If you made any changes in Pure these will be visible here soon.

Fingerprint

Dive into the research topics where L.A.M. (Berry) Schoenmakers is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Network

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Fast secure comparison for medium-sized integers and its application in binarized neural networks

    Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Secure simultaneous bit extraction from Koblitz curves

    Fan, X., Gong, G., Schoenmakers, B., Sica, F. & Sidorenko, A., 15 Jan 2019, In: Designs, Codes and Cryptography. 87, 1, p. 1-13 13 p.

    Research output: Contribution to journalArticleAcademicpeer-review

    1 Citation (Scopus)
  • Explicit optimal binary pebbling for one-way hash chain reversal

    Schoenmakers, B., 2017, Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers. Preneel, B. & Grossklags, J. (eds.). Springer, p. 299-320 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9603 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Certificate validation in secure computation and its use in verifiable linear programming

    de Hoogh, S., Schoenmakers, B. & Veeningen, M., 2016, Progress in Cryptology – AFRICACRYPT 2016 - 8th International Conference on Cryptology in Africa, Proceedings. Pointcheval, D., Rachidi, T. & Nitaj, A. (eds.). Springer, p. 265-284 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

    Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (eds.). Dordrecht: Springer, p. 346-366 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)