Sebastian Berndt

Orcid: 0000-0003-4177-8081

Affiliations:
  • University of Lübeck, Lübeck, Germany


According to our database1, Sebastian Berndt authored at least 46 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TeeJam: Sub-Cache-Line Leakages Strike Back.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Polynomial sharings on two secrets: Buy one, get one free.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge.
IACR Commun. Cryptol., 2024

New Support Size Bounds and Proximity Bounds for Integer Linear Programming.
Proceedings of the SOFSEM 2024: Theory and Practice of Computer Science, 2024

2023
Online bin covering with limited migration.
J. Comput. Syst. Sci., June, 2023

Subversion-Resilient Authenticated Encryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2023

Subversion-Resilient Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2023

Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework.
IACR Cryptol. ePrint Arch., 2023

Combined Fault and Leakage Resilience: Composability, Constructions and Compiler.
IACR Cryptol. ePrint Arch., 2023

DASH: Accelerating Distributed Private Machine Learning Inference with Arithmetic Garbled Circuits.
CoRR, 2023

PACE Solver Description: The PACE 2023 Parameterized Algorithms and Computational Experiments Challenge: Twinwidth.
Proceedings of the 18th International Symposium on Parameterized and Exact Computation, 2023

New Support Size Bounds for Integer Programming, Applied to Makespan Minimization on Uniformly Related Machines.
Proceedings of the 34th International Symposium on Algorithms and Computation, 2023

"Act natural!": Exchanging Private Messages on Public Blockchains.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Online load balancing with general reassignment cost.
Oper. Res. Lett., 2022

Recent Advances in Positive-Instance Driven Graph Searching.
Algorithms, 2022

Load Balancing: The Long Road from Theory to Practice.
Proceedings of the Symposium on Algorithm Engineering and Experiments, 2022

2021
Side-Channel Protections for Picnic Signatures.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device.
IACR Cryptol. ePrint Arch., 2021

"Act natural!": Having a Private Chat on a Public Blockchain.
IACR Cryptol. ePrint Arch., 2021

New Bounds for the Vertices of the Integer Hull.
Proceedings of the 4th Symposium on Simplicity in Algorithms, 2021

Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs.
Proceedings of the SOFSEM 2021: Theory and Practice of Computer Science, 2021

Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

Robust Online Algorithms for Dynamic Choosing Problems.
Proceedings of the Connecting with Computability, 2021

Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Fully dynamic bin packing revisited.
Math. Program., 2020

On the universal steganography of optimal rate.
Inf. Comput., 2020

SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2020

ASAP: Algorithm Substitution Attacks on Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2020

Solving Packing Problems with Few Small Items Using Rainbow Matchings.
Proceedings of the 45th International Symposium on Mathematical Foundations of Computer Science, 2020

PACE Solver Description: PID^⋆.
Proceedings of the 15th International Symposium on Parameterized and Exact Computation, 2020

PACE Solver Description: Fluid.
Proceedings of the 15th International Symposium on Parameterized and Exact Computation, 2020

SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
New results on feasibilities and limitations of provable secure steganography.
PhD thesis, 2019

Robust Online Algorithms for Dynamic Problems.
CoRR, 2019

Practical Access to Dynamic Programming on Tree Decompositions.
Algorithms, 2019

Robust Online Algorithms for Certain Dynamic Packing Problems.
Proceedings of the Approximation and Online Algorithms - 17th International Workshop, 2019

Positive-Instance Driven Dynamic Programming for Graph Searching.
Proceedings of the Algorithms and Data Structures - 16th International Symposium, 2019

2018
On the Gold Standard for Security of Universal Steganography.
IACR Cryptol. ePrint Arch., 2018

Using Structural Properties for Integer Programs.
Proceedings of the Sailing Routes in the World of Computation, 2018

Computing Tree Width: From Theory to Practice and Back.
Proceedings of the Sailing Routes in the World of Computation, 2018

2017
Learning Residual Alternating Automata.
Electron. Colloquium Comput. Complex., 2017

Jdrasil: A Modular Library for Computing Tree Decompositions.
Proceedings of the 16th International Symposium on Experimental Algorithms, 2017

Algorithm Substitution Attacks from a Steganographic Perspective.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Steganography Based on Pattern Languages.
Proceedings of the Language and Automata Theory and Applications, 2016

Hard Communication Channels for Steganography.
Proceedings of the 27th International Symposium on Algorithms and Computation, 2016

Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016


  Loading...