Introduction N Büscher, S Katzenbeisser Compilation for Secure Multi-party Computation, 1-4, 2017 | 446* | 2017 |
HyCC: Compilation of hybrid protocols for practical secure computation N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 115 | 2018 |
Salad: Secure and lightweight attestation of highly dynamic and disruptive networks F Kohnhäuser, N Büscher, S Katzenbeisser Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 67 | 2018 |
Scapi: a scalable attestation protocol to detect software and physical attacks F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser Proceedings of the 10th ACM conference on security and privacy in wireless …, 2017 | 66 | 2017 |
Breaking reCAPTCHA: a holistic approach via shape recognition P Baecher, N Büscher, M Fischlin, B Milde Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 58 | 2011 |
Two is not enough: Privacy assessment of aggregation schemes in smart metering N Buescher, S Boukoros, S Bauregger, S Katzenbeisser Proceedings on Privacy Enhancing Technologies, 2017 | 55 | 2017 |
Compiling low depth circuits for practical secure computation N Büscher, A Holzer, A Weber, S Katzenbeisser Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 37 | 2016 |
Faster secure computation through automatic parallelization N Buescher, S Katzenbeisser 24th USENIX security symposium (USENIX security 15), 531-546, 2015 | 33 | 2015 |
A practical attestation protocol for autonomous embedded systems F Kohnhäuser, N Büscher, S Katzenbeisser 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 263-278, 2019 | 30 | 2019 |
Creating cryptographic challenges using multi-party computation: The LWE challenge J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ... Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016 | 29 | 2016 |
Secure two-party computation in a quantum world N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ... Applied Cryptography and Network Security: 18th International Conference …, 2020 | 19 | 2020 |
On compiling boolean circuits optimized for secure multi-party computation N Büscher, M Franz, A Holzer, H Veith, S Katzenbeisser Formal Methods in System Design 51, 308-331, 2017 | 13 | 2017 |
Scalable secure computation from ANSI-C N Buescher, D Kretzmer, A Jindal, S Katzenbeisser 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 13 | 2016 |
Compilation for secure multi-party computation N Büscher, S Katzenbeisser Springer International Publishing, 2017 | 10 | 2017 |
Compilation for more practical secure multi-party computation N Büscher Technische Universität, 2018 | 4 | 2018 |
Towards practical RAM based secure computation N Buescher, A Weber, S Katzenbeisser Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 4 | 2018 |
Compiling ANSI-C Code into Boolean Circuits N Büscher, S Katzenbeisser, N Büscher, S Katzenbeisser Compilation for Secure Multi-party Computation, 15-28, 2017 | 1 | 2017 |
Implementing the Global Cellular Automata on CUDA B Milde, N Buescher, M Goesele PARS: Parallel-Algorithmen,-Rechnerstrukturen und-Systemsoftware 28 (1), 28-37, 2011 | 1 | 2011 |
HyCC N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser arXiv preprint arXiv:1701.08034, 2017 | | 2017 |