Michael Zohner

Orcid: 0009-0002-1188-1774

According to our database1, Michael Zohner authored at least 24 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Design und Implementierung einer interaktiven Lernumgebung im Bereich der IT-Sicherheit.
Proceedings of the DELFI 2024, 2024

2023
Security Analysis and Challenges of a Modular Vehicle Fleet.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023

2022
Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices.
Sensors, 2022

2018
Scalable Private Set Intersection Based on OT Extension.
ACM Trans. Priv. Secur., 2018

2017
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
PhD thesis, 2017

Privacy-Preserving Interdomain Routing at Internet Scale.
IACR Cryptol. ePrint Arch., 2017

Pushing the Communication Barrier in Secure Computation using Lookup Tables.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
More Efficient Oblivious Transfer Extensions.
IACR Cryptol. ePrint Arch., 2016

2015
Phasing: Private Set Intersection Using Permutation-based Hashing.
Proceedings of the 24th USENIX Security Symposium, 2015

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Ciphers for MPC and FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Faster Private Set Intersection Based on OT Extension.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

GSHADE: faster privacy-preserving distance computation and biometric identification.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
Proceedings of the Financial Cryptography and Data Security, 2013

More efficient oblivious transfer and extensions for faster secure computation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Proceedings of the Number Theory and Cryptography, 2013

2012
Improved Algebraic Side-Channel Attack on AES.
IACR Cryptol. ePrint Arch., 2012

An adaptable, modular, and autonomous side-channel vulnerability evaluator.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

Improved algebraic side-channel attack on AES.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

Side channel analysis of the SHA-3 finalists.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Butterfly-Attack on Skein's Modular Addition.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012


  Loading...