Chameleon: A hybrid secure computation framework for machine learning applications MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ... Proceedings of the 2018 on Asia conference on computer and communications …, 2018 | 598 | 2018 |
Efficient circuit-based PSI via cuckoo hashing B Pinkas, T Schneider, C Weinert, U Wieder Annual International Conference on the Theory and Applications of …, 2018 | 213 | 2018 |
Mobile private contact discovery at scale D Kales, C Rechberger, T Schneider, M Senker, C Weinert 28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019 | 145 | 2019 |
Cognicrypt: Supporting developers in using cryptography S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ... 2017 32nd IEEE/ACM International Conference on Automated Software …, 2017 | 145 | 2017 |
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier Computers & Security 50, 16-32, 2015 | 82 | 2015 |
VoiceGuard: Secure and Private Speech Processing. F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ... Interspeech 18, 1303-1307, 2018 | 71 | 2018 |
Offline model guard: Secure and private ML on mobile devices SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ... 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020 | 58 | 2020 |
Secure and private function evaluation with Intel SGX S Felsen, Á Kiss, T Schneider, C Weinert Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019 | 45 | 2019 |
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies O Tkachenko, C Weinert, T Schneider, K Hamacher Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 40 | 2018 |
All the numbers are US: large-scale abuse of contact discovery in mobile messengers C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider Cryptology ePrint Archive, 2020 | 37 | 2020 |
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop} A Heinrich, M Hollick, T Schneider, M Stute, C Weinert 30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021 | 29 | 2021 |
Towards practical secure neural network inference: the journey so far and the road ahead ZÁ Mann, C Weinert, D Chabal, JW Bos ACM Computing Surveys 56 (5), 1-37, 2023 | 20 | 2023 |
Trustworthy AI inference systems: An industry research view R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ... arXiv preprint arXiv:2008.04449, 2020 | 15 | 2020 |
Llvm-based circuit compilation for practical secure computation T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame International Conference on Applied Cryptography and Network Security, 99-121, 2021 | 14 | 2021 |
Scionfl: Efficient and robust secure quantized aggregation Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ... 2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 490-511, 2024 | 11 | 2024 |
Cryptospn: Privacy-preserving sum-product network inference A Treiber, A Molina, C Weinert, T Schneider, K Kersting ECAI 2020, 1946-1953, 2020 | 10 | 2020 |
Towards practical doubly-efficient private information retrieval H Okada, R Player, S Pohmann, C Weinert Cryptology ePrint Archive, 2023 | 9 | 2023 |
An efficient time-stamping solution for long-term digital archiving M Vigil, C Weinert, D Demirel, J Buchmann 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 9 | 2014 |
Scionfl: Secure quantized aggregation for federated learning Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ... CoRR, vol. abs/2210.07376, 2022 | 8 | 2022 |
Scaling mobile private contact discovery to billions of users L Hetz, T Schneider, C Weinert European Symposium on Research in Computer Security, 455-476, 2023 | 7 | 2023 |