13

2 items of Media coverage

Press/Media: Expert Comment

Report on NSA 'secret' payments to RSA fuels encryption ...

L.A.M. (Berry) Schoenmakers

23/12/13

1 item of Media coverage

Press/Media: Expert Comment

Report on NSA 'secret' payments to RSA fuels encryption controversy

L.A.M. (Berry) Schoenmakers

22/12/1323/12/13

13 items of Media coverage

Press/Media: Expert Comment

Report on NSA 'Payments' to RSA Fuels Controversy

L.A.M. (Berry) Schoenmakers

23/12/13

2 items of Media coverage

Press/Media: Expert Comment

Student theses

Achieving differential privacy in secure multiparty computation

Author: Thissen, K., 15 May 2019

Supervisor: Schoenmakers, B. (Supervisor 1), Koster, R. (. (External person) (External coach) & van Liesdonk, P. (External coach)

Student thesis: Master

File

Analyzing trusted elements in mobile devices

Author: Kulkarni, S., 30 Nov 2015

Supervisor: Schoenmakers, L. (Supervisor 1)

Student thesis: Master

File

An analysis and application of one-time pad in a group

Author: Zijlstra, A., 30 Jan 2017

Supervisor: Schoenmakers, L. (Supervisor 1) & van de Graaf, J. (External person) (External coach)

Student thesis: Master

File

An assessment of Silage : a stream-oriented programming language

Author: Schoenmakers, B., 31 Jan 1988

Supervisor: Rem, M. (Supervisor 1) & van Berkel, C. (Supervisor 2)

Student thesis: Master

An information theoretical approach to quantum secret sharing schemes

Author: Rietjens, K., 15 Dec 2006

Supervisor: Schoenmakers, L. (Supervisor 1) & Tuyls, P. T. (External person) (External coach)

Student thesis: Master

File