Improved Garbled Circuit: Free XOR Gates and Applications V Kolesnikov, T Schneider 35. International Colloquium on Automata, Languages and Programming (ICALP …, 2008 | 966 | 2008 |
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation D Demmler, T Schneider, M Zohner 22. Annual Network and Distributed System Security Symposium (NDSS'15), 2015 | 926 | 2015 |
Secure Two-Party Computation Is Practical B Pinkas, T Schneider, NP Smart, SC Williams 15. Advances in Cryptology - ASIACRYPT 2009 5912 (LNCS), 250-267, 2009 | 634 | 2009 |
Scalable Private Set Intersection Based on OT Extension B Pinkas, T Schneider, M Zohner ACM Transactions on Privacy and Security (TOPS) 21 (2), 35, 2018 | 589 | 2018 |
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ... 13. ACM Asia Conference on Information, Computer and Communications Security …, 2018 | 549 | 2018 |
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation G Asharov, Y Lindell, T Schneider, M Zohner 20. ACM Conference on Computer and Communications Security (CCS'13), 535-548, 2013 | 498 | 2013 |
TASTY: Tool for Automating Secure Two-partY computations W Henecka, AR Sadeghi, T Schneider, I Wehrenberg 17. ACM Conference on Computer and Communications Security (CCS'10), 451-462, 2010 | 495 | 2010 |
Efficient Privacy-Preserving Face Recognition AR Sadeghi, T Schneider, I Wehrenberg 12. International Conference on Information Security and Cryptology (ICISC …, 2009 | 487 | 2009 |
Ciphers for MPC and FHE MR Albrecht, C Rechberger, T Schneider, T Tiessen, M Zohner 34. Advances in Cryptology - EUROCRYPT 2015 9056 (LNCS), 430-454, 2015 | 474 | 2015 |
Phasing: Private Set Intersection using Permutation-Based Hashing B Pinkas, T Schneider, G Segev, M Zohner 24. USENIX Security Symposium (USENIX Security'15), 515-530, 2015 | 351 | 2015 |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima V Kolesnikov, AR Sadeghi, T Schneider 8. International Conference on Cryptology And Network Security (CANS'09 …, 2009 | 325 | 2009 |
Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract) S Bugiel, S Nürnberger, AR Sadeghi, T Schneider Workshop on Cryptography and Security in Clouds (WCSC 2011), 2011 | 285 | 2011 |
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits EM Songhori, SU Hussain, AR Sadeghi, T Schneider, F Koushanfar 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), 411-428, 2015 | 275 | 2015 |
FLAME: Taming Backdoors in Federated Learning TD Nguyen, P Rieger, H Chen, H Yalame, H Möllering, H Fereidooni, ... 31. USENIX Security Symposium (USENIX Security'22), 2022 | 261* | 2022 |
Privacy-Preserving ECG Classification with Branching Programs and Neural Networks M Barni, P Failla, R Lazzeretti, AR Sadeghi, T Schneider IEEE Transactions on Information Forensics and Security (TIFS) 6 (2), 452-468, 2011 | 257 | 2011 |
Token-Based Cloud Computing AR Sadeghi, T Schneider, M Winandy 3. International Conference on Trust and Trustworthy Computing (TRUST'10 …, 2010 | 253* | 2010 |
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation A Patra, T Schneider, A Suresh, H Yalame 30. USENIX Security Symposium (USENIX Security'21), 2165-2182, 2021 | 209 | 2021 |
Efficient Circuit-based PSI via Cuckoo Hashing B Pinkas, T Schneider, C Weinert, U Wieder 37. Advances in Cryptology - EUROCRYPT 2018 10822 (LNCS), 125-157, 2018 | 195 | 2018 |
Efficient Circuit-based PSI with Linear Communication B Pinkas, T Schneider, O Tkachenko, A Yanai 38. Advances in Cryptology – EUROCRYPT 2019 11478 (LNCS), 122–153, 2019 | 189 | 2019 |
Secure Evaluation of Private Linear Branching Programs with Medical Applications M Barni, P Failla, V Kolesnikov, R Lazzeretti, AR Sadeghi, T Schneider 14. European Symposium on Research in Computer Security (ESORICS'09) 5789 …, 2009 | 185 | 2009 |