If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Niels de Vreede is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 22 Citations
  • 4 Conference contribution
  • 3 Report
  • 2 Article

Fast secure comparison for medium-sized integers and its application in binarized neural networks

Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 1 Citation (Scopus)

    Quantization in zero leakage helper data schemes

    de Groot, J., Škorić, B., de Vreede, N. & Linnartz, J. P., 1 Dec 2016, In : Eurasip Journal on Advances in Signal Processing. 2016, p. 1-13 54.

    Research output: Contribution to journalArticleAcademicpeer-review

    Open Access
    File
  • 7 Citations (Scopus)
    134 Downloads (Pure)

    Trinocchio: privacy-preserving outsourcing by distributed verifiable computation

    Schoenmakers, B., Veeningen, M. & De Vreede, N., 2016, Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings. Manulis, M., Sadeghi, A-R. & Schneider, S. (eds.). Dordrecht: Springer, p. 346-366 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 4 Citations (Scopus)

    Spamming the code offset method

    Vreede, de, N. & Skoric, B., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (eds.). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 162-165

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
  • 51 Downloads (Pure)

    Trinocchio : privacy-friendly outsourcing by distributed verifiable computation

    Schoenmakers, B., Veeningen, M. G. & Vreede, de, N., 2015, s.n. 34 p. (Cryptology ePrint Archive; vol. 2015/480)

    Research output: Book/ReportReportAcademic

  • Student theses

    File