TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > EC SPRIDE > Engineering Cryptographic Protocols (am 01.03.18 aufgegangen in ENCRYPTO)"

Ebene hoch
Gruppiere nach: Autor(en) | Datum | Typ des Eintrags | Sprache | Keine Gruppierung
Springe zu: A | B | C | D | F | G | H | J | K | N | P | R | S | T | W | Z
Anzahl der Einträge auf dieser Ebene: 91.

A

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34th Advances in Cryptology - EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More efficient oblivious transfer extensions with security for malicious adversaries.
34th Advances in Cryptology - EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
[Online-Edition: http://dl.acm.org/citation.cfm?id=2516738]
20th ACM Conference on Computer and Communications Security (CCS'13) ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-38980-1_27]
In: LNCS (ISSN 0302-9743) , 7954 .
[Konferenz- oder Workshop-Beitrag], (2013)

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-32946-3_22]
In: 16th International Conference on Financial Cryptography and Data Security (FC'12). In: LNCS , 7397 . Springer
[Konferenz- oder Workshop-Beitrag], (2012)

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-15497-3₁₀]
In: 15th European Symposium on Research in Computer Security (ESORICS'10). In: LNCS , 6345 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

B

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster privacy-preserving distance computation and biometric identification.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: Secure Cloud Computing with Low Latency.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-24712-5₃]
In: 12th Communications and Multimedia Security Conference (CMS'11). In: LNCS , 7025 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
AmazonIA: When Elasticity Snaps Back.
[Online-Edition: http://dx.doi.org/10.1145/2046707.2046753]
In: 18th ACM Conference on Computer and Communications Security (CCS'11). ACM
[Konferenz- oder Workshop-Beitrag], (2011)

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
[Online-Edition: http://dx.doi.org/10.1109/TIFS.2011.2108650]
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2) pp. 452-468.
[Artikel], (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
[Online-Edition: http://www.zurich.ibm.com/~cca/csc2011/submissions/bugiel.pd...]

[Konferenz- oder Workshop-Beitrag], (2011)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
YAZKC: Yet Another Zero-Knowledge Compiler.
[Online-Edition: http://thomaschneider.de/papers/BKSS10.pdf]
In: 19th USENIX Security Symposium (Security'10) Poster Session.
[Konferenz- oder Workshop-Beitrag], (2010)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Efficient Privacy-Preserving Classification of ECG Signals.
[Online-Edition: http://dx.doi.org/10.1109/WIFS.2009.5386475]
In: 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09). IEEE
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
[Online-Edition: http://thomaschneider.de/papers/BKSST09.pdf]
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-04444-1]
In: 14th European Symposium on Research in Computer Security (ESORICS'09). In: LNCS , 5789 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-16441-5₅]
In: 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09). In: LNCS , 6391 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
[Online-Edition: http://thomaschneider.de/papers/BFKLSS09SPEED.pdf]
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sound Zero-Knowledge Protocols.
[Online-Edition: http://thomaschneider.de/papers/BCKSS09.pdf]
In: 28th Advances in Cryptology -- EUROCRYPT 2009 Poster Session.
[Konferenz- oder Workshop-Beitrag], (2009)

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
[Online-Edition: http://thomaschneider.de/papers/BBKSST09.pdf]
In: 17th International Workshop on Security Protocols (SPW'09).
[Konferenz- oder Workshop-Beitrag], (2009)

C

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper).
ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16) ACM
[Konferenz- oder Workshop-Beitrag], (2016)

D

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
CANS'17 - 16. International Conference on Cryptology And Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective protection of sensitive metadata in online communication networks.
ACNS'17 - 15. International Conference on Applied Cryptography and Network Security Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22nd ACM Conference on Computer and Communications Security (CCS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical multi-server PIR.
6th ACM Cloud Computing Security Workshop (ACM CCSW'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik
[Konferenz- oder Workshop-Beitrag], (2013)

F

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-19074-2₁]
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11). In: LNCS , 6558 . Springer
[Konferenz- oder Workshop-Beitrag], (2011)

G

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2017)

Günther, Daniel :
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
TU Darmstadt
[Masterarbeit], (2017)

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
[Online-Edition: http://thomaschneider.de/papers/GKS17.pdf]
In: 23. Advances in Cryptology — ASIACRYPT 2017. In: LNCS , 10625 . SPRINGER
[Konferenz- oder Workshop-Beitrag], (2017)

H

Henecka, Wilko ; Schneider, Thomas :
Faster secure two-party computation with less memory.
[Online-Edition: http://dx.doi.org/10.1145/2484313.2484369]
8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CCS '13)
[Konferenz- oder Workshop-Beitrag], (2013)

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
[Online-Edition: http://dx.doi.org/10.1145/1866307.1866358]
In: 17th ACM Conference on Computer and Communications Security (CCS'10). ACM
[Konferenz- oder Workshop-Beitrag], (2010)

J

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-15031-9₂₆]
In: 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). In: LNCS , 6225 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Embedded SFE: Offloading Server and Network using Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14577-3]
In: 14th International Conference on Financial Cryptography and Data Security (FC'10). In: LNCS , 6052 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas
Sadeghi, Ahmad-Reza ; Naccache, David (eds.) :

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14452-3₁₇]
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer-Verlag Berlin Heidelberg , pp. 367-386.
[Buchkapitel], (2010)

K

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram :
CogniCrypt: Supporting Developers in using Cryptography.
Automated Software Engineering (ASE'17) ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's universal circuit is practical.
In: LNCS , 9665 . Springer
[Konferenz- oder Workshop-Beitrag], (2016)

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke :
On the Optimality of Differential Fault Analyses on CLEFIA.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to rethink: Trust brokerage using trusted execution environments.
8th International Conference on Trust & Trustworthy Computing (TRUST'15) Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic Protocol Selection in Secure Two-Party Computations.
[Online-Edition: http://www.internetsociety.org/sites/default/files/automatic...]
In: 20th Network & Distributed System Security Symposium (NDSS'13).
[Konferenz- oder Workshop-Beitrag], (2013)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Short Talk: Automatic Protocol Selection in Secure Two-Party Computations.

[Anderes], (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464]
In: Journal of Computer Security (JCS), 21 (2) pp. 283-315.
[Artikel], (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Modular Design of Efficient Secure Function Evaluation Protocols.

[Anderes], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.

[Konferenz- oder Workshop-Beitrag], (2010)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-10433-6₁]
In: 8th International Conference on Cryptology And Network Security (CANS'09). In: LNCS , 5888 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
[Online-Edition: http://thomaschneider.de/papers/KSS09SPEEDCC.pdf]
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
[Online-Edition: http://thomaschneider.de/papers/KSS09SPEED.pdf]
In: 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09).
[Konferenz- oder Workshop-Beitrag], (2009)

Kolesnikov, Vladimir ; Schneider, Thomas :
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
[Online-Edition: http://www.freepatentsonline.com/y2009/0175443.html]

[Norm, Patent, Standard], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Universal Circuit for Secure Function Evaluation.
[Online-Edition: http://www.google.com/patents/US20090140767]

[Norm, Patent, Standard], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Improved Garbled Circuit: Free XOR Gates and Applications.
[Online-Edition: http://dx.doi.org/10.1007/978-3-540-70583-3₄₀]
In: 35th International Colloquium on Automata, Languages and Programming (ICALP'08). In: LNCS , 5126 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas ; Strehl, Volker :
Practical Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/KSS08.pdf]
In: 8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag).
[Konferenz- oder Workshop-Beitrag], (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
[Online-Edition: http://dx.doi.org/10.1007/978-3-540-85230-8₇]
In: 12th International Conference on Financial Cryptography and Data Security (FC'08). In: LNCS , 5143 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

N

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant round maliciously secure 2PC with function-independent preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

P

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
EUROCRYPT 2018 Springer
[Konferenz- oder Workshop-Beitrag], (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable private set intersection based on ot extension.
In: Transactions on Privacy and Security (TOPS)
[Artikel], (2017)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private set intersection using permutation-based hashing.
24th USENIX Security Symposium (USENIX Security'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster private set intersection based on OT extension.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas :
The design and implementation of a two-party protocol suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...]

[Report], (2012)

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. :
Secure Two-Party Computation is Practical.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-10366-7₁₅]
In: 15th Advances in Cryptology — ASIACRYPT 2009. In: LNCS , 5912 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Practical Secure Evaluation of Semi-Private Functions.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-01957-9]
In: 7th International Conference on Applied Cryptography and Network Security (ACNS'09). In: LNCS , 5536 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

R

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
[Artikel], (2017)

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre :
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
COSADE 2016 Springer
[Konferenz- oder Workshop-Beitrag], (2016)

S

Schick, Oliver :
Web application for privacy-preserving scheduling.
TU Darmstadt
[Masterarbeit], (2017)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53rd Design Automation Conference (DAC'16)
[Konferenz- oder Workshop-Beitrag], (2016)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36th IEEE Symposium on Security and Privacy (Oakland)
[Konferenz- oder Workshop-Beitrag], (2015)

Schneider, Matthias ; Schneider, Thomas :
Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39884-1_23]
In: 17th International Conference on Financial Cryptography and Data Security (FC'13). In: LNCS , 7859 .
[Konferenz- oder Workshop-Beitrag], (2013)

Schneider, Thomas ; Zohner, Michael :
Efficient secure two-party computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Mannheim.
[Konferenz- oder Workshop-Beitrag], (2012)

Schneider, Thomas:
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer-Verlag Berlin Heidelberg , p. 162. ISBN 978-3-642-30041-7
[Buch], (2012)

Schneider, Thomas :
Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Ruhr-University Bochum
[Dissertation]

Schneider, Thomas :
Engineering Secure Two-Party Computation Protocols — Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S11Thesis.pdf]
Ruhr-University Bochum, Germany
[Dissertation]

Schneider, Thomas :
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
[Online-Edition: http://buchshop.secumedia.de/buchshop/index.php?page=detail&...]
In: 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen. SecuMedia-Verlag
[Konferenz- oder Workshop-Beitrag], (2011)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
[Online-Edition: http://www.gi-ev.de/service/publikationen/lni/gi-edition-pro...]
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). In: LNI , P-174 . Bonner Köllen Verlag
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing — Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-13869-0₃₀]
In: 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. In: LNCS , 6101 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing -- Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: LNCS , 6101 . Springer
[Konferenz- oder Workshop-Beitrag], (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
Efficient Privacy-Preserving Face Recognition.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-14423-3₁₆]
In: 12th International Conference on Information Security and Cryptology (ICISC'09). In: LNCS , 5984 . Springer
[Konferenz- oder Workshop-Beitrag], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.

[Anderes], (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-00730-9₂₁]
In: 11th International Conference on Information Security and Cryptology (ICISC'08). In: LNCS , 5461 . Springer
[Konferenz- oder Workshop-Beitrag], (2008)

Schneider, Thomas :
Practical Secure Function Evaluation.
[Online-Edition: http://www.gi-ev.de/service/publikationen/gi-edition-lecture...]
In: Fachwissenschaftlicher Informatik-Kongress (Informatiktage 2008). In: LNI , S-6 . GI
[Konferenz- oder Workshop-Beitrag], (2008)

Schneider, Thomas :
Practical Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S08Thesis.pdf]
University Erlangen-Nürnberg, Germany
[Masterarbeit], (2008)

Schneider, Thomas :
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.

[Anderes], (2007)

T

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, K. :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
ACM Asia Conference on Computer and Communications Security (ASIACCS'18) ACM
[Konferenz- oder Workshop-Beitrag], (2018)

W

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes :
MoPS: A Modular Protection Scheme for Long-Term Storage.
ASIA CCS 2017 - ACM Asia Conference on Computer and Communications Security ACM
[Konferenz- oder Workshop-Beitrag], (2017)

Z

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[Dissertation], (2016)

Diese Liste wurde am Thu Jun 21 02:25:46 2018 CEST generiert.