Michael Zohner

Dr.-Ing. Michael Zohner

Michael Zohner

Former PhD Student

I was a PhD student and member of the Cryptography and Privacy Engineering Group (ENCRYPTO) at the Center for Research in Security and Privacy (CRISP) between 2012 and 2016. In December 2016, I graduated with distinction on Faster Oblivious Transfer Extension and its Impact on Secure Computation.

My research focuses on the design and implementation of privacy preserving cryptographic protocols.

Furthermore, my interests include multi-party computation, privacy preserving protocols, side-channel attacks and countermeasures against power analysis attacks, and the SHA-3 competition.

You can find further information on my personal webpage.

Contact

Publications

Group by: Publikationsjahr | Item type | No grouping
Jump to: 2018 | 2017 | 2015 | 2014 | 2013 | 2012 | 2011 | 2008
Number of items: 25.

2018

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Article] , (2018)

2017

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) S. 143-163.
[Article] , (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) S. 805-858.
[Article] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[ Konferenzveröffentlichung] , (2017)

Zohner, Michael :
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
[Online-Edition: http://tuprints.ulb.tu-darmstadt.de/6154]
Technische Universität , Darmstadt
[PhD thesis], (2016)

2015

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[ Konferenzveröffentlichung] , (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[ Konferenzveröffentlichung] , (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[ Konferenzveröffentlichung] , (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[ Konferenzveröffentlichung] , (2015)

2014

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[ Konferenzveröffentlichung] , (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[ Konferenzveröffentlichung] , (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[ Konferenzveröffentlichung] , (2014)

2013

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[ Konferenzveröffentlichung] , (2013)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2013)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13) Springer
[ Konferenzveröffentlichung] , (2013)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering S. 139-156.
[Article] , (2013)

Huss, Sorin A. ; Stöttinger, Marc ; Zohner, Michael :
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
[ Konferenzveröffentlichung] , (2013)

2012

Schneider, Thomas ; Zohner, Michael :
Efficient Secure Two-Party Computation.
17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[ Konferenzveröffentlichung] , (2012)

Mohamed, Mohamed Saied Emam ; Bulygin, Stanislav ; Zohner, Michael ; Heuser, Annelie ; Walter, Michael ; Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[ Konferenzveröffentlichung] , (2012)

Zohner, Michael ; Stoettinger, Marc ; Huss, Sorin A. ; Stein, Oliver :
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'12). San Francisco, CA, USA
[ Konferenzveröffentlichung] , (2012)

Heuser, Annelie ; Zohner, Michael :
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[ Konferenzveröffentlichung] , (2012)

Zohner, Michael ; Kasper, Michael ; Stoettinger, Marc :
Butterfly-Attack on Skein's Modular Addition.
In: Constructive Side-Channel Analysis and Secure Design - Third International Workshop (COSADE'12).
[ Konferenzveröffentlichung] , (2012)

Zohner, Michael ; Kasper, Michael ; Stöttinger, Marc ; Huss, Sorin A. :
Side channel analysis of the SHA-3 finalists.
In: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE'12).
[ Konferenzveröffentlichung] , (2012)

2011

Zohner, Michael :
Side-Channel Analysis of SHA-3 Candidates.
TU Darmstadt
[Master thesis] , (2011)

2008

Zohner, Michael :
Erweiterung von OpenSSL zur Nutzung der PadLock Security Engine.
Hochschule Fulda
[Bachelor thesis] , (2008)

This list was generated on Fri Feb 22 04:44:06 2019 CET.