Universally verifiable multiparty computation from threshold homomorphic cryptosystems B Schoenmakers, M Veeningen Applied Cryptography and Network Security: 13th International Conference …, 2015 | 61 | 2015 |
Minimising communication in honest-majority MPC by batchwise multiplication verification PS Nordholt, M Veeningen International Conference on Applied Cryptography and Network Security, 321-339, 2018 | 51 | 2018 |
Trinocchio: privacy-preserving outsourcing by distributed verifiable computation B Schoenmakers, M Veeningen, N de Vreede Applied Cryptography and Network Security: 14th International Conference …, 2016 | 41 | 2016 |
Pinocchio-based adaptive zk-SNARKs and secure/correct adaptive function evaluation M Veeningen International Conference on Cryptology in Africa, 21-39, 2017 | 31 | 2017 |
Modeling identity-related properties and their privacy strength M Veeningen, B De Weger, N Zannone Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 21 | 2011 |
Formal privacy analysis of communication protocols for identity management M Veeningen, B de Weger, N Zannone International Conference on Information Systems Security, 235-249, 2011 | 18 | 2011 |
Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation. M Veeningen, S Chatterjea, AZ Horváth, G Spindler, E Boersma, ... MIE, 76-80, 2018 | 17 | 2018 |
Formal modelling of (De) pseudonymisation: a case study in health care privacy M Veeningen, B de Weger, N Zannone International Workshop on Security and Trust Management, 145-160, 2012 | 11 | 2012 |
Certificate validation in secure computation and its use in verifiable linear programming S de Hoogh, B Schoenmakers, M Veeningen Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 10 | 2016 |
Trinocchio: Privacy-friendly outsourcing by distributed verifiable computation B Schoenmakers, M Veeningen, N de Vreede Cryptology ePrint Archive, 2015 | 10 | 2015 |
Multi-party computation system for learning a classifier MG Veeningen US Patent 11,100,427, 2021 | 9 | 2021 |
Data minimisation in communication protocols: a formal analysis framework and application to identity management M Veeningen, B De Weger, N Zannone International journal of information security 13, 529-569, 2014 | 9 | 2014 |
Are on-line personae really unlinkable? M Veeningen, A Piepoli, N Zannone Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014 | 7 | 2014 |
Secure distributed key generation in attribute based encryption systems D Pletea, S Sedghi, M Veeningen, M Petkovic 2015 10th International Conference for Internet Technology and Secured …, 2015 | 5 | 2015 |
Batch-wise verification of multiparty computations MG Veeningen US Patent 11,818,255, 2023 | 4 | 2023 |
Basic constructions of secure multiparty computation AS aCybernetica Applications of Secure Multiparty Computation 13, 1, 2015 | 4 | 2015 |
A formal privacy analysis of identity management systems MG Veeningen, BMM de Weger, N Zannone | 4 | 2012 |
Multiparty computation scheduling MG Veeningen, PP van Liesdonk, SJA DE HOOGH US Patent 11,922,210, 2024 | 3 | 2024 |
Computer-implemented method of applying a first function to each data element in a data set, and a worker node for implementing the same MG Veeningen US Patent 11,836,273, 2023 | 3 | 2023 |
Nodes and methods of operating the same MG Veeningen, PP van Liesdonk US Patent 11,818,249, 2023 | 3 | 2023 |