TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 9.

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018 Springer
[Konferenz- oder Workshop-Beitrag] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Artikel] , (2018)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Artikel] , (2017)

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. :
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
[Konferenz- oder Workshop-Beitrag] , (2017)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Konferenz- oder Workshop-Beitrag] , (2015)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Konferenz- oder Workshop-Beitrag] , (2014)

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11) Springer
[Konferenz- oder Workshop-Beitrag] , (2011)

Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram :
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS . Springer
[Konferenz- oder Workshop-Beitrag] , (2010)

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. :
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009 Springer
[Konferenz- oder Workshop-Beitrag] , (2009)

Diese Liste wurde am Wed Dec 12 09:28:29 2018 CET generiert.