[{"_id":"63407","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2026-02-04T14:20:08Z","author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2025-12-23T11:32:25Z","title":"Limitations of the Random Oracle Model","year":"2025","citation":{"ama":"Anonymous A. <i>Limitations of the Random Oracle Model</i>.; 2025.","chicago":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>, 2025.","ieee":"A. Anonymous, <i>Limitations of the Random Oracle Model</i>. 2025.","apa":"Anonymous, A. (2025). <i>Limitations of the Random Oracle Model</i>.","short":"A. Anonymous, Limitations of the Random Oracle Model, 2025.","mla":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Limitations of the Random Oracle Model}, author={Anonymous, A}, year={2025} }"}},{"title":"Clustering with Rényi Divergence","language":[{"iso":"eng"}],"date_updated":"2026-02-04T14:20:16Z","_id":"63408","author":[{"full_name":"Anonymous, A","last_name":"Anonymous","first_name":"A"}],"user_id":"41047","date_created":"2025-12-23T11:35:05Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"department":[{"_id":"34"},{"_id":"64"}],"year":"2025","citation":{"ama":"Anonymous A. <i>Clustering with Rényi Divergence</i>.; 2025.","chicago":"Anonymous, A. <i>Clustering with Rényi Divergence</i>, 2025.","ieee":"A. Anonymous, <i>Clustering with Rényi Divergence</i>. 2025.","mla":"Anonymous, A. <i>Clustering with Rényi Divergence</i>. 2025.","short":"A. Anonymous, Clustering with Rényi Divergence, 2025.","bibtex":"@book{Anonymous_2025, title={Clustering with Rényi Divergence}, author={Anonymous, A}, year={2025} }","apa":"Anonymous, A. (2025). <i>Clustering with Rényi Divergence</i>."},"status":"public","type":"mastersthesis"},{"department":[{"_id":"34"},{"_id":"64"}],"author":[{"full_name":"Anoynmous, A","last_name":"Anoynmous","first_name":"A"}],"date_created":"2025-12-23T11:31:38Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"user_id":"41047","_id":"63406","date_updated":"2026-02-04T14:20:13Z","language":[{"iso":"eng"}],"title":"BUFF Transform","type":"bachelorsthesis","status":"public","citation":{"ieee":"A. Anoynmous, <i>BUFF Transform</i>. 2025.","chicago":"Anoynmous, A. <i>BUFF Transform</i>, 2025.","ama":"Anoynmous A. <i>BUFF Transform</i>.; 2025.","mla":"Anoynmous, A. <i>BUFF Transform</i>. 2025.","bibtex":"@book{Anoynmous_2025, title={BUFF Transform}, author={Anoynmous, A}, year={2025} }","short":"A. Anoynmous, BUFF Transform, 2025.","apa":"Anoynmous, A. (2025). <i>BUFF Transform</i>."},"year":"2025"},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"_id":"61879","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","year":"2025","citation":{"apa":"Anonymous, A. (2025). <i>Overview on Threshold Signature Schemes and their Applications</i>.","mla":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>. 2025.","short":"A. Anonymous, Overview on Threshold Signature Schemes and Their Applications, 2025.","bibtex":"@book{Anonymous_2025, title={Overview on Threshold Signature Schemes and their Applications}, author={Anonymous, A.}, year={2025} }","chicago":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>, 2025.","ieee":"A. Anonymous, <i>Overview on Threshold Signature Schemes and their Applications</i>. 2025.","ama":"Anonymous A. <i>Overview on Threshold Signature Schemes and Their Applications</i>.; 2025."},"title":"Overview on Threshold Signature Schemes and their Applications","date_updated":"2025-10-20T08:53:28Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"full_name":"Anonymous, A.","last_name":"Anonymous","first_name":"A."}],"date_created":"2025-10-20T08:52:45Z"},{"citation":{"apa":"Anonymous, A. (2025). <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.","bibtex":"@book{Anonymous_2025, title={Comparison of Time-Lock Puzzle Constructions and Their Security}, author={Anonymous, A}, year={2025} }","short":"A. Anonymous, Comparison of Time-Lock Puzzle Constructions and Their Security, 2025.","mla":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","ieee":"A. Anonymous, <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","chicago":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>, 2025.","ama":"Anonymous A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.; 2025."},"year":"2025","title":"Comparison of Time-Lock Puzzle Constructions and Their Security","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"date_created":"2025-10-20T08:51:06Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_updated":"2025-10-20T08:53:24Z","status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"61878"},{"year":"2023","citation":{"chicago":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>, 2023.","ieee":"M. Pilot, <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>. 2023.","ama":"Pilot M. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>.; 2023.","short":"M. Pilot, Updatable Privacy-Preserving Reputation System Based on Blockchain, 2023.","mla":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>. 2023.","bibtex":"@book{Pilot_2023, title={Updatable Privacy-Preserving Reputation System based on Blockchain}, author={Pilot, Matthias}, year={2023} }","apa":"Pilot, M. (2023). <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>."},"date_updated":"2023-01-26T16:08:11Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"first_name":"Matthias","last_name":"Pilot","full_name":"Pilot, Matthias"}],"date_created":"2023-01-26T16:07:19Z","title":"Updatable Privacy-Preserving Reputation System based on Blockchain","type":"mastersthesis","status":"public","_id":"40440","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"27207","language":[{"iso":"eng"}],"extern":"1"},{"file":[{"file_name":"masters_thesis_schuermann.pdf","access_level":"open_access","file_id":"44177","file_size":1367369,"title":" A Formal Comparison of Advanced Digital Signature Primitives","date_created":"2023-04-25T10:49:36Z","creator":"bhenrik","date_updated":"2023-04-25T10:49:36Z","relation":"main_file","content_type":"application/pdf"}],"status":"public","type":"mastersthesis","ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2023-04-25T10:49:36Z","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"43374","user_id":"41047","department":[{"_id":"64"}],"year":"2023","citation":{"chicago":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>, 2023.","ieee":"P. Schürmann, <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","ama":"Schürmann P. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>.; 2023.","bibtex":"@book{Schürmann_2023, title={ A Formal Comparison of Advanced Digital Signature Primitives}, author={Schürmann, Patrick}, year={2023} }","mla":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","short":"P. Schürmann,  A Formal Comparison of Advanced Digital Signature Primitives, 2023.","apa":"Schürmann, P. (2023). <i> A Formal Comparison of Advanced Digital Signature Primitives</i>."},"has_accepted_license":"1","title":" A Formal Comparison of Advanced Digital Signature Primitives","date_updated":"2023-04-25T22:43:21Z","oa":"1","author":[{"full_name":"Schürmann, Patrick","last_name":"Schürmann","first_name":"Patrick"}],"date_created":"2023-04-03T14:07:32Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}]},{"_id":"43375","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"64"}],"user_id":"25078","ddc":["000"],"file_date_updated":"2023-05-30T11:43:18Z","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","file":[{"date_updated":"2023-05-30T11:43:18Z","date_created":"2023-05-26T07:07:39Z","creator":"feidens","file_size":2275949,"file_name":"thesis_koch.pdf","file_id":"45303","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"date_updated":"2023-05-30T11:43:18Z","oa":"1","date_created":"2023-04-03T14:09:14Z","author":[{"first_name":"Angelina","full_name":"Koch, Angelina","last_name":"Koch"}],"supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"title":"Privacy-Preserving Collection and Evaluation of Log Files","has_accepted_license":"1","year":"2023","citation":{"mla":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","bibtex":"@book{Koch_2023, title={Privacy-Preserving Collection and Evaluation of Log Files}, author={Koch, Angelina}, year={2023} }","short":"A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.","apa":"Koch, A. (2023). <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.","chicago":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>, 2023.","ieee":"A. Koch, <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","ama":"Koch A. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.; 2023."}},{"type":"bachelorsthesis","status":"public","_id":"32399","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"64"}],"user_id":"25078","language":[{"iso":"eng"}],"year":"2022","citation":{"apa":"Vahle, E. (2022). <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.","mla":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","bibtex":"@book{Vahle_2022, title={Modelling and Proving Security for a Secure MPC Protocol for Stable Matching}, author={Vahle, Ella}, year={2022} }","short":"E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.","ama":"Vahle E. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.; 2022.","ieee":"E. Vahle, <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","chicago":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>, 2022."},"date_updated":"2022-07-26T14:31:54Z","author":[{"last_name":"Vahle","full_name":"Vahle, Ella","first_name":"Ella"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2022-07-20T09:38:39Z","title":"Modelling and Proving Security for a Secure MPC Protocol for Stable Matching"},{"language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"}],"_id":"32398","user_id":"477","department":[{"_id":"64"},{"_id":"7"}],"status":"public","type":"bachelorsthesis","title":"Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes","date_updated":"2022-11-18T09:38:04Z","author":[{"last_name":"Siek","full_name":"Siek, Hanna","first_name":"Hanna"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2022-07-20T09:36:39Z","year":"2022","citation":{"ama":"Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.; 2022.","chicago":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.","ieee":"H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","apa":"Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.","bibtex":"@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek, Hanna}, year={2022} }","mla":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","short":"H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022."}},{"year":"2022","citation":{"ieee":"A. Anonymous, <i>Evaluating database systems relying on secure multiparty computation</i>. 2022.","chicago":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>, 2022.","ama":"Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.; 2022.","mla":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>. 2022.","short":"A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.","bibtex":"@book{Anonymous_2022, title={Evaluating database systems relying on secure multiparty computation}, author={Anonymous, A}, year={2022} }","apa":"Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty computation</i>."},"date_updated":"2023-01-10T10:31:35Z","author":[{"last_name":"Anonymous","full_name":"Anonymous, A","first_name":"A"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2022-12-24T00:14:34Z","title":"Evaluating database systems relying on secure multiparty computation","type":"bachelorsthesis","status":"public","_id":"34962","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"34963","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","status":"public","type":"mastersthesis","title":"Cost of Privacy-preserving SMPC Protocols for NN-Based Inference","date_updated":"2023-01-10T10:31:49Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"date_created":"2022-12-24T00:16:39Z","year":"2022","citation":{"bibtex":"@book{Anonymous_2022, title={Cost of Privacy-preserving SMPC Protocols for NN-Based Inference}, author={Anonymous, A}, year={2022} }","mla":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>. 2022.","short":"A. Anonymous, Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference, 2022.","apa":"Anonymous, A. (2022). <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>.","chicago":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>, 2022.","ieee":"A. Anonymous, <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>. 2022.","ama":"Anonymous A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>.; 2022."}},{"doi":"10.17619/UNIPB/1-1653","title":"Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials","date_created":"2023-01-04T09:01:48Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"last_name":"Eidens","full_name":"Eidens, Fabian","id":"25078","first_name":"Fabian"}],"date_updated":"2023-02-08T21:07:41Z","citation":{"ama":"Eidens F. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>.; 2022. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>","ieee":"F. Eidens, <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022.","chicago":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>, 2022. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>.","bibtex":"@book{Eidens_2022, title={Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>}, author={Eidens, Fabian}, year={2022} }","mla":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>.","short":"F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022.","apa":"Eidens, F. (2022). <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>"},"year":"2022","language":[{"iso":"eng"}],"user_id":"25078","department":[{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"}],"_id":"35188","status":"public","type":"dissertation"},{"citation":{"short":"A. Anonymous,  Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development, 2022.","mla":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","bibtex":"@book{Anonymous_2022, title={ Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development}, author={Anonymous, Anonymous}, year={2022} }","apa":"Anonymous, A. (2022). <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>.","ama":"Anonymous A. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>.; 2022.","ieee":"A. Anonymous, <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","chicago":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>, 2022."},"year":"2022","title":" Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"first_name":"Anonymous","full_name":"Anonymous, Anonymous","last_name":"Anonymous"}],"date_created":"2023-05-24T09:58:30Z","date_updated":"2023-05-24T09:58:33Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"45255"},{"language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"45256","status":"public","type":"mastersthesis","title":"A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2023-05-24T09:59:34Z","author":[{"first_name":"Anonymous","full_name":"Anonymous, Anonymous","last_name":"Anonymous"}],"date_updated":"2023-05-24T09:59:37Z","citation":{"ieee":"A. Anonymous, <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","chicago":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>, 2022.","ama":"Anonymous A. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>.; 2022.","bibtex":"@book{Anonymous_2022, title={A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries}, author={Anonymous, Anonymous}, year={2022} }","mla":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","short":"A. Anonymous, A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries, 2022.","apa":"Anonymous, A. (2022). <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>."},"year":"2022"},{"language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"32401","status":"public","type":"bachelorsthesis","title":"Lattice reductions and their applications to cryptographic systems","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2022-07-20T11:40:28Z","author":[{"first_name":"Jan Niklas","full_name":"Siemer, Jan Niklas","last_name":"Siemer"}],"date_updated":"2023-01-10T10:49:33Z","citation":{"ama":"Siemer JN. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>.; 2021.","chicago":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>, 2021.","ieee":"J. N. Siemer, <i>Lattice reductions and their applications to cryptographic systems</i>. 2021.","mla":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>. 2021.","short":"J.N. Siemer, Lattice Reductions and Their Applications to Cryptographic Systems, 2021.","bibtex":"@book{Siemer_2021, title={Lattice reductions and their applications to cryptographic systems}, author={Siemer, Jan Niklas}, year={2021} }","apa":"Siemer, J. N. (2021). <i>Lattice reductions and their applications to cryptographic systems</i>."},"year":"2021"},{"type":"mastersthesis","status":"public","_id":"32400","user_id":"47434","department":[{"_id":"64"}],"language":[{"iso":"eng"}],"year":"2021","citation":{"chicago":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>, 2021.","ieee":"A. Anonymous, <i>Performance Analysis of FHE Libraries</i>. 2021.","ama":"Anonymous A. <i>Performance Analysis of FHE Libraries</i>.; 2021.","bibtex":"@book{Anonymous_2021, title={Performance Analysis of FHE Libraries}, author={Anonymous, Anonymous}, year={2021} }","mla":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>. 2021.","short":"A. Anonymous, Performance Analysis of FHE Libraries, 2021.","apa":"Anonymous, A. (2021). <i>Performance Analysis of FHE Libraries</i>."},"date_updated":"2023-01-10T11:54:39Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"date_created":"2022-07-20T11:37:41Z","title":"Performance Analysis of FHE Libraries"},{"title":"Device-Independent Security Proofs Via Entropy Accumulation","date_created":"2023-05-24T09:57:18Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"author":[{"first_name":"Anonymous","full_name":"Anonymous, Anonymous","last_name":"Anonymous"}],"date_updated":"2023-05-24T09:57:21Z","citation":{"ama":"Anonymous A. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>.; 2021.","ieee":"A. Anonymous, <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","chicago":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>, 2021.","apa":"Anonymous, A. (2021). <i>Device-Independent Security Proofs Via Entropy Accumulation</i>.","short":"A. Anonymous, Device-Independent Security Proofs Via Entropy Accumulation, 2021.","mla":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","bibtex":"@book{Anonymous_2021, title={Device-Independent Security Proofs Via Entropy Accumulation}, author={Anonymous, Anonymous}, year={2021} }"},"year":"2021","language":[{"iso":"eng"}],"department":[{"_id":"64"}],"user_id":"47434","_id":"45254","status":"public","type":"mastersthesis"},{"date_updated":"2022-01-06T06:54:46Z","date_created":"2021-02-02T10:50:08Z","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"title":"Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems","year":"2020","citation":{"ieee":"A. Anonymous, <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","chicago":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>, 2020.","ama":"Anonymous A. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.; 2020.","apa":"Anonymous, A. (2020). <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.","short":"A. Anonymous, Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems, 2020.","mla":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","bibtex":"@book{Anonymous_2020, title={Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems}, author={Anonymous, Anonymous}, year={2020} }"},"_id":"21121","department":[{"_id":"64"},{"_id":"7"}],"user_id":"41047","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"department":[{"_id":"64"}],"date_created":"2020-08-20T11:23:11Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"user_id":"13703","author":[{"full_name":"Heimann, Jonas","last_name":"Heimann","first_name":"Jonas"}],"_id":"18085","date_updated":"2022-01-06T06:53:26Z","language":[{"iso":"eng"}],"title":"Distributed Key Generation for Attribute-Based Signatures","type":"bachelorsthesis","status":"public","citation":{"short":"J. Heimann, Distributed Key Generation for Attribute-Based Signatures, 2020.","bibtex":"@book{Heimann_2020, title={Distributed Key Generation for Attribute-Based Signatures}, author={Heimann, Jonas}, year={2020} }","mla":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","apa":"Heimann, J. (2020). <i>Distributed Key Generation for Attribute-Based Signatures</i>.","ama":"Heimann J. <i>Distributed Key Generation for Attribute-Based Signatures</i>.; 2020.","chicago":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>, 2020.","ieee":"J. Heimann, <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020."},"year":"2020"}]
