Michael Zohner

Dr.-Ing. Michael Zohner

Michael Zohner

Former PhD Student

I was a PhD student and member of the Cryptography and Privacy Engineering Group (ENCRYPTO) at the Center for Research in Security and Privacy (CRISP) between 2012 and 2016. In December 2016, I graduated with distinction on Faster Oblivious Transfer Extension and its Impact on Secure Computation.

My research focuses on the design and implementation of privacy preserving cryptographic protocols.

Furthermore, my interests include multi-party computation, privacy preserving protocols, side-channel attacks and countermeasures against power analysis attacks, and the SHA-3 competition.

You can find further information on my personal webpage.

Contact

Publications

Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item type | No grouping
Jump to: 2018 | 2017 | 2015 | 2014 | 2013 | 2012 | 2011 | 2008
Number of items: 25.

2018

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), S. 7:1-7:35, 21, (2), DOI: 10.1145/3154794,
[Article]

2017

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), De Gruyter Open, S. 143-163, 2017, (3), DOI: 10.1515/popets-2017-0033,
[Article]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), Springer, S. 805-858, 30, (3), DOI: 10.1007/s00145-016-9236-6,
[Article]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), Internet Society, DOI: 10.14722/ndss.2017.23097,
[Conference item]

Zohner, Michael (2017):
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
Darmstadt, Technische Universität, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154],
[PhD thesis]

2015

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), USENIX, [Conference item]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Conference item]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Conference item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
In: 22. Annual Network and Distributed System Security Symposium (NDSS'15), Internet Society, [Conference item]

2014

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2014):
Faster Private Set Intersection based on OT Extension.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2014):
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
In: 23. USENIX Security Symposium (USENIX Security'14), USENIX, [Conference item]

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael (2014):
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
In: 2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), ACM, DOI: 10.1145/2600918.2600922,
[Conference item]

2013

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2013):
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
In: 20. ACM Conference on Computer and Communications Security (CCS'13), ACM, DOI: 10.1145/2508859.2516738,
[Conference item]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2013):
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference item]

Schneider, Thomas ; Zohner, Michael (2013):
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
In: 17. International Conference on Financial Cryptography and Data Security (FC'13), Springer, DOI: 10.1007/978-3-642-39884-1_23,
[Conference item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, S. 139-156, [Article]

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael (2013):
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
In: Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday, [Conference item]

2012

Schneider, Thomas ; Zohner, Michael (2012):
Efficient Secure Two-Party Computation.
In: 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), [Conference item]

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference item]

Zohner, Michael ; Stoettinger, Marc ; Huss, Sorin A. ; Stein, Oliver (2012):
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
San Francisco, CA, USA, In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'12), [Conference item]

Heuser, Annelie ; Zohner, Michael (2012):
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference item]

Zohner, Michael ; Kasper, Michael ; Stoettinger, Marc (2012):
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12), [Conference item]

Zohner, Michael ; Kasper, Michael ; Stöttinger, Marc ; Huss, Sorin A. (2012):
Side channel analysis of the SHA-3 finalists.
In: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE'12), [Conference item]

2011

Zohner, Michael (2011):
Side-Channel Analysis of SHA-3 Candidates.
TU Darmstadt, [Master thesis]

2008

Zohner, Michael (2008):
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda, [Bachelor thesis]

This list was generated on Mon Aug 19 05:01:34 2019 CEST.