Daniel Demmler

Orcid: 0000-0001-6334-6277

According to our database1, Daniel Demmler authored at least 24 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Noah's Ark: Efficient Threshold-FHE Using Noise Flooding.
IACR Cryptol. ePrint Arch., 2023

Lessons Learned: Defending Against Property Inference Attacks.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2022
MOTION - A Framework for Mixed-Protocol Multi-Party Computation.
ACM Trans. Priv. Secur., 2022

Towards practical privacy-preserving protocols.
it Inf. Technol., 2022

Property Unlearning: A Defense Strategy Against Property Inference Attacks.
CoRR, 2022

Probing for Passwords - Privacy Implications of SSIDs in Probe Requests.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
IACR Cryptol. ePrint Arch., 2021

2020
Secure Two-Party Computation in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
IACR Cryptol. ePrint Arch., 2020

Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2019
Towards Practical Privacy-Preserving Protocols.
PhD thesis, 2019

2018
PIR-PSI: Scaling Private Contact Discovery.
Proc. Priv. Enhancing Technol., 2018

HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privacy-Preserving Interdomain Routing at Internet Scale.
Proc. Priv. Enhancing Technol., 2017

CogniCrypt: supporting developers in using cryptography.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Privacy-Preserving Whole-Genome Variant Queries.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Towards Securing Internet eXchange Points Against Curious onlooKers.
Proceedings of the 2016 Applied Networking Research Workshop, 2016

2015
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Automated Synthesis of Optimized Circuits for Secure Computation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
IACR Cryptol. ePrint Arch., 2014

RAID-PIR: Practical Multi-Server PIR.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014


  Loading...