TU Darmstadt / ULB / TUbiblio

Browsen nach Person

Ebene hoch
Gruppiere nach: Keine Gruppierung | Typ des Eintrags | Datum | Sprache
Anzahl der Einträge: 25.

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Artikel], (2018)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Artikel], (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Artikel], (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Konferenz- oder Workshop-Beitrag], (2017)

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[Dissertation], (2016)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Konferenz- oder Workshop-Beitrag], (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Konferenz- oder Workshop-Beitrag], (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Konferenz- oder Workshop-Beitrag], (2014)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Konferenz- oder Workshop-Beitrag], (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Konferenz- oder Workshop-Beitrag], (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2013)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Konferenz- oder Workshop-Beitrag], (2013)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13) Springer
[Konferenz- oder Workshop-Beitrag], (2013)

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[Konferenz- oder Workshop-Beitrag], (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Artikel], (2013)

Schneider, Thomas ; Zohner, Michael :
Efficient Secure Two-Party Computation.
17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Konferenz- oder Workshop-Beitrag], (2012)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Konferenz- oder Workshop-Beitrag], (2012)

Zohner, Michael ; Stoettinger, Marc ; Huss, Sorin A. ; Stein, Oliver :
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'12). San Francisco, CA, USA
[Konferenz- oder Workshop-Beitrag], (2012)

Zohner, Michael ; Kasper, Michael ; Stoettinger, Marc :
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Konferenz- oder Workshop-Beitrag], (2012)

Heuser, Annelie ; Zohner, Michael :
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Konferenz- oder Workshop-Beitrag], (2012)

Zohner, Michael ; Kasper, Michael ; Stöttinger, Marc ; Huss, Sorin A. :
Side channel analysis of the SHA-3 finalists.
In: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE'12).
[Konferenz- oder Workshop-Beitrag], (2012)

Zohner, Michael :
Side-Channel Analysis of SHA-3 Candidates.
TU Darmstadt
[Masterarbeit], (2011)

Zohner, Michael :
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda
[Bachelorarbeit], (2008)

Diese Liste wurde am Tue Oct 16 04:10:15 2018 CEST generiert.