Thomas Attema

Orcid: 0000-0002-8289-6853

Affiliations:
  • CWI, Amsterdam, The Netherlands
  • Leiden University, The Netherlands


According to our database1, Thomas Attema authored at least 33 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Communication-Efficient Multi-Party Computation for RMS Programs.
IACR Cryptol. ePrint Arch., 2024

2023
Fiat-Shamir Transformation of Multi-Round Interactive Proofs (Extended Version).
J. Cryptol., October, 2023

A Generalized Special-Soundness Notion and its Knowledge Extractors.
IACR Cryptol. ePrint Arch., 2023

The Fiat-Shamir Transformation of (Γ<sub>1,đots,Γ<sub>μ)</sub></sub>-Special-Sound Interactive Proofs.
IACR Cryptol. ePrint Arch., 2023

On Homomorphic Secret Sharing from Polynomial-Modulus LWE.
IACR Cryptol. ePrint Arch., 2023

Generalized Special-Sound Interactive Proofs and Their Knowledge Soundness.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022
New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment.
J. Medical Syst., 2022

Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC.
IACR Cryptol. ePrint Arch., 2022

Vector Commitments over Rings and Compressed Σ-Protocols.
IACR Cryptol. ePrint Arch., 2022

Vector Commitments over Rings and Compressed $\varSigma $-Protocols.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Parallel Repetition of (k<sub>1, đots</sub> , k<sub>μ </sub>)-Special-Sound Multi-round Interactive Proofs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Optimizing the decoy-state BB84 QKD protocol parameters.
Quantum Inf. Process., 2021

Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond.
IACR Cryptol. ePrint Arch., 2021

Fiat-Shamir Transformation of Multi-Round Interactive Proofs.
IACR Cryptol. ePrint Arch., 2021

Parallel Repetition of (k<sub>1, đots, k<sub>μ</sub>)</sub>-Special-Sound Multi-Round Interactive Proofs.
IACR Cryptol. ePrint Arch., 2021

A Compressed Σ-Protocol Theory for Lattices.
IACR Cryptol. ePrint Arch., 2021

Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

A Compressed $\varSigma $-Protocol Theory for Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Compressed $\varSigma $-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Mathematical formulation of quantum circuit design problems in networks of quantum computers.
Quantum Inf. Process., 2020

Practical Product Proofs for Lattice Commitments.
IACR Cryptol. ePrint Arch., 2020

Compressed Sigma-Protocols for Bilinear Circuits and Applications to Logarithmic-Sized Transparent Threshold Signature Schemes.
IACR Cryptol. ePrint Arch., 2020

Compressing Proofs of k-Out-Of-n Partial Knowledge.
IACR Cryptol. ePrint Arch., 2020

Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.
IACR Cryptol. ePrint Arch., 2020

Imperfect Distributed Quantum Phase Estimation.
Proceedings of the Computational Science - ICCS 2020, 2020

Compressed $\varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer.
IACR Cryptol. ePrint Arch., 2019

Towards Quantum-Safe VPNs and Internet.
IACR Cryptol. ePrint Arch., 2019

A note on short invertible ring elements and applications to cyclotomic and trinomials number fields.
IACR Cryptol. ePrint Arch., 2019

2018
Secure multiparty PageRank algorithm for collaborative fraud detection.
IACR Cryptol. ePrint Arch., 2018

Preparing Ourselves for the Threats of the Post-Quantum Era.
ERCIM News, 2018

2017
Internal Network Monitoring and Anomaly Detection through Host Clustering.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2015
Development and Evaluation of Multi-Agent Models Predicting Twitter Trends in Multiple Domains.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015


  Loading...