TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 89.

Schneider, Thomas and Tkachenko, Oleksandr :
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
In: 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19). ACM
[Conference or Workshop Item] , (2019)

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Article] , (2019)

Järvinen, Kimmo and Leppäkoski, Helena and Lohan, Elena Simona and Richter, Philipp and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng :
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
[Online-Edition: https://www.ieee-security.org/TC/EuroSP2019/]
4. IEEE European Symposium on Security and Privacy (EuroS&P'19)
[Conference or Workshop Item] , (2019)

Pinkas, Benny and Schneider, Thomas and Tkachenko, Oleksandr and Yanai, Avishay :
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019 Springer
[Conference or Workshop Item] , (2019)

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Conference or Workshop Item] , (2018)

Schneider, Thomas and Tkachenko, Oleksandr :
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Conference or Workshop Item] , (2018)

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng :
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18) Springer
[Conference or Workshop Item] , (2018)

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Conference or Workshop Item] , (2018)

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Other] , (2018)

Richter, Philipp and Yang, Zheng and Tkachenko, Oleksandr and Leppäkoski, Helena and Järvinen, Kimmo and Schneider, Thomas :
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18) IEEE
[Conference or Workshop Item] , (2018)

Riazi, M. Sadegh and Weinert, Christian and Tkachenko, Oleksandr and Songhori, Ebrahim M. and Schneider, Thomas and Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Conference or Workshop Item] , (2018)

Tkachenko, Oleksandr and Weinert, Christian and Schneider, Thomas and Hamacher, Kay :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Conference or Workshop Item] , (2018)

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018 Springer
[Conference or Workshop Item] , (2018)

Pinkas, Benny and Schneider, Thomas and Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Article] , (2018)

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[Conference or Workshop Item] , (2017)

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Conference or Workshop Item] , (2017)

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[Conference or Workshop Item] , (2017)

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Article] , (2017)

Demmler, Daniel and Holz, Marco and Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[Conference or Workshop Item] , (2017)

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Article] , (2017)

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Article] , (2017)

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto :
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or Workshop Item] , (2017)

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or Workshop Item] , (2017)

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1) pp. 62-78.
[Article] , (2017)

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16) ACM
[Conference or Workshop Item] , (2016)

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16) ACM
[Conference or Workshop Item] , (2016)

Kiss, Ágnes and Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[Conference or Workshop Item] , (2016)

Demmler, Daniel and Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15) ACM
[Conference or Workshop Item] , (2015)

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Conference or Workshop Item] , (2015)

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria :
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15) Springer
[Conference or Workshop Item] , (2015)

Songhori, Ebrahim and Hussain, Siam and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15) IEEE
[Conference or Workshop Item] , (2015)

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or Workshop Item] , (2015)

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or Workshop Item] , (2015)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Conference or Workshop Item] , (2015)

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[Conference or Workshop Item] , (2014)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or Workshop Item] , (2014)

Pinkas, Benny and Schneider, Thomas and Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or Workshop Item] , (2014)

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel :
Automatic protocol selection in secure two-party computations.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33]
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14).
[Conference or Workshop Item] , (2014)

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or Workshop Item] , (2014)

Schneider, Matthias and Schneider, Thomas :
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or Workshop Item] , (2014)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2013)

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Conference or Workshop Item] , (2013)

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Conference or Workshop Item] , (2013)

Henecka, Wilko and Schneider, Thomas :
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13) ACM
[Conference or Workshop Item] , (2013)

Schneider, Thomas and Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13) Springer
[Conference or Workshop Item] , (2013)

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel :
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Other] , (2013)

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464]
In: Journal of Computer Security (JCS), 21 (2) pp. 283-315.
[Article] , (2013)

Schneider, Thomas and Zohner, Michael :
Efficient Secure Two-Party Computation.
17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2012)

Schneider, Thomas:
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer-Verlag Berlin Heidelberg , p. 162. ISBN 978-3-642-30041-7
[Book] , (2012)

Ahmad, Junaid Jameel and Li, Shujun and Sadeghi, Ahmad-Reza and Schneider, Thomas :
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12) Springer
[Conference or Workshop Item] , (2012)

Pullonen, Pille and Bogdanov, Dan and Schneider, Thomas :
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...]

[Report] , (2012)

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11) ACM
[Conference or Workshop Item] , (2011)

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11) Springer
[Conference or Workshop Item] , (2011)

Barni, Mauro and Failla, Pierluigi and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2) pp. 452-468.
[Article] , (2011)

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
Workshop on Cryptography and Security in Clouds (WCSC'11)
[Conference or Workshop Item] , (2011)

Schneider, Thomas :
Engineering Secure Two-Party Computation Protocols — Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S11Thesis.pdf]
Ruhr-University Bochum, Germany
[Ph.D. Thesis]

Fischlin, Marc and Pinkas, Benny and Sadeghi, Ahmad-Reza and Schneider, Thomas and Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11) Springer
[Conference or Workshop Item] , (2011)

Schneider, Thomas :
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
[Online-Edition: http://buchshop.secumedia.de/buchshop/index.php?page=detail&...]
12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen SecuMedia-Verlag
[Conference or Workshop Item] , (2011)

Henecka, Wilko and Kögl, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
17. ACM Conference on Computer and Communications Security (CCS'10) ACM
[Conference or Workshop Item] , (2010)

Sadeghi, Ahmad-Reza and Schneider, Thomas :
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
[Online-Edition: http://www.gi-ev.de/service/publikationen/lni/gi-edition-pro...]
In: LNI , P-174 . Bonner Köllen Verlag
[Conference or Workshop Item] , (2010)

Almeida, José Bacelar and Bangerter, Endre and Barbosa, Manuel and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15. European Symposium on Research in Computer Security (ESORICS'10) Springer
[Conference or Workshop Item] , (2010)

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10) Springer
[Conference or Workshop Item] , (2010)

Bangerter, Endre and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
YACZK: Yet Another Compiler for Zero-Knowledge.
In: 19. USENIX Security Symposium (USENIX Security'10) Poster Session
[Other] , (2010)

Sadeghi, Ahmad-Reza and Schneider, Thomas and Winandy, Marcel :
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud Springer
[Conference or Workshop Item] , (2010)

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10) Springer
[Conference or Workshop Item] , (2010)

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer-Verlag Berlin Heidelberg , pp. 367-386.
[Book Section] , (2010)

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Paus, Annika and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Efficient Privacy-Preserving Classification of ECG Signals.
1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09) IEEE
[Conference or Workshop Item] , (2009)

Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo :
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09) Springer
[Conference or Workshop Item] , (2009)

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09) Springer
[Conference or Workshop Item] , (2009)

Pinkas, Benny and Schneider, Thomas and Smart, Nigel P. and Williams, Stephen C. :
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009 Springer
[Conference or Workshop Item] , (2009)

Sadeghi, Ahmad-Reza and Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
In: Section Days of Ruhr-University Bochum Research School
[Other] , (2009)

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
[Conference or Workshop Item] , (2009)

Bangerter, Endre and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Tsay, Joe-Kai :
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
[Conference or Workshop Item] , (2009)

Bangerter, Endre and Briner, Thomas and Henecka, Wilko and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09) Springer
[Conference or Workshop Item] , (2009)

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
[Conference or Workshop Item] , (2009)

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas :
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
[Conference or Workshop Item] , (2009)

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
14. European Symposium on Research in Computer Security (ESORICS'09) Springer
[Conference or Workshop Item] , (2009)

Paus, Annika and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09) Springer
[Conference or Workshop Item] , (2009)

Bangerter, Endre and Camenisch, Jan and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas :
Automatic Generation of Sound Zero-Knowledge Protocols.
In: 28. Advances in Cryptology -- EUROCRYPT 2009 Poster Session
[Other] , (2009)

Bangerter, Endre and Barzan, Stefania and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Tsay, Joe-Kai :
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09) Springer
[Conference or Workshop Item] , (2009)

Sadeghi, Ahmad-Reza and Schneider, Thomas :
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
11. International Conference on Information Security and Cryptology (ICISC'08) Springer
[Conference or Workshop Item] , (2008)

Kolesnikov, Vladimir and Schneider, Thomas :
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
[Online-Edition: http://www.freepatentsonline.com/y2009/0175443.html]

[Standards, patents] , (2008)

Kolesnikov, Vladimir and Schneider, Thomas :
Improved Garbled Circuit: Free XOR Gates and Applications.
35. International Colloquium on Automata, Languages and Programming (ICALP'08) Springer
[Conference or Workshop Item] , (2008)

Kolesnikov, Vladimir and Schneider, Thomas :
Universal Circuit for Secure Function Evaluation.
[Online-Edition: http://www.google.com/patents/US20090140767]

[Standards, patents] , (2008)

Kolesnikov, Vladimir and Schneider, Thomas and Strehl, Volker :
Practical Secure Function Evaluation.
8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2008)

Schneider, Thomas :
Practical secure function evaluation.
In: Fachwissenschaftlicher Informatik-Kongress (Informatiktage 2008).
[Conference or Workshop Item] , (2008)

Schneider, Thomas :
Practical Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S08Thesis.pdf]
University Erlangen-Nürnberg, Germany
[Master Thesis] , (2008)

Kolesnikov, Vladimir and Schneider, Thomas :
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
12. International Conference on Financial Cryptography and Data Security (FC'08) Springer
[Conference or Workshop Item] , (2008)

Schneider, Thomas :
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
[Bachelor Thesis] , (2007)

This list was generated on Tue Apr 23 00:39:19 2019 CEST.