Christian Weinert

Orcid: 0000-0003-4906-6871

According to our database1, Christian Weinert authored at least 30 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead.
ACM Comput. Surv., May, 2024

2023
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
ACM Trans. Priv. Secur., 2023

Towards Practical Doubly-Efficient Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2023

Scaling Mobile Private Contact Discovery to Billions of Users.
IACR Cryptol. ePrint Arch., 2023

ScionFL: Efficient and Robust Secure Quantized Aggregation.
IACR Cryptol. ePrint Arch., 2023

HyFL: A Hybrid Approach For Private Federated Learning.
CoRR, 2023

2022
ScionFL: Secure Quantized Aggregation for Federated Learning.
CoRR, 2022

2021
Practical Private Set Intersection Protocols for Privacy-Preserving Applications.
PhD thesis, 2021

LLVM-based Circuit Compilation for Practical Secure Computation.
IACR Cryptol. ePrint Arch., 2021

DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
IACR Cryptol. ePrint Arch., 2021

AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
IACR Cryptol. ePrint Arch., 2020

Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

CryptoSPN: Privacy-Preserving Sum-Product Network Inference.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Offline Model Guard: Secure and Private ML on Mobile Devices.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

CryptoSPN: Expanding PPML beyond Neural Networks.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Mobile Private Contact Discovery at Scale.
IACR Cryptol. ePrint Arch., 2019

Secure and Private Function Evaluation with Intel SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Efficient Circuit-based PSI via Cuckoo Hashing.
IACR Cryptol. ePrint Arch., 2018

VoiceGuard: Secure and Private Speech Processing.
Proceedings of the Interspeech 2018, 2018

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
IACR Cryptol. ePrint Arch., 2017

CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

MoPS: A Modular Protection Scheme for Long-Term Storage.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2015
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey.
Comput. Secur., 2015

2014
An efficient time-stamping solution for long-term digital archiving.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A Performance Analysis of Long-Term Archiving Techniques.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014


  Loading...