TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | F | G | K | M | P | S | W
Number of items at this level (without sub-levels): 28.

A

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), pp. 805-858. Springer, DOI: 10.1007/s00145-016-9236-6,
[Article]

Akishita, Toru ; Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: LNCS, 2851, In: ISC 2003 - Information Security, 6th International Conference, pp. 218-233,
Springer, Bristol, UK, ISBN 3-540-20176-9,
[Conference or Workshop Item]

Akishita, Toru ; Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

B

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pp. 187-198,
ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno (2013):
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science, In: Advances in Cryptology - ASIACRYPT 2013, pp. 154-173,
Springer, [Conference or Workshop Item]

Brzuska, Christina ; Dagdelen, Özgür ; Fischlin, Marc (2012):
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012, P-195, In: Sicherheit 2012, pp. 71-82,
Gesellschaft für Informatik, [Conference or Workshop Item]

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis (2012):
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science, In: Financial Cryptography, pp. 344-358,
Springer-Verlag, [Conference or Workshop Item]

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark (2011):
Random Oracles in a Quantum World.
In: 17th International Conference on Theory and Application of Cryptology and Information Security,
[Conference or Workshop Item]

C

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), pp. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Conference or Workshop Item]

D

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Conference or Workshop Item]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
pp. 893-908, USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina (2013):
A Cryptographic Analysis of OPACITY.
In: Cryptology ePrint Archive, 2013 (234), pp. 1-46. International Association for Cryptologic Research (IACR), [Article]

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid (2012):
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
In: Conference on Digital Automation and Test Europe (DATE),
[Conference or Workshop Item]

F

Franz, Martin (2011):
Secure Computations on Non-Integer Values.
TU Darmstadt,
[Ph.D. Thesis]

G

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn (2016):
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 357-371,
IEEE, Saarbrucken, DOI: 10.1109/EuroSP.2016.35,
[Conference or Workshop Item]

Gagliotti Vigil, Martín Augusto (2015):
Trustworthy and Efficient Protection Schemes for Digital Archiving.
Darmstadt, TU Darmstadt,
[Ph.D. Thesis]

K

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
20. Network and Distributed System Security Symposium (NDSS'13), San Diego, CA, 24-27 February, 2013, [Conference or Workshop Item]

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, pp. 176-191,
Springer, [Conference or Workshop Item]

M

Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), pp. 82-86,
IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20,
[Conference or Workshop Item]

P

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, pp. 797-812,
USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

S

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), pp. 73:1-73:6,
ACM, DOI: 10.1145/2897937.2898027,
[Conference or Workshop Item]

Schneider, Matthias ; Schneider, Thomas (2014):
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pp. 432-440,
ACM, Salzburg, Austria, June 11 - 13, 2014, DOI: 10.1145/2600918.2600927,
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan (2012):
Converse PUF-Based Authentication.
In: International Conference on Trust & Trustworthy Computing (TRUST),
Springer, [Conference or Workshop Item]

W

Wachsmann, Christian (2014):
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
Darmstadt, Technische Universität Darmstadt,
[Ph.D. Thesis]

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. (2013):
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
In: Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop),
[Conference or Workshop Item]

Wiesmaier, Alexander ; Ludwig, Christoph ; Rauchschwalbe, Ulrich ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes (2006):
Intrinsically Legal-For-Trade Objects by Digital Signatures.
In: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V., pp. 218--221,
Darmstadt, ISBN 3-88579-171-4,
[Conference or Workshop Item]

This list was generated on Sun Oct 24 01:06:57 2021 CEST.