Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ágnes Kiss
@inproceedings{DBLP:conf/uss/StaicuRK023, author = {Cristian{-}Alexandru Staicu and Sazzadur Rahaman and {\'{A}}gnes Kiss and Michael Backes}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6133--6150}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/staicu}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/StaicuRK023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Kiss21, author = {{\'{A}}gnes Kiss}, title = {Efficient Private Function Evaluation}, school = {Technical University of Darmstadt, Germany}, year = {2021}, url = {http://tuprints.ulb.tu-darmstadt.de/17496/}, urn = {urn:nbn:de:tuda-tuprints-174969}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Kiss21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-11169, author = {Cristian{-}Alexandru Staicu and Sazzadur Rahaman and {\'{A}}gnes Kiss and Michael Backes}, title = {Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages}, journal = {CoRR}, volume = {abs/2111.11169}, year = {2021}, url = {https://arxiv.org/abs/2111.11169}, eprinttype = {arXiv}, eprint = {2111.11169}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-11169.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JarvinenKSTY20, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {Faster privacy-preserving location proximity schemes for circles and polygons}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {3}, pages = {254--265}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0125}, doi = {10.1049/IET-IFS.2019.0125}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/JarvinenKSTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AlhassanGKS20, author = {Masaud Y. Alhassan and Daniel G{\"{u}}nther and {\'{A}}gnes Kiss and Thomas Schneider}, title = {Efficient and Scalable Universal Circuits}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {1216--1271}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09346-z}, doi = {10.1007/S00145-020-09346-Z}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AlhassanGKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccsscc/BuchmannDFKSSTZ20, author = {Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and {\'{A}}gnes Kiss and Ahmad{-}Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni}, title = {{SAFE:} {A} Secure and Efficient Long-Term Distributed Storage System}, booktitle = {Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference, October 6, 2020}, pages = {8--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384942.3406868}, doi = {10.1145/3384942.3406868}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccsscc/BuchmannDFKSSTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HolzKRS20, author = {Marco Holz and {\'{A}}gnes Kiss and Deevashwer Rathee and Thomas Schneider}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Linear-Complexity Private Function Evaluation is Practical}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {401--420}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_20}, doi = {10.1007/978-3-030-59013-0\_20}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HolzKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-04449, author = {Rosario Cammarota and Matthias Schunter and Anand Rajan and Fabian Boemer and {\'{A}}gnes Kiss and Amos Treiber and Christian Weinert and Thomas Schneider and Emmanuel Stapf and Ahmad{-}Reza Sadeghi and Daniel Demmler and Huili Chen and Siam Umar Hussain and M. Sadegh Riazi and Farinaz Koushanfar and Saransh Gupta and Tajana Simunic Rosing and Kamalika Chaudhuri and Hamid Nejatollahi and Nikil D. Dutt and Mohsen Imani and Kim Laine and Anuj Dubey and Aydin Aysu and Fateme Sadat Hosseini and Chengmo Yang and Eric Wallace and Pamela Norton}, title = {Trustworthy {AI} Inference Systems: An Industry Research View}, journal = {CoRR}, volume = {abs/2008.04449}, year = {2020}, url = {https://arxiv.org/abs/2008.04449}, eprinttype = {arXiv}, eprint = {2008.04449}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-04449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannDFKSSTZ20, author = {Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and {\'{A}}gnes Kiss and Ahmad{-}Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni}, title = {{SAFE:} {A} Secure and Efficient Long-Term Distributed Storage System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2020}, url = {https://eprint.iacr.org/2020/690}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannDFKSSTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolzKRS20, author = {Marco Holz and {\'{A}}gnes Kiss and Deevashwer Rathee and Thomas Schneider}, title = {Linear-Complexity Private Function Evaluation is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2020}, url = {https://eprint.iacr.org/2020/853}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HolzKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KissNLAS19, author = {{\'{A}}gnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider}, title = {SoK: Modular and Efficient Private Decision Tree Evaluation}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {2}, pages = {187--208}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0026}, doi = {10.2478/POPETS-2019-0026}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KissNLAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FelsenK0W19, author = {Susanne Felsen and {\'{A}}gnes Kiss and Thomas Schneider and Christian Weinert}, editor = {Radu Sion and Charalampos Papamanthou}, title = {Secure and Private Function Evaluation with Intel {SGX}}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {165--181}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3358919}, doi = {10.1145/3338466.3358919}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FelsenK0W19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0004KS019, author = {Daniel G{\"{u}}nther and {\'{A}}gnes Kiss and Lukas Scheidel and Thomas Schneider}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2541--2543}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363251}, doi = {10.1145/3319535.3363251}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0004KS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KissSS19, author = {{\'{A}}gnes Kiss and Oliver Schick and Thomas Schneider}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {Web Application for Privacy-preserving Scheduling using Secure Computation}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {456--463}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007947704560463}, doi = {10.5220/0007947704560463}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/KissSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlhassanGKS19, author = {Masaud Y. Alhassan and Daniel G{\"{u}}nther and {\'{A}}gnes Kiss and Thomas Schneider}, title = {Efficient and Scalable Universal Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2019}, url = {https://eprint.iacr.org/2019/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlhassanGKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/0001K0TY18, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, editor = {Jan Camenisch and Panos Papadimitratos}, title = {Faster Privacy-Preserving Location Proximity Schemes}, booktitle = {Cryptology and Network Security - 17th International Conference, {CANS} 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11124}, pages = {3--22}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00434-7\_1}, doi = {10.1007/978-3-030-00434-7\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/0001K0TY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JarvinenKSTY18, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {Faster Privacy-Preserving Location Proximity Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2018}, url = {https://eprint.iacr.org/2018/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JarvinenKSTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissNLAS18, author = {{\'{A}}gnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider}, title = {SoK: Modular and Efficient Private Decision Tree Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2018}, url = {https://eprint.iacr.org/2018/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissNLAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KissL0AP17, author = {{\'{A}}gnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas}, title = {Private Set Intersection for Unequal Set Sizes with Mobile Applications}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {177--197}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0044}, doi = {10.1515/POPETS-2017-0044}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/KissL0AP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GuntherK017, author = {Daniel G{\"{u}}nther and {\'{A}}gnes Kiss and Thomas Schneider}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {More Efficient Universal Circuit Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {443--470}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_16}, doi = {10.1007/978-3-319-70697-9\_16}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GuntherK017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissLSAP17, author = {{\'{A}}gnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas}, title = {Private Set Intersection for Unequal Set Sizes with Mobile Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2017}, url = {http://eprint.iacr.org/2017/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissLSAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherK017, author = {Daniel G{\"{u}}nther and {\'{A}}gnes Kiss and Thomas Schneider}, title = {More Efficient Universal Circuit Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2017}, url = {http://eprint.iacr.org/2017/798}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherK017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/KissKRS16, author = {{\'{A}}gnes Kiss and Juliane Kr{\"{a}}mer and Pablo Rauzy and Jean{-}Pierre Seifert}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Algorithmic Countermeasures Against Fault Attacks and Power Analysis for {RSA-CRT}}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {111--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_7}, doi = {10.1007/978-3-319-43283-0\_7}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/KissKRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Kiss016, author = {{\'{A}}gnes Kiss and Thomas Schneider}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Valiant's Universal Circuit is Practical}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {699--728}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_27}, doi = {10.1007/978-3-662-49890-3\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Kiss016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiss016, author = {{\'{A}}gnes Kiss and Thomas Schneider}, title = {Valiant's Universal Circuit is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2016}, url = {http://eprint.iacr.org/2016/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiss016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissKRS16, author = {{\'{A}}gnes Kiss and Juliane Kr{\"{a}}mer and Pablo Rauzy and Jean{-}Pierre Seifert}, title = {Algorithmic Countermeasures Against Fault Attacks and Power Analysis for {RSA-CRT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2016}, url = {http://eprint.iacr.org/2016/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissKRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/macis/KissKS15, author = {{\'{A}}gnes Kiss and Juliane Kr{\"{a}}mer and Anke St{\"{u}}ber}, editor = {Ilias S. Kotsireas and Siegfried M. Rump and Chee K. Yap}, title = {On the Optimality of Differential Fault Analyses on {CLEFIA}}, booktitle = {Mathematical Aspects of Computer and Information Sciences - 6th International Conference, {MACIS} 2015, Berlin, Germany, November 11-13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9582}, pages = {181--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-32859-1\_15}, doi = {10.1007/978-3-319-32859-1\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/macis/KissKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KramerSK14, author = {Juliane Kr{\"{a}}mer and Anke St{\"{u}}ber and {\'{A}}gnes Kiss}, title = {On the Optimality of Differential Fault Analyses on {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2014}, url = {http://eprint.iacr.org/2014/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KramerSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.