ABY-A framework for efficient mixed-protocol secure two-party computation. D Demmler, T Schneider, M Zohner NDSS, 2015 | 1012 | 2015 |
Scalable private set intersection based on OT extension B Pinkas, T Schneider, M Zohner ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-35, 2018 | 633 | 2018 |
More efficient oblivious transfer and extensions for faster secure computation G Asharov, Y Lindell, T Schneider, M Zohner Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 525 | 2013 |
Ciphers for MPC and FHE MR Albrecht, C Rechberger, T Schneider, T Tiessen, M Zohner Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 504 | 2015 |
Phasing: Private set intersection using permutation-based hashing B Pinkas, T Schneider, G Segev, M Zohner 24th USENIX Security Symposium (USENIX Security 15), 515-530, 2015 | 376 | 2015 |
Intelligent machine homicide: Breaking cryptographic devices using support vector machines A Heuser, M Zohner International Workshop on Constructive Side-Channel Analysis and Secure …, 2012 | 268 | 2012 |
GMW vs. Yao? Efficient secure two-party computation with low depth circuits T Schneider, M Zohner Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 171 | 2013 |
More efficient oblivious transfer extensions with security for malicious adversaries G Asharov, Y Lindell, T Schneider, M Zohner Annual International Conference on the Theory and Applications of …, 2015 | 128 | 2015 |
GSHADE: Faster privacy-preserving distance computation and biometric identification J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 127 | 2014 |
Pushing the communication barrier in secure computation using lookup tables G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ... Cryptology ePrint Archive, 2018 | 83 | 2018 |
More efficient oblivious transfer extensions G Asharov, Y Lindell, T Schneider, M Zohner Journal of Cryptology 30, 805-858, 2017 | 76 | 2017 |
Privacy-preserving interdomain routing at internet scale G Asharov, D Demmler, M Schapira, T Schneider, G Segev, S Shenker, ... Cryptology ePrint Archive, 2017 | 54 | 2017 |
{Ad-Hoc} secure {Two-Party} computation on mobile devices using hardware tokens D Demmler, T Schneider, M Zohner 23rd USENIX Security Symposium (USENIX Security 14), 893-908, 2014 | 45 | 2014 |
Improved algebraic side-channel attack on AES MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann 2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012 | 37 | 2012 |
Improved algebraic side-channel attack on AES MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann Journal of Cryptographic Engineering 3, 139-156, 2013 | 31 | 2013 |
Side channel analysis of the SHA-3 finalists M Zohner, M Kasper, M Stöttinger, SA Huss 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012 | 31 | 2012 |
Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework SA Huss, M Stöttinger, M Zohner Number Theory and Cryptography: Papers in Honor of Johannes Buchmann on the …, 2013 | 19 | 2013 |
Butterfly-attack on Skein’s modular addition M Zohner, M Kasper, M Stöttinger Constructive Side-Channel Analysis and Secure Design: Third International …, 2012 | 11 | 2012 |
An adaptable, modular, and autonomous side-channel vulnerability evaluator M Zohner, M Stöttinger, SA Huss, O Stein 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 43-48, 2012 | 8 | 2012 |
Scalable Private Set Intersection Based on OT Extension1 B Pinkas, T Schneider, M Zohner | 4 | |