关注
Sebastiaan de Hoogh
Sebastiaan de Hoogh
Postdoc. at University of Technology in Delft
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
Improved primitives for secure multiparty integer computation
O Catrina, S De Hoogh
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
2832010
Secure multiparty linear programming using fixed-point arithmetic
O Catrina, S De Hoogh
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
1102010
Performance comparison of secure comparison protocols
F Kerschbaum, D Biswas, S de Hoogh
2009 20th International Workshop on Database and Expert Systems Application …, 2009
772009
Secure comparison protocols in the semi-honest model
T Veugen, F Blom, SJA De Hoogh, Z Erkin
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1217-1228, 2015
742015
Practical secure decision tree learning in a teletreatment application
S De Hoogh, B Schoenmakers, P Chen, H op den Akker
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
692014
Secure collaborative supply-chain management
F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S De Hoogh, ...
Computer 44 (9), 38-43, 2011
632011
Design of large scale applications of secure multiparty computation: secure linear programming
SJA de Hoogh
392012
Flow-based reputation with uncertainty: evidence-based subjective logic
B Škorić, SJA de Hoogh, N Zannone
International Journal of Information Security 15, 381-402, 2016
332016
Verifiable rotation of homomorphic encryptions
S de Hoogh, B Schoenmakers, B Škorić, J Villegas
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
182009
Certificate validation in secure computation and its use in verifiable linear programming
S de Hoogh, B Schoenmakers, M Veeningen
Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016
102016
A multi-layer recursive residue number system
HDL Hollmann, R Rietman, S de Hoogh, L Tolhuizen, P Gorissen
2018 IEEE International Symposium on Information Theory (ISIT), 1460-1464, 2018
82018
Device and method to compute a block cipher
R Rietman, MP Bodlaender, SJA De Hoogh
US Patent 10,790,962, 2020
72020
Cryptographic device and method
SJA De Hoogh, R Rietman, LMGM Tolhuizen
US Patent 11,310,030, 2022
62022
Cryptographic device arranged to compute a target block cipher
R Rietman, SJA De Hoogh
US Patent 10,841,077, 2020
62020
Distributing a computation output
MG Veeningen, SJA De Hoogh
US Patent 11,646,876, 2023
32023
Authentication system with reduced attack surface
SJA De Hoogh
US Patent App. 17/421,030, 2022
22022
Privacy-preserving verification of clinical research
E Makri, MH Everts, SD Hoogh, A Peter, HOD Akker, P Hartel, W Jonker
Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit, 481-500, 2014
22014
Whitebox computation of keyed message authentication codes
WC Mallon, SJA De Hoogh, A Pestrin
US Patent 11,502,846, 2022
12022
Computation device and method
R Rietman, SJA De Hoogh
US Patent 11,381,379, 2022
12022
Cryptographic device arranged to compute a target block cipher
R Rietman, SJA De Hoogh
US Patent 11,362,802, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20