Niklas Büscher
Titel
Zitiert von
Zitiert von
Jahr
Introduction
N Büscher, S Katzenbeisser
Compilation for Secure Multi-party Computation, 1-4, 2017
70*2017
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
IFIP International Information Security Conference, 56-67, 2011
432011
HyCC: Compilation of hybrid protocols for practical secure computation
N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
262018
Compiling low depth circuits for practical secure computation
N Buescher, A Holzer, A Weber, S Katzenbeisser
European Symposium on Research in Computer Security, 80-98, 2016
242016
Faster secure computation through automatic parallelization
N Buescher, S Katzenbeisser
24th {USENIX} Security Symposium ({USENIX} Security 15), 531-546, 2015
232015
Scapi: a scalable attestation protocol to detect software and physical attacks
F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
222017
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
202016
Two is not enough: Privacy assessment of aggregation schemes in smart metering
N Buescher, S Boukoros, S Bauregger, S Katzenbeisser
Proceedings on Privacy Enhancing Technologies 2017 (4), 198-214, 2017
162017
Salad: Secure and lightweight attestation of highly dynamic and disruptive networks
F Kohnhäuser, N Büscher, S Katzenbeisser
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
142018
Scalable secure computation from ANSI-C
N Buescher, D Kretzmer, A Jindal, S Katzenbeisser
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
122016
On compiling boolean circuits optimized for secure multi-party computation
N Büscher, M Franz, A Holzer, H Veith, S Katzenbeisser
Formal Methods in System Design 51 (2), 308-331, 2017
82017
Compilation for Secure Multi-party Computation
N Büscher, S Katzenbeisser
Springer International Publishing, 2017
62017
A practical attestation protocol for autonomous embedded systems
F Kohnhäuser, N Büscher, S Katzenbeisser
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 263-278, 2019
42019
Towards practical RAM based secure computation
N Buescher, A Weber, S Katzenbeisser
European Symposium on Research in Computer Security, 416-437, 2018
42018
Implementing the Global Cellular Automata on CUDA
B Milde, N Buescher, M Goesele
PARS: Parallel-Algorithmen,-Rechnerstrukturen und-Systemsoftware: Vol. 28, No. 1, 2011
12011
Secure Two-Party Computation in a Quantum World.
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
IACR Cryptol. ePrint Arch. 2020, 411, 2020
2020
Compilation for More Practical Secure Multi-Party Computation
N Büscher
Technische Universität, 2018
2018
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser
arXiv preprint arXiv:1701.08034, 2017
2017
Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols
N Büscher, S Katzenbeisser
Compilation for Secure Multi-party Computation, 61-77, 2017
2017
Compiling Parallel Circuits
N Büscher, S Katzenbeisser
Compilation for Secure Multi-party Computation, 43-59, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20