Kurt Rohloff

Orcid: 0000-0003-0389-5092

According to our database1, Kurt Rohloff authored at least 68 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
OpenFHE: Open-Source Fully Homomorphic Encryption Library.
IACR Cryptol. ePrint Arch., 2022

PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX.
Proceedings of the Security and Privacy in Communication Networks, 2022

WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme.
IEEE Trans. Emerg. Top. Comput., 2021

Encrypted-Input Obfuscation of Image Classifiers.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation.
Proceedings of the CCSW'20, 2020

Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices.
IEEE Trans. Computers, 2019

Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies.
IACR Cryptol. ePrint Arch., 2019

RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption for Privacy-Preserving Genome Sequences Search.
Proceedings of the IEEE International Conference on Smart Computing, 2019

WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Computer Arithmetic Research to Accelerate Privacy-Protecting Encrypted Computing Such as Homomorphic Encryption.
Proceedings of the 26th IEEE Symposium on Computer Arithmetic, 2019

2018
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.
IEEE Trans. Inf. Forensics Secur., 2018

Implementing Token-Based Obfuscation under (Ring) LWE.
IACR Cryptol. ePrint Arch., 2018

Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership.
Proceedings of the 17th IEEE International Conference On Trust, 2018

LID-Fingerprint: A Local Intrinsic Dimensionality-Based Fingerprinting Method.
Proceedings of the Similarity Search and Applications - 11th International Conference, 2018

Secure Proxy-Reencryption-Based Inter-Network Key Exchange.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fast Proxy Re-Encryption for Publish/Subscribe Systems.
ACM Trans. Priv. Secur., 2017

Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2017

Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor.
IEEE Trans. Emerg. Top. Comput., 2017

Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors.
IACR Cryptol. ePrint Arch., 2017

Implementing Conjunction Obfuscation under Entropic Ring LWE.
IACR Cryptol. ePrint Arch., 2017

PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption.
Future Gener. Comput. Syst., 2017

Practical Implementation of Lattice-Based Program Obfuscators for Point Functions.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

Workshop on Multimedia Privacy and Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Secure access delegation of encrypted medical information.
Proceedings of the 10th International Symposium on Medical Information and Communication Technology, 2016

Practical implementations of program obfuscators for point functions.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Securely Sharing Encrypted Medical Information.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Computing with Data Privacy: Steps toward Realization.
IEEE Secur. Priv., 2015

An end-to-end security architecture to collect, process and share wearable medical device data.
Proceedings of the 17th International Conference on E-health Networking, 2015

Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
An FPGA co-processor implementation of Homomorphic Encryption.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
GAMETE: general adaptable metric execution tool and environment (WIP).
Proceedings of the 2013 Spring Simulation Multiconference, SpringSim '13, 2013

SCIMITAR: Scalable Stream-Processing for Sensor Information Brokering.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
Bounded sensor failure tolerant supervisory control.
Proceedings of the 11th International Workshop on Discrete Event Systems, 2012

An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink.
Proceedings of the IEEE Conference on High Performance Extreme Computing, 2012

2011
An Ontology for Resource Sharing.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

A Survey of Security Concepts for Common Operating Environments.
Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2011

Clause-iteration with MapReduce to scalably query datagraphs in the SHARD graph-store.
Proceedings of the DIDC'11, 2011

2010
Managed Mission Assurance - Concept, Methodology and Runtime Support.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

High-performance, massively scalable distributed systems using the MapReduce software framework: the SHARD triple-store.
Proceedings of the SPLASH Workshop on Programming Support Innovations for Emerging Distributed Applications (PSI EtA, 2010

2009
Computational Methods to Discover Sets of Patterns of Behaviors that Precede Political Events of Interest.
Proceedings of the Technosocial Predictive Analytics, 2009

2008
Deterministic and stochastic models for the detection of random constant scanning worms.
ACM Trans. Model. Comput. Simul., 2008

2007
High-level dynamic resource management for distributed, real-time embedded systems.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

An Evaluation of Triple-Store Technologies for Large Data Stores.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Scalable, Distributed, Dynamic Resource Management for the ARMS Distributed Real-Time Embedded System.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

High-Assurance Distributed, Adaptive Software for Dynamic Systems.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Scalable, Adaptive, Time-Bounded Node Failure Detection.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
Quality measures for embedded systems and their application to control and certification.
SIGBED Rev., 2006

The Verification and Control of Interacting Similar Discrete-Event Systems.
SIAM J. Control. Optim., 2006

Approximating the Minimal Sensor Selection for Supervisory Control.
Discret. Event Dyn. Syst., 2006

2005
PSPACE-completeness of Modular Supervisory Control Problems*.
Discret. Event Dyn. Syst., 2005

Contributing Authors.
Discret. Event Dyn. Syst., 2005

The detection of RCS worm epidemics.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005

Stochastic behavior of random constant scanning worms.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Sensor Failure Tolerant Supervisory Control.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

The Diagnosis of Failures Via the Combination of Distributed Observations.
Proceedings of the Intelligent Control, 2005

2004
Computations on distributed discrete -event systems.
PhD thesis, 2004

Symmetry reductions for a class of discrete-event systems.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2003
Deciding co-observability is PSPACE-complete.
IEEE Trans. Autom. Control., 2003

On the synthesis of safe control policies in decentralized control of discrete-event systems.
IEEE Trans. Autom. Control., 2003

The control and verification of similar agents operating in a broadcast network environment.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003

2002
On the computational complexity of the verification of modular discrete-event systems.
Proceedings of the 41st IEEE Conference on Decision and Control, 2002


  Loading...