TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 10.

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019,
Springer, [Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, pp. 125-157,
Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), pp. 7:1-7:35. DOI: 10.1145/3154794,
[Article]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), pp. 177-197. De Gruyter Open, DOI: 10.1515/popets-2017-0044,
[Article]

Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. (2017):
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
In: ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, pp. 31-44,
DOI: 10.1145/3052973.3053006,
[Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), pp. 515-530,
USENIX, [Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, pp. 797-812,
USENIX, 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, ISBN 978-1-931971-15-7,
[Conference or Workshop Item]

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), pp. 1-16,
Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Conference or Workshop Item]

Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram (2010):
Privacy-Preserving Group Discovery with Linear Complexity.
In: LNCS, In: 8th International Conference on Applied Cryptography and Network Security (ACNS 2010),
Springer, [Conference or Workshop Item]

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. (2009):
Secure Two-Party Computation is Practical.
In: 15. Advances in Cryptology -- ASIACRYPT 2009, pp. 250-267,
Springer, DOI: 10.1007/978-3-642-10366-7_15,
[Conference or Workshop Item]

This list was generated on Tue Aug 3 02:29:03 2021 CEST.