Thomas Schneider
TitleCited byYear
Improved Garbled Circuit: Free XOR Gates and Applications
V Kolesnikov, T Schneider
35. International Colloquium on Automata, Languages and Programming (ICALP …, 2008
5552008
Secure Two-Party Computation Is Practical
B Pinkas, T Schneider, NP Smart, SC Williams
15. Advances in Cryptology - ASIACRYPT 2009 5912 (LNCS), 250-267, 2009
4302009
TASTY: Tool for Automating Secure Two-partY computations
W Henecka, AR Sadeghi, T Schneider, I Wehrenberg
17. ACM Conference on Computer and Communications Security (CCS'10), 451-462, 2010
3652010
Efficient Privacy-Preserving Face Recognition
AR Sadeghi, T Schneider, I Wehrenberg
12. International Conference on Information Security and Cryptology (ICISC …, 2009
3202009
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
G Asharov, Y Lindell, T Schneider, M Zohner
20. ACM Conference on Computer and Communications Security (CCS'13), 535-548, 2013
2422013
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
V Kolesnikov, AR Sadeghi, T Schneider
8. International Conference on Cryptology And Network Security (CANS'09 …, 2009
2252009
ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
D Demmler, T Schneider, M Zohner
22. Annual Network and Distributed System Security Symposium (NDSS'15), 2015
2022015
Token-Based Cloud Computing
AR Sadeghi, T Schneider, M Winandy
3. International Conference on Trust and Trustworthy Computing (TRUST'10 …, 2010
1922010
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract)
S Bugiel, S Nürnberger, AR Sadeghi, T Schneider
Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011
1812011
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks
M Barni, P Failla, R Lazzeretti, AR Sadeghi, T Schneider
IEEE Transactions on Information Forensics and Security (TIFS) 6 (2), 452-468, 2011
1562011
AmazonIA: When Elasticity Snaps Back
S Bugiel, S Nürnberger, T Pöppelmann, AR Sadeghi, T Schneider
18. ACM Conference on Computer and Communications Security (CCS'11), 389-400, 2011
1422011
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
EM Songhori, SU Hussain, AR Sadeghi, T Schneider, F Koushanfar
36. IEEE Symposium on Security and Privacy (IEEE S&P'15), 411-428, 2015
1372015
Faster Private Set Intersection Based on OT Extension
B Pinkas, T Schneider, M Zohner
23. USENIX Security Symposium (USENIX Security'14), 797-812, 2014
1302014
Secure Evaluation of Private Linear Branching Programs with Medical Applications
M Barni, P Failla, V Kolesnikov, R Lazzeretti, AR Sadeghi, T Schneider
14. European Symposium on Research in Computer Security (ESORICS'09) 5789 …, 2009
1132009
Ciphers for MPC and FHE
MR Albrecht, C Rechberger, T Schneider, T Tiessen, M Zohner
34. Advances in Cryptology - EUROCRYPT 2015 9056 (LNCS), 430-454, 2015
1122015
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
T Schneider, M Zohner
17. International Conference on Financial Cryptography and Data Security (FC …, 2013
1082013
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
V Kolesnikov, T Schneider
12. International Conference on Financial Cryptography and Data Security (FC …, 2008
95*2008
Twin Clouds: Secure Cloud Computing With Low Latency
S Bugiel, S Nürnberger, AR Sadeghi, T Schneider
12. Communications and Multimedia Security Conference (CMS'11) 7025 (LNCS …, 2011
922011
Phasing: Private Set Intersection using Permutation-Based Hashing
B Pinkas, T Schneider, G Segev, M Zohner
24. USENIX Security Symposium (USENIX Security'15), 515-530, 2015
892015
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
G Asharov, Y Lindell, T Schneider, M Zohner
34. Advances in Cryptology - EUROCRYPT 2015 9056 (LNCS), 673-701, 2015
752015
The system can't perform the operation now. Try again later.
Articles 1–20