CORE A/A* ranked venues marked in bold.

2025

Gowri R Chandran, Thomas Schneider, Maximilian Stillger, and Christian Weinert. Concretely Efficient Private Set Union via Circuit-Based PSI. In 20. ACM ASIA Conference on Computer and Communications Security (ASIACCS'25), ACM, Ha Noi, Vietnam, August 25-29, 2025. To appear. Online: https://ia.cr/2024/1494. CORE rank A. [ web ]

Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, and Hossein Yalame. CONTRIBUTED TALK: Don't Eject the Impostor – Honest-Majority MPC with Fixed Malicious Parties. 11. Theory and Practice of Multi-Party Computation Workshop (TPMPC'25), Bangalore, India, March 3-6, 2025. [ web ]

Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, and Ajith Suresh. Privacy-Preserving Epidemiological Modeling on Mobile Graphs. IEEE Transactions on Information Forensics and Security (TIFS), February 28, 2025. To appear. Online: https://ia.cr/2020/1546. Code: https://encrypto.de/code/RIPPLE. CORE rank A. [ DOI | pdf | web ]

Daniel Günther. Towards Practical Secure Computation: Exploring Applicability and Function Privacy Trade-offs. PhD thesis, TU Darmstadt, Germany, February 5, 2025. [ pdf ]

2024

Daniel Günther, Joachim Schmidt, Thomas Schneider, and Hossein Yalame. FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation. In 40. Annual Computer Security Applications Conference (ACSAC'24), ACM, Waikiki, Hawaii, USA, December 9-13, 2024. To appear. Online: https://ia.cr/2024/1561. Code: https://encrypto.de/code/FLUENT. CORE rank A. [ web ]

Andreas Brüggemann, Tamino Goldan, and Thomas Schneider. POSTER: PrivForm – A Privacy-Preserving Framework for Online Forms. 40. Annual Computer Security Applications Conference (ACSAC'24) Poster Session, Waikiki, Hawaii, USA, December 9-13, 2024. CORE rank A. [ pdf | poster | web ]

Robin William Hundt, Nora Khayata, and Thomas Schneider. POSTER: SEEC – Memory Safety Meets Efficiency in Secure Two-Party Computation. 40. Annual Computer Security Applications Conference (ACSAC'24) Poster Session, Waikiki, Hawaii, USA, December 9-13, 2024. Code: https://encrypto.de/code/SEEC. CORE rank A. [ pdf | poster | web ]

Patrick Ehrler, Abdelkarim Kati, Thomas Schneider, and Amos Treiber. Evaluating Leakage Attacks Against Relational Encrypted Search. In 16. ACM Cloud Computing Security Workshop (CCSW'24), pages 15–28, ACM, Salt Lake City, USA, October 18, 2024. Online: https://ia.cr/2024/1525. Acceptance rate 41.2%. [ DOI | pdf | web ]

Gowri R Chandran, Kilian Demuth, Kasra Edalatnejad, Sebastian Linsner, Christian Reuter, and Thomas Schneider. Encrypted MultiChannel Communication (EMC2): Johnny should use Secret Sharing. In 23. Workshop on Privacy in the Electronic Society (WPES'24), pages 34–39, ACM, Salt Lake City, USA, October 14, 2024. Short paper. Online: https://ia.cr/2024/1407. Code: https://encrypto.de/emc2. Acceptance rate 50.0%. [ DOI | pdf | web ]

Linda Seyda, Andreas Brüggemann, Gerrit Hornung, and Thomas Schneider. Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag. In INFORMATIK 2024, Workshop Recht und Technik: Datenschutz im Diskurs (RuT'24), LNI, pages 153–167, GI, Wiesbaden, Germany, September 26, 2024. [ DOI | pdf | web ]

Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, and N. Asokan. Attesting Distributional Properties of Training Data for Machine Learning. In 29. European Symposium on Research in Computer Security (ESORICS'24), volume 14982 of LNCS, pages 3–23, Springer, Bydgoszcz, Poland, September 16-20, 2024. Full version: https://arxiv.org/abs/2308.09552. Code: https://github.com/ssg-research/distribution-attestation. Acceptance rate 16.1%. CORE rank A. [ DOI | pdf | web ]

Hossein Yalame. Advancing MPC: From Real-World Applications to LUT-Based Protocols. PhD thesis, TU Darmstadt, Germany, September 10, 2024. [ pdf ]

Hannah Keller, Helen Möllering, Thomas Schneider, Oleksandr Tkachenko, and Liang Zhao. Secure Noise Sampling for DP in MPC with Finite Precision. In 19. International Conference on Availability, Reliability and Security (ARES'24), pages 25:1–25:12, ACM, Vienna, Austria, July 30 - August 2, 2024. Full version: https://ia.cr/2023/1594. Acceptance rate 20.5%. CORE rank B. [ DOI | pdf | web ]

Jan Filipp. Robust combiners for blind signatures. Master's thesis, TU Darmstadt, Germany, July, 2024.

Leonie Reichert, Gowri R Chandran, Phillipp Schoppmann, Thomas Schneider, and Björn Scheuermann. Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage. In 19. ACM ASIA Conference on Computer and Communications Security (ASIACCS'24), pages 1675–1690, ACM, Singapore, July 1-5, 2024. Online: https://ia.cr/2024/556. Code: https://github.com/ReichertL/Menhir. Acceptance rate 19.4%. CORE rank A. [ DOI | pdf | web ]

Heiko Mantel, Joachim Schmidt, Thomas Schneider, Maximilian Stillger, Tim Weißmantel, and Hossein Yalame. HyCaMi: High-Level Synthesis for Cache Side Mitigation. In 61. Design Automation Conference (DAC'24), pages 323:1–223:6, ACM, San Francisco, CA, USA, June 23-27, 2024. Code: https://encrypto.de/code/HyCaMi. Online: https://ia.cr/2024/533. Acceptance rate 23%. CORE rank A. [ DOI | pdf | web ]

Robin Hundt, Nora Khayata, and Thomas Schneider. CONTRIBUTED TALK: SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. 10. Theory and Practice of Multi-Party Computation Workshop (TPMPC'24), Darmstadt, Germany, June 3-6, 2024. [ web ]

Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, and Hossein Yalame. Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. In 45. IEEE Symposium on Security and Privacy (IEEE S&P'24), pages 503–522, IEEE, San Francisco, CA, USA, May 20-23, 2024. Full version: https://ia.cr/2023/1744. Acceptance rate 17.8%. CORE rank A*. [ DOI | pdf | web ]

Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, and Thomas Schneider. BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. In 45. IEEE Symposium on Security and Privacy (IEEE S&P'24), pages 4753–4771, IEEE, San Francisco, CA, USA, May 20-23, 2024. Online: https://ia.cr/2023/1893. Acceptance rate 17.8%. CORE rank A*. [ DOI | pdf | web ]

Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, and Avishay Yanai. ScionFL: Secure Quantized Aggregation for Federated Learning. In 2. IEEE Conference on Secure and Trustworthy Machine Learning (SaTML'24), pages 490–511, IEEE, Toronto, Canada, April 9-11, 2024. Runner-up Distinguished Paper Award. Online: https://ia.cr/2023/652. Acceptance rate 21.5%. [ DOI | pdf | web ]

Tamino Goldan. Privacy-preserving online forms. Master's thesis, TU Darmstadt, Germany, February 10, 2024.

Kasra Edalatnejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, and Carmela Troncoso. Janus: Safe biometric deduplication for humanitarian aid distribution. In 45. IEEE Symposium on Security and Privacy (IEEE S&P'24), pages 115–115, IEEE Computer Society, 2024. CORE rank A*. [ DOI | pdf ]

Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal. Graphiti: Secure Graph Computation Made More Scalable. In 31. ACM SIGSAC Conference on Computer and Communications Security (CCS'24), Association for Computing Machinery, 2024. CORE rank A*. [ pdf ]

Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, and Divya Ravi. Asterisk: Super-fast MPC with a friend. In 45. IEEE Symposium on Security and Privacy (IEEE S&P'24), 2024. CORE rank A*. [ pdf ]

2023

Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, and Hossein Yalame. Breaking the Size Barrier: Universal Circuits meet Lookup Tables. In 29. Advances in Cryptology - ASIACRYPT'23, volume 14438 of LNCS, pages 3–37, Springer, Guangzhou, China, December 4-8, 2023. Full version: https://ia.cr/2022/1652. Code: https://encrypto.de/code/LUC. Acceptance rate 28.2%. CORE rank A. [ DOI | pdf | web ]

Dominique Dittert, Thomas Schneider, and Amos Treiber. Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search. In 15. ACM Cloud Computing Security Workshop (CCSW'23), pages 3–15, ACM, Copenhagen, Denmark, November 26, 2023. Online: https://ia.cr/2023/1465. Acceptance rate 50.0%. [ DOI | pdf | web ]

Gowri R Chandran, Philipp-Florens Lehwalder, Leandro Rometsch, and Thomas Schneider. POSTER: Secure and Differentially Private K-th Ranked Element. In 30. ACM Conference on Computer and Communications Security (CCS'23) Posters/Demos, pages 3624–3626, ACM, Copenhagen, Denmark, November 26-30, 2023. Code: https://encrypto.de/code/dp-KRE. Acceptance rate 47.4%. CORE rank A*. [ DOI | pdf | web ]

Robin Hundt. Memory-efficient MPC for large circuits. Master's thesis, TU Darmstadt, Germany, September 30, 2023.

Helen Möllering. Towards Practical Privacy-Preserving Clustering and Health Care Data Analyses. PhD thesis, TU Darmstadt, Germany, September 29, 2023. [ pdf ]

Gowri R Chandran, Raine Nieminen, Thomas Schneider, and Ajith Suresh. PrivMail: A Privacy-Preserving Framework for Secure Emails. In 28. European Symposium on Research in Computer Security (ESORICS'23), volume 14345 of LNCS, pages 145–165, Springer, The Hague, The Netherlands, September 25-29, 2023. Full version: https://ia.cr/2023/1294. Code: https://encrypto.de/code/PrivMail. Acceptance rate 19.5%. CORE rank A. [ DOI | pdf | web ]

Laura Hetz, Thomas Schneider, and Christian Weinert. Scaling Mobile Private Contact Discovery to Billions of Users. In 28. European Symposium on Research in Computer Security (ESORICS'23), volume 14344 of LNCS, pages 455–476, Springer, The Hague, The Netherlands, September 25-29, 2023. Full version: https://ia.cr/2023/758. Code: https://encrypto.de/code/disco. Acceptance rate 19.5%. CORE rank A. [ DOI | pdf | web ]

Raine Nieminen and Thomas Schneider. Breaking and Fixing Garbled Circuits when a Gate has Duplicate Input Wires. Journal of Cryptology (JoC), 36(4), August 3, 2023. Part of Topical Collection on Computing on Encrypted Data. Online: https://ia.cr/2023/530. CORE rank A*. [ DOI | pdf | web ]

Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, and Oleksandr Tkachenko. FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. In 18. ACM ASIA Conference on Computer and Communications Security (ASIACCS'23), pages 649–663, ACM, Melbourne, Australia, July 10-14, 2023. Full version: https://ia.cr/2023/563. Code: https://encrypto.de/code/FUSE. Acceptance rate 17.3%. CORE rank A. [ DOI | pdf | web ]

Thomas Schneider, Hossein Yalame, and Michael Yonli. Griffin: Towards Mixed Multi-Key Homomorphic Encryption. In 20. International Conference on Security and Cryptography (SECRYPT'23), pages 147–158, SciTePress, Rome, Italy, July 10-12, 2023. Full version: https://ia.cr/2023/654. Acceptance rate 13.0% for full papers. CORE rank C. [ DOI | pdf | web ]

Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, and Oleksandr Tkachenko. CONTRIBUTED TALK: FUSE – Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. 9. Theory and Practice of Multi-Party Computation Workshop (TPMPC'23), Aarhus, Denmark, June 8-9, 2023. [ web ]

Felix Marx. Framework for secure and private hierarchical federated learning. Bachelor's thesis, TU Darmstadt, Germany, May 31, 2023.

Tobias Wehrle. Defenses against data poisoning attacks on private machine learning training. Bachelor's thesis, TU Darmstadt, Germany, May 31, 2023.

Thomas Reinhold, Philipp Kühn, Daniel Günther, Thomas Schneider, and Christian Reuter. ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships. IEEE Transactions on Technology and Society, 4(2):158–170, May 29, 2023. Online: http://arxiv.org/abs/2306.00589. [ DOI | pdf | web ]

Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, and Hossein Yalame. SafeFL: MPC-Friendly Framework for Private and Robust Federated Learning. In 6. Deep Learning Security and Privacy Workshop (DLSP'23), pages 69–76, IEEE, San Francisco, CA, USA, May 25, 2023. Full version: https://ia.cr/2023/555. [ DOI | pdf | web ]

Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, and Hossein Yalame. FLUTE: Fast and Secure Lookup Table Evaluations. In 44. IEEE Symposium on Security and Privacy (IEEE S&P'23), pages 515–533, IEEE, San Francisco, CA, USA, May 22-25, 2023. Full version: https://ia.cr/2023/499. Code: https://encrypto.de/code/FLUTE. Acceptance rate 17.0%. CORE rank A*. [ DOI | pdf | web ]

Gowri R Chandran, Raine Nieminen, Thomas Schneider, and Ajith Suresh. PrivMail: A Privacy-Preserving Framework for Secure Emails (Short Talk). 44. IEEE Symposium on Security and Privacy (IEEE S&P'23) Short Talk, San Francisco, CA, USA, May 22-25, 2023. CORE rank A*. [ web ]

Andreas Brüggemann, Thomas Schneider, Ajith Suresh, and Hossein Yalame. Is Everyone Equally Trustworthy in Practice? (Short Talk). 44. IEEE Symposium on Security and Privacy (IEEE S&P'23) Short Talk, San Francisco, CA, USA, May 22-25, 2023. CORE rank A*. [ web ]

Thomas Schneider, Hossein Yalame, and Michael Yonli. POSTER: Towards Mixed Multi-Key Homomorphic Encryption. 2. Annual FHE.org Conference on Fully Homomorphic Encryption (FHE.org'23) Poster Session, Tokyo, Japan, March 26, 2023. [ web ]

Patrick Ehrler. Using query estimators for attacking relational encrypted search. Master's thesis, TU Darmstadt, Germany, March 22, 2023.

Laura Hetz. Communication-efficient privacy-preserving mobile contact discovery. Master's thesis, TU Darmstadt, Germany, March 7, 2023.

Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, and Hossein Yalame. WW-FL: Secure and Private Large-Scale Federated Learning. arXiv:2302.09904, February 20, 2023. https://arxiv.org/abs/2302.09904. [ DOI ]

Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, and Thomas Schneider. Contact Discovery in Mobile Messengers: Low-Cost Attacks, Quantitative Analyses, and Efficient Mitigations. ACM Transactions on Privacy and Security (TOPS), 26(1):1–44, February, 2023. Online: https://ia.cr/2022/875. Code: https://github.com/contact-discovery. CORE rank A. [ DOI | pdf | web ]

Thomas Schneider, Ajith Suresh, and Hossein Yalame. Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries”. IEEE Transactions on Information Forensics and Security (TIFS), 18:1407–1409, January 20, 2023. CORE rank A. [ DOI | pdf | web ]

Kasra Edalatnejad, Mathilde Raynal, Wouter Lueks, and Carmela Troncoso. Private collection matching protocols. Proceedings on Privacy Enhancing Technologies (PoPETs), 2023(3):446–468, 2023. CORE rank A. [ DOI | pdf ]

Kasra Edalatnejad. Bridging the gap between theoretical and practical privacy technologies for at-risk populations. PhD thesis, EPFL, Switzerland, 2023. [ pdf ]

Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, and Somya Sangal. Vogue: Faster computation of private heavy hitters. IEEE Transactions on Dependable and Secure Computing (TDSC'23), 2023. CORE rank A. [ pdf ]

Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, and Somya Sangal. Ruffle: Rapid 3-party shuffle protocols. Proceedings on Privacy Enhancing Technologies (PoPETs), 2023(3):24–42, 2023. CORE rank A. [ pdf ]

Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal. Find thy neighbourhood: Privacy-preserving local clustering. Proceedings on Privacy Enhancing Technologies (PoPETs), 2023(2):23–39, 2023. CORE rank A. [ pdf ]

Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal. Shield: Secure allegation escrow system with stronger guarantees. In Proceedings of the ACM Web Conference (WWW'23), pages 2252–2262, ACM, 2023. CORE rank A*. [ pdf ]

Nishat Koti, Shravani Patil, Arpita Patra, and Ajith Suresh. MPClan: Protocol suite for privacy-conscious computations. Journal of Cryptology, 36(3):22, 2023. CORE rank A*. [ pdf ]

Sarah Trame, Andreas Brüggemann, and Lothar Rink. Calculating zinc uptake by Zinc-APP. Journal of Trace Elements in Medicine and Biology, 77:127–132, 2023. [ DOI | web ]

2022

Dominique Dittert. A practical evaluation of countermeasures against leakage attacks on encrypted keyword search. Master's thesis, TU Darmstadt, Germany, December 29, 2022.

Amos Treiber. Analyzing and Applying Cryptographic Mechanisms to Protect Privacy in Applications. PhD thesis, TU Darmstadt, Germany, November 11, 2022. [ pdf ]

Nishat Koti, Shravani Patil, Arpita Patra, and Ajith Suresh. POSTER: MPClan: Protocol suite for privacy-conscious computations. In 29. ACM Conference on Computer and Communications Security (CCS'22) Posters/Demos, pages 3379–3381, ACM, Los Angeles, USA, November 7-11, 2022. CORE rank A*. [ DOI | pdf | web ]

Andreas Brüggemann, Thomas Schneider, Ajith Suresh, and Hossein Yalame. POSTER: Efficient Three-Party Shuffling Using Precomputation. In 29. ACM Conference on Computer and Communications Security (CCS'22) Posters/Demos, pages 3331–3333, ACM, Los Angeles, CA, USA, November 7-11, 2022. CORE rank A*. [ DOI | pdf | web ]

Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, and Ajith Suresh. POSTER: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. In 29. ACM Conference on Computer and Communications Security (CCS'22) Posters/Demos, pages 3351–3353, ACM, Los Angeles, CA, USA, November 7-11, 2022. CORE rank A*. [ DOI | pdf | web ]

Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, and Ulrike Meyer. Secure Maximum Weight Matching Approximation on General Graphs. In 21. Workshop on Privacy in the Electronic Society (WPES'22), pages 83–87, ACM, Los Angeles, CA, USA, November 7, 2022. Short paper. Full version: https://ia.cr/2022/1173. Acceptance rate 33.9%. [ DOI | pdf | web ]

Amos Treiber, Dirk Müllmann, Thomas Schneider, and Indra Spiecker genannt Döhmann. Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies. In 21. Workshop on Privacy in the Electronic Society (WPES'22), pages 69–82, ACM, Los Angeles, CA, USA, November 7, 2022. Online: https://ia.cr/2022/1242. Acceptance rate 20.3% for full papers. [ DOI | pdf | web ]

Michael Yonli. Efficient MPC via multi-party homomorphic encryption. Master's thesis, TU Darmstadt, Germany, October 10, 2022.

Kay Hamacher, Tobias Kussel, Thomas Schneider, and Oleksandr Tkachenko. PEA: Practical Private Epistasis Analysis using MPC. In 27. European Symposium on Research in Computer Security (ESORICS'22), volume 13556 of LNCS, pages 320–339, Springer, Copenhagen, Denmark, September 26-30, 2022. Full version: https://ia.cr/2022/1185. Acceptance rate 18.5%. CORE rank A. [ DOI | pdf | web ]

Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, and Thomas Schneider. SPIKE: Secure and Private Investigation of the Kidney Exchange problem. BMC Medical Informatics and Decision Making, 22(1):253, September 22, 2022. Online: https://arxiv.org/abs/2204.09937. Code: https://encrypto.de/code/PPKE. CORE rank B. [ DOI | pdf | web ]

Daniel Günther, Maurice Heymann, Benny Pinkas, and Thomas Schneider. GPU-Accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. In 31. USENIX Security Symposium (USENIX Security'22), pages 1759–1776, USENIX, Boston, MA, USA, August 10-12, 2022. Online: https://ia.cr/2021/823. Code: https://encrypto.de/code/cip-pir. Acceptance rate 18.1%. CORE rank A*. [ pdf | web ]

Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, and Thomas Schneider. FLAME: Taming Backdoors in Federated Learning. In 31. USENIX Security Symposium (USENIX Security'22), pages 1415–1432, USENIX, Boston, MA, USA, August 10-12, 2022. Online: https://ia.cr/2021/025. Acceptance rate 18.1%. CORE rank A*. [ pdf | web ]

Liang Zhao. Securely realizing output privacy in MPC using differential privacy. Master's thesis, TU Darmstadt, Germany, August 5, 2022.

Lukas Scheidel. Outsourced sublinear private decision tree evaluation. Master's thesis, TU Darmstadt, Germany, July 25, 2022.

Oleksandr Tkachenko. Towards Deployable MPC: Flexible and Efficient Tools for Real-World Applications. PhD thesis, TU Darmstadt, Germany, July 21, 2022. [ pdf ]

Nora Khayata. Flexible file format and intermediate representation for secure multi-party computation. Master's thesis, TU Darmstadt, Germany, July 19, 2022.

Gowri R Chandran, Carmit Hazay, Robin Hundt, and Thomas Schneider. Comparison-Based MPC in Star Topology. In 19. International Conference on Security and Cryptography (SECRYPT'22), pages 69–82, SciTePress, Lisbon, Portugal, July 11-13, 2022. Full version: https://ia.cr/2022/574. Acceptance rate 18.6% for full papers. CORE rank C. [ DOI | pdf | web ]

Christopher van der Beets, Raine Nieminen, and Thomas Schneider. FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization. In 19. International Conference on Security and Cryptography (SECRYPT'22), pages 108–120, SciTePress, Lisbon, Portugal, July 11-13, 2022. Full version: https://ia.cr/2022/564. Code: https://encrypto.de/code/ppIndoorLocalization. Acceptance rate 18.6% for full papers. CORE rank C. [ DOI | pdf | web ]

Hannah Keller. Understanding privacy leakage from independently computed statistics. Master's thesis, TU Darmstadt, Germany, July 2, 2022.

Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation. In 14. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21), pages 147–157, IEEE, Washington D.C., USA, June 27-30, 2022. Full version: https://ia.cr/2021/1153. Acceptance rate 23%. [ DOI | pdf | web ]

Maximilian Stillger. Private function evaluation for multi in- and output-gate circuits. Bachelor's thesis, TU Darmstadt, Germany, June 22, 2022.

Joachim Schmidt. Framework for flexible lut-based semi-private function evaluation. Bachelor's thesis, TU Darmstadt, Germany, June 10, 2022.

Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, and Michael Yonli. SoK: Cryptanalysis of Encrypted Search with LEAKER – A framework for LEakage AttacK Evaluation on Real-World data. In 7. IEEE European Symposium on Security and Privacy (EuroS&P'22), pages 90–108, IEEE, Genoa, Italy, June 6-10, 2022. Full version: https://ia.cr/2021/1035. Code: https://encrypto.de/code/LEAKER. Acceptance rate 30.0%. [ DOI | pdf | web ]

Nishat Koti, Arpita Patra, Rahul Rachuri, and Ajith Suresh. Tetrad: Actively secure 4PC for secure training and inference. In 29. Network and Distributed System Security Symposium (NDSS'22), Internet Society, San Diego, CA, USA, April 24-28, 2022. CORE rank A*. [ pdf | web ]

Nishat Koti, Shravani Patil, Arpita Patra, and Ajith Suresh. POSTER: MPClan: Protocol Suite for Privacy-Conscious Computations. 29. Network and Distributed System Security Symposium (NDSS'22) Poster Session, San Diego, CA, USA, April 24-28, 2022. CORE rank A*. [ web ]

Timm Birka. Efficient and practical privacy-preserving kidney exchange protocol. Master's thesis, TU Darmstadt, Germany, April 22, 2022.

Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, and Michael Yonli. CONTRIBUTED TALK: All about that Data: Towards a Practical Assessment of Attacks on Encrypted Search. Real World Crypto Symposium (RWC'22), Amsterdam, The Netherlands, April 13-15, 2022. Acceptance rate 33.3%. [ pdf | slides | web ]

Lennart Braun, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. MOTION – A Framework for Mixed-Protocol Multi-Party Computation. ACM Transactions on Privacy and Security (TOPS), 25(2):8:1–8:35, March 4, 2022. Online: https://ia.cr/2020/1137. Code: https://encrypto.de/code/MOTION. CORE rank A. [ DOI | pdf | web ]

Niklas Schwabe. Efficient multi-party private function evaluation for depth-optimized circuits. Master's thesis, TU Darmstadt, Germany, January 22, 2022.

Pankaj S. Dayama, Arpita Patra, Protik Paul, Nitin Singh, and Dhinakaran Vinayagamurthy. How to prove any np statement jointly? efficient distributed-prover zero-knowledge protocols. Proceedings on Privacy Enhancing Technologies (PoPETs), 2022:517 – 556, 2022. [ pdf ]

Jochen Staudacher, Felix Wagner, and Jan Filipp. Dynamic programming for computing power indices for weighted voting games with precoalitions. Games, 13(1), 2022. [ DOI | pdf ]

Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, and Protik Paul. Attaining GOD beyond honest majority with friends and foes. In 28. Advances in Cryptology - ASIACRYPT'22, volume 13791 of Lecture Notes in Computer Science, pages 556–587, Springer, 2022. CORE rank A. [ pdf ]

Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, and Bhavish Raj Gopal. PentaGOD: Stepping beyond Traditional GOD with Five Parties. In 29. ACM SIGSAC Conference on Computer and Communications Security (CCS'22), pages 1843–1856, Association for Computing Machinery, 2022. CORE rank A*. [ pdf ]

2021

Lennart Braun, Rosario Cammarota, and Thomas Schneider. POSTER: A Generic Hybrid 2PC Framework with Application to Private Inference of Unmodified Neural Networks (Extended Abstract). Privacy in Machine Learning Workshop (PriML@NeurIPS'21), Virtual Event, December 14, 2021. Code: https://encrypto.de/code/MOTION2NX. [ pdf | poster | web ]

Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. POSTER: ABY2.0: New Efficient Primitives for STPC with Applications to Privacy in Machine Learning (Extended Abstract). Privacy in Machine Learning Workshop (PriML@NeurIPS'21), Virtual Event, December 14, 2021. [ web ]

Aditya Hegde, Helen Möllering, Thomas Schneider, and Hossein Yalame. CONTRIBUTED TALK: SoK: Privacy-Preserving Clustering (Extended Abstract). Privacy in Machine Learning Workshop (PriML@NeurIPS'21), Virtual Event, December 14, 2021. [ web ]

Roman Hergenreder. Privacy-preserving household finance analytics. Bachelor's thesis, TU Darmstadt, Germany, December 9, 2021.

Jean-Pierre Münch, Thomas Schneider, and Hossein Yalame. VASA: Vector AES Instructions for Security Applications. In 37. Annual Computer Security Applications Conference (ACSAC'21), pages 131–145, ACM, Austin, TX, USA, December 6-10, 2021. Full version: https://ia.cr/2021/1493. Code: https://encrypto.de/code/VASA. Acceptance rate 21.0%. CORE rank A. [ DOI | pdf | web ]

Andreas Brüggemann. Secure maximum weight matching approximation for privacy-preserving kidney exchange. Master's thesis, RWTH Aachen University, Germany, December, 2021.

Hannah Keller, Helen Möllering, Thomas Schneider, and Hossein Yalame. POSTER: Balancing Quality and Efficiency in Private Clustering with Affinity Propagation (Extended Abstract). 4. Privacy Preserving Machine Learning Workshop (PPML@CCS'21), Virtual Event, November 19, 2021. [ web ]

Aditya Hegde, Helen Möllering, Thomas Schneider, and Hossein Yalame. POSTER: SoK: Privacy-Preserving Clustering (Extended Abstract). 4. Privacy Preserving Machine Learning Workshop (PPML@CCS'21), Virtual Event, November 19, 2021. [ web ]

Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. POSTER: ABY2.0: New Efficient Primitives for 2PC with Applications to Privacy Preserving Machine Learning (Extended Abstract). 4. Privacy Preserving Machine Learning Workshop (PPML@CCS'21), Virtual Event, November 19, 2021. [ web ]

Daniel Günther, Thomas Schneider, and Felix Wiegand. POSTER: Revisiting Hybrid Private Information Retrieval. In 28. ACM Conference on Computer and Communications Security (CCS'21) Posters/Demos, pages 2408–2410, ACM, Virtual Event, November 15-19, 2021. Code: https://encrypto.de/code/HybridPIR. CORE rank A*. [ DOI | pdf | web ]

Arthur Wigandt. Private function evaluation for multi-input gates. Master's thesis, TU Darmstadt, Germany, October 21, 2021.

Timm Birka, Tobias Kussel, Helen Möllering, and Thomas Schneider. An Efficient and Practical Privacy-Preserving Kidney Exchange Problem Protocol (Abstract). In 33. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Virtual Event, September 17, 2021. [ DOI | pdf ]

Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert. CONTRIBUTED TALK: Breaking and Fixing Contact Identifier-Based Mutual Authentication in Apple AirDrop. Future of PI Workshop: Challenges and Perspectives of Personal Identification (FoPI@EuroS&P'21), September 6, 2021. [ web ]

Christian Weinert. Practical Private Set Intersection Protocols for Privacy-Preserving Applications. PhD thesis, TU Darmstadt, Germany, August 31, 2021. [ pdf ]

Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation with Applications to Privacy Preserving Machine Learning (Extended Abstract). 3. Privacy-Preserving Machine Learning Workshop (PPML@CRYPTO'21), August 15, 2021. [ web ]

Nishat Koti, Mahak Pancholi, Arpita Patra, and Ajith Suresh. SWIFT: Super-fast and robust privacy-preserving machine learning. In 30. USENIX Security Symposium (USENIX Security'21), pages 2651–2668, USENIX, Virtual Event, August 11-13 2021. Acceptance rate 19%. CORE rank A*. [ pdf ]

Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert. PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop. In 30. USENIX Security Symposium (USENIX Security'21), pages 3577–3594, USENIX, Virtual Event, August 11-13, 2021. Website: https://privatedrop.github.io. Full version: https://ia.cr/2021/481. Code: https://encrypto.de/code/privatedrop. Acceptance rate 19%. CORE rank A*. [ pdf | web ]

Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In 30. USENIX Security Symposium (USENIX Security'21), pages 2165–2182, USENIX, Virtual Event, August 11-13, 2021. Full version: https://ia.cr/2020/1225. Acceptance rate 19%. CORE rank A*. [ pdf | web ]

Ajith Suresh. MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning. PhD thesis, Indian Institute of Science, Bangalore, July 28, 2021. [ pdf ]

Felix Wiegand. Combining multi-server and single-server private information retrieval for epidemiological modelling. Bachelor's thesis, TU Darmstadt, Germany, July 21, 2021.

Sébastien Andreina, Giorgia Azzurra Marson, Helen Möllering, and Ghassan Karame. BaFFLe: Backdoor detection via feedback-based federated learning. In 41. IEEE International Conference on Distributed Computing Systems (ICDCS'21), IEEE, Virtual Event, July 7-10, 2021. CORE rank A. [ pdf | web ]

Hannah Keller, Helen Möllering, Thomas Schneider, and Hossein Yalame. Balancing Quality and Efficiency in Private Clustering with Affinity Propagation. In 18. International Conference on Security and Cryptography (SECRYPT'21), pages 173–184, SciTePress, Virtual Event, July 6-8, 2021. Full version: https://ia.cr/2021/825. Code: https://encrypto.de/code/ppAffinityPropagation. Acceptance rate 18.4% for full papers. CORE rank C. [ DOI | pdf | web ]

Daniel Demmler, Stefan Katzenbeisser, Thomas Schneider, Tom Schuster, and Christian Weinert. Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation. In 18. International Conference on Security and Cryptography (SECRYPT'21), pages 444–451, SciTePress, Virtual Event, July 6-8, 2021. Short paper. Full version: https://ia.cr/2021/521. Acceptance rate 35.6%. CORE rank C. [ DOI | pdf | web ]

Aditya Hegde, Helen Möllering, Thomas Schneider, and Hossein Yalame. SoK: Efficient Privacy-Preserving Clustering. Proceedings on Privacy Enhancing Technologies (PoPETs), 2021(4):225–248, July 2021. Online: https://ia.cr/2021/809. Code: https://encrypto.de/code/SoK_ppClustering. Acceptance rate 19.5%. CORE rank A. [ DOI | pdf | web ]

Alexander Heinrich, Matthias Hollick, Thomas Schneider, Milan Stute, and Christian Weinert. DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop. In 14. ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'21) Demo, pages 371–373, ACM, Virtual Event, June 28-July 2, 2021. Website: https://privatedrop.github.io. Online: https://ia.cr/2021/893. Code: https://encrypto.de/code/aircollect. Acceptance rate 78.6%. [ DOI | pdf | web ]

Tim Heldmann, Thomas Schneider, Oleksandr Tkachenko, Christian Weinert, and Hossein Yalame. LLVM-Based Circuit Compilation for Practical Secure Computation. In 19. International Conference on Applied Cryptography and Network Security (ACNS'21), volume 12727 of LNCS, pages 99–121, Springer, Virtual Event, June 21-24, 2021. Online: https://ia.cr/2021/797. Code: https://encrypto.de/code/LLVM. Acceptance rate 19.9%. CORE rank B. [ DOI | pdf | web ]

Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, and Thomas Schneider. Privacy-preserving Density-Based Clustering. In 16. ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), pages 658–671, ACM, Virtual Event, June 7-11, 2021. Online: https://ia.cr/2021/612. Code: https://encrypto.de/code/ppDBSCAN. Acceptance rate 18.9%. CORE rank A. [ DOI | pdf | web ]

Jean-Pierre Münch. Accelerating multi-party computation with vectorized AES instructions. Master's thesis, TU Darmstadt, Germany, May 28, 2021.

Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, and Shaza Zeitouni. SAFELearn: Secure Aggregation for private FEderated Learning. In 4. Deep Learning and Security Workshop (DLS'21), pages 56–62, IEEE, Virtual Event, May 27, 2021. Full version: https://ia.cr/2021/386. Acceptance rate 40%. [ DOI | pdf | web ]

Christopher van der Beets. Client-server privacy-preserving indoor localization with secret sharing. Bachelor's thesis, TU Darmstadt, Germany, May 26, 2021.

Jan Filipp. Lattice-probleme in der kryptographie. Bachelor's thesis, Kempten University of Applied Sciences, Germany, April, 2021.

Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, and Thomas Schneider. All the Numbers are US: Large-Scale Abuse of Contact Discovery in Mobile Messengers. In 28. Network and Distributed System Security Symposium (NDSS'21), Internet Society, Virtual Event, February 21-24, 2021. Website: https://contact-discovery.github.io. Online: https://ia.cr/2020/1119. Code: https://github.com/contact-discovery. Acceptance rate 15.2%. CORE rank A*. [ DOI | pdf | web ]

Hannah Keller, Helen Möllering, Thomas Schneider, and Hossein Yalame. Privacy-Preserving Clustering (Abstract). In 32. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Virtual Event, January 15, 2021. [ DOI | pdf ]

Jochen Staudacher, László Á. Kóczy, Izabella Stach, Jan Filipp, Marcus Kramer, Till Noffke, Linus Olsson, Jonas Pichler, and Tobias Singer. Computing power indices for weighted voting games via dynamic programming. Operations Research and Decisions, 31(2):123–145, 2021. [ DOI | pdf ]

2020

Maurice Heymann. Accelerating multi-server private information retrieval using GPUs. Master's thesis, TU Darmstadt, Germany, December 20, 2020.

Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert, and Tim Weißmantel. RiCaSi: Rigorous Cache Side channel mitigation via selective circuit compilation. In 19. International Conference on Cryptology And Network Security (CANS'20), volume 12579 of LNCS, pages 505–525, Springer, Virtual Event, December 14-16, 2020. Acceptance rate 25.4%. CORE rank B. [ DOI | pdf | web ]

Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, and Hossein Yalame. POSTER: MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract). Privacy Preserving Machine Learning Workshop (PPML@NeurIPS'20), Virtual Event, December 11, 2020. [ web ]

Thomas Schneider. Engineering Privacy-Preserving Machine Learning Protocols. In Privacy-Preserving Machine Learning in Practice Workshop (PPMLP@CCS'20), pages 3–4, ACM, Virtual Event, November 9, 2020. Keynote. [ DOI | pdf | web ]

Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, and Kristian Kersting. CryptoSPN: Expanding PPML beyond Neural Networks (Extended Abstract). In Privacy-Preserving Machine Learning in Practice Workshop (PPMLP@CCS'20), pages 9–14, ACM, Virtual Event, November 9, 2020. Full paper. Acceptance rate 23.5% for full papers. [ DOI | pdf | web ]

Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, and Hossein Yalame. MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract). In Privacy-Preserving Machine Learning in Practice Workshop (PPMLP@CCS'20), pages 43–45, ACM, Virtual Event, November 9, 2020. Short paper. Acceptance rate 47.1%. [ DOI | pdf | web ]

Nora Khayata. Statically inferring method consistency levels using pre- and postcondition analysis. Bachelor's thesis, TU Darmstadt, Germany, November 4, 2020.

Niklas Büscher, Daniel Demmler, Nikolaos P. Karvelas, Stefan Katzenbeisser, Juliane Krämer, Deevashwer Rathee, Thomas Schneider, and Patrick Struck. Secure Two-Party Computation in a Quantum World. In 18. International Conference on Applied Cryptography and Network Security (ACNS'20), volume 12146 of LNCS, pages 461–480, Springer, Virtual Event, October 19-22, 2020. Full version: https://ia.cr/2020/411. Code: https://encrypto.de/code/pq-mpc. Acceptance rate 21.5%. CORE rank B. [ DOI | pdf | web ]

Johannes Buchmann, Ghada Dessouky, Tommaso Frassetto, Ágnes Kiss, Ahmad-Reza Sadeghi, Thomas Schneider, Giulia Traverso, and Shaza Zeitouni. SAFE: A Secure and Efficient Long-Term Distributed Storage System. In 8. ACM International Workshop on Security in Blockchain and Cloud Computing (SBC@ASIACCS'20), pages 8–13, ACM, Virtual Event, October 6, 2020. Online: https://ia.cr/2020/690. Acceptance rate 44.4%. [ DOI | pdf | web ]

Lennart Braun. A generic hybrid 2PC framework with application to private inference of unmodified neural networks. Master's thesis, TU Darmstadt, Germany, September 25, 2020.

Ágnes Kiss. Efficient Private Function Evaluation. PhD thesis, TU Darmstadt, Germany, September 25, 2020. [ pdf ]

Tim Heldmann. LLVM-based circuit compilation for practical secure computation. Bachelor's thesis, TU Darmstadt, Germany, September 14, 2020.

Marco Holz, Ágnes Kiss, Deevashwer Rathee, and Thomas Schneider. Linear-Complexity Private Function Evaluation is Practical. In 25. European Symposium on Research in Computer Security (ESORICS'20), volume 12309 of LNCS, pages 401–420, Springer, Virtual Event, September 14-18, 2020. Full version: https://ia.cr/2020/853. Code: https://encrypto.de/code/linearPFE. Acceptance rate 19.7%. CORE rank A. [ DOI | pdf | web ]

Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, and Kristian Kersting. CryptoSPN: Privacy-Preserving Sum-Product Network Inference. In 24. European Conference on Artificial Intelligence (ECAI'20), pages 1946–1953, IOS Press, Virtual Event, August 29-September 5, 2020. Online: https://arxiv.org/abs/2002.00801. Code: https://encrypto.de/code/CryptoSPN. Acceptance rate 26.8%. CORE rank A. [ DOI | pdf | web ]

Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, and Hossein Yalame. MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. In 15. International Conference on Availability, Reliability and Security (ARES'20), pages 14:1–14:10, ACM, Virtual Event, August 25-28, 2020. Full version: https://ia.cr/2020/721. Code: https://github.com/IntelAI/he-transformer. Acceptance rate 21.3%. CORE rank B. [ DOI | pdf | web ]

Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, and Hossein Yalame. MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract). 2. Privacy-Preserving Machine Learning Workshop (PPML@CRYPTO'20), August 16, 2020. [ web ]

Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, and Kristian Kersting. CONTRIBUTED TALK: CryptoSPN: Expanding PPML beyond Neural Networks (Extended Abstract). 2. Privacy-Preserving Machine Learning Workshop (PPML@CRYPTO'20), August 16, 2020. [ web ]

Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajan Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, and Pamela Norton. Trustworthy AI Inference Systems: An Industry Research View. arXiv:2008.04449, August 10, 2020. https://arxiv.org/abs/2008.04449. [ DOI ]

Amos Treiber, Alejandro Molina, Christian Weinert, Thomas Schneider, and Kristian Kersting. CONTRIBUTED TALK: CryptoSPN: Privacy-Preserving Machine Learning beyond Neural Networks (Extended Abstract). 7. Theory and Practice of Multi-Party Computation Workshop (TPMPC'20), Virtual Event, June 4, 2020. [ web ]

Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, and Zheng Yang. Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons. IET Information Security, 14(3):254–265, May, 2020. CORE rank C. [ DOI | pdf | web ]

Masaud Y. Alhassan, Daniel Günther, Ágnes Kiss, and Thomas Schneider. Efficient and Scalable Universal Circuits. Journal of Cryptology (JoC), 33(3):1216–1271, April 8, 2020. Preliminary version: https://ia.cr/2019/348. Code: https://encrypto.de/code/UC. CORE rank A*. [ DOI | pdf | web ]

Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, and Christian Weinert. Offline Model Guard: Secure and Private ML on Mobile Devices. In 23. Design, Automation & Test in Europe Conference & Exhibition (DATE'20), pages 460–465, IEEE, Grenoble, France, March 9-13, 2020. Online: https://arxiv.org/abs/2007.02351. Acceptance rate 26%. CORE rank B. [ DOI | pdf | web ]

Thomas Schneider and Amos Treiber. A Comment on Privacy-Preserving Scalar Product Protocols as proposed in “SPOC”. IEEE Transactions on Parallel and Distributed Systems (TPDS), 31(3):543–546, March, 2020. Full version: https://arxiv.org/abs/1906.04862. Code: https://encrypto.de/code/SPOCattack. CORE rank A*. [ DOI | pdf | web ]

Arpita Patra and Ajith Suresh. BLAZE: Blazing fast privacy-preserving machine learning. In 27. Network and Distributed System Security Symposium (NDSS'20), Internet Society, San Francisco, CA, USA, February 23-26, 2020. CORE rank A*. [ DOI | pdf ]

Harsh Chaudhari, Rahul Rachuri, and Ajith Suresh. Trident: Efficient 4PC framework for privacy preserving machine learning. In 27. Network and Distributed System Security Symposium (NDSS'20), Internet Society, San Francisco, CA, USA, February 23-26, 2020. CORE rank A*. [ DOI | pdf ]

Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, and Carmela Troncoso. Datasharenetwork: A decentralized privacy-preserving search engine for investigative journalists. In 29. USENIX Security Symposium (USENIX Security'21), pages 1911–1927, USENIX Association, 2020. CORE rank A*. [ pdf ]

Megha Byali, Harsh Chaudhari, Arpita Patra, and Ajith Suresh. FLASH: Fast and robust framework for privacy-preserving machine learning. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2):459–480, 2020. CORE rank A. [ DOI | pdf ]

Gowri R Chandran. Improved comparison-based MPC with dishonest majority. Master's thesis, S.V. National Institute of Technology, Surat, India, 2020.

Mohammad Haji Seyed Javadi, Hossein Yalame, and Hamid Reza Mahdiani. Small constant mean-error imprecise adder/multiplier for efficient VLSI implementation of mac-based applications. IEEE Transactions on Computers, 69(9):1376–1387, 2020. CORE rank A*. [ DOI | web ]

Raine Nieminen and Kimmo Järvinen. Practical privacy-preserving indoor localization based on secure two-party computation. IEEE Transactions on Mobile Computing, 2020. CORE rank A*. [ DOI ]

2019

Daniel Günther. Optimizing private information retrieval for compromised credential checking. Master's thesis, TU Darmstadt, Germany, November 22, 2019.

Sebastian P. Bayerl, Ferdinand Brasser, Christoph Busch, Tommaso Frassetto, Patrick Jauernig, Jascha Kolberg, Andreas Nautsch, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Amos Treiber, and Christian Weinert. POSTER: Privacy-Preserving Speech Processing via STPC and TEEs (Extended Abstract). 2. Privacy Preserving Machine Learning Workshop (PPML@CCS'19), London, UK, November 15, 2019. Acceptance rate 55.0%. [ pdf | poster | web ]

Tom Schuster. Optimizing HyCC with compiler IR. Bachelor's thesis, TU Darmstadt, Germany, November 12, 2019.

Marco Holz. A systematic comparison of he-based private function evaluation protocols. Master's thesis, TU Darmstadt, Germany, November 11, 2019.

Harsh Chaudhari, Ashish Choudhury, Arpita Patra, and Ajith Suresh. ASTRA: High throughput 3PC over rings with application to secure prediction. In 10. ACM Cloud Computing Security Workshop (CCSW'19), pages 81–92, ACM, London, UK, November 11, 2019. [ DOI | pdf ]

Daniel Günther, Ágnes Kiss, Lukas Scheidel, and Thomas Schneider. POSTER: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation. In 26. ACM Conference on Computer and Communications Security (CCS'19) Posters/Demos, pages 2541–2543, ACM, London, UK, November 11-15, 2019. Code: https://encrypto.de/code/spfe-framework. Acceptance rate 67.2%. CORE rank A*. [ DOI | pdf | poster | web ]

Robert Nikolai Reith, Thomas Schneider, and Oleksandr Tkachenko. Efficiently Stealing your Machine Learning Models. In 18. Workshop on Privacy in the Electronic Society (WPES'19), pages 198–210, ACM, London, UK, November 11, 2019. Acceptance rate 20.9%. [ DOI | pdf | web ]

Susanne Felsen, Ágnes Kiss, Thomas Schneider, and Christian Weinert. Secure and Private Function Evaluation with Intel SGX. In 10. ACM Cloud Computing Security Workshop (CCSW'19), pages 165–181, ACM, London, UK, November 11, 2019. Acceptance rate 37.5%. [ DOI | pdf | web ]

Amos Treiber, Andreas Nautsch, Jascha Kolberg, Thomas Schneider, and Christoph Busch. Privacy-Preserving PLDA Speaker Verification using Outsourced Secure Computation. Speech Communication, 114:60–71, November, 2019. Code: https://encrypto.de/code/PrivateASV. CORE rank B. [ DOI | pdf | web ]

Andreas Nautsch, Abelino Jiménez, Amos Treiber, Jascha Kolberg, Catherine Jasserand, Els Kindt, Héctor Delgado, Massimiliano Todisco, Mohamed Amine Hmani, Aymen Mtibaa, Mohammed Ahmed Abdelraheem, Alberto Abad, Francisco Teixeira, Driss Matrouf, Marta Gomez-Barrero, Dijana Petrovska-Delacrétaz, Gérard Chollet, Nicholas Evans, Thomas Schneider, Jean-François Bonastre, Bhiksha Raj, Isabel Trancoso, and Christoph Busch. Preserving Privacy in Speaker and Speech Characterisation. Computer Speech and Language (CSL), 2019(58):441–480, November, 2019. CORE rank A. [ DOI | pdf | web ]

Deevashwer Rathee, Thomas Schneider, and K. K. Shukla. Improved Multiplication Triple Generation over Rings via RLWE-Based AHE. In 18. International Conference on Cryptology And Network Security (CANS'19), volume 11829 of LNCS, pages 347–359, Springer, Fuzhou, China, October 25-27, 2019. Short paper. Full version: https://ia.cr/2019/577. Acceptance rate 52.7%. CORE rank B. [ DOI | pdf | web ]

Andreas Nautsch, Jose Patino, Amos Treiber, Themos Stafylakis, Petr Mizera, Massimiliano Todisco, Thomas Schneider, and Nicholas Evans. Privacy-Preserving Speaker Recognition with Cohort Score Normalisation. In 20. Conference of the International Speech Communication Association (INTERSPEECH'19), pages 2868–2872, International Speech Communication Association (ISCA), Graz, Austria, September 15-19, 2019. Online: https://arxiv.org/abs/1907.03454. Acceptance rate 49.3%. CORE rank A. [ DOI | pdf | web ]

Martin Kromm. Ppsolv – a system for privacy-preserving solvency verification. Bachelor's thesis, TU Darmstadt, Germany, September 5, 2019.

Andreas Brüggemann. Entwurf und Implementierung eines Lernspiels über die Verwendung von digitalen Zertifikaten im World Wide Web. Bachelor's thesis, RWTH Aachen University, Germany, September, 2019.

Helen Möllering. Thwarting semantic backdoor attacks in privacy preserving federated learning. Master's thesis, Eurecom, France & University of Twente, Netherlands, August 28, 2019.

Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, and Christian Weinert. Mobile Private Contact Discovery at Scale. In 28. USENIX Security Symposium (USENIX Security'19), pages 1447–1464, USENIX, Santa Clara, CA, USA, August 14-16, 2019. Website: https://contact-discovery.github.io. Full version: https://ia.cr/2019/517. Code: https://github.com/contact-discovery. Acceptance rate 16.2%. CORE rank A*. [ pdf | web ]

Ágnes Kiss, Oliver Schick, and Thomas Schneider. Web Application for Privacy-Preserving Scheduling using Secure Computation. In 16. International Conference on Security and Cryptography (SECRYPT'19), pages 456–463, SciTePress, Prague, Czech Republic, July 26-28, 2019. Short paper. Code: https://encrypto.de/code/scheduling. Acceptance rate 31.5%. CORE rank C. [ DOI | pdf | poster | web ]

Thomas Schneider and Oleksandr Tkachenko. EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. In 14. ACM ASIA Conference on Computer and Communications Security (ASIACCS'19), pages 315–327, ACM, Auckland, New Zealand, July 7-12, 2019. Online: https://ia.cr/2021/029. Acceptance rate 17.1%. CORE rank A. [ DOI | pdf | web ]

Kimmo Järvinen, Helena Leppäkoski, Elena Simona Lohan, Philipp Richter, Thomas Schneider, Oleksandr Tkachenko, and Zheng Yang. PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing. In 4. IEEE European Symposium on Security and Privacy (EuroS&P'19), pages 448–463, IEEE, Stockholm, Sweden, June 17-19, 2019. Acceptance rate 20.0%. [ DOI | pdf | web ]

Benny Pinkas, Thomas Schneider, Oleksandr Tkachenko, and Avishay Yanai. Efficient Circuit-Based PSI with Linear Communication. In 38. Advances in Cryptology - EUROCRYPT'19, volume 11478 of LNCS, pages 122–153, Springer, Darmstadt, Germany, May 19-23, 2019. Online: https://ia.cr/2019/241. Code: https://encrypto.de/code/OPPRF-PSI. Acceptance rate 23.2%. CORE rank A*. [ DOI | pdf | web ]

Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, and Thomas Schneider. SoK: Modular and Efficient Private Decision Tree Evaluation. Proceedings on Privacy Enhancing Technologies (PoPETs), 2019(2):187–208, April 2019. Full version: https://ia.cr/2018/1099. Code: https://encrypto.de/code/PDTE. Acceptance rate 21.1%. CORE rank A. [ DOI | pdf | web ]

Susanne Felsen. Secure two-party computation: Aby versus intel sgx. Master's thesis, TU Darmstadt, Germany, January 10, 2019.

Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, and Igors Stepanovs. On the security of two-round multi-signatures. In 40. IEEE Symposium on Security and Privacy (IEEE S&P'19), pages 1084–1101, IEEE, 2019. CORE rank A*. [ DOI | pdf ]

2018

Daniel Demmler. Towards Practical Privacy-Preserving Protocols. PhD thesis, TU Darmstadt, Germany, November 22, 2018. [ pdf ]

Robert Reith. Silently learning your support vector machines models. Bachelor's thesis, TU Darmstadt, Germany, October 31, 2018.

Nikolaos P. Karvelas, Amos Treiber, and Stefan Katzenbeisser. Examining leakage of access counts in ORAM constructions. In 17. Workshop on Privacy in the Electronic Society (WPES'18), pages 71–75, ACM, Toronto, Canada, October 15, 2018. Acceptance rate 36.5%. [ DOI | web ]

Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, and Thomas Schneider. HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. In 25. ACM Conference on Computer and Communications Security (CCS'18), pages 847–861, ACM, Toronto, Canada, October 15-19, 2018. Code: https://gitlab.com/securityengineering/HyCC. Acceptance rate 16.6%. CORE rank A*. [ DOI | pdf | web ]

Oleksandr Tkachenko and Thomas Schneider. Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases. In 17. Workshop on Privacy in the Electronic Society (WPES'18), pages 71–75, ACM, Toronto, Canada, October 15, 2018. Short paper. Acceptance rate 36.5%. [ DOI | pdf | web ]

Raine Nieminen. Privacy-preserving indoor localization with Paillier encryption and garbled circuits. Master's thesis, Aalto University, Finland, October 8, 2018. [ pub ]

Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, and Zheng Yang. Faster Privacy-Preserving Location Proximity Schemes. In 17. International Conference on Cryptology And Network Security (CANS'18), volume 11124 of LNCS, pages 3–22, Springer, Naples, Italy, September 30-October 3, 2018. Full version: https://ia.cr/2018/694. Acceptance rate 32.9%. CORE rank B. [ DOI | pdf | web ]

Nikolaos P. Karvelas, Amos Treiber, and Stefan Katzenbeisser. Examining leakage of access counts in ORAM constructions. In 29. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Bosch Renningen, Germany, September 6-7, 2018.

Oleksandr Tkachenko. Privacy-preserving genomics on a large scale. In 29. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Bosch Renningen, Germany, September 6-7, 2018.

Daniel Günther. Private function evaluation with universal circuits. In 29. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Bosch Renningen, Germany, September 6-7, 2018.

Ferdinand Brasser, Tommaso Frassetto, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, and Christian Weinert. VoiceGuard: Secure and Private Speech Processing. In 19. Conference of the International Speech Communication Association (INTERSPEECH'18), pages 1303–1307, International Speech Communication Association (ISCA), Hyderabad, India, September 2-6, 2018. Acceptance rate 54%. CORE rank A. [ DOI | pdf | poster | web ]

Ágnes Kiss, Oliver Schick, and Thomas Schneider. POSTER: Web Application for Privacy-Preserving Scheduling. 27. USENIX Security Symposium (USENIX Security'18) Poster Session, Baltimore, MD, USA, August 15-17, 2018. CORE rank A*. [ poster | web ]

Matthias Senker. Psi meets signal: Integrating a malicious-secure private contact discovery solution in an open-source instant messaging service. Master's thesis, TU Darmstadt, Germany, July 23, 2018.

Daniel Demmler, Peter Rindal, Mike Rosulek, and Ni Trieu. PIR-PSI: Scaling private contact discovery. Proceedings on Privacy Enhancing Technologies (PoPETs), 2018(4):159–178, July 2018. CORE rank A. [ DOI | web ]

Philipp Richter, Zheng Yang, Oleksandr Tkachenko, Helena Leppäkoski, Kimmo Järvinen, Thomas Schneider, and Elena Simona Lohan. Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting. In 8. International Conference on Localization and GNSS (ICL-GNSS'18), pages 1–6, IEEE, Guimarães, Portugal, June 26-28, 2018. [ DOI | pdf | web ]

Oleksandr Tkachenko, Christian Weinert, Thomas Schneider, and Kay Hamacher. Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies. In 13. ACM ASIA Conference on Computer and Communications Security (ASIACCS'18), pages 221–235, ACM, Songdo, South Korea, June 4-8, 2018. Acceptance rate 16.8%. CORE rank A. [ DOI | pdf | web ]

M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, and Farinaz Koushanfar. Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. In 13. ACM ASIA Conference on Computer and Communications Security (ASIACCS'18), pages 707–721, ACM, Songdo, South Korea, June 4-8, 2018. Preliminary version: https://ia.cr/2017/1164. Acceptance rate 16.8%. CORE rank A. [ DOI | pdf | web ]

Gilad Asharov, Marco Canini, Marco Chiesa, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, and Michael Zohner. CONTRIBUTED TALK: Towards Practical Private Internet Routing using MPC. 5. Theory and Practice of Multi-Party Computation Workshop (TPMPC'18), Aarhus, Denmark, May 28-31, 2018. [ web ]

Amos Treiber. Access count leakage in oblivious RAMs. Master's thesis, TU Darmstadt, Germany, May, 2018.

Benny Pinkas, Thomas Schneider, Christian Weinert, and Udi Wieder. Efficient Circuit-Based PSI via Cuckoo Hashing. In 37. Advances in Cryptology - EUROCRYPT'18, volume 10822 of LNCS, pages 125–157, Springer, Tel Aviv, Israel, April 29-May 3, 2018. Full version: https://ia.cr/2018/120. Code: https://encrypto.de/code/2DCH. Acceptance rate 23.0%. CORE rank A*. [ DOI | pdf | web ]

Taha Tariq. Web application for privacy-preserving assignments. Master's thesis, TU Darmstadt, Germany, April 3, 2018.

Masaud Alhassan. Improving scalability of universal circuits for large-scale private function evaluation. Master's thesis, TU Darmstadt, Germany, March 12, 2018.

Benny Pinkas, Thomas Schneider, and Michael Zohner. Scalable Private Set Intersection Based on OT Extension. ACM Transactions on Privacy and Security (TOPS), 21(2):7:1–7:35, January 2018. Preliminary version: https://ia.cr/2016/930. Code: https://encrypto.de/code/JournalPSI. CORE rank A. [ DOI | pdf | web ]

2017

Oliver Schick. Web application for privacy-preserving scheduling. Bachelor's thesis, TU Darmstadt, Germany, December 12, 2017.

Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, and Thomas Schneider. SIXPACK: Securing Internet eXchange Points Against Curious onlooKers. In 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), pages 120–133, ACM, Seoul, South Korea, December 12-15, 2017. Code: https://six-pack.bitbucket.io. Acceptance rate 18.1%. CORE rank A. [ DOI | pdf | web ]

Daniel Günther, Ágnes Kiss, and Thomas Schneider. More Efficient Universal Circuit Constructions. In 23. Advances in Cryptology - ASIACRYPT'17, volume 10625 of LNCS, pages 443–470, Springer, Hong Kong, China, December 3-7, 2017. Full version: https://ia.cr/2017/798. Code: https://encrypto.de/code/UC. Acceptance rate 27.6%. CORE rank A. [ DOI | pdf | web ]

Daniel Demmler, Kay Hamacher, Thomas Schneider, and Sebastian Stammler. Privacy-Preserving Whole-Genome Variant Queries. In 16. International Conference on Cryptology And Network Security (CANS'17), volume 11261 of LNCS, pages 1–22, Springer, Hong Kong, China, November 30-December 2, 2017. Acceptance rate 31.8%. CORE rank B. [ DOI | pdf | web ]

Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, and Ram Kamath. Cognicrypt: Supporting developers in using cryptography. In 32. IEEE/ACM International Conference on Automated Software Engineering (ASE'17), pages 931–936, IEEE, Urbana, IL, USA, October 30 - November 3, 2017. Acceptance rate 62.5%. CORE rank A*. [ DOI | web ]

Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, and Benny Pinkas. Private Set Intersection for Unequal Set Sizes with Mobile Applications. Proceedings on Privacy Enhancing Technologies (PoPETs), 2017(4):177–197, October 2017. Full version: https://ia.cr/2017/670. Code: https://encrypto.de/code/MobilePSI. Acceptance rate 21.7%. CORE rank A. [ DOI | pdf | web ]

Oleksandr Tkachenko. Large-scale privacy-preserving statistical computations for distributed genome-wide association studies. Master's thesis, TU Darmstadt, Germany, September 12, 2017.

Daniel Demmler, Marco Holz, and Thomas Schneider. OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks. In 15. International Conference on Applied Cryptography and Network Security (ACNS'17), volume 10355 of LNCS, pages 599–619, Springer, Kanazawa, Japan, July 10-12, 2017. Code: https://encrypto.de/code/onionPIR. Acceptance rate 22.8%. CORE rank B. [ DOI | pdf | web ]

Hossein Yalame, Mohammad Hossein Farzam, and Siavash Bayat Sarmadi. Secure two-party computation using an efficient garbled circuit by reducing data transfer. In 8. International Conference on Applications and Techniques in Information Security (ATIS'17), pages 23–34, Springer, Auckland, New Zealand, July 6-7, 2017. [ DOI | web ]

Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More Efficient Oblivious Transfer Extensions. Journal of Cryptology (JoC), 30(3):805–858, July 2017. Updated version: https://ia.cr/2016/602. CORE rank A*. [ DOI | pdf | web ]

Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, and Michael Zohner. Privacy-Preserving Interdomain Routing at Internet Scale. Proceedings on Privacy Enhancing Technologies (PoPETs), 2017(3):143–163, July 2017. Full version: https://ia.cr/2017/393. Acceptance rate 18.6%. CORE rank A. [ DOI | pdf | web ]

Christian Weinert, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, and Johannes Buchmann. Mops: A modular protection scheme for long-term storage. In 12. ACM ASIA Conference on Computer and Communications Security (ASIACCS'17), pages 436–448, ACM, Abu Dhabi, United Arab Emirates, April 2-6, 2017. Acceptance rate 19.8%. CORE rank A. [ DOI | web ]

Daniel Günther. Valiant's universal circuit – towards a modular construction and implementation. Bachelor's thesis, TU Darmstadt, Germany, March 31, 2017.

Arpita Patra, Pratik Sarkar, and Ajith Suresh. Fast actively secure OT extension for short secrets. In 24. Network and Distributed System Security Symposium (NDSS'17), Internet Society, February 26 - March 1, 2017. CORE rank A*. [ DOI | pdf ]

Jesper Buus Nielsen, Thomas Schneider, and Roberto Trifiletti. Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO. In 24. Network and Distributed System Security Symposium (NDSS'17), Internet Society, San Diego, CA, USA, February 26-March 1, 2017. Acceptance rate 16.1%. CORE rank A*. [ DOI | pdf | web ]

Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, and Michael Zohner. Pushing the Communication Barrier in Secure Computation using Lookup Tables. In 24. Network and Distributed System Security Symposium (NDSS'17), Internet Society, San Diego, CA, USA, February 26-March 1, 2017. Full version: https://ia.cr/2018/486. Code: https://encrypto.de/code/ABY. Acceptance rate 16.1%. CORE rank A*. [ DOI | pdf | web ]

Ajith Suresh. Fast actively secure ot extension for short secrets. Master's thesis, Indian Institute of Science, Bangalore, 2017. [ pdf ]

Hossein Yalame. An efficient secure two-party computation with a combination of GC and GMW. Master's thesis, Sharif University of Technology, Iran, 2017.

M. Sadegh Riazi, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. Toward Practical Secure Stable Matching. Proceedings on Privacy Enhancing Technologies (PoPETs), 2017(1):62–78, January 2017. Acceptance rate 37.9%. CORE rank A. [ DOI | pdf | web ]

2016

Michael Zohner. Faster Oblivious Transfer Extension and Its Impact on Secure Computation. PhD thesis, TU Darmstadt, Germany, December 12, 2016. [ pdf ]

Helen Möllering. Vergleich der Methoden zur Applikationsentwicklung für mobile Endgeräte mit einem Fallbeispiel unter iOS. Bachelor's thesis, Westfälische Wilhelms-Universität Münster, Germany, November 19, 2016.

Nils Schroth. Demonstrator for privacy-preserving face recognition. Bachelor's thesis, TU Darmstadt, Germany, November 15, 2016.

Julian Bieber. Generalizing semi-private function evaluation. Bachelor's thesis, TU Darmstadt, Germany, October 25, 2016.

Marco Holz. Effective protection of sensitive metadata in online communication networks. Bachelor's thesis, TU Darmstadt, Germany, October 18, 2016.

Raine Nieminen. Supersingular elliptic curve isogeny cryptography. Bachelor's thesis, Aalto University, Finland, October 1, 2016. [ pub ]

Christian Weinert. Building a modular long-term archiving system. Master's thesis, TU Darmstadt, Germany, July 25, 2016.

Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, and Thomas Schneider. Towards Securing Internet eXchange Points Against Curious onlooKers. In ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), pages 32–34, ACM, Berlin, Germany, July 16, 2016. Short paper. [ DOI | pdf | web ]

Ebrahim M. Songhori, Shaza Zeitouni, Ghada Dessouky, Thomas Schneider, Ahmad-Reza Sadeghi, and Farinaz Koushanfar. GarbledCPU: A MIPS Processor for Secure Computation in Hardware. In 53. Design Automation Conference (DAC'16), pages 73:1–73:6, ACM, Austin, TX, USA, June 5-9, 2016. Acceptance rate 17.4%. CORE rank A. [ DOI | pdf | web ]

Ágnes Kiss and Thomas Schneider. Valiant's Universal Circuit is Practical. In 35. Advances in Cryptology - EUROCRYPT'16, volume 9665 of LNCS, pages 699–728, Springer, Vienna, Austria, May 8-12, 2016. Full version: https://ia.cr/2016/093. Code: https://encrypto.de/code/UC. Acceptance rate 22.6%. CORE rank A*. [ DOI | pdf | web ]

Ágnes Kiss, Juliane Krämer, Pablo Rauzy, and Jean-Pierre Seifert. Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT. In 7. International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'16), volume 9689 of LNCS, pages 111–129, Springer, Graz, Austria, April 14-15, 2016. [ DOI | web ]

Han Zhang, Kasra Edalatnejad, Amir Rahmati, and Harsha V. Madhyastha. Towards comprehensive repositories of opinions. In 15. ACM Workshop on Hot Topics in Networks (HotNets'16), pages 15–21, ACM, 2016. CORE rank A. [ DOI | pdf ]

2015

Amos Treiber. Searchable encryption. Bachelor's thesis, Universität Mannheim & Ruprecht-Karls Universität Heidelberg, Germany, December, 2015.

Ágnes Kiss, Juliane Krämer, and Anke Stüber. On the optimality of differential fault analyses on CLEFIA. In 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), volume 9582 of LNCS, pages 181–196, Springer, Berlin, Germany, November 11-13, 2015. [ DOI | web ]

Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, and Shaza Zeitouni. Automated Synthesis of Optimized Circuits for Secure Computation. In 22. ACM Conference on Computer and Communications Security (CCS'15), pages 1504–1517, ACM, Denver, CO, USA, October 12-16, 2015. Acceptance rate 19.8%. CORE rank A*. [ DOI | pdf | web ]

Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, and Maria Zhdanova. Time to Rethink: Trust Brokerage using Trusted Execution Environments. In 8. International Conference on Trust and Trustworthy Computing (TRUST'15), volume 9229 of LNCS, pages 181–190, Springer, Heraklion, Crete, Greece, August 24-26, 2015. Short paper. [ DOI | pdf | web ]

Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. Phasing: Private Set Intersection using Permutation-Based Hashing. In 24. USENIX Security Symposium (USENIX Security'15), pages 515–530, USENIX, Washington, DC, USA, August 12-14, 2015. Full version: https://ia.cr/2015/634. Code: https://encrypto.de/code/PSI. Acceptance rate 15.7%. CORE rank A*. [ pdf | web ]

Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits. In 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), pages 411–428, IEEE, San Jose, CA, USA, May 18-20, 2015. Acceptance rate 13.5%. CORE rank A*. [ DOI | pdf | web ]

Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. In 34. Advances in Cryptology - EUROCRYPT'15, volume 9056 of LNCS, pages 673–701, Springer, Sofia, Bulgaria, April 26-30, 2015. Full version: https://ia.cr/2015/061. Code: https://encrypto.de/code/OTExtension. Acceptance rate 29.4%. CORE rank A*. [ DOI | pdf | web ]

Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner. Ciphers for MPC and FHE. In 34. Advances in Cryptology - EUROCRYPT'15, volume 9056 of LNCS, pages 430–454, Springer, Sofia, Bulgaria, April 26-30, 2015. Full version: https://ia.cr/2016/687. Acceptance rate 29.4%. CORE rank A*. [ DOI | pdf | web ]

Daniel Demmler, Thomas Schneider, and Michael Zohner. ABY – A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22. Network and Distributed System Security Symposium (NDSS'15), Internet Society, San Diego, CA, USA, February 8-11, 2015. Code: https://encrypto.de/code/ABY. Acceptance rate 18.4%. CORE rank A*. [ pdf | web ]

Hossein Yalame. Bio-inspired imprecise adder/multiplier for efficient implementation of MAC-based applications. Bachelor's thesis, Shahid Beheshti University, Iran, 2015.

Martín A. Gagliotti Vigil, Johannes Buchmann, Daniel Cabarcas, Christian Weinert, and Alexander Wiesmaier. Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. Computers & Security, 50:16–32, January 2015. CORE rank B. [ DOI | web ]

2014

Martín A. Gagliotti Vigil, Christian Weinert, Denise Demirel, and Johannes Buchmann. An efficient time-stamping solution for long-term digital archiving. In 33. International Performance Computing and Communications Conference (IPCCC'14), pages 1–8, IEEE, Austin, TX, USA, December 5-7, 2014. Acceptance rate 31.7%. CORE rank B. [ DOI | web ]

Daniel Demmler, Amir Herzberg, and Thomas Schneider. RAID-PIR: Practical Multi-Server PIR. In 6. ACM Cloud Computing Security Workshop (CCSW'14), pages 45–56, ACM, Scottsdale, AZ, USA, November 7, 2014. Code: https://encrypto.de/code/RAID-PIR. Acceptance rate 33.3%. [ DOI | pdf | web ]

Ágnes Kiss. Testing self-secure exponentiation countermeasures against the bellcore attack. Master's thesis, TU Berlin, Germany, November, 2014.

Benedikt Hiemenz. Analysis and extensions of the pcf secure two-party computation compiler. Bachelor's thesis, TU Darmstadt, Germany, August 28, 2014.

Martín A. Gagliotti Vigil, Christian Weinert, Kjell Braden, Denise Demirel, and Johannes Buchmann. A performance analysis of long-term archiving techniques. In 16. International Conference on High Performance Computing and Communications (HPCC'14), pages 878–889, IEEE, Paris, France, August 20-22, 2014. Acceptance rate 25.0%. CORE rank B. [ DOI | web ]

Daniel Demmler, Thomas Schneider, and Michael Zohner. Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens. In 23. USENIX Security Symposium (USENIX Security'14), pages 893–908, USENIX, San Diego, CA, USA, August 20-22, 2014. Full version: https://ia.cr/2014/467. Acceptance rate 19.1%. CORE rank A*. [ pdf | web ]

Benny Pinkas, Thomas Schneider, and Michael Zohner. Faster Private Set Intersection based on OT Extension. In 23. USENIX Security Symposium (USENIX Security'14), pages 797–812, USENIX, San Diego, CA, USA, August 20-22, 2014. Full version: https://ia.cr/2014/447. Code: https://encrypto.de/code/PSI. Acceptance rate 19.1%. CORE rank A*. [ pdf | web ]

Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner. GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification. In 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pages 187–198, ACM, Salzburg, Austria, June 11-13, 2014. Code: https://encrypto.de/code/GSHADE. Acceptance rate 37.5%. CORE rank C. [ DOI | pdf | web ]

Matthias Schneider and Thomas Schneider. Notes on Non-Interactive Secure Comparison in “Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT”. In 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), pages 432–440, ACM, Salzburg, Austria, June 11-13, 2014. Acceptance rate 37.5%. CORE rank C. [ DOI | pdf | web ]

Florian Kerschbaum, Thomas Schneider, and Axel Schröpfer. Automatic Protocol Selection in Secure Two-Party Computations. In 12. International Conference on Applied Cryptography and Network Security (ACNS'14), volume 8479 of LNCS, pages 566–584, Springer, Lausanne, Switzerland, June 10-13, 2014. Full version: https://ia.cr/2014/200. Acceptance rate 22.4%. CORE rank B. [ DOI | pdf ]

2013

Daniel Demmler, Thomas Schneider, and Michael Zohner. Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones (Abstract). In 19. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Stuttgart, Germany, November 14-15, 2013.

Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More Efficient Oblivious Transfer and Extensions for Faster Secure Computation. In 20. ACM Conference on Computer and Communications Security (CCS'13), pages 535–548, ACM, Berlin, Germany, November 4-8, 2013. Full version: https://ia.cr/2013/552. Code: https://encrypto.de/code/OTExtension. Acceptance rate 19.8%. CORE rank A*. [ DOI | pdf ]

Christian Weinert. Content integrity system and notarisation for long-term protection of data objects. Bachelor's thesis, TU Darmstadt, Germany, October 18, 2013.

Daniel Demmler. Hardware-assisted two-party secure computation on mobile devices. Master's thesis, TU Darmstadt, Germany, July 1, 2013.

N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: Secure Mobile Resource Sharing. In 11. International Conference on Applied Cryptography and Network Security (ACNS'13), volume 7954 of LNCS, pages 432–440, Springer, Banff, Alberta, Canada, June 25-28, 2013. Short paper. Full version: https://encrypto.de/papers/ADNRSSS13_TR.pdf. CORE rank B. [ DOI | pdf | web ]

Vladimir Kolesnikov and Thomas Schneider. Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits. U.S. patent no 8443205 (applied 10/24/2008; issued 05/14/2013; EXPIRED 06/21/2021), May 14, 2013. [ pub ]

Wilko Henecka and Thomas Schneider. Faster Secure Two-Party Computation with Less Memory. In 8. ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS'13), pages 437–446, ACM, Hangzhou, China, May 7-10, 2013. Code: https://encrypto.de/code/me-sfe. Acceptance rate 16.2% for full papers. CORE rank A. [ DOI | pdf ]

Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, and Johannes Buchmann. Improved algebraic side-channel attack on AES. Journal of Cryptographic Engineering, 3(3):139–156, April 2013. [ DOI ]

Thomas Schneider and Michael Zohner. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. In 17. International Conference on Financial Cryptography and Data Security (FC'13), volume 7859 of LNCS, pages 275–292, Springer, Okinawa, Japan, April 1-5, 2013. Acceptance rate 12.5% for regular papers. CORE rank A. [ DOI | pdf | web ]

Florian Kerschbaum, Thomas Schneider, and Axel Schröpfer. Automatic Protocol Selection in Secure Two-Party Computations (Short Talk). 20. Network and Distributed System Security Symposium (NDSS'13) Short Talk, San Diego, CA, USA, February 24-27, 2013. CORE rank A*. [ pdf | web ]

Sorin A. Huss, Marc Stöttinger, and Michael Zohner. AMASIVE: an adaptable and modular autonomous side-channel vulnerability evaluation framework. In Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, volume 8260 of LNCS, pages 151–165, Springer, 2013. [ DOI ]

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design. Journal of Computer Security (JCS), 21(2):283–315, January 2013. Preliminary version: https://ia.cr/2010/079. CORE rank B. [ DOI | pdf | web ]

2012

Thomas Schneider and Michael Zohner. Efficient Secure Two-Party Computation (Abstract). In 17. Kryptotag (crypto day matters), Gesellschaft für Informatik e.V. / FG KRYPTO, Heidelberg, Germany, December 7, 2012. [ pdf ]

Thomas Schneider. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer-Verlag Berlin Heidelberg, August 4, 2012. https://thomaschneider.de/engineeringSFEbook. [ DOI | pub ]

Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, and Johannes Buchmann. Improved algebraic side-channel attack on AES. In 4. International Symposium on Hardware-Oriented Security and Trust (HOST'12), pages 146–151, IEEE, San Francisco, CA, USA, June 3-4, 2012. [ DOI | web ]

Michael Zohner, Marc Stöttinger, Sorin A. Huss, and Oliver Stein. An adaptable, modular, and autonomous side-channel vulnerability evaluator. In 4. International Symposium on Hardware-Oriented Security and Trust (HOST'12), pages 43–48, IEEE, San Francisco, CA, USA, June 3-4, 2012. [ DOI | web ]

Vladimir Kolesnikov and Thomas Schneider. Universal Circuit for Secure Function Evaluation. U.S. patent no 8175854 (applied 07/14/2008; issued 05/08/2012), May 8, 2012. [ pub ]

Annelie Heuser and Michael Zohner. Intelligent machine homicide - breaking cryptographic devices using support vector machines. In 3. International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'12, volume 7275 of LNCS, pages 249–264, Springer, Darmstadt, Germany, May 3-4, 2012. [ DOI | web ]

Michael Zohner, Michael Kasper, and Marc Stöttinger. Butterfly-attack on Skein's modular addition. In 3. International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'12, volume 7275 of LNCS, pages 215–230, Springer, Darmstadt, Germany, May 3-4, 2012. [ DOI | web ]

Ágnes Kiss. Finding and representations of minimum cuts and their applications. Bachelor's thesis, Budapest University of Technology and Economics, Hungary, May, 2012.

Oleksandr Tkachenko. Methods of adaptive filtering in speech input systems. Master's thesis, Kherson National Technical University, Ukraine, April, 2012.

Michael Zohner, Michael Kasper, Marc Stöttinger, and Sorin A. Huss. Side channel analysis of the SHA-3 finalists. In 15. Design, Automation & Test in Europe Conference & Exhibition (DATE'12), pages 1012–1017, IEEE, Dresden, Germany, March 12-16, 2012. CORE rank B. [ DOI | web ]

Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, and Thomas Schneider. CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. In 16. International Conference on Financial Cryptography and Data Security (FC'12), volume 7397 of LNCS, pages 299–313, Springer, Bonaire, February 27 - March 2, 2012. Full version: https://ia.cr/2011/679. Acceptance rate 26.1%. CORE rank A. [ DOI | pdf | web ]

Pille Pullonen, Dan Bogdanov, and Thomas Schneider. The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3. Technical report, CYBERNETICA Institute of Information Security, 2012. T-4-17. [ pdf ]

2011

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, and Thomas Schneider. Twin Clouds: Secure Cloud Computing with Low Latency. In 12. Communications and Multimedia Security Conference (CMS'11), volume 7025 of LNCS, pages 32–44, Springer, October 19-21, 2011. Best Paper Award. Acceptance rate 21.2%. CORE rank C. [ DOI | pdf ]

Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, and Thomas Schneider. AmazonIA: When Elasticity Snaps Back. In 18. ACM Conference on Computer and Communications Security (CCS'11), pages 389–400, ACM, Chicago, IL, USA, October 17-21, 2011. Info: https://encrypto.de/AMID. Acceptance rate 14.0%. CORE rank A*. [ DOI | pdf | web ]

Daniel Demmler. Fpga-implementation of the multivariate signature scheme "Unbalanced Oil and Vinegar". Bachelor's thesis, TU Darmstadt, Germany, June, 2011.

Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, and Thomas Schneider. Privacy-Preserving ECG Classification with Branching Programs and Neural Networks. IEEE Transactions on Information Forensics and Security (TIFS), 6(2):452–468, June 2011. CORE rank A. [ DOI | pdf | web ]

Thomas Schneider. Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung. In 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, pages 191–198, SecuMedia-Verlag, Bonn, Germany, May 10-12, 2011. [ pdf | pub ]

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, and Thomas Schneider. Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract). Workshop on Cryptography and Security in Clouds (WCSC'11), Zurich, Switzerland, March 15-16, 2011. [ web ]

Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, and Ivan Visconti. Secure Set Intersection with Untrusted Hardware Tokens. In 11. Cryptographers' Track at the RSA Conference (CT-RSA'11), volume 6558 of LNCS, pages 1–16, Springer, San Francisco, CA, USA, February 14-18, 2011. Acceptance rate 29.9%. CORE rank B. [ DOI | pdf | web ]

Thomas Schneider. Engineering Secure Two-Party Computation Protocols – Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation. PhD thesis, Ruhr-University Bochum, Germany, February 9, 2011. [ pdf ]

Michael Zohner. Side-channel analysis of SHA-3 candidates. Master's thesis, TU Darmstadt, Germany, 2011.

2010

Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. TASTY: Tool for Automating Secure Two-partY computations. In 17. ACM Conference on Computer and Communications Security (CCS'10), pages 451–462, ACM, Chicago, IL, USA, October 4-8, 2010. Full version: https://ia.cr/2010/365. Code: https://encrypto.de/code/TASTY. Acceptance rate 17.2%. CORE rank A*. [ DOI | pdf | web ]

José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols. In 15. European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of LNCS, pages 151–167, Springer, Athens, Greece, September 20-22, 2010. Full version: https://ia.cr/2010/339. Acceptance rate 20.9%. CORE rank A. [ DOI | pdf ]

Ahmad-Reza Sadeghi and Thomas Schneider. Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten. In Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), volume P-174 of LNI, pages 11–25, Bonner Köllen Verlag, Darmstadt, Germany, September 8, 2010. [ pdf | pub ]

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs. In 12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), volume 6225 of LNCS, pages 383–397, Springer, Santa Barbara, CA, USA, August 17-20, 2010. Full version: https://ia.cr/2010/276. Acceptance rate 27.8%. CORE rank A. [ DOI | pdf | web ]

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. POSTER: YACZK: Yet Another Compiler for Zero-Knowledge. 19. USENIX Security Symposium (USENIX Security'10) Poster Session, Washington, DC, USA, August 11-13, 2010. CORE rank A*. [ pdf | poster | web ]

Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy. Token-Based Cloud Computing – Secure Outsourcing of Data and Arbitrary Computations with Lower Latency. In 3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, volume 6101 of LNCS, pages 417–429, Springer, Berlin, Germany, June 21-23, 2010. [ DOI | pdf | web ]

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Embedded SFE: Offloading Server and Network using Hardware Tokens. In 14. International Conference on Financial Cryptography and Data Security (FC'10), volume 6052 of LNCS, pages 207–221, Springer, Tenerife, Canary Islands, Spain, January 25-28, 2010. Full version: https://ia.cr/2009/591. Acceptance rate 14.6%. CORE rank A. [ DOI | pdf | web ]

Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Efficient Secure Two-Party Computation with Untrusted Hardware Tokens. In Ahmad-Reza Sadeghi and David Naccache, editors, Towards Hardware Intrinsic Security: Foundation and Practice, Information Security and Cryptography, pages 367–386. Springer-Verlag Berlin Heidelberg, 2010. [ DOI ]

2009

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In 8. International Conference on Cryptology And Network Security (CANS'09), volume 5888 of LNCS, pages 1–20, Springer, Kanazawa, Japan, December 12-14, 2009. Full version: https://ia.cr/2009/411. Acceptance rate 29.4%. CORE rank B. [ DOI | pdf | web ]

Benny Pinkas, Thomas Schneider, Nigel P. Smart, and Stephen C. Williams. Secure Two-Party Computation is Practical. In 15. Advances in Cryptology - ASIACRYPT'09, volume 5912 of LNCS, pages 250–267, Springer, Tokyo, Japan, December 6-10, 2009. Full version: https://ia.cr/2009/314. Acceptance rate 13.7%. CORE rank A. [ DOI | pdf | web ]

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, and Thomas Schneider. Efficient Privacy-Preserving Classification of ECG Signals. In 1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), pages 91–95, IEEE, London, UK, December 6-9, 2009. Acceptance rate 32.5%. [ DOI | pdf ]

Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. Efficient Privacy-Preserving Face Recognition. In 12. International Conference on Information Security and Cryptology (ICISC'09), volume 5984 of LNCS, pages 229–244, Springer, Seoul, South Korea, December 2-4, 2009. Full version: https://ia.cr/2009/507. Acceptance rate 19.8%. [ DOI | pdf ]

Ahmad-Reza Sadeghi and Thomas Schneider. POSTER: Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics. Section Days of Ruhr-University Bochum Research School, Bochum, Germany, November 6, 2009. (Poster prize awarded). [ poster | web ]

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), Berlin, Germany, October 12-13, 2009. [ pdf | web ]

Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, and Joe-Kai Tsay. On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge. In ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), Berlin, Germany, October 12-13, 2009. [ pdf | web ]

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, and Thomas Schneider. Secure Evaluation of Private Linear Branching Programs with Medical Applications. In 14. European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of LNCS, pages 424–439, Springer, Saint Malo, France, September 21-25, 2009. Full version: https://ia.cr/2009/195. Acceptance rate 19.1%. CORE rank A. [ DOI | pdf | web ]

Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. Automatic Generation of Sigma-Protocols. In 6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), volume 6391 of LNCS, pages 67–82, Springer, Pisa, Italy, September 10-11, 2009. Acceptance rate 45.0%. CORE rank B. [ DOI | pdf ]

Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, and Thomas Schneider. Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification. In 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), Lausanne, Switzerland, September 10, 2009. [ pdf ]

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. How to Combine Homomorphic Encryption and Garbled Circuits – Improved Circuits and Computing the Minimum Distance Efficiently. In 1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), Lausanne, Switzerland, September 10, 2009. [ pdf ]

Annika Paus, Ahmad-Reza Sadeghi, and Thomas Schneider. Practical Secure Evaluation of Semi-Private Functions. In 7. International Conference on Applied Cryptography and Network Security (ACNS'09), volume 5536 of LNCS, pages 89–106, Springer, Paris-Rocquencourt, France, June 2-5, 2009. Full version: https://ia.cr/2009/124. Code: https://encrypto.de/code/FairplaySPF. Acceptance rate 21.3%. CORE rank B. [ DOI | pdf | web ]

Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. POSTER: Automatic Generation of Sound Zero-Knowledge Protocols. 28. Advances in Cryptology - EUROCRYPT'09 Poster Session, Cologne, Germany, April 26-30, 2009. Full version: https://ia.cr/2008/471. Acceptance rate 33% for papers and posters. CORE rank A*. [ pdf | poster | web ]

Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, and Joe-Kai Tsay. Bringing Zero-Knowledge Proofs of Knowledge to Practice. In 17. International Workshop on Security Protocols (SPW'09), volume 7028 of LNCS, pages 51–62, Springer, Cambridge, UK, April 1-3, 2009. Full version: https://ia.cr/2009/211. [ DOI | pdf ]

2008

Ahmad-Reza Sadeghi and Thomas Schneider. Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. In 11. International Conference on Information Security and Cryptology (ICISC'08), volume 5461 of LNCS, pages 336–353, Springer, Seoul, South Korea, December 3-5, 2008. Full version: https://ia.cr/2008/453. Acceptance rate 19.8%. [ DOI | pdf ]

Vladimir Kolesnikov and Thomas Schneider. Improved Garbled Circuit: Free XOR Gates and Applications. In 35. International Colloquium on Automata, Languages and Programming (ICALP'08), volume 5126 of LNCS, pages 486–498, Springer, Reykjavik, Iceland, July 6-13, 2008. Acceptance rate 30%. CORE rank A. [ DOI | pdf | web ]

Vladimir Kolesnikov, Thomas Schneider, and Volker Strehl. Practical Secure Function Evaluation (Abstract). In 8. Kryptotag (crypto day matters), volume WSI-2008-02, Gesellschaft für Informatik e.V. / FG KRYPTO, Tübingen, Germany, April 11, 2008. [ pdf ]

Thomas Schneider. POSTER: Practical Secure Function Evaluation. In Fachwissenschaftlicher Informatik-Kongress (Informatiktage 2008), volume S-6 of LNI, pages 37–40, GI, Bonn, Germany, March 14, 2008. [ pdf | poster | pub ]

Thomas Schneider. Practical Secure Function Evaluation. Master's thesis, Friedrich-Alexander University Erlangen-Nürnberg, Germany, February 27, 2008. [ pdf ]

Vladimir Kolesnikov and Thomas Schneider. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. In 12. International Conference on Financial Cryptography and Data Security (FC'08), volume 5143 of LNCS, pages 83–97, Springer, Cozumel, Mexico, January 28-31, 2008. Code: https://encrypto.de/code/FairplayPF. Acceptance rate 19.1%. CORE rank A. [ DOI | pdf | pub | web ]

Michael Zohner. Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine. Bachelor's thesis, Hochschule Fulda, Germany, 2008.

2007

Thomas Schneider. Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems. Bachelor's thesis, Friedrich-Alexander University Erlangen-Nürnberg, Germany, July 10, 2007. [ pdf ]