Michael Zohner

Orcid: 0009-0002-1188-1774

According to our database1, Michael Zohner authored at least 23 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security Analysis and Challenges of a Modular Vehicle Fleet.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023

2022
Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices.
Sensors, 2022

2018
Scalable Private Set Intersection Based on OT Extension.
ACM Trans. Priv. Secur., 2018

Pushing the Communication Barrier in Secure Computation using Lookup Tables.
IACR Cryptol. ePrint Arch., 2018

2017
Faster Oblivious Transfer Extension and Its Impact on Secure Computation.
PhD thesis, 2017

Privacy-Preserving Interdomain Routing at Internet Scale.
Proc. Priv. Enhancing Technol., 2017

More Efficient Oblivious Transfer Extensions.
J. Cryptol., 2017

2016
Ciphers for MPC and FHE.
IACR Cryptol. ePrint Arch., 2016

2015
Phasing: Private Set Intersection using Permutation-based Hashing.
IACR Cryptol. ePrint Arch., 2015

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2015

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Faster Private Set Intersection based on OT Extension.
IACR Cryptol. ePrint Arch., 2014

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
IACR Cryptol. ePrint Arch., 2014

GSHADE: faster privacy-preserving distance computation and biometric identification.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

2013
Improved algebraic side-channel attack on AES.
J. Cryptogr. Eng., 2013

More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
IACR Cryptol. ePrint Arch., 2013

GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
Proceedings of the Financial Cryptography and Data Security, 2013

AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
Proceedings of the Number Theory and Cryptography, 2013

2012
Improved Algebraic Side-Channel Attack on AES.
IACR Cryptol. ePrint Arch., 2012

An adaptable, modular, and autonomous side-channel vulnerability evaluator.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

Side channel analysis of the SHA-3 finalists.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

Butterfly-Attack on Skein's Modular Addition.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012


  Loading...