Sampling in a Quantum Population, and Applications. NJ Bouman, S Fehr CRYPTO, 724-741, 2010 | 63 | 2010 |
An all-but-one entropic uncertainty relation, and application to password-based identification NJ Bouman, S Fehr, C González-Guillén, C Schaffner Conference on Quantum Computation, Communication, and Cryptography, 29-44, 2012 | 24 | 2012 |
Experimental validation of an explicit power-flow primary control in microgrids L Reyes-Chamorro, A Bernstein, NJ Bouman, E Scolari, AM Kettner, ... IEEE Transactions on Industrial Informatics 14 (11), 4779-4791, 2018 | 16 | 2018 |
Efficient Secure Ridge Regression from Randomized Gaussian Elimination. F Blom, NJ Bouman, B Schoenmakers, N de Vreede IACR Cryptol. ePrint Arch. 2019, 773, 2019 | 15 | 2019 |
Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks M Abspoel, NJ Bouman, B Schoenmakers, N de Vreede CT-RSA 2019 11405, 2019 | 15 | 2019 |
Secure authentication from a weak key, without leaking information NJ Bouman, S Fehr Annual International Conference on the Theory and Applications of …, 2011 | 11 | 2011 |
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition. NJ Bouman, N De Vreede IACR Cryptol. ePrint Arch. 2018, 703, 2018 | 9 | 2018 |
A multi-scale approach to directional field estimation AM Bazen, NJ Bouman, RNJ Veldhuis Proc. ProRISC, 215-218, 2004 | 8 | 2004 |
Multiprecision Arithmetic for Cryptology in C++-Compile-Time Computations and Beating the Performance of Hand-Optimized Assembly at Run-Time NJ Bouman arXiv preprint arXiv:1804.07236, 2018 | 6 | 2018 |
A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals NJ Bouman, N de Vreede International Conference on Applied Cryptography and Network Security, 398-417, 2020 | 4 | 2020 |
Real-Time Control of an Ensemble of Heterogeneous Resources A Bernstein, NJ Bouman, JY LeBoudec 56th IEEE Conference on Decision and Control, 2017 | 4 | 2017 |
Power and Bandwidth Efficient Coded Modulation for Linear Gaussian Channels NJ Bouman, HS Cronie Werkgemeenschap voor Informatie-en Communicatietheorie, 2010 | 1 | 2010 |
Average Point Pursuit using the Greedy Algorithm: Theory and Applications A Bernstein, NJ Bouman arXiv preprint arXiv:1811.07734, 2018 | | 2018 |
The Amount as a Predictor of Transaction Fraud NJ Bouman 2017 Symposium on Information Theory and Signal Processing in the Benelux 38 …, 2017 | | 2017 |
Real-Time Control of Microgrids with Explicit Power Setpoints: an API for Resource Agents NJ Bouman, A Bernstein, JY LeBoudec https://infoscience.epfl.ch/record/212794?ln=en, 2015 | | 2015 |
Cryptography from Quantum Uncertainty in the Presence of Quantum Side Information NJ Bouman Mathematical Institute, Leiden University & CWI, 2012 | | 2012 |
Spectral-Efficient Communication over Linear Gaussian Channels NJ Bouman | | 2007 |
D2. 1 State of the Art Analysis of MPC-Based Big Data Analytics PSN ALX, NV ALX, MA PHI, MV PHI, FB TUE, NJB TUE, MP TUE | | |
D2. 2 Application-Oriented MPC Protocols MA PHI, SA PHI, FB TUE, NJB TUE, TKF ALX, P Koster | | |
D2. 3 Use-Case Specific Algorithms MA PHI, FB TUE, NJB TUE, TF ALX, PK PHI, CO AU, MP TUE, BS TUE | | |