TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 100.

Reith, Robert Nikolai and Schneider, Thomas and Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society, In: WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Online-Edition: https://encrypto.de/papers/RST19.pdf],
[Conference or Workshop Item]

Günther, Daniel and Kiss, Ágnes and Scheidel, Lukas and Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, In: ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Online-Edition: https://encrypto.de/papers/GKSS19.pdf],
[Conference or Workshop Item]

Bayerl, Sebastian P. and Brasser, Ferdinand and Busch, Christoph and Frassetto, Tommaso and Jauernig, Patrick and Kolberg, Jascha and Nautsch, Andreas and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stapf, Emmanuel and Treiber, Amos and Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
In: 2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Conference or Workshop Item]

Felsen, Susanne and Kiss, Ágnes and Schneider, Thomas and Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
In: CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Online-Edition: https://encrypto.de/papers/FKSW19.pdf],
[Conference or Workshop Item]

Rathee, Deevashwer and Schneider, Thomas and Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
In: 18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Online-Edition: https://encrypto.de/papers/RSS19.pdf],
[Conference or Workshop Item]

Kales, Daniel and Rechberger, Christian and Schneider, Thomas and Senker, Matthias and Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, In: 28. USENIX Security Symposium (USENIX Security'19), [Online-Edition: https://encrypto.de/papers/KRSSW19.pdf],
[Conference or Workshop Item]

Nautsch, Andreas and Patino, Jose and Treiber, Amos and Stafylakis, Themos and Mezira, Petr and Todisco, Massimiliano and Schneider, Thomas and Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
In: Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Online-Edition: https://encrypto.de/papers/NPTSMTSE19.pdf],
[Conference or Workshop Item]

Schneider, Thomas and Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, In: 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Online-Edition: https://encrypto.de/papers/ST19ASIACCS.pdf],
[Conference or Workshop Item]

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, 2, [Online-Edition: https://encrypto.de/papers/KNLAS19.pdf],
[Article]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19), SciTePress, [Online-Edition: https://encrypto.de/papers/KSS19.pdf],
[Conference or Workshop Item]

Järvinen, Kimmo and Leppäkoski, Helena and Lohan, Elena Simona and Richter, Philipp and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), [Online-Edition: https://encrypto.de/papers/JLLRSTY19.pdf],
[Conference or Workshop Item]

Nautsch, Andreas and Jiménez, Abelino and Treiber, Amos and Kolberg, Jascha and Jasserand, Catherine and Kindt, Els and Delgado, Héctor and Todisco, Massimiliano and Hmani, Mohamed Amine and Mtibaa, Aymen and Abdelraheem, Mohammed Ahmed and Abad, Alberto and Teixeira, Francisco and Matrouf, Driss and Gomez-Barrero, Marta and Petrovska-Delacrétaz, Dijana and Chollet, Gérard and Evans, Nicholas and Schneider, Thomas and Bonastre, Jean-François and Raj, Bhiksha and Trancoso, Isabel and Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, Elsevier, DOI: 10.1016/j.csl.2019.06.001,
[Online-Edition: https://encrypto.de/papers/NJTKHMAATMGPCESBRTB19.pdf],
[Article]

Pinkas, Benny and Schneider, Thomas and Tkachenko, Oleksandr and Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019, Springer, [Online-Edition: https://encrypto.de/papers/PSTY19.pdf],
[Conference or Workshop Item]

Schneider, Thomas and Treiber, Amos (2019):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, [Online-Edition: https://encrypto.de/papers/ST19TPDS.pdf],
[Article]

Treiber, Amos and Nautsch, Andreas and Kolberg, Jascha and Schneider, Thomas and Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Article]

Büscher, Niklas and Demmler, Daniel and Katzenbeisser, Stefan and Kretzmer, David and Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), ACM, DOI: 10.1145/3243734.3243786,
[Online-Edition: https://encrypto.de/papers/BDKKS18.pdf],
[Conference or Workshop Item]

Schneider, Thomas and Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), ACM, DOI: 10.1145/3267323.3268956,
[Online-Edition: https://encrypto.de/papers/TS18.pdf],
[Conference or Workshop Item]

Järvinen, Kimmo and Kiss, Ágnes and Schneider, Thomas and Tkachenko, Oleksandr and Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Online-Edition: https://encrypto.de/papers/JKSTY18.pdf],
[Conference or Workshop Item]

Brasser, Ferdinand and Frassetto, Tommaso and Riedhammer, Korbinian and Sadeghi, Ahmad-Reza and Schneider, Thomas and Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Online-Edition: https://encrypto.de/papers/BFRSSW18.pdf],
[Conference or Workshop Item]

Kiss, Ágnes and Schick, Oliver and Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session, [Online-Edition: https://encrypto.de/papers/KSS18.pdf],
[Other]

Richter, Philipp and Yang, Zheng and Tkachenko, Oleksandr and Leppäkoski, Helena and Järvinen, Kimmo and Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Online-Edition: https://encrypto.de/papers/RYTLJSL18.pdf],
[Conference or Workshop Item]

Riazi, M. Sadegh and Weinert, Christian and Tkachenko, Oleksandr and Songhori, Ebrahim M. and Schneider, Thomas and Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196522,
[Online-Edition: https://encrypto.de/papers/RWTSSK18.pdf],
[Conference or Workshop Item]

Tkachenko, Oleksandr and Weinert, Christian and Schneider, Thomas and Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), ACM, DOI: 10.1145/3196494.3196541,
[Online-Edition: https://encrypto.de/papers/TWSH18.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Weinert, Christian and Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Online-Edition: https://encrypto.de/papers/PSWW18.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), pp. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Online-Edition: https://encrypto.de/papers/PSZ18.pdf],
[Article]

Günther, Daniel and Kiss, Ágnes and Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Online-Edition: https://encrypto.de/papers/GKS17.pdf],
[Conference or Workshop Item]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), ACM, DOI: 10.1145/3143361.3143362,
[Online-Edition: https://encrypto.de/papers/CDCSS17.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Hamacher, Kay and Schneider, Thomas and Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17), Springer, [Online-Edition: https://encrypto.de/papers/DHSS17.pdf],
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, pp. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Online-Edition: https://encrypto.de/papers/ALSZ17.pdf],
[Article]

Demmler, Daniel and Holz, Marco and Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Online-Edition: https://encrypto.de/papers/DHS17.pdf],
[Conference or Workshop Item]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Online-Edition: https://encrypto.de/papers/ADSSSSZ17.pdf],
[Article]

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 177-197, 2017, (4), DOI: 10.1515/popets-2017-0044,
[Online-Edition: https://encrypto.de/papers/KLSAP17.pdf],
[Article]

Nielsen, Jesper Buus and Schneider, Thomas and Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23075,
[Online-Edition: https://encrypto.de/papers/NST17.pdf],
[Conference or Workshop Item]

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Online-Edition: https://encrypto.de/papers/DKSSZZ17.pdf],
[Conference or Workshop Item]

Riazi, M. Sadegh and Songhori, Ebrahim M. and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 62-78, 2017, (1), DOI: 10.1515/popets-2017-0005,
[Online-Edition: https://encrypto.de/papers/RSSSK17.pdf],
[Article]

Chiesa, Marco and Demmler, Daniel and Canini, Marco and Schapira, Michael and Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), ACM, DOI: 10.1145/2959424.2959427,
[Online-Edition: https://encrypto.de/papers/CDCSS16.pdf],
[Conference or Workshop Item]

Songhori, Ebrahim and Zeitouni, Shaza and Dessouky, Ghada and Schneider, Thomas and Sadeghi, Ahmad-Reza and Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), ACM, DOI: 10.1145/2897937.2898027,
[Online-Edition: https://encrypto.de/papers/SZDSSK16.pdf],
[Conference or Workshop Item]

Kiss, Ágnes and Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Online-Edition: https://encrypto.de/papers/KS16.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), ACM, DOI: 10.1145/2810103.2813678,
[Online-Edition: https://encrypto.de/papers/DDKSSZ15.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Online-Edition: https://encrypto.de/papers/PSSZ15.pdf],
[Conference or Workshop Item]

Koeberl, Patrick and Phegade, Vinay and Rajan, Anand and Schneider, Thomas and Schulz, Steffen and Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Online-Edition: https://encrypto.de/papers/KPRSSZ15.pdf],
[Conference or Workshop Item]

Songhori, Ebrahim and Hussain, Siam and Sadeghi, Ahmad-Reza and Schneider, Thomas and Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), IEEE, DOI: 10.1109/SP.2015.32,
[Online-Edition: https://encrypto.de/papers/SHSSK15.pdf],
[Conference or Workshop Item]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Online-Edition: https://encrypto.de/papers/ARSTZ15.pdf],
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Online-Edition: https://encrypto.de/papers/ALSZ15.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Online-Edition: https://encrypto.de/papers/DSZ15.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
ACM, In: 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Online-Edition: https://encrypto.de/papers/DHS14.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014 •August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/DSZ14.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: Proceedings of the 23rd USENIX Security Symposium, USENIX, In: 23. USENIX Security Symposium (USENIX Security'14), San Diego, CA, August 20–22, 2014, ISBN 978-1-931971-15-7,
[Online-Edition: https://encrypto.de/papers/PSZ14.pdf],
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2014):
Automatic protocol selection in secure two-party computations.
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14), DOI: 10.1007/978-3-319-07536-5_33,
[Online-Edition: https://encrypto.de/papers/KSS14.pdf],
[Conference or Workshop Item]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, ISBN 978-1-4503-2647-6,
DOI: 10.1145/2600918.2600922,
[Online-Edition: https://encrypto.de/papers/BCFPSZ14.pdf],
[Conference or Workshop Item]

Schneider, Matthias and Schneider, Thomas (2014):
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, Salzburg, Austria, June 11 - 13, 2014, DOI: 10.1145/2600918.2600927,
[Online-Edition: https://encrypto.de/papers/SS14.pdf],
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, Berlin, November 04 - 08, 2013, DOI: 10.1145/2508859.2516738,
[Online-Edition: https://encrypto.de/papers/ALSZ13.pdf],
[Conference or Workshop Item]

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus (2013):
CrowdShare: Secure Mobile Resource Sharing.
Springer, In: 11. International Conference on Applied Cryptography and Network Security (ACNS'13), ISSN 0302-9743,
DOI: 10.1007/978-3-642-38980-1_27,
[Online-Edition: https://encrypto.de/papers/ADNRSSS13.pdf],
[Conference or Workshop Item]

Henecka, Wilko and Schneider, Thomas (2013):
Faster Secure Two-Party Computation with Less Memory.
In: ASIA CCS '13 : Proceedings, New York, ACM, In: 8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), Hangzhou, China, May 08 - 10, 2013, ISBN 978-1-4503-1767-2,
DOI: 10.1145/2484313.2484369,
[Online-Edition: https://encrypto.de/papers/HS13.pdf],
[Conference or Workshop Item]

Schneider, Thomas and Zohner, Michael (2013):
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
In: Financial Cryptography and Data Security, Berlin, Springer, In: 17. International Conference on Financial Cryptography and Data Security (FC'13), Okinawa, Japan, April 1-5,2013, ISBN Print ISBN 978-3-642-39883-4 Online ISBN 978-3-642-39884-1,
DOI: 10.1007/978-3-642-39884-1_23,
[Online-Edition: https://encrypto.de/papers/SZ13.pdf],
[Conference or Workshop Item]

Kerschbaum, Florian and Schneider, Thomas and Schröpfer, Axel (2013):
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13), [Other]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2013):
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), IOS Press, pp. 283-315, 21, (2), DOI: 10.3233/JCS-130464,
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464],
[Article]

Schneider, Thomas and Zohner, Michael (2012):
Efficient Secure Two-Party Computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Online-Edition: https://encrypto.de/papers/SZ12.pdf],
[Conference or Workshop Item]

Schneider, Thomas (2012):
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer-Verlag Berlin Heidelberg, ISBN 978-3-642-30041-7,
DOI: 10.1007/978-3-642-30042-4,
[Book]

Ahmad, Junaid Jameel and Li, Shujun and Sadeghi, Ahmad-Reza and Schneider, Thomas (2012):
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
In: 16. International Conference on Financial Cryptography and Data Security (FC'12), Springer, DOI: 10.1007/978-3-642-32946-3_22,
[Online-Edition: https://encrypto.de/papers/ALSS12.pdf],
[Conference or Workshop Item]

Pullonen, Pille and Bogdanov, Dan and Schneider, Thomas (2012):
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...],
[Report]

Bugiel, Sven and Pöppelmann, Thomas and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
AmazonIA: When Elasticity Snaps Back.
In: 18. ACM Conference on Computer and Communications Security (CCS'11), ACM, DOI: 10.1145/2046707.2046753,
[Online-Edition: https://encrypto.de/papers/BNPSS11.pdf],
[Conference or Workshop Item]

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Twin Clouds: Secure Cloud Computing with Low Latency.
In: 12. Communications and Multimedia Security Conference (CMS'11), Springer, DOI: 10.1007/978-3-642-24712-5_3,
[Online-Edition: https://encrypto.de/papers/BNSS11.pdf],
[Conference or Workshop Item]

Barni, Mauro and Failla, Pierluigi and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), pp. 452-468, 6, (2), DOI: 10.1109/TIFS.2011.2108650,
[Online-Edition: https://encrypto.de/papers/BFLSS11.pdf],
[Article]

Bugiel, Sven and Nürnberger, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2011):
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
In: Workshop on Cryptography and Security in Clouds (WCSC'11), [Conference or Workshop Item]

Schneider, Thomas (2011):
Engineering Secure Two-Party Computation Protocols — Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Bochum, Ruhr-University, [Online-Edition: https://encrypto.de/papers/S11Thesis.pdf],
[Ph.D. Thesis]

Fischlin, Marc and Pinkas, Benny and Sadeghi, Ahmad-Reza and Schneider, Thomas and Visconti, Ivan (2011):
Secure Set Intersection with Untrusted Hardware Tokens.
In: 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), Springer, DOI: 10.1007/978-3-642-19074-2_1,
[Online-Edition: https://encrypto.de/papers/FPSSV11.pdf],
[Conference or Workshop Item]

Schneider, Thomas (2011):
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
In: 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, SecuMedia-Verlag, [Online-Edition: https://encrypto.de/papers/S11.pdf],
[Conference or Workshop Item]

Henecka, Wilko and Kögl, Stefan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo (2010):
TASTY: Tool for Automating Secure Two-partY computations.
In: Proceedings of the 17. ACM Conference on Computer and Communications Security (CCS'10), Chicago, Illinois, ACM, In: CCS'10, October 04-08 2010, ISBN 978-1-4503-0245-6,
DOI: 10.1145/1866307.1866358,
[Online-Edition: https://encrypto.de/papers/HKSSW10.pdf],
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
In: Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), Bonner Köllen Verlag, In: LNI, P-174, [Online-Edition: https://encrypto.de/papers/SS10.pdf],
[Conference or Workshop Item]

Almeida, José Bacelar and Bangerter, Endre and Barbosa, Manuel and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
In: 15. European Symposium on Research in Computer Security (ESORICS'10), Springer, DOI: 10.1007/978-3-642-15497-3_10,
[Online-Edition: https://encrypto.de/papers/ABBKSS10.pdf],
[Conference or Workshop Item]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
In: 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), Springer, DOI: 10.1007/978-3-642-15031-9_26,
[Online-Edition: https://encrypto.de/papers/JKSS10OTP.pdf],
[Conference or Workshop Item]

Bangerter, Endre and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
YACZK: Yet Another Compiler for Zero-Knowledge (Poster Abstract).
In: 19. USENIX Security Symposium (USENIX Security'10) Poster Session, In: 19th USENIX Security Symposium (Security'10) Poster Session, [Online-Edition: https://encrypto.de/papers/BKSS10Abstract.pdf],
[Other]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Winandy, Marcel (2010):
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
In: 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, Springer, DOI: 10.1007/978-3-642-13869-0_30,
[Online-Edition: https://encrypto.de/papers/SSW10.pdf],
[Conference or Workshop Item]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Embedded SFE: Offloading Server and Network using Hardware Tokens.
In: 14. International Conference on Financial Cryptography and Data Security (FC'10), Springer, DOI: 10.1007/978-3-642-14577-3_17,
[Online-Edition: https://encrypto.de/papers/JKSS10TOKEN.pdf],
[Conference or Workshop Item]

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice, Springer-Verlag Berlin Heidelberg, pp. 367-386, DOI: 10.1007/978-3-642-14452-3_17,
[Book Section]

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Paus, Annika and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Efficient Privacy-Preserving Classification of ECG Signals.
In: 1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), London, IEEE, DOI: 10.1109/WIFS.2009.5386475,
[Online-Edition: https://encrypto.de/papers/BFKLPSS09.pdf],
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas and Wehrenberg, Immo (2009):
Efficient Privacy-Preserving Face Recognition.
In: 12. International Conference on Information Security and Cryptology (ICISC'09), Springer, DOI: 10.1007/978-3-642-14423-3_16,
[Online-Edition: https://encrypto.de/papers/SSW09.pdf],
[Conference or Workshop Item]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: 8. International Conference on Cryptology And Network Security (CANS'09), Springer, DOI: 10.1007/978-3-642-10433-6_1,
[Online-Edition: https://encrypto.de/papers/KSS09.pdf],
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Smart, Nigel P. and Williams, Stephen C. (2009):
Secure Two-Party Computation is Practical.
In: 15. Advances in Cryptology -- ASIACRYPT 2009, Springer, DOI: 10.1007/978-3-642-10366-7_15,
[Online-Edition: https://encrypto.de/papers/PSSW09.pdf],
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster).
In: Section Days of Ruhr-University Bochum Research School, [Online-Edition: https://encrypto.de/papers/SS09Poster.pdf],
[Other]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), [Online-Edition: https://encrypto.de/papers/KSS09SPEEDCC.pdf],
[Conference or Workshop Item]

Bangerter, Endre and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Tsay, Joe-Kai (2009):
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), [Online-Edition: https://encrypto.de/papers/BKSST09.pdf],
[Conference or Workshop Item]

Bangerter, Endre and Briner, Thomas and Henecka, Wilko and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), Springer, DOI: 10.1007/978-3-642-16441-5_5,
[Online-Edition: https://encrypto.de/papers/BBHKSS09.pdf],
[Conference or Workshop Item]

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), [Online-Edition: https://encrypto.de/papers/BFKLSS09SPEED.pdf],
[Conference or Workshop Item]

Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), [Online-Edition: https://encrypto.de/papers/KSS09SPEED.pdf],
[Conference or Workshop Item]

Barni, Mauro and Failla, Pierluigi and Kolesnikov, Vladimir and Lazzeretti, Riccardo and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09), Springer, DOI: 10.1007/978-3-642-04444-1_26,
[Online-Edition: https://encrypto.de/papers/BFKLSS09.pdf],
[Conference or Workshop Item]

Paus, Annika and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Practical Secure Evaluation of Semi-Private Functions.
In: 7. International Conference on Applied Cryptography and Network Security (ACNS'09), Springer, DOI: 10.1007/978-3-642-01957-9_6,
[Online-Edition: https://encrypto.de/papers/PSS09.pdf],
[Conference or Workshop Item]

Bangerter, Endre and Camenisch, Jan and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas (2009):
Automatic Generation of Sound Zero-Knowledge Protocols.
In: 28. Advances in Cryptology -- EUROCRYPT 2009 Poster Session, In: 28th Advances in Cryptology -- EUROCRYPT 2009 Poster Session, [Online-Edition: https://encrypto.de/papers/BCKSS09Abstract.pdf],
[Other]

Bangerter, Endre and Barzan, Stefania and Krenn, Stephan and Sadeghi, Ahmad-Reza and Schneider, Thomas and Tsay, Joe-Kai (2009):
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
In: 17. International Workshop on Security Protocols (SPW'09), Springer, DOI: 10.1007/978-3-642-36213-2_9,
[Online-Edition: https://encrypto.de/papers/BBKSST09.pdf],
[Conference or Workshop Item]

Sadeghi, Ahmad-Reza and Schneider, Thomas (2008):
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08), Springer, DOI: 10.1007/978-3-642-00730-9_21,
[Online-Edition: https://encrypto.de/papers/SS08.pdf],
[Conference or Workshop Item]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
[Online-Edition: http://www.freepatentsonline.com/y2009/0175443.html],
[Standards, patents]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
Improved Garbled Circuit: Free XOR Gates and Applications.
In: Automata, Languages and Programming, Berlin, Springer, In: 35. International Colloquium on Automata, Languages and Programming (ICALP'08), In: Lecture Notes in Computer Science, 5126, ISBN Print ISBN 978-3-540-70582-6 Online ISBN 978-3-540-70583-3,
DOI: 10.1007/978-3-540-70583-3_40,
[Online-Edition: https://encrypto.de/papers/KS08XOR.pdf],
[Conference or Workshop Item]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
Universal Circuit for Secure Function Evaluation.
[Online-Edition: http://www.google.com/patents/US20090140767],
[Standards, patents]

Kolesnikov, Vladimir and Schneider, Thomas and Strehl, Volker (2008):
Practical Secure Function Evaluation.
In: 8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), WSI-2008-02, [Online-Edition: https://encrypto.de/papers/KSS08.pdf],
[Conference or Workshop Item]

Schneider, Thomas (2008):
Practical secure function evaluation.
In: Fachwissenschaftlicher Informatik-Kongress (Informatiktage 2008), [Online-Edition: https://encrypto.de/papers/S08Abstract.pdf],
[Conference or Workshop Item]

Schneider, Thomas (2008):
Practical Secure Function Evaluation.
University Erlangen-Nürnberg, Germany, [Online-Edition: https://thomaschneider.de/papers/S08Thesis.pdf],
[Diploma Thesis or Magisterarbeit]

Kolesnikov, Vladimir and Schneider, Thomas (2008):
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
In: 12. International Conference on Financial Cryptography and Data Security (FC'08), Springer, DOI: 10.1007/978-3-540-85230-8_7,
[Online-Edition: https://encrypto.de/papers/KS08UC.pdf],
[Conference or Workshop Item]

Schneider, Thomas (2007):
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany, [Online-Edition: https://encrypto.de/papers/S07Thesis.pdf],
[Bachelor Thesis]

This list was generated on Tue Oct 22 00:18:04 2019 CEST.