default search action
Thomas Schneider 0003
Person information
- affiliation: TU Darmstadt, European Center for Security and Privacy by Design, Germany
- affiliation: Darmstadt University of Technology, Department of Computer Science, Germany
- affiliation (PhD 2012): Ruhr-Universität Bochum, Horst Görtz Institute for IT-Security, Germany
- not to be confused with: Thomas Schneider 0006
Other persons with the same name
- Thomas Schneider — disambiguation page
- Thomas Schneider 0001 — Technical University Munich, Limnological Station Iffeldorf, Germany
- Thomas Schneider 0002 — University of Bremen, Faculty of Mathematics, Computer Science, Germany (and 2 more)
- Thomas Schneider 0004 — Vienna University of Technology, Austria
- Thomas Schneider 0005 — SAP AG, Germany
- Thomas Schneider 0006 — Darmstadt University of Technology, Institute of Microelectronic Systems, Germany
- Thomas Schneider 0007 — ETH Zurich, Switzerland
- Thomas Schneider 0008 — Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
- Thomas Schneider 0009 — University of Trier, Germany
- Thomas Schneider 0010 — TU Braunschweig, Germany (and 2 more)
- Thomas Schneider 0011 — Siemens
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c118]Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao:
Secure Noise Sampling for DP in MPC with Finite Precision. ARES 2024: 25:1-25:12 - [c117]Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann:
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. AsiaCCS 2024 - [c116]Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, Amos Treiber:
Evaluating Leakage Attacks Against Relational Encrypted Search. CCSW@CCS 2024: 15-28 - [c115]Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame:
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. DAC 2024: 323:1-323:6 - [c114]Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. ESORICS (1) 2024: 3-23 - [c113]Linda Seyda, Andreas Brüggemann, Gerrit Hornung, Thomas Schneider:
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag. INFORMATIK 2024: 153-167 - [c112]Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Efficient and Robust Secure Quantized Aggregation. SaTML 2024: 490-511 - [c111]Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. SP 2024: 503-522 - [c110]Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider:
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. SP 2024: 4753-4771 - [c109]Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider:
Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing. WPES@CCS 2024: 34-39 - [i99]Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". CoRR abs/2409.19964 (2024) - [i98]Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, Hossein Yalame:
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation. IACR Cryptol. ePrint Arch. 2024: 533 (2024) - [i97]Leonie Reichert, Gowri R. Chandran, Phillipp Schoppmann, Thomas Schneider, Björn Scheuermann:
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. IACR Cryptol. ePrint Arch. 2024: 556 (2024) - [i96]Gowri R. Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, Thomas Schneider:
Encrypted MultiChannel Communication (EMC2): Johnny Should Use Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 1407 (2024) - [i95]Gowri R. Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert:
Concretely Efficient Private Set Union via Circuit-based PSI. IACR Cryptol. ePrint Arch. 2024: 1494 (2024) - [i94]Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". IACR Cryptol. ePrint Arch. 2024: 1504 (2024) - [i93]Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, Amos Treiber:
Evaluating Leakage Attacks Against Relational Encrypted Search. IACR Cryptol. ePrint Arch. 2024: 1525 (2024) - [i92]Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame:
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation. IACR Cryptol. ePrint Arch. 2024: 1561 (2024) - 2023
- [j18]Raine Nieminen, Thomas Schneider:
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires. J. Cryptol. 36(4): 34 (2023) - [j17]Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". IEEE Trans. Inf. Forensics Secur. 18: 1407-1409 (2023) - [j16]Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. ACM Trans. Priv. Secur. 26(1): 2:1-2:44 (2023) - [c108]Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. AsiaCCS 2023: 649-663 - [c107]Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame:
Breaking the Size Barrier: Universal Circuits Meet Lookup Tables. ASIACRYPT (1) 2023: 3-37 - [c106]Gowri R. Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, Thomas Schneider:
Poster: Secure and Differentially Private kth Ranked Element. CCS 2023: 3624-3626 - [c105]Dominique Dittert, Thomas Schneider, Amos Treiber:
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search. CCSW@CCS 2023: 3-15 - [c104]Gowri R. Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh:
PrivMail: A Privacy-Preserving Framework for Secure Emails. ESORICS (2) 2023: 145-165 - [c103]Laura Hetz, Thomas Schneider, Christian Weinert:
Scaling Mobile Private Contact Discovery to Billions of Users. ESORICS (1) 2023: 455-476 - [c102]Thomas Schneider, Hossein Yalame, Michael Yonli:
Griffin: Towards Mixed Multi-Key Homomorphic Encryption. SECRYPT 2023: 147-158 - [c101]Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SafeFL: MPC-friendly Framework for Private and Robust Federated Learning. SP (Workshops) 2023: 69-76 - [c100]Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations. SP 2023: 515-533 - [i91]Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame:
HyFL: A Hybrid Approach For Private Federated Learning. CoRR abs/2302.09904 (2023) - [i90]Thomas Reinhold, Philipp Kuehn, Daniel Günther, Thomas Schneider, Christian Reuter:
ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships. CoRR abs/2306.00589 (2023) - [i89]Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan:
Attesting Distributional Properties of Training Data for Machine Learning. CoRR abs/2308.09552 (2023) - [i88]Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version). IACR Cryptol. ePrint Arch. 2023: 499 (2023) - [i87]Raine Nieminen, Thomas Schneider:
Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires. IACR Cryptol. ePrint Arch. 2023: 530 (2023) - [i86]Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning. IACR Cryptol. ePrint Arch. 2023: 555 (2023) - [i85]Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2023: 563 (2023) - [i84]Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Efficient and Robust Secure Quantized Aggregation. IACR Cryptol. ePrint Arch. 2023: 652 (2023) - [i83]Thomas Schneider, Hossein Yalame, Michael Yonli:
Griffin: Towards Mixed Multi-Key Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 654 (2023) - [i82]Laura Hetz, Thomas Schneider, Christian Weinert:
Scaling Mobile Private Contact Discovery to Billions of Users. IACR Cryptol. ePrint Arch. 2023: 758 (2023) - [i81]Gowri R. Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh:
PrivMail: A Privacy-Preserving Framework for Secure Emails. IACR Cryptol. ePrint Arch. 2023: 1294 (2023) - [i80]Dominique Dittert, Thomas Schneider, Amos Treiber:
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search. IACR Cryptol. ePrint Arch. 2023: 1465 (2023) - [i79]Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, Liang Zhao:
Secure Noise Sampling for DP in MPC with Finite Precision. IACR Cryptol. ePrint Arch. 2023: 1594 (2023) - [i78]Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version). IACR Cryptol. ePrint Arch. 2023: 1744 (2023) - [i77]Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider:
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. IACR Cryptol. ePrint Arch. 2023: 1893 (2023) - 2022
- [j15]Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, Thomas Schneider:
SPIKE: secure and private investigation of the kidney exchange problem. BMC Medical Informatics Decis. Mak. 22(1): 253 (2022) - [j14]Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. ACM Trans. Priv. Secur. 25(2): 8:1-8:35 (2022) - [c99]Andreas Brüggemann, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Poster: Efficient Three-Party Shuffling Using Precomputation. CCS 2022: 3331-3333 - [c98]Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh:
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. CCS 2022: 3351-3353 - [c97]Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko:
PEA: Practical Private Epistasis Analysis Using MPC. ESORICS (3) 2022: 320-339 - [c96]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. EuroS&P 2022: 90-108 - [c95]Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider:
Comparison-based MPC in Star Topology. SECRYPT 2022: 69-82 - [c94]Christopher van der Beets, Raine Nieminen, Thomas Schneider:
FAPRIL: Towards Faster Privacy-preserving Fingerprint-based Localization. SECRYPT 2022: 108-120 - [c93]Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider:
FLAME: Taming Backdoors in Federated Learning. USENIX Security Symposium 2022: 1415-1432 - [c92]Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider:
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. USENIX Security Symposium 2022: 1759-1776 - [c91]Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann:
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies. WPES@CCS 2022: 69-82 - [c90]Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer:
Secure Maximum Weight Matching Approximation on General Graphs. WPES@CCS 2022: 83-87 - [i76]Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, Thomas Schneider:
SPIKE: Secure and Private Investigation of the Kidney Exchange problem. CoRR abs/2204.09937 (2022) - [i75]Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh:
Privacy-Preserving Epidemiological Modeling on Mobile Graphs. CoRR abs/2206.00539 (2022) - [i74]Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Secure Quantized Aggregation for Federated Learning. CoRR abs/2210.07376 (2022) - [i73]Christopher van der Beets, Raine Nieminen, Thomas Schneider:
FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization. IACR Cryptol. ePrint Arch. 2022: 564 (2022) - [i72]Gowri R. Chandran, Carmit Hazay, Robin Hundt, Thomas Schneider:
Comparison-Based MPC in Star Topology (Full Version). IACR Cryptol. ePrint Arch. 2022: 574 (2022) - [i71]Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. IACR Cryptol. ePrint Arch. 2022: 875 (2022) - [i70]Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer:
Secure Maximum Weight Matching Approximation on General Graphs (Full Version). IACR Cryptol. ePrint Arch. 2022: 1173 (2022) - [i69]Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko:
PEA: Practical private epistasis analysis using MPC. IACR Cryptol. ePrint Arch. 2022: 1185 (2022) - [i68]Amos Treiber, Dirk Müllmann, Thomas Schneider, Indra Spiecker genannt Döhmann:
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies. IACR Cryptol. ePrint Arch. 2022: 1242 (2022) - [i67]Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame:
Improved Universal Circuits using Lookup Tables. IACR Cryptol. ePrint Arch. 2022: 1652 (2022) - 2021
- [j13]Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame:
SoK: Efficient Privacy-preserving Clustering. Proc. Priv. Enhancing Technol. 2021(4): 225-248 (2021) - [c89]Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame:
LLVM-Based Circuit Compilation for Practical Secure Computation. ACNS (2) 2021: 99-121 - [c88]Jean-Pierre Münch, Thomas Schneider, Hossein Yalame:
VASA: Vector AES Instructions for Security Applications. ACSAC 2021: 131-145 - [c87]Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider:
Privacy-preserving Density-based Clustering. AsiaCCS 2021: 658-671 - [c86]Daniel Günther, Thomas Schneider, Felix Wiegand:
Revisiting Hybrid Private Information Retrieval. CCS 2021: 2408-2410 - [c85]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation. HOST 2021: 147-157 - [c84]Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. NDSS 2021 - [c83]Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame:
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. SECRYPT 2021: 173-184 - [c82]Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. SECRYPT 2021: 444-451 - [c81]Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. SP (Workshops) 2021: 56-62 - [c80]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. USENIX Security Symposium 2021: 2165-2182 - [c79]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. USENIX Security Symposium 2021: 3577-3594 - [c78]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop. WISEC 2021: 371-373 - [i66]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. CoRR abs/2101.02281 (2021) - [i65]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. IACR Cryptol. ePrint Arch. 2021: 25 (2021) - [i64]Thomas Schneider, Oleksandr Tkachenko:
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. IACR Cryptol. ePrint Arch. 2021: 29 (2021) - [i63]Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. IACR Cryptol. ePrint Arch. 2021: 386 (2021) - [i62]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 481 (2021) - [i61]Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, Christian Weinert:
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. IACR Cryptol. ePrint Arch. 2021: 521 (2021) - [i60]Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider:
Privacy-preserving Density-based Clustering. IACR Cryptol. ePrint Arch. 2021: 612 (2021) - [i59]Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, Hossein Yalame:
LLVM-based Circuit Compilation for Practical Secure Computation. IACR Cryptol. ePrint Arch. 2021: 797 (2021) - [i58]Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame:
SoK: Efficient Privacy-preserving Clustering. IACR Cryptol. ePrint Arch. 2021: 809 (2021) - [i57]Daniel Günther, Maurice Heymann, Benny Pinkas, Thomas Schneider:
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. IACR Cryptol. ePrint Arch. 2021: 823 (2021) - [i56]Hannah Keller, Helen Möllering, Thomas Schneider, Hossein Yalame:
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. IACR Cryptol. ePrint Arch. 2021: 825 (2021) - [i55]Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, Christian Weinert:
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. IACR Cryptol. ePrint Arch. 2021: 893 (2021) - [i54]Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli:
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data. IACR Cryptol. ePrint Arch. 2021: 1035 (2021) - [i53]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1153 (2021) - [i52]Jean-Pierre Münch, Thomas Schneider, Hossein Yalame:
VASA: Vector AES Instructions for Security Applications. IACR Cryptol. ePrint Arch. 2021: 1493 (2021) - 2020
- [j12]Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang:
Faster privacy-preserving location proximity schemes for circles and polygons. IET Inf. Secur. 14(3): 254-265 (2020) - [j11]Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, Thomas Schneider:
Efficient and Scalable Universal Circuits. J. Cryptol. 33(3): 1216-1271 (2020) - [j10]Thomas Schneider, Amos Treiber:
A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC". IEEE Trans. Parallel Distributed Syst. 31(3): 543-546 (2020) - [c77]Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame:
MP2ML: a mixed-protocol machine learning framework for private inference. ARES 2020: 14:1-14:10 - [c76]Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck:
Secure Two-Party Computation in a Quantum World. ACNS (1) 2020: 461-480 - [c75]Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. SBC@AsiaCCS 2020: 8-13 - [c74]Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, Tim Weißmantel:
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation. CANS 2020: 505-525 - [c73]Thomas Schneider:
Engineering Privacy-Preserving Machine Learning Protocols. PPMLP@CCS 2020: 3-4 - [c72]Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting:
CryptoSPN: Expanding PPML beyond Neural Networks. PPMLP@CCS 2020: 9-14 - [c71]Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame:
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. PPMLP@CCS 2020: 43-45 - [c70]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. DATE 2020: 460-465 - [c69]Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting:
CryptoSPN: Privacy-Preserving Sum-Product Network Inference. ECAI 2020: 1946-1953 - [c68]Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider:
Linear-Complexity Private Function Evaluation is Practical. ESORICS (2) 2020: 401-420 - [i51]Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, Kristian Kersting:
CryptoSPN: Privacy-preserving Sum-Product Network Inference. CoRR abs/2002.00801 (2020) - [i50]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. CoRR abs/2007.02351 (2020) - [i49]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020) - [i48]Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, Patrick Struck:
Secure Two-Party Computation in a Quantum World. IACR Cryptol. ePrint Arch. 2020: 411 (2020) - [i47]Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, Shaza Zeitouni:
SAFE: A Secure and Efficient Long-Term Distributed Storage System. IACR Cryptol. ePrint Arch. 2020: 690 (2020) - [i46]Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame:
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. IACR Cryptol. ePrint Arch. 2020: 721 (2020) - [i45]Marco Holz, Ágnes Kiss, Deevashwer Rathee, Thomas Schneider:
Linear-Complexity Private Function Evaluation is Practical. IACR Cryptol. ePrint Arch. 2020: 853 (2020) - [i44]Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. IACR Cryptol. ePrint Arch. 2020: 1119 (2020) - [i43]Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. IACR Cryptol. ePrint Arch. 2020: 1137 (2020) - [i42]