Follow
Niklas Büscher
Title
Cited by
Cited by
Year
Introduction
N Büscher, S Katzenbeisser
Compilation for Secure Multi-party Computation, 1-4, 2017
446*2017
HyCC: Compilation of hybrid protocols for practical secure computation
N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1152018
Salad: Secure and lightweight attestation of highly dynamic and disruptive networks
F Kohnhäuser, N Büscher, S Katzenbeisser
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
672018
Scapi: a scalable attestation protocol to detect software and physical attacks
F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser
Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017
662017
Breaking reCAPTCHA: a holistic approach via shape recognition
P Baecher, N Büscher, M Fischlin, B Milde
Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011
582011
Two is not enough: Privacy assessment of aggregation schemes in smart metering
N Buescher, S Boukoros, S Bauregger, S Katzenbeisser
Proceedings on Privacy Enhancing Technologies, 2017
552017
Compiling low depth circuits for practical secure computation
N Büscher, A Holzer, A Weber, S Katzenbeisser
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
372016
Faster secure computation through automatic parallelization
N Buescher, S Katzenbeisser
24th USENIX security symposium (USENIX security 15), 531-546, 2015
332015
A practical attestation protocol for autonomous embedded systems
F Kohnhäuser, N Büscher, S Katzenbeisser
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 263-278, 2019
302019
Creating cryptographic challenges using multi-party computation: The LWE challenge
J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ...
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
292016
Secure two-party computation in a quantum world
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
Applied Cryptography and Network Security: 18th International Conference …, 2020
192020
On compiling boolean circuits optimized for secure multi-party computation
N Büscher, M Franz, A Holzer, H Veith, S Katzenbeisser
Formal Methods in System Design 51, 308-331, 2017
132017
Scalable secure computation from ANSI-C
N Buescher, D Kretzmer, A Jindal, S Katzenbeisser
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
132016
Compilation for secure multi-party computation
N Büscher, S Katzenbeisser
Springer International Publishing, 2017
102017
Compilation for more practical secure multi-party computation
N Büscher
Technische Universität, 2018
42018
Towards practical RAM based secure computation
N Buescher, A Weber, S Katzenbeisser
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
42018
Compiling ANSI-C Code into Boolean Circuits
N Büscher, S Katzenbeisser, N Büscher, S Katzenbeisser
Compilation for Secure Multi-party Computation, 15-28, 2017
12017
Implementing the Global Cellular Automata on CUDA
B Milde, N Buescher, M Goesele
PARS: Parallel-Algorithmen,-Rechnerstrukturen und-Systemsoftware 28 (1), 28-37, 2011
12011
HyCC
N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2018
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks
F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser
arXiv preprint arXiv:1701.08034, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20