TU Darmstadt / ULB / TUbiblio

Blättern nach Person

Ebene hoch
Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Springe zu: Deutsch | Englisch
Anzahl der Einträge: 166.

Deutsch

Schneider, Thomas (2011)
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen. Bonn-Bad Godesberg (10.-05.2011-12.05.2011)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10). Mannheim (08.09.2010-08.09.2010)
Konferenzveröffentlichung, Bibliographie

Englisch

Schneider, Thomas ; Ehrler, Patrick ; Kati, Abdelkarim ; Treiber, Amos (2024)
Evaluating leakage attacks against relational encrypted search.
CCS '24: ACM SIGSAC Conference on Computer and Communications Security. Salt Lake City, USA (14.10.2024 - 18.10.2024)
Konferenzveröffentlichung, Bibliographie

Duddu, Vasisht ; Das, Anudeep ; Khayata, Nora ; Yalame, Hossein ; Schneider, Thomas ; Asokan, N. (2024)
Attesting Distributional Properties of Training Data for Machine Learning.
29th European Symposium on Research in Computer Security. Bydgoszcz, Poland (16.09.2024 -20.09.2024)
doi: 10.1007/978-3-031-70879-4_1
Konferenzveröffentlichung, Bibliographie

Reichert, Leonie ; Chandran, Gowri R. ; Schoppmann, Phillipp ; Schneider, Thomas ; Scheuermann, Björn (2024)
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage.
19th ACM Asia Conference on Computer and Communications Security. Singapore (01.07.2024 - 05.07.2024)
doi: 10.1145/3634737.3657005
Konferenzveröffentlichung, Bibliographie

Mantel, Heiko ; Schmidt, Joachim ; Schneider, Thomas ; Stillger, Maximilian ; Weißmantel, Tim ; Yalame, Hossein (2024)
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation.
61st Design Automation Conference (DAC'24). San Francisco, USA (23.06.2024 - 27.06.2024)
Konferenzveröffentlichung, Bibliographie

Ben-Itzhak, Yaniv ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith ; Tkachenko, Oleksandr ; Vargaftik, Shay ; Weinert, Christian ; Yalame, Hossein ; Yanai, Avishay (2024)
ScionFL: Secure Quantized Aggregation for Federated Learning.
2nd IEEE Conference on Secure and Trustworthy Machine Learning (SaTML'24). Toronto, Canada (09.04.2024 - 11.04.2024)
doi: 10.1109/SaTML59370.2024.00031
Konferenzveröffentlichung, Bibliographie

Pang, Qi ; Zhu, Jinhao ; Möllering, Helen ; Zheng, Wenting ; Schneider, Thomas (2024)
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers.
45th IEEE Symposium on Security and Privacy (IEEE S&P'24). San Francisco, USA (20.05.2024 - 23.05.2024)
doi: 10.1109/SP54263.2024.00130
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Schick, Oliver ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2024)
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater.
45th IEEE Symposium on Security and Privacy (IEEE S&P'24). San Francisco, USA (20.05.2024 - 23.05.2024)
doi: 10.1109/SP54263.2024.00164
Konferenzveröffentlichung, Bibliographie

Disser, Yann ; Günther, Daniel ; Schneider, Thomas ; Stillger, Maximilian ; Wigandt, Arthur ; Yalame, Hossein (2023)
Breaking the Size Barrier: Universal Circuits meet Lookup Tables.
29th International Conference on the Theory and Application of Cryptology and Information Security. Guangzhou, Peoples Republic China (04.12.2023 - 08.12.2023)
doi: 10.1007/978-981-99-8721-4_1
Konferenzveröffentlichung, Bibliographie

Dittert, Dominique ; Schneider, Thomas ; Treiber, Amos (2023)
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search.
CCS '23: ACM SIGSAC Conference on Computer and Communications Security 2023. Copenhagen, Denmark (26.11.2023 - 30.11.2023)
doi: 10.1145/3605763.3625243
Konferenzveröffentlichung, Bibliographie

Chandran, Gowri R. ; Lehwalder, Philipp-Florens ; Rometsch, Leandro ; Schneider, Thomas (2023)
Poster: Secure and Differentially Private kth Ranked Element.
CCS '23: ACM SIGSAC Conference on Computer and Communications Security. Copenhagen, Denmark (26.11.2023 - 30.11.2023)
doi: 10.1145/3576915.3624392
Konferenzveröffentlichung, Bibliographie

Chandran, Gowri R ; Nieminen, Raine ; Schneider, Thomas ; Suresh, Ajith (2023)
PrivMail: A Privacy-Preserving Framework for Secure Emails.
28th European Symposium on Research in Computer Security (ESORICS'23). The Hague, The Netherlands (25.09.2023 – 29.09.2023)
doi: 10.1007/978-3-031-51476-0_8
Konferenzveröffentlichung, Bibliographie

Hetz, Laura ; Schneider, Thomas ; Weinert, Christian (2023)
Scaling Mobile Private Contact Discovery to Billions of Users.
28th European Symposium on Research in Computer Security (ESORICS'23). The Hague, The Netherlands (25.09.2023 – 29.09.2023)
doi: 10.1007/978-3-031-50594-2_23
Konferenzveröffentlichung, Bibliographie

Nieminen, Raine ; Schneider, Thomas
Hrsg.: Springer (2023)
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires.
In: Journal of Cryptology, 36 (34)
doi: 10.1007/s00145-023-09472-4
Artikel, Bibliographie

Braun, Lennart ; Huppert, Moritz ; Khayata, Nora ; Tkachenko, Oleksandr ; Schneider, Thomas (2023)
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation.
ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security. Melbourne, Australia (10.07.2023-14.07.2023)
doi: 10.1145/3579856.3590340
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Yalame, Hossein ; Yonli, Michael (2023)
Griffin: Towards mixed multi-key homomorphic encryption.
20th International Conference on Security and Cryptography (SECRYPT'23). Rome, Italy (10.07.2023-12.07.2023)
doi: 10.5220/0012090200003555
Konferenzveröffentlichung, Bibliographie

Reinhold, Thomas ; Kühn, Philipp ; Günther, Daniel ; Schneider, Thomas ; Reuter, Christian (2023)
ExTRUST: Reducing exploit stockpiles with a privacy-preserving depletion system for inter-state relationships.
In: IEEE Transactions on Technology and Society, 4 (2)
doi: 10.1109/TTS.2023.3280356
Artikel, Bibliographie

Brüggemann, Andreas ; Hundt, Robin ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
FLUTE: Fast and Secure Lookup Table Evaluations.
44th IEEE Symposium on Security and Privacy. San Francisco, USA (22.05.2023-25.05.2023)
doi: 10.1109/SP46215.2023.10179345
Konferenzveröffentlichung, Bibliographie

Gehlhar, Till ; Marx, Felix ; Schneider, Thomas ; Suresh, Ajith ; Wehrle, Tobias ; Yalame, Hossein (2023)
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning.
6th Deep Learning Security and Privacy Workshop (DLSP 2023). San Francisco, USA (25.05.2023-25.05.2023)
Konferenzveröffentlichung, Bibliographie

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2023)
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
In: ACM Transactions on Privacy and Security, 26 (1)
doi: 10.1145/3546191
Artikel, Bibliographie

Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2023)
Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”.
In: IEEE Transactions on Information Forensics and Security, 18
doi: 10.1109/TIFS.2023.3238544
Artikel, Bibliographie

Treiber, Amos ; Müllmann, Dirk ; Schneider, Thomas ; Spiecker genannt Döhmann, Indra (2022)
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies.
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-07.11.2022)
doi: 10.1145/3559613.3563192
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2022)
Poster: Efficient Three-Party Shuffling Using Precomputation.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563511
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Holz, Marco ; Judkewitz, Benjamin ; Möllering, Helen ; Pinkas, Benny ; Schneider, Thomas ; Suresh, Ajith (2022)
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CCS '22: ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-11.11.2022)
doi: 10.1145/3548606.3563497
Konferenzveröffentlichung, Bibliographie

Brüggemann, Andreas ; Breuer, Malte ; Klinger, Andreas ; Schneider, Thomas ; Meyer, Ulrike (2022)
Secure Maximum Weight Matching Approximation on General Graphs.
CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. Los Angeles, USA (07.11.2022-07.11.2022)
doi: 10.1145/3559613.3563209
Konferenzveröffentlichung, Bibliographie

Hamacher, Kay ; Kussel, Tobias ; Schneider, Thomas ; Tkachenko, Oleksandr (2022)
PEA: Practical private epistasis analysis using MPC.
27th European Symposium on Research in Computer Security (ESORICS 2022). Copenhagen, Denmark (26.09.2022-30.09.2022)
doi: 10.1007/978-3-031-17143-7_16
Konferenzveröffentlichung, Bibliographie

Birka, Timm ; Hamacher, Kay ; Kussel, Tobias ; Möllering, Helen ; Schneider, Thomas (2022)
SPIKE: secure and private investigation of the kidney exchange problem.
In: BMC medical informatics and decision making, 22 (1)
doi: 10.1186/s12911-022-01994-4
Artikel, Bibliographie

Guenther, Daniel ; Heymann, Maurice ; Pinkas, Benny ; Schneider, Thomas
Hrsg.: USENIX (2022)
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Chandran, Gowri R. ; Hazay, Carmit ; Hundt, Robin ; Schneider, Thomas (2022)
Comparison-Based MPC in Star Topology.
19th International Conference on Security and Cryptography (SECRYPT'22). Lisbon, Portugal (11.07.2022 - 13.07.2022)
doi: 10.5220/0011144100003283
Konferenzveröffentlichung, Bibliographie

van der Beets, Christopher ; Nieminen, Raine ; Schneider, Thomas (2022)
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization.
19th International Conference on Security and Cryptography (SECRYPT'22). Lisbon, Portugal (11.07.2022 - 13.07.2022)
doi: 10.5220/0011263500003283
Konferenzveröffentlichung, Bibliographie

Braun, Lennart ; Demmler, Daniel ; Schneider, Thomas ; Tkachenko, Oleksandr (2022)
MOTION - A Framework for Mixed-Protocol Multi-Party Computation.
In: ACM Transactions on Privacy and Security, 25 (2)
doi: 10.1145/3490390
Artikel, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Chen, Huili ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Zeitouni, Shaza ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2022)
FLAME: Taming Backdoors in Federated Learning.
31st USENIX Security Symposium (USENIX Security 22). Boston, USA (10.08.2022-12.08.2022)
Konferenzveröffentlichung, Bibliographie

Kamara, Seny ; Kat, Abdelkarim ; Moataz, Tarik ; Schneider, Thomas ; Treiber, Amos ; Yonli, Michael (2022)
SoK: Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data.
7th IEEE European Symposium on Security and Privacy (EuroS&P'22). Genoa, Italy (06.06.2022-10.06.2022)
Konferenzveröffentlichung, Bibliographie

Münch, Jean-Pierre ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
VASA: Vector AES Instructions for Security Applications.
37th Annual Computer Security Applications Conference. virtual Conference (06.12.2021-10.12.2021)
doi: 10.1145/3485832.3485897
Konferenzveröffentlichung, Bibliographie

Braun, Lennart ; Cammarota, Rosario ; Schneider, Thomas (2021)
A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract).
Privacy in Machine Learning Workshop at 35th Conference on Neural Information Processing Systems. virtual Conference (06.12.2021-14.12.2021)
Konferenzveröffentlichung, Bibliographie

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
14th IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21). virtual Conference (13.12.2021-14.12.2021)
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Schneider, Thomas ; Wiegand, Felix (2021)
Revisiting Hybrid Private Information Retrieval.
27th ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (15.11.2021-19.11.2021)
doi: 10.1145/3460120.3485346
Konferenzveröffentlichung, Bibliographie

Birka, Timm ; Möllering, Helen ; Kussel, Tobias ; Schneider, Thomas (2021)
Efficient and Practical Privacy-Preserving Kidney Exchange Problem Protocol.
33. Kryptotag - crypto day matters. virtual Conference (17.09.2021)
Konferenzveröffentlichung, Bibliographie

Kamara, Seny ; Kati, Abdelkarim ; Moataz, Tarik ; Schneider, Thomas ; Treiber, Amos ; Yonli, Michael (2021)
Cryptanalysis of encrypted search with LEAKER - a framework for LEakage AttacK Evaluation on Real-world data.
Report, Bibliographie

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium. virtual Conference (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021)
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
18th International Conference on Security and Cryptography (SECRYPT'21). virtual Conference (06.07.2021-08.07.2021)
Konferenzveröffentlichung, Bibliographie

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021)
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
14th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Abu Dhabi, United Arab Emirates (28.06.2021-01.07.2021)
doi: 10.1145/3448300.3468252
Konferenzveröffentlichung, Bibliographie

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021)
LLVM-based Circuit Compilation for Practical Secure Computation.
19th International Conference on Applied Cryptography and Network Security (ACNS'21). virtual Conference (21.06.2021-24.06.2021)
doi: 10.1007/978-3-030-78375-4_5
Konferenzveröffentlichung, Bibliographie

Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021)
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21). virtual Conference (07.06.2021-11.06.2021)
Konferenzveröffentlichung, Bibliographie

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021)
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21). virtual Conference (27.05.2021-27.05.2021)
Konferenzveröffentlichung, Bibliographie

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021)
FLGUARD: Secure and Private Federated Learning.
Report, Bibliographie

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Hossein (2021)
Privacy - Preserving Clustering.
32. Kryptotag - crypto day matters. virtual Conference (15.01.2021-15.01.2021)
doi: 10.18420/cdm-2021-32-42
Konferenzveröffentlichung, Bibliographie

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021)
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium 2021. Vancouver, Canada (11.08.2021-13.08.2021)
Konferenzveröffentlichung, Bibliographie

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021)
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
28. Annual Network and Distributed System Security Symposium (NDSS'21). virtual Conference (21.02.2021-24.02.2021)
doi: 10.14722/ndss.2021.23159
Konferenzveröffentlichung, Bibliographie

Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021)
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021). virtual Conference (12.07.2021-16.07.2021)
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419417
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2020)
Engineering Privacy-Preserving Machine Learning Protocols.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-09.11.2020)
doi: 10.1145/3411501.3418607
Konferenzveröffentlichung, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. virtual Conference (09.11.2020-13.11.2020)
doi: 10.1145/3411501.3419425
Konferenzveröffentlichung, Bibliographie

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020)
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20). Taipei, Taiwan (01.06.2020-05.06.2020)
Konferenzveröffentlichung, Bibliographie

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020)
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20). virtual Conference (19.10.2020-22.10.2020)
Konferenzveröffentlichung, Bibliographie

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020)
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20). virtual Conference (14.09.2020-18.09.2020)
Konferenzveröffentlichung, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20). virtual Conference (25.08.2020-28.08.2020)
doi: 10.1145/3407023.3407045
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Expanding PPML beyond Neural Networks.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Konferenzveröffentlichung, Bibliographie

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
2nd Privacy-Preserving Machine Learning Workshop at CRYPTO 2020. virtual Conference (16.08.2020-16.08.2020)
Konferenzveröffentlichung, Bibliographie

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020)
Trustworthy AI Inference Systems: An Industry Research View.
doi: 10.48550/arXiv.2008.04449
Report, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Privacy-preserving machine learning beyond neural networks.
7th Theory and Practice of Multi-Party Computation Workshop (TPMPC'20). virtual Conference (25.05.2020-04.06.2020)
doi: 10.48550/arXiv.2002.00801
Konferenzveröffentlichung, Bibliographie

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020)
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC)
doi: 10.1007/s00145-020-09346-z
Artikel, Bibliographie

Schneider, Thomas ; Treiber, Amos (2020)
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, 31 (3)
doi: 10.1109/TPDS.2019.2939313
Artikel, Bibliographie

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020)
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20). Grenoble, France (09.03.2020-13.03.2020)
Konferenzveröffentlichung, Bibliographie

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020)
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20). Santiago de Compostela (08.06.2020-12.06.2020)
Konferenzveröffentlichung, Bibliographie

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020)
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20). virtual Conference (14.12.2020-16.12.2020)
Konferenzveröffentlichung, Bibliographie

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019)
Privacy-preserving speech processing via STPC and TEEs.
2nd Privacy Preserving Machine Learning (PPML) - CCS 2019 Workshop. London, United Kingdom (15.11.2019-15.11.2019)
Konferenzveröffentlichung, Bibliographie

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019)
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
26th ACM Conference on Computer and Communications Security. London, United Kingdom (11.11.2019-15.11.2019)
doi: 10.1145/3319535.3363251
Konferenzveröffentlichung, Bibliographie

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019)
Efficiently Stealing your Machine Learning Models.
WPES'19 - 18. Workshop on Privacy in the Electronic Society. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019)
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58
doi: 10.1016/j.csl.2019.06.001
Artikel, Bibliographie

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019)
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication
doi: 10.1016/j.specom.2019.09.004
Artikel, Bibliographie

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019)
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop. London, UK (11.11.2019-11.11.2019)
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security
doi: 10.1049/iet-ifs.2019.0125
Artikel, Bibliographie

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019)
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19). Fuzhou, China (25.10.2019-27.10.2019)
Konferenzveröffentlichung, Bibliographie

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019)
Mobile Private Contact Discovery at Scale.
28. USENIX Security Symposium (USENIX Security'19). SANTA CLARA, CA, USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019)
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019. Graz, Austria (15.09.2019-19.09.2019)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Tkachenko, Oleksandr (2019)
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19). Auckland New Zealand (09.07.2019-12.07.2019)
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019)
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
Artikel, Bibliographie

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019)
Web Application for Privacy-Preserving Scheduling using Secure Computation.
16th International Joint Conference on e-Business and Telecommunications. Prague, Czech Republic (26.07.2019 - 28.07.2019)
doi: 10.5220/0007947704560463
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019)
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
4. IEEE European Symposium on Security and Privacy (EuroS&P'19). Stockholm (17.06.2019-19.06.2019)
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019)
Efficient Circuit-based PSI with Linear Communication.
38. Advances in Cryptology -- EUROCRYPT 2019. Darmstadt (19.05.2019-23.05.2019)
Konferenzveröffentlichung, Bibliographie

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018)
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3243734.3243786
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Tkachenko, Oleksandr (2018)
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18). Toronto, Canada (15.10.2018-19.10.2018)
doi: 10.1145/3267323.3268956
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018)
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18). Naples, Italy (30.09.2018-03.10.2018)
doi: 10.1007/978-3-030-00434-7_1
Konferenzveröffentlichung, Bibliographie

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018)
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018. HYDERABAD (02.09.2018-06.09.2018)
doi: 10.21437/Interspeech.2018-2032
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018)
Web Application for Privacy-Preserving Scheduling.
27th USENIX Security Symposium (USENIX Security'18). Baltimore, USA (15.08.2018-17.08.2018)
Konferenzveröffentlichung, Bibliographie

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018)
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18). Guimaraes, Portugal (26.06.2018-28.06.2018)
doi: 10.1109/ICL-GNSS.2018.8440910
Konferenzveröffentlichung, Bibliographie

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018)
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196522
Konferenzveröffentlichung, Bibliographie

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018)
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18). Incheon Republic of Korea (04.06.2018-04.06.2018)
doi: 10.1145/3196494.3196541
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018)
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018. Tel Aviv, Israel (29.04.2019-03.05.2018)
doi: 10.1007/978-3-319-78372-7_5
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018)
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2)
doi: 10.1145/3154794
Artikel, Bibliographie

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017)
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017. Hong Kong, China (03.12.2017-07.12.2017)
doi: 10.1007/978-3-319-70697-9_16
Konferenzveröffentlichung, Bibliographie

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017)
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17). Incheon Republic of Korea (12.12.2017-15.12.2017)
doi: 10.1145/3143361.3143362
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017)
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17). Hong Kong (30.11.2017-02.12.2017)
Konferenzveröffentlichung, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017)
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3)
doi: 10.1007/s00145-016-9236-6
Artikel, Bibliographie

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017)
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17). Kanazawa, Japan (10.07.2017-12.07.2017)
doi: 10.1007/978-3-319-61204-1_30
Konferenzveröffentlichung, Bibliographie

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017)
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3)
doi: 10.1515/popets-2017-0033
Artikel, Bibliographie

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017)
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4)
doi: 10.1515/popets-2017-0044
Artikel, Bibliographie

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017)
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23075
Konferenzveröffentlichung, Bibliographie

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017)
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17). San Diego, California (26.02.2017-01.03.2017)
doi: 10.14722/ndss.2017.23097
Konferenzveröffentlichung, Bibliographie

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017)
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1)
doi: 10.1515/popets-2017-0005
Artikel, Bibliographie

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016)
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16). Berlin (16.07.2016-16.07.2016)
doi: 10.1145/2959424.2959427
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016)
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16). Austin Texas (05.06.2016-09.06.2016)
doi: 10.1145/2897937.2898027
Konferenzveröffentlichung, Bibliographie

Kiss, Ágnes ; Schneider, Thomas (2016)
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016. Wien (08.05.2016-12.05.2016)
doi: 10.1007/978-3-662-49890-3_27
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015)
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15). Denver Colorado USA (12.10.2015-16.10.2015)
doi: 10.1145/2810103.2813678
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015)
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15). Austin, TX (10.08.2016-12.08.2016)
Konferenzveröffentlichung, Bibliographie

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015)
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15). Heraklion, Greece (24.08.2015-26.08.2015)
doi: 10.1007/978-3-319-22846-4_11
Konferenzveröffentlichung, Bibliographie

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015)
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15). San Jose, California (18.05.2015-20.05.2015)
doi: 10.1109/SP.2015.32
Konferenzveröffentlichung, Bibliographie

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015)
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_17
Konferenzveröffentlichung, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015)
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015. Sofia, Bulgaria (26.04.2015-30.04.2015)
doi: 10.1007/978-3-662-46800-5_26
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22nd Annual Network and Distributed System Security Symposium (NDSS'15). San Diego, USA (08.02.2015-11.02.2015)
doi: 10.14722/ndss.2015.23113
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014)
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14). Scottsdale, Arizona, USA (07.11.2014-07.11.2014)
doi: 10.1145/2664168.2664181
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014)
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14). San Diego, USA (20.08.2014-22.08.2014)
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014)
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14). San Diego, CA (20.08.2014-22.08.2014)
Konferenzveröffentlichung, Bibliographie

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2014)
Automatic protocol selection in secure two-party computations.
12. International Conference on Applied Cryptography and Network Security (ACNS'14). Lausanne, Switzerland (10.06.2014-13.06.2014)
doi: 10.1007/978-3-319-07536-5_33
Konferenzveröffentlichung, Bibliographie

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014)
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (11.06.2014-13.06.2014)
doi: 10.1145/2600918.2600922
Konferenzveröffentlichung, Bibliographie

Schneider, Matthias ; Schneider, Thomas (2014)
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). Salzburg, Austria (11.06.2014-13.06.2014)
doi: 10.1145/2600918.2600927
Konferenzveröffentlichung, Bibliographie

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013)
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19th Crypto-Day. Stuttgart, Germany (14.11.2013 - 15.11.2013)
Konferenzveröffentlichung, Bibliographie

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
doi: 10.1145/2508859.2516738
Buchkapitel, Bibliographie

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus (2013)
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13). Banff AB Canada (25.06.2013-28.06.2013)
doi: 10.1007/978-3-642-38980-1_27
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2013)
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
Norm, Patent, Standard, Bibliographie

Henecka, Wilko ; Schneider, Thomas (2013)
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13). Hangzhou, China (08.05.2013-10.05.2013)
doi: 10.1145/2484313.2484369
Konferenzveröffentlichung, Bibliographie

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013)
Automatic Protocol Selection in Secure Two-Party Computations.
20th Network and Distributed System Security Symposium (NDSS'13). San Diego, USA (24.02.2013-27.02.2013)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas ; Zohner, Michael (2013)
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13). Okinawa, Japan (01.04.2013-05.04.2013)
doi: 10.1007/978-3-642-39884-1_23
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2013)
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
In: Journal of Computer Security (JCS), 21 (2)
doi: 10.3233/JCS-130464
Artikel, Bibliographie

Schneider, Thomas ; Zohner, Michael (2012)
Efficient Secure Two-Party Computation.
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2012)
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
doi: 10.1007/978-3-642-30042-4
Buch, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2012)
Universal Circuit for Secure Function Evaluation.
Norm, Patent, Standard, Bibliographie

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2012)
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12). Kralendijk, Bonaire (02.03.2012-02.03.2012)
doi: 10.1007/978-3-642-32946-3_22
Konferenzveröffentlichung, Bibliographie

Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas (2012)
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
Report, Bibliographie

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11). Chicago Illinois USA (17.10.2011- 21.10.2011)
doi: 10.1145/2046707.2046753
Konferenzveröffentlichung, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11). Ghent, Belgium (19.10.2011-21.10.2011)
doi: 10.1007/978-3-642-24712-5_3
Konferenzveröffentlichung, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2)
doi: 10.1109/TIFS.2011.2108650
Artikel, Bibliographie

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Workshop on Cryptography and Security in Clouds (WCSC'11). Zurich, Switzerland (15.03.2011 - 16.03.2011)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2011)
Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Ruhr-Universität Bochum
Dissertation, Bibliographie

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan (2011)
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11). San Francisco, CA, USA (14.02.2011-18.02.2011)
doi: 10.1007/978-3-642-19074-2_1
Konferenzveröffentlichung, Bibliographie

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2010)
TASTY: Tool for Automating Secure Two-partY computations.
CCS'10. Chicago Illinois USA (04.10.2010-08.10.2010)
doi: 10.1145/1866307.1866358
Konferenzveröffentlichung, Bibliographie

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15th European Symposium on Research in Computer Security (ESORICS'10). Athens, Greece (20.09.2010 - 22.09.2010)
doi: 10.1007/978-3-642-15497-3_10
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10). Santa Barbara, USA (17.08.2010-20.08.2010)
doi: 10.1007/978-3-642-15031-9_26
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
YACZK: Yet Another Compiler for Zero-Knowledge.
19th USENIX Security Symposium. Washington D.C., USA (14.08.2019-16.08.2019)
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel (2010)
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud. Berlin (21.06.2010-23.06.2010)
doi: 10.1007/978-3-642-13869-0_30
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10). Tenerife, Canary Islands (25.01.2010-28.10.2010)
doi: 10.1007/978-3-642-14577-3_17
Konferenzveröffentlichung, Bibliographie

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice
doi: 10.1007/978-3-642-14452-3_17
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Efficient Privacy-Preserving Classification of ECG Signals.
2009 First IEEE International Workshop on Information Forensics and Security (WIFS). London (06.12.2009-09.12.2009)
doi: 10.1109/WIFS.2009.5386475
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo (2009)
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09). Seoul, Korea (02.12.2009-04.12.2009)
doi: 10.1007/978-3-642-14423-3_16
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09). Kanazawa, Japan (12.12.2009-14.12.2009)
doi: 10.1007/978-3-642-10433-6_1
Konferenzveröffentlichung, Bibliographie

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. (2009)
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009. Tokyo, Japan (06.12.2009-10.12.2009)
doi: 10.1007/978-3-642-10366-7_15
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
3rd Section Days of Ruhr-University Bochum Research School. Bochum, Germany (06.11.2009-06.11.2009)
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
In: ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
Buchkapitel, Bibliographie

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sigma-Protocols.
In: 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09)
doi: 10.1007/978-3-642-16441-5_5
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
In: 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
Buchkapitel, Bibliographie

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
In: 14. European Symposium on Research in Computer Security (ESORICS'09)
doi: 10.1007/978-3-642-04444-1_26
Buchkapitel, Bibliographie

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09). Paris, France (02.06.2009 - 05.06.2009)
doi: 10.1007/978-3-642-01957-9_6
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2009)
Automatic Generation of Sound Zero-Knowledge Protocols.
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne, Germany (26.04.2009-30.04.2009)
Konferenzveröffentlichung, Bibliographie

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai (2009)
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09). Cambridge, UK (01.04.2009-03.04.2009)
doi: 10.1007/978-3-642-36213-2_9
Konferenzveröffentlichung, Bibliographie

Sadeghi, Ahmad-Reza ; Schneider, Thomas (2008)
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
In: 11. International Conference on Information Security and Cryptology (ICISC'08)
doi: 10.1007/978-3-642-00730-9_21
Buchkapitel, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2008)
Improved Garbled Circuit: Free XOR Gates and Applications.
35. International Colloquium on Automata, Languages and Programming (ICALP'08). Reykjavik, Iceland (07.07.2008-11.07.2008)
doi: 10.1007/978-3-540-70583-3_40
Konferenzveröffentlichung, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas ; Strehl, Volker (2008)
Practical Secure Function Evaluation.
8. Kryptotag. Tübingen, Germany (11.04.2008)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2008)
Practical secure function evaluation.
Informatiktage 2008 - Fachwissenschaftlicher Informatik-Kongress. Bonn, Germany (14.03.2008 - 15.03.2008)
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2008)
Practical Secure Function Evaluation.
Friedrich-Alexander-Universität Erlangen-Nürnberg
Diplom- oder Magisterarbeit, Bibliographie

Kolesnikov, Vladimir ; Schneider, Thomas (2008)
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
12th International Conference on Financial Cryptography and Data Security (FC'08). Cozumel, Mexico (28.01.2008 - 31.01.2008)
doi: 10.1007/978-3-540-85230-8_7
Konferenzveröffentlichung, Bibliographie

Schneider, Thomas (2007)
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
Bachelorarbeit, Bibliographie

Diese Liste wurde am Tue Dec 17 02:58:23 2024 CET generiert.