Christian Weinert

Orcid: 0000-0003-4906-6871

According to our database1, Christian Weinert authored at least 33 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Perceptual Hash Inversion Attacks on Image-Based Sexual Abuse Removal Tools.
IEEE Secur. Priv., 2025

On Algebraic Homomorphic Encryption and Its Applications to Doubly-Efficient PIR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Concretely Efficient Private Set Union via Circuit-Based PSI.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead.
ACM Comput. Surv., May, 2024

ScionFL: Efficient and Robust Secure Quantized Aggregation.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024

Towards Practical Doubly-Efficient Private Information Retrieval.
Proceedings of the Financial Cryptography and Data Security, 2024

2023
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
ACM Trans. Priv. Secur., 2023

HyFL: A Hybrid Approach For Private Federated Learning.
CoRR, 2023

Scaling Mobile Private Contact Discovery to Billions of Users.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
ScionFL: Secure Quantized Aggregation for Federated Learning.
CoRR, 2022

2021
Practical Private Set Intersection Protocols for Privacy-Preserving Applications.
PhD thesis, 2021

DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
Proceedings of the 30th USENIX Security Symposium, 2021

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

LLVM-Based Circuit Compilation for Practical Secure Computation.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

CryptoSPN: Privacy-Preserving Sum-Product Network Inference.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Offline Model Guard: Secure and Private ML on Mobile Devices.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

CryptoSPN: Expanding PPML beyond Neural Networks.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Mobile Private Contact Discovery at Scale.
Proceedings of the 28th USENIX Security Symposium, 2019

Secure and Private Function Evaluation with Intel SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
VoiceGuard: Secure and Private Speech Processing.
Proceedings of the 19th Annual Conference of the International Speech Communication Association, 2018

Efficient Circuit-Based PSI via Cuckoo Hashing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

MoPS: A Modular Protection Scheme for Long-Term Storage.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2015
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey.
Comput. Secur., 2015

2014
An efficient time-stamping solution for long-term digital archiving.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A Performance Analysis of Long-Term Archiving Techniques.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014


  Loading...