Michael Zohner

Dr.-Ing. Michael Zohner

Michael Zohner

Former PhD Student

I was a PhD student and member of the Cryptography and Privacy Engineering Group (ENCRYPTO) at the Center for Research in Security and Privacy (CRISP) between 2012 and 2016. In December 2016, I graduated with distinction on Faster Oblivious Transfer Extension and its Impact on Secure Computation.

My research focuses on the design and implementation of privacy preserving cryptographic protocols.

Furthermore, my interests include multi-party computation, privacy preserving protocols, side-channel attacks and countermeasures against power analysis attacks, and the SHA-3 competition.

You can find further information on my personal webpage.

Contact

Publications

Group by: Date | Item type | No grouping
Jump to: 2018 | 2017 | 2015 | 2014 | 2013 | 2012 | 2011 | 2008
Number of items: 25.

2018

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Article] , (2018)

2017

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Article] , (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Article] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or workshop item] , (2017)

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[PhD thesis], (2016)

2015

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Conference or workshop item] , (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or workshop item] , (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or workshop item] , (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Conference or workshop item] , (2015)

2014

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or workshop item] , (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or workshop item] , (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or workshop item] , (2014)

2013

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Conference or workshop item] , (2013)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2013)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13) Springer
[Conference or workshop item] , (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Article] , (2013)

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[Conference or workshop item] , (2013)

2012

Schneider, Thomas ; Zohner, Michael :
Efficient Secure Two-Party Computation.
17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2012)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Conference or workshop item] , (2012)

Zohner, Michael ; Stoettinger, Marc ; Huss, Sorin A. ; Stein, Oliver :
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'12). San Francisco, CA, USA
[Conference or workshop item] , (2012)

Heuser, Annelie ; Zohner, Michael :
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Conference or workshop item] , (2012)

Zohner, Michael ; Kasper, Michael ; Stoettinger, Marc :
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[Conference or workshop item] , (2012)

Zohner, Michael ; Kasper, Michael ; Stöttinger, Marc ; Huss, Sorin A. :
Side channel analysis of the SHA-3 finalists.
In: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE'12).
[Conference or workshop item] , (2012)

2011

Zohner, Michael :
Side-Channel Analysis of SHA-3 Candidates.
TU Darmstadt
[Master thesis] , (2011)

2008

Zohner, Michael :
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda
[Bachelor thesis] , (2008)

This list was generated on Fri Dec 14 05:55:18 2018 CET.