Thomas Schneider

Prof. Dr.-Ing. Thomas Schneider

Thomas Schneider

Head of Group

I am a professor for Cryptography and Privacy Engineering (ENCRYPTO) at the Department of Computer Science of Technische Universität Darmstadt, Germany.

Before, I was independent Claude Shannon research group leader at the Center for Research in Security and Privacy (CRISP), formerly European Center for Security and Privacy by Design (EC SPRIDE), and postdoc at the Center for Advanced Security Research Darmstadt (CASED). I did my PhD at the Horst Götz Institute for IT Security (HGI) at Ruhr-University Bochum.

My research focuses on privacy, cryptographic protocols, applied cryptography, and computer security.

You can find further information on my personal webpage.

Download my CV here.

Consultation-hours: please contact me via email.

Contact

S4|14 5.3.14
Mornewegstraße 32
64293 Darmstadt

+49 6151 16-27300

Publications

You can find further information on my publications (including Bibtex entries and PDFs) at https://thomaschneider.de/pubs.

Group by: Date | Item type | No grouping
Jump to: 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007
Number of items: 86.

2019

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Article] , (2019)

2018

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas :
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
25. ACM Conference on Computer and Communications Security (CCS'18) ACM
[Conference or workshop item] , (2018)

Schneider, Thomas ; Tkachenko, Oleksandr :
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
17. Workshop on Privacy in the Electronic Society (WPES’18) ACM
[Conference or workshop item] , (2018)

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng :
Faster Privacy-Preserving Location Proximity Schemes.
17. International Conference on Cryptology And Network Security (CANS'18) Springer
[Conference or workshop item] , (2018)

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian :
VoiceGuard: Secure and Private Speech Processing.
Interspeech 2018 International Speech Communication Association (ISCA)
[Conference or workshop item] , (2018)

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas :
Web Application for Privacy-Preserving Scheduling (Poster).
In: 27. USENIX Security Symposium (USENIX Security'18) Poster Session
[Other] , (2018)

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas :
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
8. International Conference on Localization and GNSS (ICL-GNSS'18) IEEE
[Conference or workshop item] , (2018)

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay :
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Conference or workshop item] , (2018)

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz :
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18) ACM
[Conference or workshop item] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi :
Efficient Circuit-based PSI via Cuckoo Hashing.
37. Advances in Cryptology -- EUROCRYPT 2018 Springer
[Conference or workshop item] , (2018)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2) 7:1-7:35.
[Article] , (2018)

2017

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas :
More Efficient Universal Circuit Constructions.
23. Advances in Cryptology -- ASIACRYPT 2017 Springer
[Conference or workshop item] , (2017)

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17) ACM
[Conference or workshop item] , (2017)

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian :
Privacy-Preserving Whole-Genome Variant Queries.
16. International Conference on Cryptology And Network Security (CANS'17) Springer
[Conference or workshop item] , (2017)

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas :
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
15. International Conference on Applied Cryptography and Network Security (ACNS'17) Springer
[Conference or workshop item] , (2017)

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Article] , (2017)

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael :
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (3) pp. 143-163.
[Article] , (2017)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3) pp. 805-858.
[Article] , (2017)

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael :
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or workshop item] , (2017)

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto :
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
24. Annual Network and Distributed System Security Symposium (NDSS'17) Internet Society
[Conference or workshop item] , (2017)

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (1) pp. 62-78.
[Article] , (2017)

2016

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas :
Towards Securing Internet eXchange Points Against Curious onlooKers.
ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16) ACM
[Conference or workshop item] , (2016)

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz :
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
53. Annual Design Automation Conference (DAC'16) ACM
[Conference or workshop item] , (2016)

Kiss, Ágnes ; Schneider, Thomas :
Valiant's Universal Circuit is Practical.
35. Advances in Cryptology -- EUROCRYPT 2016 Springer
[Conference or workshop item] , (2016)

2015

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza :
Automated Synthesis of Optimized Circuits for Secure Computation.
22. ACM Conference on Computer and Communications Security (CCS'15) ACM
[Conference or workshop item] , (2015)

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael :
Phasing: Private Set Intersection using Permutation-based Hashing.
24. USENIX Security Symposium (USENIX Security'15) USENIX
[Conference or workshop item] , (2015)

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria :
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
8. International Conference on Trust and Trustworthy Computing (TRUST'15) Springer
[Conference or workshop item] , (2015)

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz :
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
36. IEEE Symposium on Security and Privacy (IEEE S&P'15) IEEE
[Conference or workshop item] , (2015)

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael :
Ciphers for MPC and FHE.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or workshop item] , (2015)

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
34. Advances in Cryptology -- EUROCRYPT 2015 Springer
[Conference or workshop item] , (2015)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
22. Annual Network and Distributed System Security Symposium (NDSS'15) Internet Society
[Conference or workshop item] , (2015)

2014

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[Conference or workshop item] , (2014)

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael :
Faster Private Set Intersection based on OT Extension.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or workshop item] , (2014)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
23. USENIX Security Symposium (USENIX Security'14) USENIX
[Conference or workshop item] , (2014)

Bringer, Julien ; Chabanne, Hervé ; Favre, Mélanie ; Patey, Alain ; Schneider, Thomas ; Zohner, Michael :
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification.
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or workshop item] , (2014)

Schneider, Matthias ; Schneider, Thomas :
Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT".
2. ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14) ACM
[Conference or workshop item] , (2014)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic protocol selection in secure two-party computations.
[Online-Edition: http://dx.doi.org/10.1007/978-3-319-07536-5_33]
In: 12. International Conference on Applied Cryptography and Network Security (ACNS'14).
[Conference or workshop item] , (2014)

2013

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael :
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
20. ACM Conference on Computer and Communications Security (CCS'13) ACM
[Conference or workshop item] , (2013)

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael :
Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones.
19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2013)

Asokan, N. ; Dmitrienko, Alexandra ; Nagy, Marcin ; Reshetova, Elena ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Conference or workshop item] , (2013)

Henecka, Wilko ; Schneider, Thomas :
Faster Secure Two-Party Computation with Less Memory.
8. ACM Symposium on Information, Computer and Communications Security (ASIACCS'13) ACM
[Conference or workshop item] , (2013)

Schneider, Thomas ; Zohner, Michael :
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
17. International Conference on Financial Cryptography and Data Security (FC'13) Springer
[Conference or workshop item] , (2013)

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel :
Automatic Protocol Selection in Secure Two-Party Computations (Short Talk).
In: 20. Network and Distributed System Security Symposium (NDSS'13)
[Other] , (2013)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Systematic Approach to Practically Efficient General Two-Party Secure Function Evaluation Protocols and their Modular Design.
[Online-Edition: http://dx.doi.org/10.3233/JCS-130464]
In: Journal of Computer Security (JCS), 21 (2) pp. 283-315.
[Article] , (2013)

2012

Schneider, Thomas ; Zohner, Michael :
Efficient Secure Two-Party Computation.
17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2012)

Schneider, Thomas:
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer-Verlag Berlin Heidelberg , p. 162. ISBN 978-3-642-30041-7
[Book] , (2012)

Ahmad, Junaid Jameel ; Li, Shujun ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
16. International Conference on Financial Cryptography and Data Security (FC'12) Springer
[Conference or workshop item] , (2012)

Pullonen, Pille ; Bogdanov, Dan ; Schneider, Thomas :
The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3.
[Online-Edition: http://research.cyber.ee/reports/T-4-17-The-design-and-imple...]

[Report] , (2012)

2011

Bugiel, Sven ; Pöppelmann, Thomas ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
AmazonIA: When Elasticity Snaps Back.
18. ACM Conference on Computer and Communications Security (CCS'11) ACM
[Conference or workshop item] , (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: Secure Cloud Computing with Low Latency.
12. Communications and Multimedia Security Conference (CMS'11) Springer
[Conference or workshop item] , (2011)

Barni, Mauro ; Failla, Pierluigi ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks.
In: IEEE Transactions on Information Forensics and Security (TIFS), 6 (2) pp. 452-468.
[Article] , (2011)

Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract).
Workshop on Cryptography and Security in Clouds (WCSC'11)
[Conference or workshop item] , (2011)

Schneider, Thomas :
Engineering Secure Two-Party Computation Protocols — Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S11Thesis.pdf]
Ruhr-University Bochum, Germany
[PhD thesis]

Fischlin, Marc ; Pinkas, Benny ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Visconti, Ivan :
Secure Set Intersection with Untrusted Hardware Tokens.
11th Cryptographers' Track at the RSA Conference (CT-RSA'11) Springer
[Conference or workshop item] , (2011)

Schneider, Thomas :
Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung.
[Online-Edition: http://buchshop.secumedia.de/buchshop/index.php?page=detail&...]
12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen SecuMedia-Verlag
[Conference or workshop item] , (2011)

2010

Henecka, Wilko ; Kögl, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
TASTY: Tool for Automating Secure Two-partY computations.
17. ACM Conference on Computer and Communications Security (CCS'10) ACM
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
[Online-Edition: http://www.gi-ev.de/service/publikationen/lni/gi-edition-pro...]
In: LNI , P-174 . Bonner Köllen Verlag
[Conference or workshop item] , (2010)

Almeida, José Bacelar ; Bangerter, Endre ; Barbosa, Manuel ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
15. European Symposium on Research in Computer Security (ESORICS'10) Springer
[Conference or workshop item] , (2010)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
YACZK: Yet Another Compiler for Zero-Knowledge.
In: 19. USENIX Security Symposium (USENIX Security'10) Poster Session
[Other] , (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
12. International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10) Springer
[Conference or workshop item] , (2010)

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Winandy, Marcel :
Token-Based Cloud Computing - Secure Outsourcing of Data and Arbitrary Computations with Lower Latency.
3. International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud Springer
[Conference or workshop item] , (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10) Springer
[Conference or workshop item] , (2010)

Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice. Information Security and Cryptography. Springer-Verlag Berlin Heidelberg , pp. 367-386.
[Book section] , (2010)

2009

Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Wehrenberg, Immo :
Efficient Privacy-Preserving Face Recognition.
12. International Conference on Information Security and Cryptology (ICISC'09) Springer
[Conference or workshop item] , (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Efficient Privacy-Preserving Classification of ECG Signals.
1. IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09) IEEE
[Conference or workshop item] , (2009)

Pinkas, Benny ; Schneider, Thomas ; Smart, Nigel P. ; Williams, Stephen C. :
Secure Two-Party Computation is Practical.
15. Advances in Cryptology -- ASIACRYPT 2009 Springer
[Conference or workshop item] , (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
8. International Conference on Cryptology And Network Security (CANS'09) Springer
[Conference or workshop item] , (2009)

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics.
In: Section Days of Ruhr-University Bochum Research School
[Other] , (2009)

Bangerter, Endre ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge.
ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
[Conference or workshop item] , (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09)
[Conference or workshop item] , (2009)

Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently.
1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
[Conference or workshop item] , (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification.
1. International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09)
[Conference or workshop item] , (2009)

Bangerter, Endre ; Briner, Thomas ; Henecka, Wilko ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sigma-Protocols.
6. European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09) Springer
[Conference or workshop item] , (2009)

Barni, Mauro ; Failla, Pierluigi ; Kolesnikov, Vladimir ; Lazzeretti, Riccardo ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
14. European Symposium on Research in Computer Security (ESORICS'09) Springer
[Conference or workshop item] , (2009)

Paus, Annika ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Practical Secure Evaluation of Semi-Private Functions.
7. International Conference on Applied Cryptography and Network Security (ACNS'09) Springer
[Conference or workshop item] , (2009)

Bangerter, Endre ; Barzan, Stefania ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Tsay, Joe-Kai :
Bringing Zero-Knowledge Proofs of Knowledge to Practice.
17. International Workshop on Security Protocols (SPW'09) Springer
[Conference or workshop item] , (2009)

Bangerter, Endre ; Camenisch, Jan ; Krenn, Stephan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Automatic Generation of Sound Zero-Knowledge Protocols.
In: 28. Advances in Cryptology -- EUROCRYPT 2009 Poster Session
[Other] , (2009)

2008

Sadeghi, Ahmad-Reza ; Schneider, Thomas :
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
11. International Conference on Information Security and Cryptology (ICISC'08) Springer
[Conference or workshop item] , (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Secure Function Evaluation Techniques for Circuits Containing XOR Gates with Applications to Universal Circuits.
[Online-Edition: http://www.freepatentsonline.com/y2009/0175443.html]

[Norm, Patent, Standard] , (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Universal Circuit for Secure Function Evaluation.
[Online-Edition: http://www.google.com/patents/US20090140767]

[Norm, Patent, Standard] , (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
Improved Garbled Circuit: Free XOR Gates and Applications.
35. International Colloquium on Automata, Languages and Programming (ICALP'08) Springer
[Conference or workshop item] , (2008)

Kolesnikov, Vladimir ; Schneider, Thomas ; Strehl, Volker :
Practical Secure Function Evaluation.
8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag) Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI)
[Conference or workshop item] , (2008)

Schneider, Thomas :
Practical secure function evaluation.
In: Fachwissenschaftlicher Informatik-Kongress (Informatiktage 2008).
[Conference or workshop item] , (2008)

Schneider, Thomas :
Practical Secure Function Evaluation.
[Online-Edition: http://thomaschneider.de/papers/S08Thesis.pdf]
University Erlangen-Nürnberg, Germany
[Master thesis] , (2008)

Kolesnikov, Vladimir ; Schneider, Thomas :
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
12. International Conference on Financial Cryptography and Data Security (FC'08) Springer
[Conference or workshop item] , (2008)

2007

Schneider, Thomas :
Secure Task Migration and Interprocess Communication in Reconfigurable, Distributed, Embedded Systems.
University Erlangen-Nürnberg, Germany
[Bachelor thesis] , (2007)

This list was generated on Mon Dec 10 04:40:09 2018 CET.