[{"supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"author":[{"last_name":"Anonymous","full_name":"Anonymous, A","first_name":"A"}],"date_created":"2025-12-23T11:32:25Z","date_updated":"2026-02-04T14:20:08Z","title":"Limitations of the Random Oracle Model","citation":{"chicago":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>, 2025.","ieee":"A. Anonymous, <i>Limitations of the Random Oracle Model</i>. 2025.","ama":"Anonymous A. <i>Limitations of the Random Oracle Model</i>.; 2025.","short":"A. Anonymous, Limitations of the Random Oracle Model, 2025.","bibtex":"@book{Anonymous_2025, title={Limitations of the Random Oracle Model}, author={Anonymous, A}, year={2025} }","mla":"Anonymous, A. <i>Limitations of the Random Oracle Model</i>. 2025.","apa":"Anonymous, A. (2025). <i>Limitations of the Random Oracle Model</i>."},"year":"2025","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"_id":"63407","language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public"},{"language":[{"iso":"eng"}],"title":"Clustering with Rényi Divergence","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2025-12-23T11:35:05Z","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"date_updated":"2026-02-04T14:20:16Z","_id":"63408","citation":{"apa":"Anonymous, A. (2025). <i>Clustering with Rényi Divergence</i>.","mla":"Anonymous, A. <i>Clustering with Rényi Divergence</i>. 2025.","short":"A. Anonymous, Clustering with Rényi Divergence, 2025.","bibtex":"@book{Anonymous_2025, title={Clustering with Rényi Divergence}, author={Anonymous, A}, year={2025} }","ieee":"A. Anonymous, <i>Clustering with Rényi Divergence</i>. 2025.","chicago":"Anonymous, A. <i>Clustering with Rényi Divergence</i>, 2025.","ama":"Anonymous A. <i>Clustering with Rényi Divergence</i>.; 2025."},"status":"public","year":"2025","type":"mastersthesis"},{"year":"2025","status":"public","citation":{"ama":"Anoynmous A. <i>BUFF Transform</i>.; 2025.","chicago":"Anoynmous, A. <i>BUFF Transform</i>, 2025.","ieee":"A. Anoynmous, <i>BUFF Transform</i>. 2025.","apa":"Anoynmous, A. (2025). <i>BUFF Transform</i>.","bibtex":"@book{Anoynmous_2025, title={BUFF Transform}, author={Anoynmous, A}, year={2025} }","mla":"Anoynmous, A. <i>BUFF Transform</i>. 2025.","short":"A. Anoynmous, BUFF Transform, 2025."},"type":"bachelorsthesis","title":"BUFF Transform","language":[{"iso":"eng"}],"_id":"63406","date_updated":"2026-02-04T14:20:13Z","department":[{"_id":"34"},{"_id":"64"}],"author":[{"last_name":"Anoynmous","full_name":"Anoynmous, A","first_name":"A"}],"date_created":"2025-12-23T11:31:38Z","supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"user_id":"41047"},{"year":"2025","citation":{"ieee":"A. Anonymous, <i>Overview on Threshold Signature Schemes and their Applications</i>. 2025.","chicago":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>, 2025.","ama":"Anonymous A. <i>Overview on Threshold Signature Schemes and Their Applications</i>.; 2025.","short":"A. Anonymous, Overview on Threshold Signature Schemes and Their Applications, 2025.","mla":"Anonymous, A. <i>Overview on Threshold Signature Schemes and Their Applications</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Overview on Threshold Signature Schemes and their Applications}, author={Anonymous, A.}, year={2025} }","apa":"Anonymous, A. (2025). <i>Overview on Threshold Signature Schemes and their Applications</i>."},"date_updated":"2025-10-20T08:53:28Z","date_created":"2025-10-20T08:52:45Z","author":[{"last_name":"Anonymous","full_name":"Anonymous, A.","first_name":"A."}],"supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"title":"Overview on Threshold Signature Schemes and their Applications","type":"bachelorsthesis","status":"public","_id":"61879","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"language":[{"iso":"eng"}]},{"title":"Comparison of Time-Lock Puzzle Constructions and Their Security","date_created":"2025-10-20T08:51:06Z","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"last_name":"Anonymous","full_name":"Anonymous, A","first_name":"A"}],"date_updated":"2025-10-20T08:53:24Z","citation":{"ieee":"A. Anonymous, <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","chicago":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>, 2025.","ama":"Anonymous A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.; 2025.","apa":"Anonymous, A. (2025). <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>.","mla":"Anonymous, A. <i>Comparison of Time-Lock Puzzle Constructions and Their Security</i>. 2025.","bibtex":"@book{Anonymous_2025, title={Comparison of Time-Lock Puzzle Constructions and Their Security}, author={Anonymous, A}, year={2025} }","short":"A. Anonymous, Comparison of Time-Lock Puzzle Constructions and Their Security, 2025."},"year":"2025","language":[{"iso":"eng"}],"department":[{"_id":"34"},{"_id":"64"}],"user_id":"41047","_id":"61878","status":"public","type":"bachelorsthesis"},{"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"_id":"40440","user_id":"27207","department":[{"_id":"7"},{"_id":"64"}],"language":[{"iso":"eng"}],"extern":"1","type":"mastersthesis","status":"public","date_updated":"2023-01-26T16:08:11Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"first_name":"Matthias","last_name":"Pilot","full_name":"Pilot, Matthias"}],"date_created":"2023-01-26T16:07:19Z","title":"Updatable Privacy-Preserving Reputation System based on Blockchain","year":"2023","citation":{"apa":"Pilot, M. (2023). <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>.","short":"M. Pilot, Updatable Privacy-Preserving Reputation System Based on Blockchain, 2023.","mla":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>. 2023.","bibtex":"@book{Pilot_2023, title={Updatable Privacy-Preserving Reputation System based on Blockchain}, author={Pilot, Matthias}, year={2023} }","ieee":"M. Pilot, <i>Updatable Privacy-Preserving Reputation System based on Blockchain</i>. 2023.","chicago":"Pilot, Matthias. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>, 2023.","ama":"Pilot M. <i>Updatable Privacy-Preserving Reputation System Based on Blockchain</i>.; 2023."}},{"_id":"43374","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"64"}],"user_id":"41047","ddc":["000"],"file_date_updated":"2023-04-25T10:49:36Z","language":[{"iso":"eng"}],"type":"mastersthesis","status":"public","file":[{"date_created":"2023-04-25T10:49:36Z","creator":"bhenrik","date_updated":"2023-04-25T10:49:36Z","file_id":"44177","access_level":"open_access","file_name":"masters_thesis_schuermann.pdf","file_size":1367369,"title":" A Formal Comparison of Advanced Digital Signature Primitives","content_type":"application/pdf","relation":"main_file"}],"date_updated":"2023-04-25T22:43:21Z","oa":"1","author":[{"first_name":"Patrick","last_name":"Schürmann","full_name":"Schürmann, Patrick"}],"date_created":"2023-04-03T14:07:32Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"title":" A Formal Comparison of Advanced Digital Signature Primitives","has_accepted_license":"1","year":"2023","citation":{"chicago":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>, 2023.","ieee":"P. Schürmann, <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","ama":"Schürmann P. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>.; 2023.","mla":"Schürmann, Patrick. <i> A Formal Comparison of Advanced Digital Signature Primitives</i>. 2023.","bibtex":"@book{Schürmann_2023, title={ A Formal Comparison of Advanced Digital Signature Primitives}, author={Schürmann, Patrick}, year={2023} }","short":"P. Schürmann,  A Formal Comparison of Advanced Digital Signature Primitives, 2023.","apa":"Schürmann, P. (2023). <i> A Formal Comparison of Advanced Digital Signature Primitives</i>."}},{"has_accepted_license":"1","citation":{"ama":"Koch A. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>.; 2023.","chicago":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>, 2023.","ieee":"A. Koch, <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","short":"A. Koch, Privacy-Preserving Collection and Evaluation of Log Files, 2023.","mla":"Koch, Angelina. <i>Privacy-Preserving Collection and Evaluation of Log Files</i>. 2023.","bibtex":"@book{Koch_2023, title={Privacy-Preserving Collection and Evaluation of Log Files}, author={Koch, Angelina}, year={2023} }","apa":"Koch, A. (2023). <i>Privacy-Preserving Collection and Evaluation of Log Files</i>."},"year":"2023","author":[{"first_name":"Angelina","full_name":"Koch, Angelina","last_name":"Koch"}],"date_created":"2023-04-03T14:09:14Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_updated":"2023-05-30T11:43:18Z","oa":"1","title":"Privacy-Preserving Collection and Evaluation of Log Files","type":"bachelorsthesis","status":"public","file":[{"file_size":2275949,"access_level":"open_access","file_name":"thesis_koch.pdf","file_id":"45303","date_updated":"2023-05-30T11:43:18Z","date_created":"2023-05-26T07:07:39Z","creator":"feidens","relation":"main_file","content_type":"application/pdf"}],"department":[{"_id":"64"}],"user_id":"25078","_id":"43375","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"file_date_updated":"2023-05-30T11:43:18Z","language":[{"iso":"eng"}],"ddc":["000"]},{"type":"bachelorsthesis","status":"public","user_id":"25078","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"32399","language":[{"iso":"eng"}],"citation":{"ieee":"E. Vahle, <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","chicago":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>, 2022.","ama":"Vahle E. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.; 2022.","apa":"Vahle, E. (2022). <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>.","short":"E. Vahle, Modelling and Proving Security for a Secure MPC Protocol for Stable Matching, 2022.","mla":"Vahle, Ella. <i>Modelling and Proving Security for a Secure MPC Protocol for Stable Matching</i>. 2022.","bibtex":"@book{Vahle_2022, title={Modelling and Proving Security for a Secure MPC Protocol for Stable Matching}, author={Vahle, Ella}, year={2022} }"},"year":"2022","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"date_created":"2022-07-20T09:38:39Z","author":[{"first_name":"Ella","full_name":"Vahle, Ella","last_name":"Vahle"}],"date_updated":"2022-07-26T14:31:54Z","title":"Modelling and Proving Security for a Secure MPC Protocol for Stable Matching"},{"title":"Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"first_name":"Hanna","full_name":"Siek, Hanna","last_name":"Siek"}],"date_created":"2022-07-20T09:36:39Z","date_updated":"2022-11-18T09:38:04Z","citation":{"ieee":"H. Siek, <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","chicago":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>, 2022.","ama":"Siek H. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.; 2022.","apa":"Siek, H. (2022). <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>.","mla":"Siek, Hanna. <i>Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes</i>. 2022.","bibtex":"@book{Siek_2022, title={Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes}, author={Siek, Hanna}, year={2022} }","short":"H. Siek, Bringing Structure to Structure-Preserving Signatures: Overview, Implementation and Comparison of Selected SPS Schemes, 2022."},"year":"2022","language":[{"iso":"eng"}],"user_id":"477","department":[{"_id":"64"},{"_id":"7"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"},{"_id":"82","name":"SFB 901 - T: SFB 901 - Project Area T"}],"_id":"32398","status":"public","type":"bachelorsthesis"},{"language":[{"iso":"eng"}],"project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"34962","user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"status":"public","type":"bachelorsthesis","title":"Evaluating database systems relying on secure multiparty computation","date_updated":"2023-01-10T10:31:35Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"date_created":"2022-12-24T00:14:34Z","author":[{"first_name":"A","last_name":"Anonymous","full_name":"Anonymous, A"}],"year":"2022","citation":{"apa":"Anonymous, A. (2022). <i>Evaluating database systems relying on secure multiparty computation</i>.","mla":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>. 2022.","short":"A. Anonymous, Evaluating Database Systems Relying on Secure Multiparty Computation, 2022.","bibtex":"@book{Anonymous_2022, title={Evaluating database systems relying on secure multiparty computation}, author={Anonymous, A}, year={2022} }","ieee":"A. Anonymous, <i>Evaluating database systems relying on secure multiparty computation</i>. 2022.","chicago":"Anonymous, A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>, 2022.","ama":"Anonymous A. <i>Evaluating Database Systems Relying on Secure Multiparty Computation</i>.; 2022."}},{"citation":{"ama":"Anonymous A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>.; 2022.","chicago":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>, 2022.","ieee":"A. Anonymous, <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>. 2022.","short":"A. Anonymous, Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference, 2022.","bibtex":"@book{Anonymous_2022, title={Cost of Privacy-preserving SMPC Protocols for NN-Based Inference}, author={Anonymous, A}, year={2022} }","mla":"Anonymous, A. <i>Cost of Privacy-Preserving SMPC Protocols for NN-Based Inference</i>. 2022.","apa":"Anonymous, A. (2022). <i>Cost of Privacy-preserving SMPC Protocols for NN-Based Inference</i>."},"year":"2022","title":"Cost of Privacy-preserving SMPC Protocols for NN-Based Inference","date_created":"2022-12-24T00:16:39Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"full_name":"Anonymous, A","last_name":"Anonymous","first_name":"A"}],"date_updated":"2023-01-10T10:31:49Z","status":"public","type":"mastersthesis","language":[{"iso":"eng"}],"user_id":"41047","department":[{"_id":"34"},{"_id":"64"}],"project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"_id":"34963"},{"year":"2022","citation":{"mla":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>.","short":"F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022.","bibtex":"@book{Eidens_2022, title={Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>}, author={Eidens, Fabian}, year={2022} }","apa":"Eidens, F. (2022). <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>","ieee":"F. Eidens, <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>. 2022.","chicago":"Eidens, Fabian. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>, 2022. <a href=\"https://doi.org/10.17619/UNIPB/1-1653\">https://doi.org/10.17619/UNIPB/1-1653</a>.","ama":"Eidens F. <i>Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials</i>.; 2022. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-1653\">10.17619/UNIPB/1-1653</a>"},"date_updated":"2023-02-08T21:07:41Z","supervisor":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"}],"author":[{"full_name":"Eidens, Fabian","id":"25078","last_name":"Eidens","first_name":"Fabian"}],"date_created":"2023-01-04T09:01:48Z","title":"Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials","doi":"10.17619/UNIPB/1-1653","type":"dissertation","status":"public","project":[{"name":"SFB 901: SFB 901","_id":"1"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"}],"_id":"35188","user_id":"25078","department":[{"_id":"64"}],"language":[{"iso":"eng"}]},{"language":[{"iso":"eng"}],"_id":"45255","user_id":"47434","department":[{"_id":"64"}],"status":"public","type":"mastersthesis","title":" Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development","date_updated":"2023-05-24T09:58:33Z","supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2023-05-24T09:58:30Z","author":[{"first_name":"Anonymous","full_name":"Anonymous, Anonymous","last_name":"Anonymous"}],"year":"2022","citation":{"ieee":"A. Anonymous, <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","chicago":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>, 2022.","ama":"Anonymous A. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>.; 2022.","apa":"Anonymous, A. (2022). <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>.","short":"A. Anonymous,  Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development, 2022.","mla":"Anonymous, Anonymous. <i> Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development</i>. 2022.","bibtex":"@book{Anonymous_2022, title={ Comparison of Open Source Software in Quantum Computing from the Perspective of Software Development}, author={Anonymous, Anonymous}, year={2022} }"}},{"citation":{"ama":"Anonymous A. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>.; 2022.","chicago":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>, 2022.","ieee":"A. Anonymous, <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","mla":"Anonymous, Anonymous. <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>. 2022.","short":"A. Anonymous, A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries, 2022.","bibtex":"@book{Anonymous_2022, title={A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries}, author={Anonymous, Anonymous}, year={2022} }","apa":"Anonymous, A. (2022). <i>A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries</i>."},"year":"2022","author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"supervisor":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"}],"date_created":"2023-05-24T09:59:34Z","date_updated":"2023-05-24T09:59:37Z","title":"A Detailed Survey and Comparison of the Selected Homomorphic Encryption Libraries","type":"mastersthesis","status":"public","user_id":"47434","department":[{"_id":"64"}],"_id":"45256","language":[{"iso":"eng"}]},{"_id":"32401","user_id":"47434","department":[{"_id":"64"}],"language":[{"iso":"eng"}],"type":"bachelorsthesis","status":"public","date_updated":"2023-01-10T10:49:33Z","date_created":"2022-07-20T11:40:28Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"author":[{"full_name":"Siemer, Jan Niklas","last_name":"Siemer","first_name":"Jan Niklas"}],"title":"Lattice reductions and their applications to cryptographic systems","year":"2021","citation":{"mla":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>. 2021.","short":"J.N. Siemer, Lattice Reductions and Their Applications to Cryptographic Systems, 2021.","bibtex":"@book{Siemer_2021, title={Lattice reductions and their applications to cryptographic systems}, author={Siemer, Jan Niklas}, year={2021} }","apa":"Siemer, J. N. (2021). <i>Lattice reductions and their applications to cryptographic systems</i>.","chicago":"Siemer, Jan Niklas. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>, 2021.","ieee":"J. N. Siemer, <i>Lattice reductions and their applications to cryptographic systems</i>. 2021.","ama":"Siemer JN. <i>Lattice Reductions and Their Applications to Cryptographic Systems</i>.; 2021."}},{"type":"mastersthesis","status":"public","_id":"32400","user_id":"47434","department":[{"_id":"64"}],"language":[{"iso":"eng"}],"year":"2021","citation":{"ama":"Anonymous A. <i>Performance Analysis of FHE Libraries</i>.; 2021.","ieee":"A. Anonymous, <i>Performance Analysis of FHE Libraries</i>. 2021.","chicago":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>, 2021.","apa":"Anonymous, A. (2021). <i>Performance Analysis of FHE Libraries</i>.","bibtex":"@book{Anonymous_2021, title={Performance Analysis of FHE Libraries}, author={Anonymous, Anonymous}, year={2021} }","short":"A. Anonymous, Performance Analysis of FHE Libraries, 2021.","mla":"Anonymous, Anonymous. <i>Performance Analysis of FHE Libraries</i>. 2021."},"date_updated":"2023-01-10T11:54:39Z","date_created":"2022-07-20T11:37:41Z","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"title":"Performance Analysis of FHE Libraries"},{"title":"Device-Independent Security Proofs Via Entropy Accumulation","supervisor":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"}],"date_created":"2023-05-24T09:57:18Z","author":[{"full_name":"Anonymous, Anonymous","last_name":"Anonymous","first_name":"Anonymous"}],"date_updated":"2023-05-24T09:57:21Z","citation":{"ieee":"A. Anonymous, <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","chicago":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>, 2021.","ama":"Anonymous A. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>.; 2021.","bibtex":"@book{Anonymous_2021, title={Device-Independent Security Proofs Via Entropy Accumulation}, author={Anonymous, Anonymous}, year={2021} }","mla":"Anonymous, Anonymous. <i>Device-Independent Security Proofs Via Entropy Accumulation</i>. 2021.","short":"A. Anonymous, Device-Independent Security Proofs Via Entropy Accumulation, 2021.","apa":"Anonymous, A. (2021). <i>Device-Independent Security Proofs Via Entropy Accumulation</i>."},"year":"2021","language":[{"iso":"eng"}],"user_id":"47434","department":[{"_id":"64"}],"_id":"45254","status":"public","type":"mastersthesis"},{"type":"bachelorsthesis","status":"public","department":[{"_id":"64"},{"_id":"7"}],"user_id":"41047","_id":"21121","language":[{"iso":"eng"}],"citation":{"short":"A. Anonymous, Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems, 2020.","mla":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020.","bibtex":"@book{Anonymous_2020, title={Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems}, author={Anonymous, Anonymous}, year={2020} }","apa":"Anonymous, A. (2020). <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.","ama":"Anonymous A. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>.; 2020.","chicago":"Anonymous, Anonymous. <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>, 2020.","ieee":"A. Anonymous, <i>Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems</i>. 2020."},"year":"2020","author":[{"last_name":"Anonymous","full_name":"Anonymous, Anonymous","first_name":"Anonymous"}],"supervisor":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"}],"date_created":"2021-02-02T10:50:08Z","date_updated":"2022-01-06T06:54:46Z","title":"Benchmarking the Efficiency of Secure Multiparty Computation for Real World Problems"},{"language":[{"iso":"eng"}],"title":"Distributed Key Generation for Attribute-Based Signatures","department":[{"_id":"64"}],"date_created":"2020-08-20T11:23:11Z","supervisor":[{"last_name":"Blömer","id":"23","full_name":"Blömer, Johannes","first_name":"Johannes"}],"author":[{"first_name":"Jonas","last_name":"Heimann","full_name":"Heimann, Jonas"}],"user_id":"13703","_id":"18085","date_updated":"2022-01-06T06:53:26Z","status":"public","citation":{"apa":"Heimann, J. (2020). <i>Distributed Key Generation for Attribute-Based Signatures</i>.","mla":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","short":"J. Heimann, Distributed Key Generation for Attribute-Based Signatures, 2020.","bibtex":"@book{Heimann_2020, title={Distributed Key Generation for Attribute-Based Signatures}, author={Heimann, Jonas}, year={2020} }","chicago":"Heimann, Jonas. <i>Distributed Key Generation for Attribute-Based Signatures</i>, 2020.","ieee":"J. Heimann, <i>Distributed Key Generation for Attribute-Based Signatures</i>. 2020.","ama":"Heimann J. <i>Distributed Key Generation for Attribute-Based Signatures</i>.; 2020."},"year":"2020","type":"bachelorsthesis"}]
