[{"citation":{"short":"A. Anonymous, Limitations of the Random Oracle Model, 2025.","mla":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Limitations of the Random Oracle Model}, author={Anonymous, A}, year={2025} }","apa":"Anonymous, A. (2025). <i>Limitations of the Random Oracle Model</i>.","ieee":"A. Anonymous, <i>Limitations of the Random Oracle Model</i>. 2025.","chicago":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>, 2025.","ama":"Anonymous A. <i>Limitations of the Random Oracle Model</i>.; 2025."},"year":"2025","date_created":"2025-12-23T11:32:25Z","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_updated":"2026-02-04T14:20:08Z","title":"Limitations of the Random Oracle Model","type":"bachelorsthesis","status":"public","department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"63407","language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"title":"Clustering with Rényi Divergence","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"date_created":"2025-12-23T11:35:05Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"date_updated":"2026-02-04T14:20:16Z","_id":"63408","citation":{"ama":"Anonymous A. <i>Clustering with Rényi Divergence</i>.; 2025.","chicago":"Anonymous, A. <i>Clustering with Rényi Divergence</i>, 2025.","ieee":"A. Anonymous, <i>Clustering with Rényi Divergence</i>. 2025.","short":"A. Anonymous, Clustering with Rényi Divergence, 2025.","bibtex":"@book{Anonymous_2025, title={Clustering with Rényi Divergence}, author={Anonymous, A}, year={2025} }","mla":"Anonymous, A. <i>Clustering with Rényi Divergence</i>. 2025.","apa":"Anonymous, A. (2025). <i>Clustering with Rényi Divergence</i>."},"status":"public","year":"2025","type":"mastersthesis"},{"status":"public","citation":{"chicago":"Anoynmous, A. <i>BUFF Transform</i>, 2025.","ieee":"A. Anoynmous, <i>BUFF Transform</i>. 2025.","ama":"Anoynmous A. <i>BUFF Transform</i>.; 2025.","bibtex":"@book{Anoynmous_2025, title={BUFF Transform}, author={Anoynmous, A}, year={2025} }","mla":"Anoynmous, A. <i>BUFF Transform</i>. 2025.","short":"A. Anoynmous, BUFF Transform, 2025.","apa":"Anoynmous, A. (2025). <i>BUFF Transform</i>."},"year":"2025","type":"bachelorsthesis","language":[{"iso":"eng"}],"title":"BUFF Transform","department":[{"_id":"34"},{"_id":"64"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"last_name":"Anoynmous","full_name":"Anoynmous, A","first_name":"A"}],"date_created":"2025-12-23T11:31:38Z","user_id":"41047","_id":"63406","date_updated":"2026-02-04T14:20:13Z"},{"citation":{"ama":"Anonymous A. <i>Overview on Threshold Signature Schemes and Their Applications</i>.; 2025.","ieee":"A. Anonymous, <i>Overview on Threshold Signature Schemes and their Applications</i>. 2025.","chicago":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>, 2025.","apa":"Anonymous, A. (2025). <i>Overview on Threshold Signature Schemes and their Applications</i>.","bibtex":"@book{Anonymous_2025, title={Overview on Threshold Signature Schemes and their Applications}, author={Anonymous, A.}, year={2025} }","mla":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>. 2025.","short":"A. Anonymous, Overview on Threshold Signature Schemes and Their Applications, 2025."},"year":"2025","title":"Overview on Threshold Signature Schemes and their Applications","author":[{"full_name":"Anonymous, A.","last_name":"Anonymous","first_name":"A."}],"date_created":"2025-10-20T08:52:45Z","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_updated":"2025-10-20T08:53:28Z","status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"61879"},{"title":"Comparison of Time-Lock Puzzle Constructions and Their Security","date_created":"2025-10-20T08:51:06Z","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_updated":"2025-10-20T08:53:24Z","citation":{"apa":"Anonymous, A. (2025). <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.","mla":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Comparison of Time-Lock Puzzle Constructions and Their Security}, author={Anonymous, A}, year={2025} }","short":"A. Anonymous, Comparison of Time-Lock Puzzle Constructions and Their Security, 2025.","ama":"Anonymous A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.; 2025.","ieee":"A. Anonymous, <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","chicago":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>, 2025."},"year":"2025","language":[{"iso":"eng"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"61878","status":"public","type":"bachelorsthesis"},{"title":"Updatable Privacy-Preserving Reputation System based on Blockchain","author":[{"first_name":"Matthias","last_name":"Pilot","full_name":"Pilot, Matthias"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2023-01-26T16:07:19Z","date_updated":"2023-01-26T16:08:11Z","citation":{"mla":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>. 2023.","short":"M. Pilot, Updatable Privacy-Preserving Reputation System Based on Blockchain, 2023.","bibtex":"@book{Pilot_2023, title={Updatable Privacy-Preserving Reputation System based on Blockchain}, author={Pilot, Matthias}, year={2023} }","apa":"Pilot, M. (2023). <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>.","ama":"Pilot M. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>.; 2023.","ieee":"M. Pilot, <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>. 2023.","chicago":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>, 2023."},"year":"2023","language":[{"iso":"eng"}],"extern":"1","user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"_id":"40440","status":"public","type":"mastersthesis"},{"file_date_updated":"2023-04-25T10:49:36Z","language":[{"iso":"eng"}],"ddc":["000"],"user_id":"41047","department":[{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"43374","file":[{"content_type":"application/pdf","relation":"main_file","date_updated":"2023-04-25T10:49:36Z","creator":"bhenrik","date_created":"2023-04-25T10:49:36Z","title":" A Formal Comparison of Advanced Digital Signature Primitives","file_size":1367369,"file_name":"masters_thesis_schuermann.pdf","access_level":"open_access","file_id":"44177"}],"status":"public","type":"mastersthesis","title":" A Formal Comparison of Advanced Digital Signature Primitives","author":[{"first_name":"Patrick","last_name":"Schürmann","full_name":"Schürmann, Patrick"}],"date_created":"2023-04-03T14:07:32Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"oa":"1","date_updated":"2023-04-25T22:43:21Z","citation":{"ieee":"P. Schürmann, <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","chicago":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>, 2023.","ama":"Schürmann P. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>.; 2023.","bibtex":"@book{Schürmann_2023, title={ A Formal Comparison of Advanced Digital Signature Primitives}, author={Schürmann, Patrick}, year={2023} }","mla":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","short":"P. Schürmann,  A Formal Comparison of Advanced Digital Signature Primitives, 2023.","apa":"Schürmann, P. (2023). <i> A Formal Comparison of Advanced Digital Signature Primitives</i>."},"year":"2023","has_accepted_license":"1"},{"ddc":["000"],"language":[{"iso":"eng"}],"file_date_updated":"2023-05-30T11:43:18Z","_id":"43375","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"64"}],"user_id":"25078","status":"public","file":[{"file_size":2275949,"file_name":"thesis_koch.pdf","file_id":"45303","access_level":"open_access","date_updated":"2023-05-30T11:43:18Z","creator":"feidens","date_created":"2023-05-26T07:07:39Z","relation":"main_file","content_type":"application/pdf"}],"type":"bachelorsthesis","title":"Privacy-Preserving Collection and Evaluation of Log Files","date_updated":"2023-05-30T11:43:18Z","oa":"1","date_created":"2023-04-03T14:09:14Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"first_name":"Angelina","last_name":"Koch","full_name":"Koch, Angelina"}],"year":"2023","citation":{"ama":"Koch A. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.; 2023.","ieee":"A. Koch, <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","chicago":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>, 2023.","apa":"Koch, A. (2023). <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.","short":"A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.","mla":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","bibtex":"@book{Koch_2023, title={Privacy-Preserving Collection and Evaluation of Log Files}, author={Koch, Angelina}, year={2023} }"},"has_accepted_license":"1"},{"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"author":[{"first_name":"Ella","last_name":"Vahle","full_name":"Vahle, Ella"}],"date_created":"2022-07-20T09:38:39Z","date_updated":"2022-07-26T14:31:54Z","title":"Modelling and Proving Security for a Secure MPC Protocol for Stable Matching","citation":{"ama":"Vahle E. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.; 2022.","ieee":"E. Vahle, <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","chicago":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>, 2022.","apa":"Vahle, E. (2022). <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.","short":"E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.","mla":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","bibtex":"@book{Vahle_2022, title={Modelling and Proving Security for a Secure MPC Protocol for Stable Matching}, author={Vahle, Ella}, year={2022} }"},"year":"2022","user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"32399","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"date_updated":"2022-11-18T09:38:04Z","author":[{"last_name":"Siek","full_name":"Siek, Hanna","first_name":"Hanna"}],"date_created":"2022-07-20T09:36:39Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"title":"Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes","year":"2022","citation":{"ama":"Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.; 2022.","ieee":"H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","chicago":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.","bibtex":"@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek, Hanna}, year={2022} }","mla":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","short":"H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022.","apa":"Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>."},"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"}],"_id":"32398","user_id":"477","department":[{"_id":"64"},{"_id":"7"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"34962","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"citation":{"ama":"Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.; 2022.","chicago":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>, 2022.","ieee":"A. Anonymous, <i>Evaluating database systems relying on secure multiparty computation</i>. 2022.","short":"A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.","mla":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>. 2022.","bibtex":"@book{Anonymous_2022, title={Evaluating database systems relying on secure multiparty computation}, author={Anonymous, A}, year={2022} }","apa":"Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty computation</i>."},"year":"2022","title":"Evaluating database systems relying on secure multiparty computation","author":[{"full_name":"Anonymous, A","last_name":"Anonymous","first_name":"A"}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2022-12-24T00:14:34Z","date_updated":"2023-01-10T10:31:35Z"},{"language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"34963","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"status":"public","type":"mastersthesis","title":"Cost of Privacy-preserving SMPC Protocols for NN-Based Inference","date_updated":"2023-01-10T10:31:49Z","date_created":"2022-12-24T00:16:39Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"first_name":"A","full_name":"Anonymous, A","last_name":"Anonymous"}],"year":"2022","citation":{"chicago":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>, 2022.","ieee":"A. Anonymous, <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>. 2022.","ama":"Anonymous A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>.; 2022.","apa":"Anonymous, A. (2022). <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>.","short":"A. Anonymous, Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference, 2022.","bibtex":"@book{Anonymous_2022, title={Cost of Privacy-preserving SMPC Protocols for NN-Based Inference}, author={Anonymous, A}, year={2022} }","mla":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>. 2022."}},{"type":"dissertation","status":"public","department":[{"_id":"64"}],"user_id":"25078","_id":"35188","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"}],"language":[{"iso":"eng"}],"citation":{"ama":"Eidens F. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>.; 2022. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>","chicago":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>, 2022. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>.","ieee":"F. Eidens, <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022.","mla":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>.","short":"F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022.","bibtex":"@book{Eidens_2022, title={Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>}, author={Eidens, Fabian}, year={2022} }","apa":"Eidens, F. (2022). <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>"},"year":"2022","author":[{"first_name":"Fabian","last_name":"Eidens","full_name":"Eidens, Fabian","id":"25078"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2023-01-04T09:01:48Z","date_updated":"2023-02-08T21:07:41Z","doi":"10.17619/UNIPB/1-1653","title":"Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials"},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"45255","citation":{"chicago":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>, 2022.","ieee":"A. Anonymous, <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","ama":"Anonymous A. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>.; 2022.","mla":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","short":"A. Anonymous,  Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development, 2022.","bibtex":"@book{Anonymous_2022, title={ Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development}, author={Anonymous, Anonymous}, year={2022} }","apa":"Anonymous, A. (2022). <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>."},"year":"2022","title":" Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development","author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2023-05-24T09:58:30Z","date_updated":"2023-05-24T09:58:33Z"},{"status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"_id":"45256","department":[{"_id":"64"}],"user_id":"47434","year":"2022","citation":{"mla":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","bibtex":"@book{Anonymous_2022, title={A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries}, author={Anonymous, Anonymous}, year={2022} }","short":"A. Anonymous, A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries, 2022.","apa":"Anonymous, A. (2022). <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>.","chicago":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>, 2022.","ieee":"A. Anonymous, <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","ama":"Anonymous A. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>.; 2022."},"title":"A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries","date_updated":"2023-05-24T09:59:37Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"first_name":"Anonymous","full_name":"Anonymous, Anonymous","last_name":"Anonymous"}],"date_created":"2023-05-24T09:59:34Z"},{"citation":{"apa":"Siemer, J. N. (2021). <i>Lattice reductions and their applications to cryptographic systems</i>.","short":"J.N. Siemer, Lattice Reductions and Their Applications to Cryptographic Systems, 2021.","mla":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>. 2021.","bibtex":"@book{Siemer_2021, title={Lattice reductions and their applications to cryptographic systems}, author={Siemer, Jan Niklas}, year={2021} }","chicago":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>, 2021.","ieee":"J. N. Siemer, <i>Lattice reductions and their applications to cryptographic systems</i>. 2021.","ama":"Siemer JN. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>.; 2021."},"year":"2021","title":"Lattice reductions and their applications to cryptographic systems","date_created":"2022-07-20T11:40:28Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"last_name":"Siemer","full_name":"Siemer, Jan Niklas","first_name":"Jan Niklas"}],"date_updated":"2023-01-10T10:49:33Z","status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"32401"},{"language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"32400","status":"public","type":"mastersthesis","title":"Performance Analysis of FHE Libraries","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"date_created":"2022-07-20T11:37:41Z","date_updated":"2023-01-10T11:54:39Z","citation":{"ama":"Anonymous A. <i>Performance Analysis of FHE Libraries</i>.; 2021.","chicago":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>, 2021.","ieee":"A. Anonymous, <i>Performance Analysis of FHE Libraries</i>. 2021.","apa":"Anonymous, A. (2021). <i>Performance Analysis of FHE Libraries</i>.","short":"A. Anonymous, Performance Analysis of FHE Libraries, 2021.","bibtex":"@book{Anonymous_2021, title={Performance Analysis of FHE Libraries}, author={Anonymous, Anonymous}, year={2021} }","mla":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>. 2021."},"year":"2021"},{"citation":{"ama":"Anonymous A. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>.; 2021.","ieee":"A. Anonymous, <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","chicago":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>, 2021.","bibtex":"@book{Anonymous_2021, title={Device-Independent Security Proofs Via Entropy Accumulation}, author={Anonymous, Anonymous}, year={2021} }","mla":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","short":"A. Anonymous, Device-Independent Security Proofs Via Entropy Accumulation, 2021.","apa":"Anonymous, A. (2021). <i>Device-Independent Security Proofs Via Entropy Accumulation</i>."},"year":"2021","title":"Device-Independent Security Proofs Via Entropy Accumulation","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"date_created":"2023-05-24T09:57:18Z","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"date_updated":"2023-05-24T09:57:21Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"department":[{"_id":"64"}],"user_id":"47434","_id":"45254"},{"year":"2020","citation":{"mla":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","short":"A. Anonymous, Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems, 2020.","bibtex":"@book{Anonymous_2020, title={Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems}, author={Anonymous, Anonymous}, year={2020} }","apa":"Anonymous, A. (2020). <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.","ama":"Anonymous A. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.; 2020.","ieee":"A. Anonymous, <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","chicago":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>, 2020."},"title":"Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems","date_updated":"2022-01-06T06:54:46Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2021-02-02T10:50:08Z","author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"status":"public","type":"bachelorsthesis","language":[{"iso":"eng"}],"_id":"21121","department":[{"_id":"64"},{"_id":"7"}],"user_id":"41047"},{"type":"bachelorsthesis","citation":{"chicago":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>, 2020.","ieee":"J. Heimann, <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","ama":"Heimann J. <i>Distributed Key Generation for Attribute-Based Signatures</i>.; 2020.","apa":"Heimann, J. (2020). <i>Distributed Key Generation for Attribute-Based Signatures</i>.","bibtex":"@book{Heimann_2020, title={Distributed Key Generation for Attribute-Based Signatures}, author={Heimann, Jonas}, year={2020} }","short":"J. Heimann, Distributed Key Generation for Attribute-Based Signatures, 2020.","mla":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020."},"status":"public","year":"2020","author":[{"first_name":"Jonas","full_name":"Heimann, Jonas","last_name":"Heimann"}],"date_created":"2020-08-20T11:23:11Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"user_id":"13703","department":[{"_id":"64"}],"date_updated":"2022-01-06T06:53:26Z","_id":"18085","language":[{"iso":"eng"}],"title":"Distributed Key Generation for Attribute-Based Signatures"}]
