Berry Schoenmakers
According to our database^{1},
Berry Schoenmakers
authored at least 76 papers
between 1990 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:

on github.com

on win.tue.nl
On csauthors.net:
Bibliography
2019
IACR Cryptol. ePrint Arch., 2019
Des. Codes Cryptogr., 2019
2018
Fast Secure Comparison for MediumSized Integers and Its Application in Binarized Neural Networks.
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
2016
IACR Cryptol. ePrint Arch., 2016
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming.
Proceedings of the Progress in Cryptology  AFRICACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Guaranteeing Correctness in PrivacyFriendly Outsourcing by Certificate Validation.
IACR Cryptol. ePrint Arch., 2015
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems.
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2012
J. Math. Cryptol., 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Computer, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Cryptology and Network Security  9th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Public Key Cryptography, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
2007
CoRR, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Discret. Appl. Math., 2006
Proceedings of the Advances in Cryptology  EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the Secure Data Management, 2005
Quantum information theoretical analysis of various constructions for quantum secret sharing.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Cryptographic Hardware and Embedded Systems  CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2001
Discret. Appl. Math., 2001
2000
Proceedings of the Public Key Cryptography, 2000
1999
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic.
Proceedings of the Advances in Cryptology, 1999
1997
Inf. Process. Lett., 1997
Eur. Trans. Telecommun., 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
Sci. Comput. Program., 1996
Proceedings of the Advances in Cryptology, 1996
1994
Proceedings of the Computer Security, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Inf. Process. Lett., 1993
1992
Proceedings of the Mathematics of Program Construction, Second International Conference, Oxford, UK, June 29, 1992
1991
Inf. Process. Lett., 1991
A Parallel program for the recognition of PInvariant segments.
Proceedings of the Algorithms and Parallel VLSI Architectures II, 1991
1990
Sci. Comput. Program., 1990