TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Kryptographische Protokolle"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | F | G | K | M | P | S | W
Anzahl der Einträge auf dieser Ebene: 28.

A

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Akishita, Toru ; Takagi, Tsuyoshi :
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: LNCS , 2851 . Springer
[Konferenz- oder Workshop-Beitrag], (2003)

Akishita, Toru ; Takagi, Tsuyoshi :
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.

[Report], (2003)

B

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster privacy-preserving distance computation and biometric identification.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Baecher, Paul ; Brzuska, Christina ; Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Brzuska, Christina ; Dagdelen, Özgür ; Fischlin, Marc :
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012 , P-195 . Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2012)

Bender, Jens ; Dagdelen, Özgür ; Fischlin, Marc ; Kügler, Dennis :
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science . Springer-Verlag
[Konferenz- oder Workshop-Beitrag], (2012)

Boneh, Dan ; Dagdelen, Özgür ; Fischlin, Marc ; Lehmann, Anja ; Schaffner, Christian ; Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Konferenz- oder Workshop-Beitrag], (2011)

C

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper).
ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

D

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical multi-server PIR.
6th ACM Cloud Computing Security Workshop (ACM CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

Dagdelen, Ö. ; Fischlin, M. ; Gagliardoni, Tommaso ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive
[Artikel], (2013)

Das, Amitabh ; Kocabaş, Ünal ; Sadeghi, Ahmad-Reza ; Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Konferenz- oder Workshop-Beitrag], (2012)

F

Franz, Martin :
Secure Computations on Non-Integer Values.
[Online-Edition: urn:nbn:de:tuda-tuprints-28112]
TU Darmstadt
[Dissertation], (2011)

G

Gutmann, Andreas ; Renaud, Karen ; Maguire, Joseph ; Mayer, Peter ; Volkamer, Melanie ; Matsuura, Kanta ; Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[Konferenz- oder Workshop-Beitrag], (2016)

Gagliotti Vigil, Martín Augusto :
Trustworthy and Efficient Protection Schemes for Digital Archiving.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4669]
TU Darmstadt , Darmstadt
[Dissertation], (2015)

K

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Short Talk: Automatic Protocol Selection in Secure Two-Party Computations.
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Anderes], (2013)

Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Preneel, Bart ; Takagi, Tsuyoshi (eds.) :

Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS (6917). Springer
[Konferenz- oder Workshop-Beitrag], (2011)

M

Molter, Gregor ; Ogata, Kei ; Tews, Erik ; Weinmann, Ralf-Philipp :
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009) IEEE Computer Society
[Konferenz- oder Workshop-Beitrag], (2009)

P

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster private set intersection based on OT extension.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

S

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Schneider, Matthias ; Schneider, Thomas :
Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Sadeghi, Ahmad-Reza ; Kocabaş, Ünal ; Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Konferenz- oder Workshop-Beitrag], (2012)

W

Wachsmann, Christian :
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851]
Technische Universität Darmstadt , Darmstadt
[Dissertation], (2013)

Werner, M. ; Kaiser, J. ; Hollick, Matthias ; Weingärtner, E. ; Wehrle, K. :
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop)
[Konferenz- oder Workshop-Beitrag], (2013)

Wiesmaier, Alexander ; Ludwig, Christoph ; Rauchschwalbe, Ulrich ; Henhapl, Birgit ; Ruppert, Markus ; Buchmann, Johannes :
Intrinsically Legal-For-Trade Objects by Digital Signatures.
Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V.
[Konferenz- oder Workshop-Beitrag], (2006)

Diese Liste wurde am Sun Aug 12 02:05:12 2018 CEST generiert.