TU Darmstadt / ULB / TUbiblio

Einträge mit Organisationseinheit "20 Fachbereich Informatik > Praktische Kryptographie und Privatheit"

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Springe zu: A | B | C | D | F | G | H | J | K | M | N | P | R | S | T | V | W | Y | Z
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 138.

A

Andreina, Sebastien ; Marson, Giorgia Azzurra ; Möllering, Helen ; Karame, Ghassan (2021)
BaFFLe: Backdoor detection via Feedback-based Federated Learning.
41st IEEE International Conference on Distributed Computing Systems (ICDCS'21). virtual Conference (07.07.2021-10.07.2021)
doi: 10.1109/ICDCS51616.2021.00086
Konferenzveröffentlichung, Bibliographie

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Artikel, Bibliographie

Alhassan, Masaud Y. (2018)
Improving scalability of universal circuits for large-scale private function evaluation.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

B

Ben-Itzhak, Yaniv ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith ; Tkachenko, Oleksandr ; Vargaftik, Shay ; Weinert, Christian ; Yalame, Hossein ; Yanai, Avishay (2024)
ScionFL: Secure Quantized Aggregation for Federated Learning.
2nd IEEE Conference on Secure and Trustworthy Machine Learning (SaTML'24). Toronto, Canada (09.04.2024 - 11.04.2024)
doi: 10.1109/SaTML59370.2024.00031
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Schick, Oliver ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2024)
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater.
45th IEEE Symposium on Security and Privacy (IEEE S&P'24). San Francisco, USA (20.05.2024 - 23.05.2024)
doi: 10.1109/SP54263.2024.00164
Konferenzveröffentlichung, Bibliographie

Braun, Lennart ; Huppert, Moritz ; Khayata, Nora ; Tkachenko, Oleksandr ; Schneider, Thomas (2023)
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation.
ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security. Melbourne, Australia (10.07.2023-14.07.2023)
doi: 10.1145/3579856.3590340
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Hundt, Robin ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
FLUTE: Fast and Secure Lookup Table Evaluations.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023-25.05.2023)
doi: 10.1109/SP46215.2023.10179345
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Breuer, Malte ; Klinger, Andreas ; Schneider, Thomas ; Meyer, Ulrike (2022)
Secure Maximum Weight Matching Approximation on General Graphs.
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-07.11.2022)
doi: 10.1145/3559613.3563209
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2022)
Poster: Efficient Three-Party Shuffling Using Precomputation.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563511
Konferenzveröffentlichung, Bibliographie

Birka, Timm ; Hamacher, Kay ; Kussel, Tobias ; Möllering, Helen ; Schneider, Thomas (2022)
SPIKE: secure and private investigation of the kidney exchange problem.
In: BMC medical informatics and decision making, 22 (1)
doi: 10.1186/s12911-022-01994-4
Artikel, Bibliographie

Braun, Lennart ; Demmler, Daniel ; Schneider, Thomas ; Tkachenko, Oleksandr (2022)
MOTION - A Framework for Mixed-Protocol Multi-Party Computation.
In: ACM Transactions on Privacy and Security, 25 (2)
doi: 10.1145/3490390
Artikel, Bibliographie

Braun, Lennart ; Cammarota, Rosario ; Schneider, Thomas (2021)
A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract).
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems. virtual Conference (06.12.2021-14.12.2021)
Konferenzveröffentlichung, Bibliographie

Birka, Timm ; Möllering, Helen ; Kussel, Tobias ; Schneider, Thomas (2021)
Efficient and Practical Privacy-Preserving Kidney Exchange Problem Protocol.
33. Kryptotag - crypto day matters. virtual Conference (17.09.2021)
Konferenzveröffentlichung, Bibliographie

Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.06.2021-11.06.2021)
Konferenzveröffentlichung, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419425
Konferenzveröffentlichung, Bibliographie

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (01.06.2020-05.06.2020)
Konferenzveröffentlichung, Bibliographie

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.10.2020-22.10.2020)
Konferenzveröffentlichung, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.08.2020-28.08.2020)
doi: 10.1145/3407023.3407045
Konferenzveröffentlichung, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09.03.2020-13.03.2020)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019-15.11.2019)
Konferenzveröffentlichung, Bibliographie

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243786
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Konferenzveröffentlichung, Bibliographie

Bieber, Julian (2016)
Generalizing Semi-Private Function Evaluation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

C

Chandran, Gowri R. ; Lehwalder, Philipp-Florens ; Rometsch, Leandro ; Schneider, Thomas (2023)
Poster: Secure and Differentially Private kth Ranked Element.
CCS '23: ACM SIGSAC Conference on Computer and Communications Security. Copenhagen, Denmark (26.11.2023 - 30.11.2023)
doi: 10.1145/3576915.3624392
Konferenzveröffentlichung, Bibliographie

Chandran, Gowri R ; Nieminen, Raine ; Schneider, Thomas ; Suresh, Ajith (2023)
PrivMail: A Privacy-Preserving Framework for Secure Emails.
28th European Symposium on Research in Computer Security (ESORICS'23). The Hague, The Netherlands (25.09.2023 – 29.09.2023)
doi: 10.1007/978-3-031-51476-0_8
Konferenzveröffentlichung, Bibliographie

Chandran, Gowri R. ; Hazay, Carmit ; Hundt, Robin ; Schneider, Thomas (2022)
Comparison-Based MPC in Star Topology.
19th International Conference on Security and Cryptography (SECRYPT'22). Lisbon, Portugal (11.07.2022 - 13.07.2022)
doi: 10.5220/0011144100003283
Konferenzveröffentlichung, Bibliographie

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
doi: 10.48550/arXiv.2008.04449
Report, Bibliographie

D

Duddu, Vasisht ; Das, Anudeep ; Khayata, Nora ; Yalame, Hossein ; Schneider, Thomas ; Asokan, N. (2024)
Attesting Distributional Properties of Training Data for Machine Learning.
29th European Symposium on Research in Computer Security. Bydgoszcz, Poland (16.09.2024 -20.09.2024)
doi: 10.1007/978-3-031-70879-4_1
Konferenzveröffentlichung, Bibliographie

Disser, Yann ; Günther, Daniel ; Schneider, Thomas ; Stillger, Maximilian ; Wigandt, Arthur ; Yalame, Hossein (2023)
Breaking the Size Barrier: Universal Circuits meet Lookup Tables.
29th International Conference on the Theory and Application of Cryptology and Information Security. Guangzhou, Peoples Republic China (04.12.2023 - 08.12.2023)
doi: 10.1007/978-981-99-8721-4_1
Konferenzveröffentlichung, Bibliographie

Dittert, Dominique ; Schneider, Thomas ; Treiber, Amos (2023)
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search.
CCS '23: ACM SIGSAC Conference on Computer and Communications Security 2023. Copenhagen, Denmark (26.11.2023 - 30.11.2023)
doi: 10.1145/3605763.3625243
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018)
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs)
doi: 10.1515/popets-2018-0037
Artikel, Bibliographie

Demmler, Daniel (2018)
Towards Practical Privacy-Preserving Protocols.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Demmler, Daniel (2011)
FPGA-Implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar".
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

F

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020)
Information-Theoretic Security of Cryptographic Channels.
22nd International Conference on Information and Communications Security (ICICS 2020). virtual Conference (24.08.2021-26.08.2021)
doi: 10.1007/978-3-030-61078-4_17
Konferenzveröffentlichung, Bibliographie

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie

Felsen, Susanne (2019)
Secure Two-Party Computation: ABY versus Intel SGX.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

G

Gehlhar, Till ; Marx, Felix ; Schneider, Thomas ; Suresh, Ajith ; Wehrle, Tobias ; Yalame, Hossein (2023)
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning.
6th Deep Learning Security and Privacy Workshop (DLSP 2023). San Francisco, USA (25.05.2023-25.05.2023)
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Holz, Marco ; Judkewitz, Benjamin ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith (2022)
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563497
Konferenzveröffentlichung, Bibliographie

Guenther, Daniel ; Heymann, Maurice ; Pinkas, Benny ; Schneider, Thomas
Hrsg.: USENIX (2022)
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Schneider, Thomas ; Wiegand, Felix (2021)
Revisiting Hybrid Private Information Retrieval.
27th ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3485346
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
26th ACM Conference on Computer and Communications Security. London, United Kingdom (11.11.2019-15.11.2019)
doi: 10.1145/3319535.3363251
Konferenzveröffentlichung, Bibliographie

Günther, Daniel (2018)
Private Function Evaluation with Universal Circuits.
Bosch Renningen, Germany (06.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie

Günther, Daniel (2017)
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

H

Hetz, Laura ; Schneider, Thomas ; Weinert, Christian (2023)
Scaling Mobile Private Contact Discovery to Billions of Users.
28th European Symposium on Research in Computer Security (ESORICS'23). The Hague, The Netherlands (25.09.2023 – 29.09.2023)
doi: 10.1007/978-3-031-50594-2_23
Konferenzveröffentlichung, Bibliographie

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2023)
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
In: ACM Transactions on Privacy and Security, 26 (1)
doi: 10.1145/3546191
Artikel, Bibliographie

Hamacher, Kay ; Kussel, Tobias ; Schneider, Thomas ; Tkachenko, Oleksandr (2022)
PEA: Practical private epistasis analysis using MPC.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17143-7_16
Konferenzveröffentlichung, Bibliographie

Hamacher, Kay ; Kussel, Tobias ; von Landesberger, Tatiana ; Baumgartl, Tom ; Höhn, Markus ; Scheithauer, Simone ; Marschollek, Michael ; Wulffk, Antje (2022)
Fallzahlen, Re-Identifikation und der technische Datenschutz.
In: Datenschutz und Datensicherheit - DuD, 46 (3)
doi: 10.1007/s11623-022-1579-6
Artikel, Bibliographie

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.2021-01.07.2021)
doi: 10.1145/3448300.3468252
Konferenzveröffentlichung, Bibliographie

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.06.2021-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Konferenzveröffentlichung, Bibliographie

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). virtual Conference (21.02.2021-24.02.2021)
doi: 10.14722/ndss.2021.23159
Konferenzveröffentlichung, Bibliographie

Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021). virtual Conference (12.07.2021-16.07.2021)
Konferenzveröffentlichung, Bibliographie

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020)
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20). virtual Conference (14.09.2020-18.09.2020)
Konferenzveröffentlichung, Bibliographie

Holz, Marco (2016)
Effective Protection of Sensitive Metadata in Online Communication Networks.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

J

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020)
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020
doi: 10.1109/TC.2020.2972549
Artikel, Bibliographie

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security
doi: 10.1049/iet-ifs.2019.0125
Artikel, Bibliographie

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
4. IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm (17.06.2019-19.06.2019)
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018)
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18). Naples, Italy (30.09.2018-03.10.2018)
doi: 10.1007/978-3-030-00434-7_1
Konferenzveröffentlichung, Bibliographie

K

Koti, Nishat ; Kukkala, Varsha Bhat ; Patra, Arpita ; Gopal, Bhavish Raj (2024)
Graphiti: Secure Graph Computation Made More Scalable.
NIST Workshop on Privacy-Enhancing Cryptography 2024. virtual Conference (24.09.2024 - 26.09.2024)
Konferenzveröffentlichung, Bibliographie

Koti, Nishat ; Patra, Arpita ; Rachuri, Rahul ; Suresh, Ajith (2022)
Tetrad: Actively Secure 4PC for Secure Training and Inference.
29th Network and Distributed System Security Symposium (NDSS'22). San Diego, USA (24.04.2022 - 28.04.2022)
doi: 10.14722/ndss.2022.24058
Konferenzveröffentlichung, Bibliographie

Kamara, Seny ; Kat, Abdelkarim ; Moataz, Tarik ; Schneider, Thomas ; Treiber, Amos ; Yonli, Michael (2022)
SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data.
7th IEEE European Symposium on Security and Privacy (EuroS&P'22). Genoa, Italy (06.06.2022-10.06.2022)
Konferenzveröffentlichung, Bibliographie

Koti, Nishat ; Pancholi, Mahak ; Patra, Arpita ; Suresh, Ajith (2021)
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning.
30th USENIX Security Symposium (USENIX Security'21). virtual Conference (11.08.2021 - 13.08.2021)
Konferenzveröffentlichung, Bibliographie

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Konferenzveröffentlichung, Bibliographie

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Hossein (2021)
Privacy - Preserving Clustering.
32. Kryptotag - crypto day matters. virtual Conference (15.01.2021-15.01.2021)
doi: 10.18420/cdm-2021-32-42
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes (2020)
Efficient Private Function Evaluation.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00017496
Dissertation, Erstveröffentlichung, Verlagsversion

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019)
Mobile Private Contact Discovery at Scale.
28. USENIX Security Symposium (USENIX Security'19). SANTA CLARA, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019)
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
Artikel, Bibliographie

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019)
Web Application for Privacy-Preserving Scheduling using Secure Computation.
16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic (26.07.2019 - 28.07.2019)
doi: 10.5220/0007947704560463
Konferenzveröffentlichung, Bibliographie

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
Kryptotag29: 29. Krypto-Tag @ Bosch. Renningen, Germany (06.09.2018-07.09.2018)
doi: 10.18420/cdm-2018-29-24
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018)
Web Application for Privacy-Preserving Scheduling.
27th USENIX Security Symposium (USENIX Security'18). Baltimore, USA (15.08.2018-17.08.2018)
Konferenzveröffentlichung, Bibliographie

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018)
Examining Leakage of Access Counts in ORAM Constructions.
CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. Toronto, Canada (15.10.2018-15.10.2018)
doi: 10.1145/3267323.3268963
Konferenzveröffentlichung, Bibliographie

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015)
On the Optimality of Differential Fault Analyses on CLEFIA.
doi: 10.1007/978-3-319-32859-1_15
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes (2014)
Testing Self-Secure Exponentiation Countermeasures Against the Bellcore Attack.
Technical University of Berlin
Masterarbeit, Bibliographie

Kiss, Ágnes (2012)
Finding and Representations of Minimum Cuts and Their Applications.
Budapest University of Technology and Economics
Bachelorarbeit, Bibliographie

M

Mantel, Heiko ; Schmidt, Joachim ; Schneider, Thomas ; Stillger, Maximilian ; Weißmantel, Tim ; Yalame, Hossein (2024)
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation.
61st Design Automation Conference (DAC'24). San Francisco, USA (23.06.2024 - 27.06.2024)
Konferenzveröffentlichung, Bibliographie

Möllering, Helen (2023)
Towards Practical Privacy-Preserving Clustering and Health Care Data Analyses.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00024708
Dissertation, Erstveröffentlichung, Verlagsversion

Münch, Jean-Pierre ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
VASA: Vector AES Instructions for Security Applications.
37th Annual Computer Security Applications Conference. virtual Conference (06.12.2021-10.12.2021)
doi: 10.1145/3485832.3485897
Konferenzveröffentlichung, Bibliographie

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020)
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20). virtual Conference (14.12.2020-16.12.2020)
Konferenzveröffentlichung, Bibliographie

Möllering, Helen (2019)
Thwarting Semantic Backdoor Attacks in Privacy Preserving Federated Learning.
University of Twente
Masterarbeit, Bibliographie

Möllering, Helen (2016)
Vergleich der Methoden zur Applikationsentwicklung für mobile Endgeräte mit einem Fallbeispiel unter iOS.
Westfälische Wilhelms-Universität Münster
Bachelorarbeit, Bibliographie

N

Nieminen, Raine ; Schneider, Thomas
Hrsg.: Springer (2023)
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires.
In: Journal of Cryptology, 36 (34)
doi: 10.1007/s00145-023-09472-4
Artikel, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Chen, Huili ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Zeitouni, Shaza ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2022)
FLAME: Taming Backdoors in Federated Learning.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Nieminen, Raine ; Järvinen, Kimmo (2020)
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing
doi: 10.1109/TMC.2020.2990871
Artikel, Bibliographie

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019)
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58
doi: 10.1016/j.csl.2019.06.001
Artikel, Bibliographie

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019)
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019. Graz, Austria (15.09.2019-19.09.2019)
Konferenzveröffentlichung, Bibliographie

P

Pang, Qi ; Zhu, Jinhao ; Möllering, Helen ; Zheng, Wenting ; Schneider, Thomas (2024)
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers.
45th IEEE Symposium on Security and Privacy (IEEE S&P'24). San Francisco, USA (20.05.2024 - 23.05.2024)
doi: 10.1109/SP54263.2024.00130
Konferenzveröffentlichung, Bibliographie

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
14th IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21). virtual Conference (13.12.2021-14.12.2021)
Konferenzveröffentlichung, Bibliographie

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium 2021. Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019)
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019. Darmstadt (19.05.2019-23.05.2019)
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018)
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018. Tel Aviv, Israel (29.04.2019-03.05.2018)
doi: 10.1007/978-3-319-78372-7_5
Konferenzveröffentlichung, Bibliographie

R

Reichert, Leonie ; Chandran, Gowri R. ; Schoppmann, Phillipp ; Schneider, Thomas ; Scheuermann, Björn (2024)
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage.
19th ACM Asia Conference on Computer and Communications Security. Singapore (01.07.2024 - 05.07.2024)
doi: 10.1145/3634737.3657005
Konferenzveröffentlichung, Bibliographie

Reinhold, Thomas ; Kühn, Philipp ; Günther, Daniel ; Schneider, Thomas ; Reuter, Christian (2023)
ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships.
In: IEEE Transactions on Technology and Society, 4 (2)
doi: 10.1109/TTS.2023.3280356
Artikel, Bibliographie

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019)
Efficiently Stealing your Machine Learning Models.
WPES'19 - 18. Workshop on Privacy in the Electronic Society. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019)
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19). Fuzhou, China (25.10.2019-27.10.2019)
Konferenzveröffentlichung, Bibliographie

Reith, Robert Nikolai (2018)
Silently Learning your Support Vector Machines Models.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018)
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18). Guimaraes, Portugal (26.06.2018-28.06.2018)
doi: 10.1109/ICL-GNSS.2018.8440910
Konferenzveröffentlichung, Bibliographie

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018)
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196522
Konferenzveröffentlichung, Bibliographie

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016)
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
doi: 10.1007/978-3-319-43283-0_7
Konferenzveröffentlichung, Bibliographie

S

Schneider, Thomas ; Ehrler, Patrick ; Kati, Abdelkarim ; Treiber, Amos (2024)
Evaluating leakage attacks against relational encrypted search.
CCS '24: ACM SIGSAC Conference on Computer and Communications Security. Salt Lake City, USA (14.10.2024 - 18.10.2024)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Yalame, Hossein ; Yonli, Michael (2023)
Griffin: Towards mixed multi-key homomorphic encryption.
20th International Conference on Security and Cryptography (SECRYPT'23). Rome, Italy (10.07.2023-12.07.2023)
doi: 10.5220/0012090200003555
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”.
In: IEEE Transactions on Information Forensics and Security, 18
doi: 10.1109/TIFS.2023.3238544
Artikel, Bibliographie

Schneider, Thomas (2020)
Engineering Privacy-Preserving Machine Learning Protocols.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-09.11.2020)
doi: 10.1145/3411501.3418607
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Treiber, Amos (2020)
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, 31 (3)
doi: 10.1109/TPDS.2019.2939313
Artikel, Bibliographie

Schuster, Tom (2019)
Optimizing HyCC with Compiler Intermediate Representation.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

Schneider, Thomas ; Tkachenko, Oleksandr (2019)
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19). Auckland New Zealand (09.07.2019-12.07.2019)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Tkachenko, Oleksandr (2018)
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3267323.3268956
Konferenzveröffentlichung, Bibliographie

Senker, Matthias (2018)
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Schneider, Thomas ; Zohner, Michael (2012)
Efficient Secure Two-Party Computation.
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2011)
Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Ruhr-Universität Bochum
Dissertation, Bibliographie

Schneider, Thomas (2008)
Practical secure function evaluation.
Informatiktage 2008 - Fachwissenschaftlicher Informatik-Kongress. Bonn, Germany (14.03.2008 - 15.03.2008)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2007)
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
Bachelorarbeit, Bibliographie

T

Trame, Sarah ; Brüggemann, Andreas ; Rink, Lothar (2023)
Calculating zinc uptake by Zinc-APP.
In: Journal of Trace Elements in Medicine and Biology, 77
doi: 10.1016/j.jtemb.2023.127132
Artikel, Bibliographie

Treiber, Amos ; Müllmann, Dirk ; Schneider, Thomas ; Spiecker genannt Döhmann, Indra (2022)
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies.
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-07.11.2022)
doi: 10.1145/3559613.3563192
Konferenzveröffentlichung, Bibliographie

Tkachenko, Oleksandr (2022)
Towards Deployable MPC: Flexible and Efficient Tools for Real-World Applications.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00021253
Dissertation, Erstveröffentlichung, Verlagsversion

Treiber, Amos (2022)
Analyzing and Applying Cryptographic Mechanisms to Protect Privacy in Applications.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00022922
Dissertation, Erstveröffentlichung, Verlagsversion

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419417
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Privacy-preserving machine learning beyond neural networks.
7th Theory and Practice of Multi-Party Computation Workshop (TPMPC'20). virtual Conference (25.05.2020-04.06.2020)
doi: 10.48550/arXiv.2002.00801
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20). Santiago de Compostela (08.06.2020-12.06.2020)
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019)
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication
doi: 10.1016/j.specom.2019.09.004
Artikel, Bibliographie

Tkachenko, Oleksandr (2018)
Privacy-Preserving Genomics on a Large Scale.
Bosch Renningen, Germany (06.09.2018-07.09.2018)
Konferenzveröffentlichung, Bibliographie

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196541
Konferenzveröffentlichung, Bibliographie

Treiber, Amos (2018)
Access Count Leakage in Oblivious RAMs.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Tariq, Taha (2018)
Web application for privacy-preserving assignments.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Tkachenko, Oleksandr (2017)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Treiber, Amos (2015)
Searchable Encryption.
Universität Mannheim & Ruprecht-Karls Universität Heidelberg
Bachelorarbeit, Bibliographie

Tkachenko, Oleksandr (2012)
Методи адаптивноi фiльтрацiї в системах мовного вводу.
Kherson National Technical University
Diplom- oder Magisterarbeit, Bibliographie

V

van der Beets, Christopher ; Nieminen, Raine ; Schneider, Thomas (2022)
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization.
19th International Conference on Security and Cryptography (SECRYPT'22). Lisbon, Portugal (11.07.2022 - 13.07.2022)
doi: 10.5220/0011263500003283
Konferenzveröffentlichung, Bibliographie

W

Weinert, Christian (2021)
Practical Private Set Intersection Protocols for Privacy-Preserving Applications.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00019295
Dissertation, Erstveröffentlichung, Verlagsversion

Weinert, Christian (2013)
Content Integrity System and Notarisation for Long-Term Protection of Data Objects.
Technische Universität Darmstadt
Bachelorarbeit, Bibliographie

Y

Yalame, Hossein (2024)
Advancing MPC: From Real-World Applications to LUT-Based Protocols.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00028168
Dissertation, Erstveröffentlichung, Verlagsversion

Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017)
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
Konferenzveröffentlichung, Bibliographie

Z

Zohner, Michael (2017)
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung

Zohner, Michael (2011)
Side-Channel Analysis of SHA-3 Candidates.
Technische Universität Darmstadt
Masterarbeit, Bibliographie

Zohner, Michael (2008)
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda
Bachelorarbeit, Bibliographie

Diese Liste wurde am Sun Dec 15 02:12:52 2024 CET generiert.