@misc{63408,
  author       = {{Anonymous, A}},
  title        = {{{Clustering with Rényi Divergence}}},
  year         = {{2025}},
}

@misc{47658,
  author       = {{Anonymous, A.}},
  title        = {{{Private Set Intersection using Third Generation FHE}}},
  year         = {{2023}},
}

@misc{47659,
  author       = {{Anonymous, A.}},
  title        = {{{Rational Models in Cryptography Applied to Matching}}},
  year         = {{2023}},
}

@misc{40440,
  author       = {{Pilot, Matthias}},
  title        = {{{Updatable Privacy-Preserving Reputation System based on Blockchain}}},
  year         = {{2023}},
}

@misc{43374,
  author       = {{Schürmann, Patrick}},
  title        = {{{ A Formal Comparison of Advanced Digital Signature Primitives}}},
  year         = {{2023}},
}

@misc{31485,
  author       = {{Kramer, Paul}},
  title        = {{{On Transforming Lattice-Based Cryptography to the Ring Setting}}},
  year         = {{2022}},
}

@misc{34963,
  author       = {{Anonymous, A}},
  title        = {{{Cost of Privacy-preserving SMPC Protocols for NN-Based Inference}}},
  year         = {{2022}},
}

@misc{45255,
  author       = {{Anonymous, Anonymous}},
  title        = {{{ Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development}}},
  year         = {{2022}},
}

@misc{45256,
  author       = {{Anonymous, Anonymous}},
  title        = {{{A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries}}},
  year         = {{2022}},
}

@misc{32400,
  author       = {{Anonymous, Anonymous}},
  title        = {{{Performance Analysis of FHE Libraries}}},
  year         = {{2021}},
}

@misc{45254,
  author       = {{Anonymous, Anonymous}},
  title        = {{{Device-Independent Security Proofs Via Entropy Accumulation}}},
  year         = {{2021}},
}

@misc{15746,
  author       = {{Otte, Oliver}},
  title        = {{{Outsourced Decryption of Attribute-based Ciphertexts}}},
  year         = {{2019}},
}

@misc{13128,
  author       = {{Bröcher, Henrik}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Rational Secure Multiparty Computation}}},
  year         = {{2019}},
}

@misc{10306,
  author       = {{Porzenheim, Laurens Alexander}},
  title        = {{{Post-Quantum Secure Group Signatures}}},
  year         = {{2019}},
}

@misc{13648,
  author       = {{Scholz, Swante}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Implementation and Comparison of Elliptic Curve Algorithms in Java}}},
  year         = {{2019}},
}

@misc{60,
  author       = {{Niehus, David}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Semantically Secure Attribute-based Searchable Encryption}}},
  year         = {{2017}},
}

@misc{117,
  author       = {{Bemmann, Pascal}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Attribute-based Signatures using Structure Preserving Signatures}}},
  year         = {{2017}},
}

@misc{2898,
  author       = {{Weis, Eduard}},
  title        = {{{Searchable Encryption}}},
  year         = {{2016}},
}

@misc{146,
  author       = {{Hamm, Julian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Symmetric Anonymous Credentials with Protocols for Relations on Attributes}}},
  year         = {{2016}},
}

@misc{321,
  author       = {{Eidens, Fabian}},
  publisher    = {{Universität Paderborn}},
  title        = {{{Anonymous credential system based on q-Strong Diffie-Hellman Assumption}}},
  year         = {{2015}},
}

