Searched for: author%3A%22Attema%2C+T.%22
(1 - 20 of 27)

Pages

New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment
New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment
Vector Commitments over Rings and Compressed Σ-Protocols
Vector Commitments over Rings and Compressed Σ-Protocols
Parallel Repetition of (k1, . . . , kµ)-Special-Sound Multi-Round Interactive Proofs
Parallel Repetition of (k1, . . . , kµ)-Special-Sound Multi-Round Interactive Proofs
Fiat-Shamir Transformation of Multi-Round Interactive Proofs
Fiat-Shamir Transformation of Multi-Round Interactive Proofs
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC
Vector Commitments over Rings and Compressed Σ -Protocols
Vector Commitments over Rings and Compressed Σ -Protocols
A Compressed Σ-Protocol Theory for Lattices
A Compressed Σ-Protocol Theory for Lattices
Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
Optimizing the decoy-state BB84 QKD protocol parameters
Optimizing the decoy-state BB84 QKD protocol parameters
Privacy bescherming bij niet-cooperatieve gezichtsherkenning
Privacy bescherming bij niet-cooperatieve gezichtsherkenning
Post-Quantum Cryptography
Post-Quantum Cryptography: computational-hardness assumptions and beyond
Technologische doorbraak eindelijk een privacyvriendelijke manier om data te benutten [Technological breakthrough finally, a privacy-friendly way to harness data]
Technologische doorbraak eindelijk een privacyvriendelijke manier om data te benutten [Technological breakthrough finally, a privacy-friendly way to harness data]
Post-Quantum Cryptography Beyond Computational Security
Post-Quantum Cryptography Beyond Computational Security
Brief Announcement
Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders
Compressed E-protocol Theory and Practical Applications to Plug & Play Algorithms
Compressed E-protocol Theory and Practical Applications to Plug & Play Algorithms
Practical Product Proofs for Lattice Commitments
Practical Product Proofs for Lattice Commitments
Imperfect Distributed Quantum Phase Estimation
Imperfect Distributed Quantum Phase Estimation
Mathematical formulation of quantum circuit design problems in networks of quantum computers
Mathematical formulation of quantum circuit design problems in networks of quantum computers
Detecting transaction fraud with multi-party computation
Detecting transaction fraud with multi-party computation
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
Searched for: author%3A%22Attema%2C+T.%22
(1 - 20 of 27)

Pages