TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 25.

Article

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), pp. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Article]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, pp. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Article]

Asharov, Gilad and Demmler, Daniel and Schapira, Michael and Schneider, Thomas and Segev, Gil and Shenker, Scott and Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, pp. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Conference or Workshop Item

Dessouky, Ghada and Koushanfar, Farinaz and Sadeghi, Ahmad-Reza and Schneider, Thomas and Zeitouni, Shaza and Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Segev, Gil and Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Conference or Workshop Item]

Albrecht, Martin and Rechberger, Christian and Schneider, Thomas and Tiessen, Tyge and Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), Internet Society, [Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference or Workshop Item]

Pinkas, Benny and Schneider, Thomas and Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference or Workshop Item]

Bringer, Julien and Chabanne, Hervé and Favre, Mélanie and Patey, Alain and Schneider, Thomas and Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, DOI: 10.1145/2600918.2600922,
[Conference or Workshop Item]

Demmler, Daniel and Schneider, Thomas and Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Asharov, Gilad and Lindell, Yehuda and Schneider, Thomas and Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, DOI: 10.1145/2508859.2516738,
[Conference or Workshop Item]

Schneider, Thomas and Zohner, Michael (2013):
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
In: 17. International Conference on Financial Cryptography and Data Security (FC'13), Springer, DOI: 10.1007/978-3-642-39884-1_23,
[Conference or Workshop Item]

Huss, Sorin A. and Stöttinger, Marc and Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, [Conference or Workshop Item]

Schneider, Thomas and Zohner, Michael (2012):
Efficient Secure Two-Party Computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Zohner, Michael and Stoettinger, Marc and Huss, Sorin A. and Stein, Oliver (2012):
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
San Francisco, CA, USA, In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'12), [Conference or Workshop Item]

Zohner, Michael and Kasper, Michael and Stoettinger, Marc (2012):
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]

Heuser, Annelie and Zohner, Michael (2012):
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference or Workshop Item]

Zohner, Michael and Kasper, Michael and Stöttinger, Marc and Huss, Sorin A. (2012):
Side channel analysis of the SHA-3 finalists.
In: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE'12), [Conference or Workshop Item]

Ph.D. Thesis

Zohner, Michael (2017):
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154],
[Ph.D. Thesis]

Master Thesis

Zohner, Michael (2011):
Side-Channel Analysis of SHA-3 Candidates.
TU Darmstadt, [Master Thesis]

Bachelor Thesis

Zohner, Michael (2008):
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda, [Bachelor Thesis]

This list was generated on Tue Jul 23 00:43:05 2019 CEST.