TU Darmstadt / ULB / TUbiblio

Items in division

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: A | B | C | D | F | G | K | M | P | S | W
Number of items at this level: 28.

A

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Article] , (2017)

Akishita, Toru and Takagi, Tsuyoshi :
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: LNCS , 2851 . Springer
[Conference or Workshop Item] , (2003)

Akishita, Toru and Takagi, Tsuyoshi :
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.

[Report] , (2003)

B

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or Workshop Item] , (2014)

Baecher, Paul and Brzuska, Christina and Mittelbach, Arno :
Reset Indifferentiability and its Consequences.
In: Lecture Notes in Computer Science . Springer
[Conference or Workshop Item] , (2013)

Brzuska, Christina and Dagdelen, Özgür and Fischlin, Marc :
TLS, PACE, and EAC: A Cryptographic View at Modern Key Exchange Protocols.
In: Sicherheit 2012 , P-195 . Gesellschaft für Informatik
[Conference or Workshop Item] , (2012)

Bender, Jens and Dagdelen, Özgür and Fischlin, Marc and Kügler, Dennis :
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security.
In: Lecture Notes in Computer Science . Springer-Verlag
[Conference or Workshop Item] , (2012)

Boneh, Dan and Dagdelen, Özgür and Fischlin, Marc and Lehmann, Anja and Schaffner, Christian and Zhandry, Mark :
Random Oracles in a Quantum World.
17th International Conference on Theory and Application of Cryptology and Information Security
[Conference or Workshop Item] , (2011)

C

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16) ACM
[Conference or Workshop Item] , (2016)

D

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Conference or Workshop Item] , (2015)

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[Conference or Workshop Item] , (2014)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or Workshop Item] , (2014)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2013)

Dagdelen, Ö. and Fischlin, M. and Gagliardoni, Tommaso and Marson, Giorgia Azzurra and Mittelbach, Arno and Onete, Cristina :
A Cryptographic Analysis of OPACITY.
In: ESORICS 2013.IACR Cryptology ePrint Archive
[Article] , (2013)

Das, Amitabh and Kocabaş, Ünal and Sadeghi, Ahmad-Reza and Verbauwhede, Ingrid :
POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC.
Conference on Digital Automation and Test Europe (DATE)
[Conference or Workshop Item] , (2012)

F

Franz, Martin :
Secure Computations on Non-Integer Values.
[Online-Edition: urn:nbn:de:tuda-tuprints-28112]
TU Darmstadt
[Ph.D. Thesis], (2011)

G

Gutmann, Andreas and Renaud, Karen and Maguire, Joseph and Mayer, Peter and Volkamer, Melanie and Matsuura, Kanta and Müller-Quade, Jörn :
ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology.
2016 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE
[Conference or Workshop Item] , (2016)

Gagliotti Vigil, Martín Augusto :
Trustworthy and Efficient Protection Schemes for Digital Archiving.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/4669]
TU Darmstadt , Darmstadt
[Ph.D. Thesis], (2015)

K

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel :
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Other] , (2013)

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin
Preneel, Bart and Takagi, Tsuyoshi (eds.) :

Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS (6917). Springer
[Conference or Workshop Item] , (2011)

M

Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp :
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009) IEEE Computer Society
[Conference or Workshop Item] , (2009)

P

Pinkas, Benny and Schneider, Thomas and Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or Workshop Item] , (2014)

S

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16) ACM
[Conference or Workshop Item] , (2016)

Schneider, Matthias and Schneider, Thomas :
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or Workshop Item] , (2014)

Sadeghi, Ahmad-Reza and Kocabaş, Ünal and Katzenbeisser, Stefan :
Converse PUF-Based Authentication.
International Conference on Trust & Trustworthy Computing (TRUST) Springer
[Conference or Workshop Item] , (2012)

W

Wachsmann, Christian :
Trusted and Privacy-preserving Embedded Systems: Advances in Design, Analysis and Application of Lightweight Privacy-preserving Authentication and Physical Security Primitives.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3851]
Technische Universität Darmstadt , Darmstadt
[Ph.D. Thesis], (2013)

Werner, M. and Kaiser, J. and Hollick, Matthias and Weingärtner, E. and Wehrle, K. :
A Blueprint for Switching Between Secure Routing Protocols in Wireless Multihop Networks.
Proceedings of the 14th International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM, D-SPAN Workshop)
[Conference or Workshop Item] , (2013)

Wiesmaier, Alexander and Ludwig, Christoph and Rauchschwalbe, Ulrich and Henhapl, Birgit and Ruppert, Markus and Buchmann, Johannes :
Intrinsically Legal-For-Trade Objects by Digital Signatures.
Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagungdes Fachbereichs der Gesellschaft für Informatik e.V.
[Conference or Workshop Item] , (2006)

This list was generated on Sun Apr 21 01:32:45 2019 CEST.