TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 25.

Pinkas, Benny and Schneider, Thomas and Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Article] , (2018)

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Article] , (2017)

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Article] , (2017)

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or Workshop Item] , (2017)

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[Ph.D. Thesis], (2016)

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Conference or Workshop Item] , (2015)

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or Workshop Item] , (2015)

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or Workshop Item] , (2015)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Conference or Workshop Item] , (2015)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or Workshop Item] , (2014)

Pinkas, Benny and Schneider, Thomas and Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or Workshop Item] , (2014)

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or Workshop Item] , (2014)

Demmler, Daniel and Schneider, Thomas and Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2013)

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Conference or Workshop Item] , (2013)

Schneider, Thomas and Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13) Springer
[Conference or Workshop Item] , (2013)

Huss, Sorin A. and Stöttinger, Marc and Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[Conference or Workshop Item] , (2013)

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Article] , (2013)

Schneider, Thomas and Zohner, Michael :
Efficient Secure Two-Party Computation.
17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or Workshop Item] , (2012)

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Conference or Workshop Item] , (2012)

Zohner, Michael and Stoettinger, Marc and Huss, Sorin A. and Stein, Oliver :
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'12). San Francisco, CA, USA
[Conference or Workshop Item] , (2012)

Zohner, Michael and Kasper, Michael and Stoettinger, Marc :
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Conference or Workshop Item] , (2012)

Heuser, Annelie and Zohner, Michael :
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Conference or Workshop Item] , (2012)

Zohner, Michael and Kasper, Michael and Stöttinger, Marc and Huss, Sorin A. :
Side channel analysis of the SHA-3 finalists.
In: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE'12).
[Conference or Workshop Item] , (2012)

Zohner, Michael :
Side-Channel Analysis of SHA-3 Candidates.
TU Darmstadt
[Master Thesis] , (2011)

Zohner, Michael :
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda
[Bachelor Thesis] , (2008)

This list was generated on Tue Apr 23 02:07:40 2019 CEST.