Thomas Schneider
Orcid: 0000-0001-8090-1316Affiliations:
- TU Darmstadt, European Center for Security and Privacy by Design, Germany
- Darmstadt University of Technology, Department of Computer Science, Germany
- Ruhr-Universität Bochum, Horst Görtz Institute for IT-Security, Germany (PhD 2012)
According to our database1,
Thomas Schneider
authored at least 157 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Encrypted MultiChannel Communication (EMC<sup>2</sup>): Johnny Should Use Secret Sharing.
Proceedings of the 23rd Workshop on Privacy in the Electronic Society, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Multi-Party Computation als Instrument zur Umsetzung datenschutzkonformer behördlicher Datenabgleiche: Eine interdisziplinäre Analyse am Beispiel der Diskussionen um das Gesetz zur Selbstbestimmung über den Geschlechtseintrag.
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
J. Cryptol., October, 2023
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
ACM Trans. Priv. Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version).
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships.
CoRR, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
ACM Trans. Priv. Secur., 2022
BMC Medical Informatics Decis. Mak., 2022
Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Parallel Distributed Syst., 2020
IET Inf. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
Speech Commun., 2019
Proc. Priv. Enhancing Technol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the 20th Annual Conference of the International Speech Communication Association, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
ACM Trans. Priv. Secur., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 19th Annual Conference of the International Speech Communication Association, 2018
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
Proceedings of the 8th International Conference on Localization and GNSS, 2018
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 2016 Applied Networking Research Workshop, 2016
2015
IACR Cryptol. ePrint Arch., 2015
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT".
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
2013
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer, ISBN: 978-3-642-30041-7, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptol. ePrint Arch., 2010
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Proceedings of the perspeGKtive 2010, 2010
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Practical Secure Function Evaluation.
Proceedings of the Informatiktage 2008, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008