Browse by Person
Up a level |
Ben-Itzhak, Yaniv ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith ; Tkachenko, Oleksandr ; Vargaftik, Shay ; Weinert, Christian ; Yalame, Hossein ; Yanai, Avishay (2024)
ScionFL: Secure Quantized Aggregation for Federated Learning.
2nd IEEE Conference on Secure and Trustworthy Machine Learning (SaTML'24). Toronto, Canada (09.04.2024 - 11.04.2024)
doi: 10.1109/SaTML59370.2024.00031
Conference or Workshop Item, Bibliographie
Günther, Daniel ; Holz, Marco ; Judkewitz, Benjamin ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith (2022)
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022 - 11.11.2022)
doi: 10.1145/3548606.3563497
Conference or Workshop Item, Bibliographie
Guenther, Daniel ; Heymann, Maurice ; Pinkas, Benny ; Schneider, Thomas
ed.: USENIX (2022)
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.-12.08.2022)
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019)
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019. Darmstadt (19.05.2019-23.05.2019)
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018)
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018. Tel Aviv, Israel (29.04.2019-03.05.2018)
doi: 10.1007/978-3-319-78372-7_5
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018)
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2)
doi: 10.1145/3154794
Article, Bibliographie
Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017)
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4)
doi: 10.1515/popets-2017-0044
Article, Bibliographie
Tamrakar, Sandeep ; Liu, Jian ; Paverd, Andrew ; Ekberg, Jan-Erik ; Pinkas, Benny ; Asokan, N. (2017)
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
doi: 10.1145/3052973.3053006
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015)
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15). Austin, TX (10.08.2016-12.08.2016)
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014)
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (August 20–22, 2014)
Conference or Workshop Item, Bibliographie
Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011)
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11). San Francisco, CA, USA (14.02.2011-18.02.2011)
doi: 10.1007/978-3-642-19074-2_1
Conference or Workshop Item, Bibliographie
Manulis, Mark ; Pinkas, Benny ; Poettering, Bertram (2010)
Privacy-Preserving Group Discovery with Linear Complexity.
Conference or Workshop Item, Bibliographie
Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. (2009)
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009. Tokyo, Japan (06.12.2009-10.12.2009)
doi: 10.1007/978-3-642-10366-7_15
Conference or Workshop Item, Bibliographie