Follow
Niek J. Bouman
Niek J. Bouman
Verified email at tue.nl
Title
Cited by
Cited by
Year
Sampling in a Quantum Population, and Applications.
NJ Bouman, S Fehr
CRYPTO, 724-741, 2010
632010
An all-but-one entropic uncertainty relation, and application to password-based identification
NJ Bouman, S Fehr, C González-Guillén, C Schaffner
Conference on Quantum Computation, Communication, and Cryptography, 29-44, 2012
242012
Experimental validation of an explicit power-flow primary control in microgrids
L Reyes-Chamorro, A Bernstein, NJ Bouman, E Scolari, AM Kettner, ...
IEEE Transactions on Industrial Informatics 14 (11), 4779-4791, 2018
162018
Efficient Secure Ridge Regression from Randomized Gaussian Elimination.
F Blom, NJ Bouman, B Schoenmakers, N de Vreede
IACR Cryptol. ePrint Arch. 2019, 773, 2019
152019
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks
M Abspoel, NJ Bouman, B Schoenmakers, N de Vreede
CT-RSA 2019 11405, 2019
152019
Secure authentication from a weak key, without leaking information
NJ Bouman, S Fehr
Annual International Conference on the Theory and Applications of …, 2011
112011
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition.
NJ Bouman, N De Vreede
IACR Cryptol. ePrint Arch. 2018, 703, 2018
92018
A multi-scale approach to directional field estimation
AM Bazen, NJ Bouman, RNJ Veldhuis
Proc. ProRISC, 215-218, 2004
82004
Multiprecision Arithmetic for Cryptology in C++-Compile-Time Computations and Beating the Performance of Hand-Optimized Assembly at Run-Time
NJ Bouman
arXiv preprint arXiv:1804.07236, 2018
62018
A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals
NJ Bouman, N de Vreede
International Conference on Applied Cryptography and Network Security, 398-417, 2020
42020
Real-Time Control of an Ensemble of Heterogeneous Resources
A Bernstein, NJ Bouman, JY LeBoudec
56th IEEE Conference on Decision and Control, 2017
42017
Power and Bandwidth Efficient Coded Modulation for Linear Gaussian Channels
NJ Bouman, HS Cronie
Werkgemeenschap voor Informatie-en Communicatietheorie, 2010
12010
Average Point Pursuit using the Greedy Algorithm: Theory and Applications
A Bernstein, NJ Bouman
arXiv preprint arXiv:1811.07734, 2018
2018
The Amount as a Predictor of Transaction Fraud
NJ Bouman
2017 Symposium on Information Theory and Signal Processing in the Benelux 38 …, 2017
2017
Real-Time Control of Microgrids with Explicit Power Setpoints: an API for Resource Agents
NJ Bouman, A Bernstein, JY LeBoudec
https://infoscience.epfl.ch/record/212794?ln=en, 2015
2015
Cryptography from Quantum Uncertainty in the Presence of Quantum Side Information
NJ Bouman
Mathematical Institute, Leiden University & CWI, 2012
2012
Spectral-Efficient Communication over Linear Gaussian Channels
NJ Bouman
2007
D2. 1 State of the Art Analysis of MPC-Based Big Data Analytics
PSN ALX, NV ALX, MA PHI, MV PHI, FB TUE, NJB TUE, MP TUE
D2. 2 Application-Oriented MPC Protocols
MA PHI, SA PHI, FB TUE, NJB TUE, TKF ALX, P Koster
D2. 3 Use-Case Specific Algorithms
MA PHI, FB TUE, NJB TUE, TF ALX, PK PHI, CO AU, MP TUE, BS TUE
The system can't perform the operation now. Try again later.
Articles 1–20