Proofs of partial knowledge and simplified design of witness hiding protocols R Cramer, I Damgård, B Schoenmakers Annual International Cryptology Conference, 174-187, 1994 | 1569 | 1994 |
A Secure and Optimally Efficient Multi-Authority Election Scheme R Cramer, R Gennaro, B Schoenmakers European Transactions on Telecommunications 8, 1997 | 1399 | 1997 |
A simple publicly verifiable secret sharing scheme and its application to electronic voting B Schoenmakers Advances in Cryptology—CRYPTO'99, 148-164, 1999 | 810 | 1999 |
Multi-Authority Secret Ballot Elections with Linear Work R Cramer, M Franklin, B Schoenmakers, M Yung Proceedings of EUROCRYPT, 72-83, 1996 | 564 | 1996 |
The ESPRIT project CAFE—High security digital payment systems JP Boly, A Bosselaers, R Cramer, R Michelsen, S Mjølsnes, F Muller, ... European Symposium on Research in Computer Security, 217-230, 1994 | 278* | 1994 |
On second-order differential power analysis M Joye, P Paillier, B Schoenmakers Cryptographic Hardware and Embedded Systems–CHES 2005: 7th International …, 2005 | 210 | 2005 |
A Fair and Efficient Solution to the Socialist Millionaires’ Problem F Boudot, B Schoenmakers, J Traoré Discrete Applied Mathematics 111 (1-2), 2001 | 209 | 2001 |
Efficient binary conversion for Paillier encrypted values B Schoenmakers, P Tuyls Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006 | 191 | 2006 |
Practical and secure solutions for integer comparison J Garay, B Schoenmakers, J Villegas Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007 | 186 | 2007 |
Partitioned information storage systems with controlled retrieval D Chaum, NT Ferguson, B Schoenmakers, EW Voskuil US Patent 5,956,400, 1999 | 185 | 1999 |
Practical two-party computation based on the conditional gate B Schoenmakers, P Tuyls International conference on the theory and application of cryptology and …, 2004 | 164 | 2004 |
Basic security of the ecash payment system B Schoenmakers Computer Security and Industrial Cryptography 1528, 1997 | 148* | 1997 |
Optimally Efficient Accountable Time-Stamping A Buldas, H Lipmaa, B Schoenmakers Public Key Cryptography, 293-305, 2000 | 104 | 2000 |
Concrete Security of The Blum-Blum-Shub Pseudorandom Generator A Sidorenko, B Schoenmakers Cryptography and Coding: 10th IMA International Conference 3796, 355-375, 2005 | 91 | 2005 |
A protocol issue for the malicious case of Yao’s garbled circuit construction M Kiraz, B Schoenmakers 27th Symposium on Information Theory in the Benelux 29 (4), 283-290, 2006 | 84 | 2006 |
Practical Secure Decision Tree Learning in a Teletreatment Application S de Hoogh, B Schoenmakers, P Chen, H op den Akker Proceedings of the 18th International Conference on Financial Cryptography …, 2014 | 65 | 2014 |
Securely computing a similarity measure PT Tuyls, E Verbitskiy, B Schoenmakers, ME Van Dijk US Patent 8,281,148, 2012 | 65 | 2012 |
MPyC---Python package for secure multiparty computation B Schoenmakers Workshop on the Theory and Practice of MPC. https://github.com/lschoe/mpyc, 2018 | 63* | 2018 |
Key extraction from general nondiscrete signals EA Verbitskiy, P Tuyls, C Obi, B Schoenmakers, B Skoric IEEE Transactions on Information Forensics and Security 5 (2), 269-279, 2010 | 63 | 2010 |
Secure collaborative supply-chain management F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S De Hoogh, ... Computer 44 (9), 38-43, 2011 | 61 | 2011 |