Practical approaches to secure computation
Our proposal focuses on cryptographic primitives and methods which do not yet belong to the standard toolkit of the
security engineer. This proposal concerns to elements from the area of secure computation, which is well understood in
cryptographic literature in a theoretical sense.
Example application areas include digital rights management and biological authentification, treshold cryptography,
profile matching and secure datamining.
Dr.ir. L.A.M. Schoenmakers, TU Eindhoven