Thomas Attema
Thomas Attema
Researcher, TNO
Verified email at
Cited by
Cited by
Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics
T Attema, R Cramer
Practical product proofs for lattice commitments
T Attema, V Lyubashevsky, G Seiler
Annual International Cryptology Conference, 470-499, 2020
Secure multiparty PageRank algorithm for collaborative fraud detection
A Sangers, M Heesch, T Attema, T Veugen, M Wiggerman, J Veldsink, ...
International Conference on Financial Cryptography and Data Security, 605-623, 2019
A Compressed -Protocol Theory for Lattices
T Attema, R Cramer, L Kohl
Annual International Cryptology Conference, 549-579, 2021
Compressing Proofs of k-Out-Of-n Partial Knowledge
T Attema, R Cramer, S Fehr
Annual International Cryptology Conference, 65-91, 2021
Fiat-shamir transformation of multi-round interactive proofs
T Attema, S Fehr, M Klooß
Cryptology ePrint Archive, 2021
Compressed -Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
T Attema, R Cramer, M Rambaud
International Conference on the Theory and Application of Cryptology and …, 2021
Maintenance decision model for steel bridges: a case in the Netherlands
T Attema, A Kosgodagan Acharige, O Morales-Nįpoles, J Maljaars
Structure and Infrastructure Engineering 13 (2), 242-253, 2017
Development and evaluation of multi-agent models predicting Twitter trends in multiple domains
T Attema, PP van Maanen, E Meeuwissen
Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM …, 2015
Bayesian belief networks in business continuity
F Phillipson, E Matthijssen, T Attema
Journal of business continuity & emergency planning 8 (1), 20-30, 2014
Imperfect distributed quantum phase estimation
NMP Neumann, R Houte, T Attema
International Conference on Computational Science, 605-615, 2020
Towards Quantum-Safe VPNs and Internet
M van Heesch, N van Adrichem, T Attema, T Veugen
A new approach to privacy-preserving clinical decision support systems
T Attema, E Mancini, G Spini, M Abspoel, J de Gier, S Fehr, T Veugen, ...
arXiv preprint arXiv:1810.01107, 2018
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
T Attema, R Cramer, C Xing
Mathematical Cryptology 1 (1), 45-70, 2021
Optimizing the decoy-state BB84 QKD protocol parameters
T Attema, JW Bosman, NMP Neumann
Quantum Information Processing 20 (4), 1-26, 2021
An implementation of the Paillier crypto system with threshold decryption without a trusted dealer
T Veugen, T Attema, G Spini
Cryptology ePrint Archive, 2019
Mathematical formulation of quantum circuit design problems in networks of quantum computers
R van Houte, J Mulderij, T Attema, I Chiscop, F Phillipson
Quantum Information Processing 19 (5), 1-22, 2020
Malicious security comes for free in consensus with leaders
M Abspoel, T Attema, M Rambaud
Cryptology ePrint Archive, 2020
Parallel repetition of (k1,..., kµ)-special-sound multi-round interactive proofs
T Attema, S Fehr
Cryptology ePrint Archive, Report 2021/1259, 2021. https://eprint. iacr. org …, 0
Vector Commitments over Rings and Compressed -Protocols
T Attema, I Cascudo, R Cramer, IB Damgård, D Escudero
Cryptology ePrint Archive, 2022
The system can't perform the operation now. Try again later.
Articles 1–20