Follow
Christian Weinert
Christian Weinert
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5982018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Annual International Conference on the Theory and Applications of …, 2018
2132018
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
1452019
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1452017
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
822015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
712018
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
582020
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
452019
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
402018
All the numbers are US: large-scale abuse of contact discovery in mobile messengers
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
Cryptology ePrint Archive, 2020
372020
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021
292021
Towards practical secure neural network inference: the journey so far and the road ahead
ZÁ Mann, C Weinert, D Chabal, JW Bos
ACM Computing Surveys 56 (5), 1-37, 2023
202023
Trustworthy AI inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
152020
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
International Conference on Applied Cryptography and Network Security, 99-121, 2021
142021
Scionfl: Efficient and robust secure quantized aggregation
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024
112024
Cryptospn: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
ECAI 2020, 1946-1953, 2020
102020
Towards practical doubly-efficient private information retrieval
H Okada, R Player, S Pohmann, C Weinert
Cryptology ePrint Archive, 2023
92023
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
92014
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
82022
Scaling mobile private contact discovery to billions of users
L Hetz, T Schneider, C Weinert
European Symposium on Research in Computer Security, 455-476, 2023
72023
The system can't perform the operation now. Try again later.
Articles 1–20