[{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"_id":"63407","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","year":"2025","citation":{"bibtex":"@book{Anonymous_2025, title={Limitations of the Random Oracle Model}, author={Anonymous, A}, year={2025} }","short":"A. Anonymous, Limitations of the Random Oracle Model, 2025.","mla":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>. 2025.","apa":"Anonymous, A. (2025). <i>Limitations of the Random Oracle Model</i>.","ieee":"A. Anonymous, <i>Limitations of the Random Oracle Model</i>. 2025.","chicago":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>, 2025.","ama":"Anonymous A. <i>Limitations of the Random Oracle Model</i>.; 2025."},"title":"Limitations of the Random Oracle Model","date_updated":"2026-02-04T14:20:08Z","author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_created":"2025-12-23T11:32:25Z"},{"title":"Clustering with Rényi Divergence","language":[{"iso":"eng"}],"date_updated":"2026-02-04T14:20:16Z","_id":"63408","author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"date_created":"2025-12-23T11:35:05Z","user_id":"41047","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"department":[{"_id":"34"},{"_id":"64"}],"year":"2025","citation":{"ama":"Anonymous A. <i>Clustering with Rényi Divergence</i>.; 2025.","ieee":"A. Anonymous, <i>Clustering with Rényi Divergence</i>. 2025.","chicago":"Anonymous, A. <i>Clustering with Rényi Divergence</i>, 2025.","short":"A. Anonymous, Clustering with Rényi Divergence, 2025.","mla":"Anonymous, A. <i>Clustering with Rényi Divergence</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Clustering with Rényi Divergence}, author={Anonymous, A}, year={2025} }","apa":"Anonymous, A. (2025). <i>Clustering with Rényi Divergence</i>."},"status":"public","type":"mastersthesis"},{"_id":"63406","date_updated":"2026-02-04T14:20:13Z","department":[{"_id":"34"},{"_id":"64"}],"author":[{"last_name":"Anoynmous","full_name":"Anoynmous, A","first_name":"A"}],"date_created":"2025-12-23T11:31:38Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"user_id":"41047","title":"BUFF Transform","language":[{"iso":"eng"}],"type":"bachelorsthesis","year":"2025","status":"public","citation":{"apa":"Anoynmous, A. (2025). <i>BUFF Transform</i>.","short":"A. Anoynmous, BUFF Transform, 2025.","mla":"Anoynmous, A. <i>BUFF Transform</i>. 2025.","bibtex":"@book{Anoynmous_2025, title={BUFF Transform}, author={Anoynmous, A}, year={2025} }","ama":"Anoynmous A. <i>BUFF Transform</i>.; 2025.","chicago":"Anoynmous, A. <i>BUFF Transform</i>, 2025.","ieee":"A. Anoynmous, <i>BUFF Transform</i>. 2025."}},{"year":"2025","citation":{"ama":"Anonymous A. <i>Overview on Threshold Signature Schemes and Their Applications</i>.; 2025.","chicago":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>, 2025.","ieee":"A. Anonymous, <i>Overview on Threshold Signature Schemes and their Applications</i>. 2025.","apa":"Anonymous, A. (2025). <i>Overview on Threshold Signature Schemes and their Applications</i>.","mla":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Overview on Threshold Signature Schemes and their Applications}, author={Anonymous, A.}, year={2025} }","short":"A. Anonymous, Overview on Threshold Signature Schemes and Their Applications, 2025."},"date_updated":"2025-10-20T08:53:28Z","date_created":"2025-10-20T08:52:45Z","author":[{"full_name":"Anonymous, A.","last_name":"Anonymous","first_name":"A."}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"title":"Overview on Threshold Signature Schemes and their Applications","type":"bachelorsthesis","status":"public","_id":"61879","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"language":[{"iso":"eng"}]},{"type":"bachelorsthesis","status":"public","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"61878","language":[{"iso":"eng"}],"citation":{"chicago":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>, 2025.","ieee":"A. Anonymous, <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","ama":"Anonymous A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.; 2025.","mla":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Comparison of Time-Lock Puzzle Constructions and Their Security}, author={Anonymous, A}, year={2025} }","short":"A. Anonymous, Comparison of Time-Lock Puzzle Constructions and Their Security, 2025.","apa":"Anonymous, A. (2025). <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>."},"year":"2025","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2025-10-20T08:51:06Z","author":[{"full_name":"Anonymous, A","last_name":"Anonymous","first_name":"A"}],"date_updated":"2025-10-20T08:53:24Z","title":"Comparison of Time-Lock Puzzle Constructions and Their Security"},{"language":[{"iso":"eng"}],"extern":"1","_id":"40440","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"7"},{"_id":"64"}],"user_id":"27207","status":"public","type":"mastersthesis","title":"Updatable Privacy-Preserving Reputation System based on Blockchain","date_updated":"2023-01-26T16:08:11Z","date_created":"2023-01-26T16:07:19Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"first_name":"Matthias","full_name":"Pilot, Matthias","last_name":"Pilot"}],"year":"2023","citation":{"apa":"Pilot, M. (2023). <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>.","mla":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>. 2023.","bibtex":"@book{Pilot_2023, title={Updatable Privacy-Preserving Reputation System based on Blockchain}, author={Pilot, Matthias}, year={2023} }","short":"M. Pilot, Updatable Privacy-Preserving Reputation System Based on Blockchain, 2023.","ama":"Pilot M. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>.; 2023.","chicago":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>, 2023.","ieee":"M. Pilot, <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>. 2023."}},{"citation":{"chicago":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>, 2023.","ieee":"P. Schürmann, <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","ama":"Schürmann P. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>.; 2023.","mla":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","bibtex":"@book{Schürmann_2023, title={ A Formal Comparison of Advanced Digital Signature Primitives}, author={Schürmann, Patrick}, year={2023} }","short":"P. Schürmann,  A Formal Comparison of Advanced Digital Signature Primitives, 2023.","apa":"Schürmann, P. (2023). <i> A Formal Comparison of Advanced Digital Signature Primitives</i>."},"year":"2023","has_accepted_license":"1","title":" A Formal Comparison of Advanced Digital Signature Primitives","author":[{"first_name":"Patrick","full_name":"Schürmann, Patrick","last_name":"Schürmann"}],"date_created":"2023-04-03T14:07:32Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_updated":"2023-04-25T22:43:21Z","oa":"1","file":[{"date_updated":"2023-04-25T10:49:36Z","date_created":"2023-04-25T10:49:36Z","creator":"bhenrik","file_size":1367369,"title":" A Formal Comparison of Advanced Digital Signature Primitives","file_name":"masters_thesis_schuermann.pdf","access_level":"open_access","file_id":"44177","content_type":"application/pdf","relation":"main_file"}],"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"file_date_updated":"2023-04-25T10:49:36Z","ddc":["000"],"user_id":"41047","department":[{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"43374"},{"citation":{"short":"A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.","mla":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","bibtex":"@book{Koch_2023, title={Privacy-Preserving Collection and Evaluation of Log Files}, author={Koch, Angelina}, year={2023} }","apa":"Koch, A. (2023). <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.","ama":"Koch A. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.; 2023.","chicago":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>, 2023.","ieee":"A. Koch, <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023."},"year":"2023","has_accepted_license":"1","title":"Privacy-Preserving Collection and Evaluation of Log Files","author":[{"first_name":"Angelina","full_name":"Koch, Angelina","last_name":"Koch"}],"date_created":"2023-04-03T14:09:14Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"oa":"1","date_updated":"2023-05-30T11:43:18Z","status":"public","file":[{"date_updated":"2023-05-30T11:43:18Z","date_created":"2023-05-26T07:07:39Z","creator":"feidens","file_size":2275949,"file_id":"45303","file_name":"thesis_koch.pdf","access_level":"open_access","content_type":"application/pdf","relation":"main_file"}],"type":"bachelorsthesis","file_date_updated":"2023-05-30T11:43:18Z","language":[{"iso":"eng"}],"ddc":["000"],"department":[{"_id":"64"}],"user_id":"25078","_id":"43375","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}]},{"_id":"32399","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"64"}],"user_id":"25078","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2022-07-26T14:31:54Z","author":[{"first_name":"Ella","full_name":"Vahle, Ella","last_name":"Vahle"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2022-07-20T09:38:39Z","title":"Modelling and Proving Security for a Secure MPC Protocol for Stable Matching","year":"2022","citation":{"mla":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","short":"E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.","bibtex":"@book{Vahle_2022, title={Modelling and Proving Security for a Secure MPC Protocol for Stable Matching}, author={Vahle, Ella}, year={2022} }","apa":"Vahle, E. (2022). <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.","ieee":"E. Vahle, <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","chicago":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>, 2022.","ama":"Vahle E. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.; 2022."}},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"}],"_id":"32398","user_id":"477","department":[{"_id":"64"},{"_id":"7"}],"year":"2022","citation":{"ama":"Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.; 2022.","ieee":"H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","chicago":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.","bibtex":"@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek, Hanna}, year={2022} }","mla":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","short":"H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022.","apa":"Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>."},"title":"Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes","date_updated":"2022-11-18T09:38:04Z","author":[{"full_name":"Siek, Hanna","last_name":"Siek","first_name":"Hanna"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2022-07-20T09:36:39Z"},{"title":"Evaluating database systems relying on secure multiparty computation","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2022-12-24T00:14:34Z","author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"date_updated":"2023-01-10T10:31:35Z","citation":{"mla":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>. 2022.","short":"A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.","bibtex":"@book{Anonymous_2022, title={Evaluating database systems relying on secure multiparty computation}, author={Anonymous, A}, year={2022} }","apa":"Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty computation</i>.","chicago":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>, 2022.","ieee":"A. Anonymous, <i>Evaluating database systems relying on secure multiparty computation</i>. 2022.","ama":"Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.; 2022."},"year":"2022","language":[{"iso":"eng"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"_id":"34962","status":"public","type":"bachelorsthesis"},{"type":"mastersthesis","status":"public","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"_id":"34963","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"language":[{"iso":"eng"}],"year":"2022","citation":{"apa":"Anonymous, A. (2022). <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>.","bibtex":"@book{Anonymous_2022, title={Cost of Privacy-preserving SMPC Protocols for NN-Based Inference}, author={Anonymous, A}, year={2022} }","short":"A. Anonymous, Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference, 2022.","mla":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>. 2022.","ama":"Anonymous A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>.; 2022.","chicago":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>, 2022.","ieee":"A. Anonymous, <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>. 2022."},"date_updated":"2023-01-10T10:31:49Z","date_created":"2022-12-24T00:16:39Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"title":"Cost of Privacy-preserving SMPC Protocols for NN-Based Inference"},{"status":"public","type":"dissertation","language":[{"iso":"eng"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"}],"_id":"35188","user_id":"25078","department":[{"_id":"64"}],"year":"2022","citation":{"apa":"Eidens, F. (2022). <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>","short":"F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022.","mla":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>.","bibtex":"@book{Eidens_2022, title={Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>}, author={Eidens, Fabian}, year={2022} }","ama":"Eidens F. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>.; 2022. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>","chicago":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>, 2022. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>.","ieee":"F. Eidens, <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022."},"title":"Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials","doi":"10.17619/UNIPB/1-1653","date_updated":"2023-02-08T21:07:41Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"id":"25078","full_name":"Eidens, Fabian","last_name":"Eidens","first_name":"Fabian"}],"date_created":"2023-01-04T09:01:48Z"},{"department":[{"_id":"64"}],"user_id":"47434","_id":"45255","language":[{"iso":"eng"}],"type":"mastersthesis","status":"public","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"date_created":"2023-05-24T09:58:30Z","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"date_updated":"2023-05-24T09:58:33Z","title":" Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development","citation":{"ama":"Anonymous A. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>.; 2022.","chicago":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>, 2022.","ieee":"A. Anonymous, <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","short":"A. Anonymous,  Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development, 2022.","mla":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","bibtex":"@book{Anonymous_2022, title={ Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development}, author={Anonymous, Anonymous}, year={2022} }","apa":"Anonymous, A. (2022). <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>."},"year":"2022"},{"department":[{"_id":"64"}],"user_id":"47434","_id":"45256","language":[{"iso":"eng"}],"type":"mastersthesis","status":"public","author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2023-05-24T09:59:34Z","date_updated":"2023-05-24T09:59:37Z","title":"A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries","citation":{"ieee":"A. Anonymous, <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","chicago":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>, 2022.","ama":"Anonymous A. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>.; 2022.","mla":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","short":"A. Anonymous, A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries, 2022.","bibtex":"@book{Anonymous_2022, title={A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries}, author={Anonymous, Anonymous}, year={2022} }","apa":"Anonymous, A. (2022). <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>."},"year":"2022"},{"user_id":"47434","department":[{"_id":"64"}],"_id":"32401","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_created":"2022-07-20T11:40:28Z","author":[{"first_name":"Jan Niklas","last_name":"Siemer","full_name":"Siemer, Jan Niklas"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_updated":"2023-01-10T10:49:33Z","title":"Lattice reductions and their applications to cryptographic systems","citation":{"apa":"Siemer, J. N. (2021). <i>Lattice reductions and their applications to cryptographic systems</i>.","mla":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>. 2021.","bibtex":"@book{Siemer_2021, title={Lattice reductions and their applications to cryptographic systems}, author={Siemer, Jan Niklas}, year={2021} }","short":"J.N. Siemer, Lattice Reductions and Their Applications to Cryptographic Systems, 2021.","ama":"Siemer JN. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>.; 2021.","chicago":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>, 2021.","ieee":"J. N. Siemer, <i>Lattice reductions and their applications to cryptographic systems</i>. 2021."},"year":"2021"},{"language":[{"iso":"eng"}],"_id":"32400","department":[{"_id":"64"}],"user_id":"47434","status":"public","type":"mastersthesis","title":"Performance Analysis of FHE Libraries","date_updated":"2023-01-10T11:54:39Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"date_created":"2022-07-20T11:37:41Z","year":"2021","citation":{"apa":"Anonymous, A. (2021). <i>Performance Analysis of FHE Libraries</i>.","mla":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>. 2021.","bibtex":"@book{Anonymous_2021, title={Performance Analysis of FHE Libraries}, author={Anonymous, Anonymous}, year={2021} }","short":"A. Anonymous, Performance Analysis of FHE Libraries, 2021.","ieee":"A. Anonymous, <i>Performance Analysis of FHE Libraries</i>. 2021.","chicago":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>, 2021.","ama":"Anonymous A. <i>Performance Analysis of FHE Libraries</i>.; 2021."}},{"title":"Device-Independent Security Proofs Via Entropy Accumulation","date_updated":"2023-05-24T09:57:21Z","date_created":"2023-05-24T09:57:18Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"first_name":"Anonymous","last_name":"Anonymous","full_name":"Anonymous, Anonymous"}],"year":"2021","citation":{"ama":"Anonymous A. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>.; 2021.","chicago":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>, 2021.","ieee":"A. Anonymous, <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","apa":"Anonymous, A. (2021). <i>Device-Independent Security Proofs Via Entropy Accumulation</i>.","mla":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","bibtex":"@book{Anonymous_2021, title={Device-Independent Security Proofs Via Entropy Accumulation}, author={Anonymous, Anonymous}, year={2021} }","short":"A. Anonymous, Device-Independent Security Proofs Via Entropy Accumulation, 2021."},"language":[{"iso":"eng"}],"_id":"45254","department":[{"_id":"64"}],"user_id":"47434","status":"public","type":"mastersthesis"},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"user_id":"41047","department":[{"_id":"64"},{"_id":"7"}],"_id":"21121","citation":{"apa":"Anonymous, A. (2020). <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.","short":"A. Anonymous, Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems, 2020.","bibtex":"@book{Anonymous_2020, title={Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems}, author={Anonymous, Anonymous}, year={2020} }","mla":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","ama":"Anonymous A. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.; 2020.","chicago":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>, 2020.","ieee":"A. Anonymous, <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020."},"year":"2020","title":"Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2021-02-02T10:50:08Z","date_updated":"2022-01-06T06:54:46Z"},{"date_updated":"2022-01-06T06:53:26Z","_id":"18085","date_created":"2020-08-20T11:23:11Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"full_name":"Heimann, Jonas","last_name":"Heimann","first_name":"Jonas"}],"user_id":"13703","department":[{"_id":"64"}],"title":"Distributed Key Generation for Attribute-Based Signatures","language":[{"iso":"eng"}],"type":"bachelorsthesis","year":"2020","citation":{"ama":"Heimann J. <i>Distributed Key Generation for Attribute-Based Signatures</i>.; 2020.","chicago":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>, 2020.","ieee":"J. Heimann, <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","apa":"Heimann, J. (2020). <i>Distributed Key Generation for Attribute-Based Signatures</i>.","mla":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","short":"J. Heimann, Distributed Key Generation for Attribute-Based Signatures, 2020.","bibtex":"@book{Heimann_2020, title={Distributed Key Generation for Attribute-Based Signatures}, author={Heimann, Jonas}, year={2020} }"},"status":"public"}]
