TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 10.

Pinkas, Benny and Schneider, Thomas and Tkachenko, Oleksandr and Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019, Springer, [Online-Edition: https://encrypto.de/papers/PSTY19.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, pp. 125-157, DOI: 10.1007/978-3-319-78372-7_5,
[Online-Edition: https://encrypto.de/papers/PSWW18.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), pp. 7:1-7:35, DOI: 10.1145/3154794,
[Online-Edition: https://encrypto.de/papers/PSZ18.pdf],

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), De Gruyter Open, pp. 177-197, DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],

Tamrakar, Sandeep and Liu, Jian and Paverd, Andrew and Ekberg, Jan-Erik and Pinkas, Benny and Asokan, N. (2017):
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, pp. 31-44, DOI: 10.1145/3052973.3053006,
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, pp. 515-530, [Online-Edition: https://encrypto.de/papers/PSSZ15.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, pp. 797-812, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/PSZ14.pdf],
[Conference or Workshop Item]

Fischlin, Marc and Pinkas, Benny and Sadeghi, Ahmad-Reza and Schneider, Thomas and Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), Springer, pp. 1-16, DOI: 10.1007/978-3-642-19074-2_1,
[Online-Edition: https://encrypto.de/papers/FPSSV11.pdf],
[Conference or Workshop Item]

Manulis, Mark and Pinkas, Benny and Poettering, Bertram (2010):
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS, In: 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Springer, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Smart, Nigel P. and Williams, Stephen C. (2009):
Secure Two-Party Computation is Practical.
In: 15. Advances in Cryptology -- ASIACRYPT 2009, Springer, pp. 250-267, DOI: 10.1007/978-3-642-10366-7_15,
[Online-Edition: https://encrypto.de/papers/PSSW09.pdf],
[Conference or Workshop Item]

This list was generated on Sat Oct 24 00:28:30 2020 CEST.