default search action
Jeroen van de Graaf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i15]Jeroen van de Graaf, Arjen K. Lenstra:
Delphi: sharing assessments of cryptographic assumptions. IACR Cryptol. ePrint Arch. 2024: 157 (2024) - [i14]Lucas Piske, Jeroen van de Graaf, Anderson C. A. Nascimento, Ni Trieu:
Shared OT and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition. IACR Cryptol. ePrint Arch. 2024: 963 (2024) - 2021
- [i13]Jeroen van de Graaf:
A fast recurrence for Fibonacci and Lucas numbers. CoRR abs/2112.10895 (2021)
2010 – 2019
- 2018
- [j7]Diego F. Aranha, Jeroen van de Graaf:
The Good, the Bad, and the Ugly: Two Decades of E-Voting in Brazil. IEEE Secur. Priv. 16(6): 22-30 (2018) - 2017
- [j6]Jeroen van de Graaf:
Long-Term Threats to Ballot Privacy. IEEE Secur. Priv. 15(3): 40-47 (2017) - 2016
- [j5]Bernardo Machado David, Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento, Adriana C. B. Pinto:
Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra. IEEE Trans. Inf. Forensics Secur. 11(1): 59-73 (2016) - [c16]Vladimir P. Parente, Jeroen van de Graaf:
A Practical Fuzzy Extractor for Continuous Features. ICITS 2016: 241-258 - 2015
- [c15]Pablo Garcia, Jeroen van de Graaf, German Montejano, Daniel Riesco, Narayan C. Debnath, Silvia Bast:
Storage Optimization for Non Interactive Dining Cryptographers (NIDC). ITNG 2015: 55-60 - 2014
- [c14]Pablo García, Jeroen van de Graaf, Alejandro Hevia, Alfredo Viola:
Beating the Birthday Paradox in Dining Cryptographer Networks. LATINCRYPT 2014: 179-198 - [i12]Christian Franck, Jeroen van de Graaf:
Dining Cryptographers are Practical (preliminary version). CoRR abs/1402.2269 (2014) - [i11]Geraldo A. Barbosa, Jeroen van de Graaf:
Untappable key distribution system: a one-time-pad booster. CoRR abs/1406.1543 (2014) - [i10]Geraldo A. Barbosa, Jeroen van de Graaf:
Untappable communication channels over optical fibers from quantum-optical noise. IACR Cryptol. ePrint Arch. 2014: 146 (2014) - 2013
- [c13]Johannes Buchmann, Denise Demirel, Jeroen van de Graaf:
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy. Financial Cryptography 2013: 197-204 - [c12]Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan, Johannes Buchmann:
Prêt à Voter Providing Everlasting Privacy. VoteID 2013: 156-175 - 2012
- [j4]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(2): 567-575 (2012) - [c11]Denise Demirel, Jeroen van de Graaf, Roberto Samarone dos Santos Araújo:
Improving Helios with Everlasting Privacy Towards the Public. EVT/WOTE 2012 - [i9]Denise Demirel, Jeroen van de Graaf:
A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers. IACR Cryptol. ePrint Arch. 2012: 420 (2012) - 2010
- [c10]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. WISA 2010: 337-350 - [c9]Jeroen van de Graaf:
Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting. Towards Trustworthy Elections 2010: 231-241 - [c8]Roberto Araújo, Ricardo Felipe Custódio, Jeroen van de Graaf:
A Verifiable Voting Protocol Based on Farnel. Towards Trustworthy Elections 2010: 274-288 - [i8]Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. IACR Cryptol. ePrint Arch. 2010: 289 (2010)
2000 – 2009
- 2009
- [j3]Jeroen van de Graaf:
Voting with unconditional privacy by merging Prêt à voter and PunchScan. IEEE Trans. Inf. Forensics Secur. 4(4): 674-684 (2009) - [i7]Jeroen van de Graaf:
Voting with unconditional privacy: CFSY for booth voting. IACR Cryptol. ePrint Arch. 2009: 574 (2009) - 2008
- [c7]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer Based on the McEliece Assumptions. ICITS 2008: 107-117 - [i6]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
Oblivious Transfer based on the McEliece Assumptions}. IACR Cryptol. ePrint Arch. 2008: 138 (2008) - [i5]Rafael Dowsley, Jeroen van de Graaf, Jörn Müller-Quade, Anderson C. A. Nascimento:
On the Composability of Statistically Secure Bit Commitments. IACR Cryptol. ePrint Arch. 2008: 457 (2008) - 2007
- [i4]Roberto Araújo, Ricardo Felipe Custódio, Jeroen van de Graaf:
A Verifiable Voting Protocol based on Farnel. IACR Cryptol. ePrint Arch. 2007: 252 (2007) - [i3]Jeroen van de Graaf:
Voting with Unconditional Privacy by Merging Prêt-à-Voter and PunchScan. IACR Cryptol. ePrint Arch. 2007: 269 (2007) - [i2]David Chaum, Jeroen van de Graaf, Peter Y. A. Ryan, Poorvi L. Vora:
Secret Ballot Elections with Unconditional Integrity. IACR Cryptol. ePrint Arch. 2007: 270 (2007) - 2002
- [j2]Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor:
Security of Quantum Key Distribution against All Collective Attacks. Algorithmica 34(4): 372-388 (2002)
1990 – 1999
- 1999
- [j1]Christopher A. Fuchs, Jeroen van de Graaf:
Cryptographic Distinguishability Measures for Quantum-Mechanical States. IEEE Trans. Inf. Theory 45(4): 1216-1227 (1999) - 1995
- [c6]Claude Crépeau, Jeroen van de Graaf, Alain Tapp:
Committed Oblivious Transfer and Private Multi-Party Computation. CRYPTO 1995: 110-123
1980 – 1989
- 1987
- [c5]David Chaum, Ivan Damgård, Jeroen van de Graaf:
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. CRYPTO 1987: 87-119 - [c4]Jeroen van de Graaf, René Peralta:
A Simple and Secure Way to Show the Validity of Your Public Key. CRYPTO 1987: 128-134 - [c3]Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf:
Gradual and Verifiable Release of a Secret. CRYPTO 1987: 156-166 - [c2]David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf:
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. EUROCRYPT 1987: 127-141 - 1986
- [c1]David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta:
Demonstrating Possession of a Discrete Logarithm Without Revealing It. CRYPTO 1986: 200-212 - [i1]René Peralta, Jeroen van de Graaf:
A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number. EUROCRYPT 1986: 15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-02 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint