Publications
2017
- M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider and Farinaz Koushanfar:
Toward practical secure stable matching
Proceedings on Privacy Enhancing Technologies (PoPETs), 2017
- J. B. Nielsen, T. Schneider and R. Trifiletti:
Constant round maliciously secure 2PC with function-independent preprocessing using LEGO
Network and Distributed System Security (NDSS’17), 2017
- G. Dessouky, F. Koushanfar, A.-R. Sadeghi, T. Schneider, S. Zeitouni and M. Zohner:
Pushing the communication barrier in secure computation using lookup tables
Network and Distributed System Security (NDSS’17), 2017
2016
- David W. Archer, Dan Bogdanov, Benny Pinkas, Pille Pullonen:
Maturity and Performance of Programmable Secure Computation
IEEE Security & Privacy Magazine, September-October 2016
- Gilad Asharov, Yehuda Lindell, Thomas Schneider and Michael Zohner:
More Efficient Oblivious Transfer Extensions
Journal of Cryptology, 2016
- Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira and Thomas Schneider:
Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper)
Applied Networking Research Workshop (ANRW'16), July 16, 2016
- Ebrahim M. Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider, Ahmad-Reza Sadeghi and Farinaz Koushanfar:
GarbledCPU: A MIPS processor for secure computation in hardware
Design Automation Conference (DAC'16), June 5-9, 2016
- Ágnes Kiss, Juliane Krämer, Pablo Rauzy and Jean-Pierre Seifert:
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Constructive Side-Channel Analysis and Secure Design (COSADE), April 14-15, 2016
- Ágnes Kiss, Thomas Schneider:
Valiant’s Universal Circuit is Practical
Eurocrypt 2016
- Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft:
Confidential Benchmarking based on Multiparty Computation
Financial Cryptography and Data Security 2016
- Gerald Spindler:
Die neue EU-Datenschutz-Grundverordnung
Handelsblatt Fachmedien GmbH
- Gerald Spindler:
Verbandsklagen und Datenschutz – das neue Verbandsklagerecht - Neuregelungen und Probleme
C.H.BECK oHG
- T. Shrimpton, M. Stam, B. Warinschi:
A modular treatment of cryptographic APIs: The Symmetric Key case
Springer
- M. Barbosa, B. Portela, G. Scerri, B. Warinschi:
Foundations of hardware based attested computation and applications to SGX
IEEE
- S. Costea, B. Warinschi:
Secure Software Licensing: Models, Constructions, and Proofs
IEEE
- D. Bernhard, M. Fischlin, B. Warinschi:
On the Hardness of Proving CCA-Security of Signed ElGamal
Springer
- M. Sadegh Riazi, E. M. Songhori, A. R. Sadeghi, T. Schneider, F. Koushanfar:
Toward practical secure stable matching
De Gruyter Open
- Dan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht:
Privacy-preserving tax fraud detection in the cloud with realistic data volumes
Cybernetica
- Dan Bogdanov, Liina Kamm, Sven Laur and Ville Sokk:
Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data
IEEE
- Gerald Spindler, Philipp Schmechel:
Personal Data and Encryption in the European General Data Protection Regulation
Open Access Journal
- Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:
Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
Springer
- Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen:
Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming
Springer
2015
- Florian Kerschbaum:
Frequency-Hiding Order-Preserving Encryption
ACM Conference on Computer and Communications Security (CCS 2015)
- David Bernhard, Marc Fischlin, Bogdan Warinschi:
Adaptive Proofs of Knowledge in the Random Oracle Model
IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2015)
- Anna Lisa Ferrara, Georg Fachsbauer, Bogdan Warinschi:
Policy Privacy in Cryptographic Access Control
28th IEEE Computer Security Foundations Symposium (CSF 2015)
- Sebastiaan de Hoogh, Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Outsourcing and Application to Linear Programming
Applications of Secure Multiparty Computation (Book)
- Berry Schoenmakers, Meilof Veeningen:
Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
13th International Conference on Applied Cryptography and Network Security (ACNS 2015)
- Tung Chou, Claudio Orlandi:
The Simplest Protocol for Oblivious Transfer
Latincrypt 2015
- Julian Kurz:
Capacity Planning for a Maintenance Service Provider with Advanced Information
European Journal of Operational Research, 2015
- Tore Kasper Frederiksen, Jesper Buus Nielsen, Claudio Orlandi:
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge
Eurocrypt, 2015
- Ignacio Cascudo, Ivan Damgård, Bernardo Machado David, Irene Giacomelli, Jesper Buus Nielsen, Roberto Trifiletti:
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
Public Key Cryptography (PKC), 2015
- Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation
CHES: 164-184, 2015
- Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
A Masked Ring-LWE Implementation
CHES: 683-702, 2015
- Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede:
Efficient software implementation of ring-LWE encryption
DATE: 339-344, 2015
- V. Bellandi, S. Cimato, E. Damiani, G. Gianini, A. Zilli:
Towards Economics Aware Risk Assessment on the Cloud
IEEE Security & Privacy, vol. 13, no. 6, 2015, pp. 30-37
- Ernesto Damiani, Valerio Bellandi, Stelvio Cimato, and Gabriele Gianini:
Possibilistic assessment of process-related disclosure risks on the cloud
In "Computational Intelligence and Quantitative Software Engineering", editors: W. Pedrycz, G. Succi, A. Sillitti, 2015
- N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
SEDA: Scalable Device Attestation
ACM Conference on Computer and Communications Security (CCS), October, 2015
- Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
Automated synthesis of optimized circuits for secure computation
In 22nd ACM Conference on Computer and Communications Security (CCS), October 12-16, 2015
- Benny Pinkas, Yehuda Lindell, Shay Gueron, Ariel Nof:
Fast Garbling of Circuits Under Standard Assumptions
In 22nd ACM Conference on Computer and Communications Security (CCS), October 12-16, 2015
- Jian Liu, N. Asokan, Benny Pinkas:
Secure Deduplication of Encrypted Data without Additional Independent Servers
In 22nd ACM Conference on Computer and Communications Security (CCS), October 12-16, 2015
- Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova:
Time to rethink: Trust brokerage using trusted execution environments
In 8th International Conference on Trust and Trustworthy Computing (TRUST), August 24-26, 2015
- Benny Pinkas, Yehuda Lindell, Nigel P. Smart, Avishay Yanai:
Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
In 35th International Cryptology Conference (CRYPTO), August 16-20, 2015
- FP7 ICT Trust and Security Projects Handbook
The PRACTICE project was included in the Handbook of ICT Security and Trust by the FP7 project “SecCOrd” - Benny Pinkas (BIU), Thomas Schneider (TUDA), Gil Segev, Michael Zohner (TUDA):
Phasing: Private set intersection using permutation-based hashing
In 24th USENIX Security Symposium 2015, August 12-14, 2015
- Dan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht:
How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation (Short Paper)
In Financial Crypto, 2015
- Michael Backes, Manuel Barbosa, Dario Fiore, Raphael Reischuk:
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
In Financial Crypto, 2015
- Meril Vaht:
The Analysis and Design of a Privacy-Preserving Survey System
Master's thesis of the University of Tartu, 21 Mai, 2015
- Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi (TUDA), Thomas Schneider (TUDA), Farinaz Koushanfar:
TinyGarble: Highly compressed and scalable sequential garbled circuits
In 36th IEEE Symposium on Security and Privacy (IEEE S&P'15), May 18-20, 2015
- Gilad Asharov, Yehuda Lindell (BIU), Thomas Schneider (TUDA), Michael Zohner (TUDA):
More efficient oblivious transfer extensions with security for malicious adversaries
In 34th Advances in Cryptology - EUROCRYPT 2015. April 26-30, 2015
- Martin Albrecht, Christian Rechberger, Thomas Schneider (TUDA), Tyge Tiessen, Michael Zohner (TUDA):
Ciphers for MPC and FHE
In 34th Advances in Cryptology - EUROCRYPT 2015. April 26-30, 2015
- Florian Kerschbaum (SAP):
Oblivious Outsourcing of Garbled Circuit Generation
In ACM SAC. April 13-17, 2015
- Yehuda Lindell:
An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle
Theory of Cryptography Conference (TCC), March 23-25, 2015
- Daniel Demmler, Thomas Schneider, Michael Zohner (TUDA):
ABY - A framework for efficient mixed-protocol secure two-party computation
21st Annual Network and Distributed System Security Symposium (NDSS'15). February 8-11, 2015
2014
- Franz Ferdinand Brasser, Mihai Bucicoiu, Ahmad-Reza Sadeghi
Swap and Play: Live Updating Hypervisors and its Application to Xen
ACM Cloud Computing Security Workshop (CCSW), 2014
- Ernesto Damiani, Stelvio Cimato, Gabriele Gianini:
A Risk Model for Cloud Processes
ISC international journal of information security (iSecure)
- Dario Catalano, Dario Fiore, and Bogdan Warinschi:
Homomorphic Signatures with Efficient Verification for Polynomial Functions
Crypto 2014
- Stephan Heuser, Adwait Nadkarni, William Enck and Ahmad-Reza Sadeghi:
ASM: A Programmable Interface for Extending Android Security
USENIX Security Symposium (USENIX Security)
- Markus Miettinen, N. Asokan, Thien Duc Nguyen and Ahmad-Reza Sadeghi:
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
ACM Conference on Computer and Communications Security (CCS)
- Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:
A Framework for Outsourcing of Secure Computation
ACM Cloud Computing Security Workshop (CCSW)
- Ivan Darmgard, Rasmus Lauritsen, Tomas Toft:
An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation
9th Conference on Security and Cryptography for Networks
- Tore Kasper Frederiksen (AU), Thomas P. Jakobsen, Jesper Buus Nielsen:
Faster Maliciously Secure Two-Party Computation Using the GPU
9th Conference on Security and Cryptography for Networks
- Ivan Darmgard (AU), Rasmus Lauritsen, Tomas Toft:
Publicity Auditable Secure Multy-Party Computation
9th Conference on Security and Cryptography for Networks
- Matthis Grenzer (UGOE), Niklas Heitmueller (UGOE):
Zur Problematik des Personenbezuges beim Cloud Computing
Published in the legal journal PinG - Privacy in Germany, Edition 06/2014
- Daniel Demmler (TUDA), Amir Herzberg (BIU), Thomas Schneider (TUDA):
RAID-PIR: Practical multi-server PIR.
In 6th ACM Cloud Computing Security Workshop (ACM CCSW'14), November 7, 2014
- Florian Kerschbaum (SAP):
Tutorial: Client-Controlled Cloud Encryption.
21st ACM Conference on Computer and Communications Security (CCS), 2014 - Florian Kerschbaum, Axel Schröpfer (SAP):
Optimal Average-Complexity Ideal-Security Order-Preserving Encryption.
21st ACM Conference on Computer and Communications Security (CCS), 2014
- Florian Hahn, Florian Kerschbaum (SAP):
Searchable Encryption with Secure Efficient Updates.
21st ACM Conference on Computer and Communications Security (CCS), 2014
- Sujoy Sinha Roy, Frederik Vercauteren (KUL), Nele Mentens (KUL), Donald Donglong Chen and Ingrid Verbauwhede (KUL):
Compact Ring-LWE Cryptoprocessor.
In Workshop on Cryptographic Hardware and Embedded Systems (CHES), September 23-26, 2014
- Matthias Schneider, Thomas Schneider (TUDA):
Notes on non-interactive secure comparison in "Image feature extraction in the encrypted domain with privacy-preserving SIFT".
In 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), June 11-13, 2014 - Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider (TUDA), Michael Zohner (TUDA):
GSHADE: Faster privacy-preserving distance computation and biometric identification.
In 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), June 11-13, 2014 - Daniel Demmler (TUDA), Thomas Schneider (TUDA), Michael Zohner (TUDA):
Ad-hoc secure two-party computation on mobile devices using hardware tokens.
In 23rd USENIX Security Symposium (USENIX Security'14), August 20-22, 2014 - Benny Pinkas (BIU), Thomas Schneider (TUDA), Michael Zohner (TUDA):
Faster private set intersection based on OT extension.
In 23rd USENIX Security Symposium (USENIX Security'14), August 20-22, 2014 - Florian Kerschbaum (SAP), Thomas Schneider (TUDA), Axel Schröpfer (SAP):
Automatic protocol selection in secure two-party computations.
In 12th International Conference on Applied Cryptography and Network Security (ACNS'14) - Y. Lindell and B. Riva (BIU):
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings.
CRYPTO 2014, August 17-21, 2014