TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 18.

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: PoPETs - Proceedings on Privacy Enhancing Technologies
[Artikel], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17). The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the communication barrier in secure computation using lookup tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) The Internet society
[Konferenz- oder Workshop-Beitrag], (2017)

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[Dissertation], (2016)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable private set intersection based on ot extension.
In: Transactions on Privacy and Security (TOPS)
[Artikel], (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology
[Artikel], (2016)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private set intersection using permutation-based hashing.
24th USENIX Security Symposium (USENIX Security'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34th Advances in Cryptology - EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More efficient oblivious transfer extensions with security for malicious adversaries.
34th Advances in Cryptology - EUROCRYPT 2015
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Network and Distributed System Security Symposium (NDSS'15)
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster private set intersection based on OT extension.
23rd USENIX Security Symposium (USENIX Security'14)
[Konferenz- oder Workshop-Beitrag], (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster privacy-preserving distance computation and biometric identification.
2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
[Online-Edition: http://dx.doi.org/10.1007/978-3-642-39884-1_23]
In: 17th International Conference on Financial Cryptography and Data Security (FC'13). In: LNCS , 7859 .
[Konferenz- oder Workshop-Beitrag], (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Artikel], (2013)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
[Online-Edition: http://dl.acm.org/citation.cfm?id=2516738]
20th ACM Conference on Computer and Communications Security (CCS'13) ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Schneider, Thomas ; Zohner, Michael :
Efficient secure two-party computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Mannheim.
[Konferenz- oder Workshop-Beitrag], (2012)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Diese Liste wurde am Tue May 22 02:30:26 2018 CEST generiert.