Improved primitives for secure multiparty integer computation O Catrina, S De Hoogh Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 283 | 2010 |
Secure multiparty linear programming using fixed-point arithmetic O Catrina, S De Hoogh Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 110 | 2010 |
Performance comparison of secure comparison protocols F Kerschbaum, D Biswas, S de Hoogh 2009 20th International Workshop on Database and Expert Systems Application …, 2009 | 77 | 2009 |
Secure comparison protocols in the semi-honest model T Veugen, F Blom, SJA De Hoogh, Z Erkin IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015 | 74 | 2015 |
Practical secure decision tree learning in a teletreatment application S De Hoogh, B Schoenmakers, P Chen, H op den Akker Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 69 | 2014 |
Secure collaborative supply-chain management F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S De Hoogh, ... Computer 44 (9), 38-43, 2011 | 63 | 2011 |
Design of large scale applications of secure multiparty computation: secure linear programming SJA de Hoogh | 39 | 2012 |
Flow-based reputation with uncertainty: evidence-based subjective logic B Škorić, SJA de Hoogh, N Zannone International Journal of Information Security 15, 381-402, 2016 | 33 | 2016 |
Verifiable rotation of homomorphic encryptions S de Hoogh, B Schoenmakers, B Škorić, J Villegas Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009 | 18 | 2009 |
Certificate validation in secure computation and its use in verifiable linear programming S de Hoogh, B Schoenmakers, M Veeningen Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 10 | 2016 |
A multi-layer recursive residue number system HDL Hollmann, R Rietman, S de Hoogh, L Tolhuizen, P Gorissen 2018 IEEE International Symposium on Information Theory (ISIT), 1460-1464, 2018 | 8 | 2018 |
Device and method to compute a block cipher R Rietman, MP Bodlaender, SJA De Hoogh US Patent 10,790,962, 2020 | 7 | 2020 |
Cryptographic device and method SJA De Hoogh, R Rietman, LMGM Tolhuizen US Patent 11,310,030, 2022 | 6 | 2022 |
Cryptographic device arranged to compute a target block cipher R Rietman, SJA De Hoogh US Patent 10,841,077, 2020 | 6 | 2020 |
Distributing a computation output MG Veeningen, SJA De Hoogh US Patent 11,646,876, 2023 | 3 | 2023 |
Authentication system with reduced attack surface SJA De Hoogh US Patent App. 17/421,030, 2022 | 2 | 2022 |
Privacy-preserving verification of clinical research E Makri, MH Everts, SD Hoogh, A Peter, HOD Akker, P Hartel, W Jonker Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 481-500, 2014 | 2 | 2014 |
Whitebox computation of keyed message authentication codes WC Mallon, SJA De Hoogh, A Pestrin US Patent 11,502,846, 2022 | 1 | 2022 |
Computation device and method R Rietman, SJA De Hoogh US Patent 11,381,379, 2022 | 1 | 2022 |
Cryptographic device arranged to compute a target block cipher R Rietman, SJA De Hoogh US Patent 11,362,802, 2022 | 1 | 2022 |