Follow
Michael Zohner
Michael Zohner
Hochschule Fulda
Verified email at informatik.hs-fulda.de - Homepage
Title
Cited by
Cited by
Year
ABY-A framework for efficient mixed-protocol secure two-party computation.
D Demmler, T Schneider, M Zohner
NDSS, 2015
5682015
More efficient oblivious transfer and extensions for faster secure computation
G Asharov, Y Lindell, T Schneider, M Zohner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4032013
Ciphers for MPC and FHE
MR Albrecht, C Rechberger, T Schneider, T Tiessen, M Zohner
Annual International Conference on the Theory and Applications of …, 2015
3082015
Faster private set intersection based on {OT} extension
B Pinkas, T Schneider, M Zohner
23rd USENIX Security Symposium (USENIX Security 14), 797-812, 2014
2642014
Phasing: Private set intersection using permutation-based hashing
B Pinkas, T Schneider, G Segev, M Zohner
24th USENIX Security Symposium (USENIX Security 15), 515-530, 2015
2212015
Intelligent machine homicide
A Heuser, M Zohner
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
1982012
Scalable private set intersection based on OT extension
B Pinkas, T Schneider, M Zohner
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-35, 2018
1952018
GMW vs. Yao? Efficient secure two-party computation with low depth circuits
T Schneider, M Zohner
International Conference on Financial Cryptography and Data Security, 275-292, 2013
1452013
More efficient oblivious transfer extensions with security for malicious adversaries
G Asharov, Y Lindell, T Schneider, M Zohner
Annual International Conference on the Theory and Applications of …, 2015
1062015
GSHADE: Faster privacy-preserving distance computation and biometric identification
J Bringer, H Chabanne, M Favre, A Patey, T Schneider, M Zohner
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1032014
More efficient oblivious transfer extensions
G Asharov, Y Lindell, T Schneider, M Zohner
Journal of Cryptology 30 (3), 805-858, 2017
532017
Pushing the communication barrier in secure computation using lookup tables
G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, S Zeitouni, ...
Cryptology ePrint Archive, 2018
492018
Privacy-Preserving Interdomain Routing at Internet Scale.
G Asharov, D Demmler, M Schapira, T Schneider, G Segev, S Shenker, ...
Proc. Priv. Enhancing Technol. 2017 (3), 147, 2017
382017
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012
352012
{Ad-Hoc} Secure {Two-Party} Computation on Mobile Devices using Hardware Tokens
D Demmler, T Schneider, M Zohner
23rd USENIX Security Symposium (USENIX Security 14), 893-908, 2014
342014
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
Journal of Cryptographic Engineering 3 (3), 139-156, 2013
272013
Side channel analysis of the SHA-3 finalists
M Zohner, M Kasper, M Stöttinger, SA Huss
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
272012
Amasive: an adaptable and modular autonomous side-channel vulnerability evaluation framework
SA Huss, M Stöttinger, M Zohner
Number theory and cryptography, 151-165, 2013
152013
Butterfly-attack on Skein’s modular addition
M Zohner, M Kasper, M Stöttinger
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
102012
An adaptable, modular, and autonomous side-channel vulnerability evaluator
M Zohner, M Stöttinger, SA Huss, O Stein
2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 43-48, 2012
52012
The system can't perform the operation now. Try again later.
Articles 1–20