Follow
Christian Weinert
Christian Weinert
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
4322018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1412018
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1082017
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
752019
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
692015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
622018
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
412020
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
362018
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
252019
All the numbers are us: Large-scale abuse of contact discovery in mobile messengers
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
Cryptology ePrint Archive, 2020
192020
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
USENIX Security Symposium, 3577-3594, 2021
132021
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
Applied Cryptography and Network Security: 19th International Conference …, 2021
112021
Trustworthy ai inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
102020
CryptoSPN: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
arXiv preprint arXiv:2002.00801, 2020
102020
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
H Mantel, L Scheidel, T Schneider, A Weber, C Weinert, T Weißmantel
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
62020
Privacy-preserving speech processing via STPC and TEEs (Poster)
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
6*2019
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
62014
ScionFL: Secure Quantized Aggregation for Federated Learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
arXiv preprint arXiv:2210.07376, 2022
52022
Mops: a modular protection scheme for long-term storage
C Weinert, D Demirel, M Vigil, M Geihs, J Buchmann
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
52017
A performance analysis of long-term archiving techniques
M Vigil, C Weinert, K Braden, D Demirel, J Buchmann
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20