Thomas Schneider

Orcid: 0000-0001-8090-1316

Affiliations:
  • TU Darmstadt, European Center for Security and Privacy by Design, Germany
  • Darmstadt University of Technology, Department of Computer Science, Germany
  • Ruhr-Universität Bochum, Horst Görtz Institute for IT-Security, Germany (PhD 2012)


According to our database1, Thomas Schneider authored at least 150 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage.
IACR Cryptol. ePrint Arch., 2024

HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation.
IACR Cryptol. ePrint Arch., 2024

2023
Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires.
J. Cryptol., October, 2023

Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.
ACM Trans. Priv. Secur., 2023

Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries".
IEEE Trans. Inf. Forensics Secur., 2023

Griffin: Towards Mixed Multi-Key Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers.
IACR Cryptol. ePrint Arch., 2023

Secure Noise Sampling for DP in MPC with Finite Precision.
IACR Cryptol. ePrint Arch., 2023

Scaling Mobile Private Contact Discovery to Billions of Users.
IACR Cryptol. ePrint Arch., 2023

SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning.
IACR Cryptol. ePrint Arch., 2023

Too Close for Comfort? Measuring Success of Sampled-Data Leakage Attacks Against Encrypted Search.
IACR Cryptol. ePrint Arch., 2023

PrivMail: A Privacy-Preserving Framework for Secure Emails.
IACR Cryptol. ePrint Arch., 2023

Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version).
IACR Cryptol. ePrint Arch., 2023

FLUTE: Fast and Secure Lookup Table Evaluations (Full Version).
IACR Cryptol. ePrint Arch., 2023

FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2023

ScionFL: Efficient and Robust Secure Quantized Aggregation.
IACR Cryptol. ePrint Arch., 2023

Attesting Distributional Properties of Training Data for Machine Learning.
CoRR, 2023

ExTRUST: Reducing Exploit Stockpiles with a Privacy-Preserving Depletion System for Inter-State Relationships.
CoRR, 2023

HyFL: A Hybrid Approach For Private Federated Learning.
CoRR, 2023

FLUTE: Fast and Secure Lookup Table Evaluations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Poster: Secure and Differentially Private kth Ranked Element.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Breaking the Size Barrier: Universal Circuits Meet Lookup Tables.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
MOTION - A Framework for Mixed-Protocol Multi-Party Computation.
ACM Trans. Priv. Secur., 2022

SPIKE: secure and private investigation of the kidney exchange problem.
BMC Medical Informatics Decis. Mak., 2022

Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies.
IACR Cryptol. ePrint Arch., 2022

PEA: Practical private epistasis analysis using MPC.
IACR Cryptol. ePrint Arch., 2022

Improved Universal Circuits using Lookup Tables.
IACR Cryptol. ePrint Arch., 2022

Comparison-Based MPC in Star Topology (Full Version).
IACR Cryptol. ePrint Arch., 2022

Secure Maximum Weight Matching Approximation on General Graphs (Full Version).
IACR Cryptol. ePrint Arch., 2022

FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization.
IACR Cryptol. ePrint Arch., 2022

ScionFL: Secure Quantized Aggregation for Federated Learning.
CoRR, 2022

Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
CoRR, 2022

Secure Maximum Weight Matching Approximation on General Graphs.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022


Comparison-based MPC in Star Topology.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Poster: Efficient Three-Party Shuffling Using Precomputation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
SoK: Efficient Privacy-preserving Clustering.
Proc. Priv. Enhancing Technol., 2021

EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
IACR Cryptol. ePrint Arch., 2021

SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
IACR Cryptol. ePrint Arch., 2021

FLGUARD: Secure and Private Federated Learning.
IACR Cryptol. ePrint Arch., 2021

VASA: Vector AES Instructions for Security Applications.
IACR Cryptol. ePrint Arch., 2021

Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
IACR Cryptol. ePrint Arch., 2021

LLVM-based Circuit Compilation for Practical Secure Computation.
IACR Cryptol. ePrint Arch., 2021

DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
IACR Cryptol. ePrint Arch., 2021

GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications.
IACR Cryptol. ePrint Arch., 2021

SAFELearn: Secure Aggregation for private FEderated Learning.
IACR Cryptol. ePrint Arch., 2021

Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
IACR Cryptol. ePrint Arch., 2021

Privacy-preserving Density-based Clustering.
IACR Cryptol. ePrint Arch., 2021

AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Revisiting Hybrid Private Information Retrieval.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in "SPOC".
IEEE Trans. Parallel Distributed Syst., 2020

Efficient and Scalable Universal Circuits.
J. Cryptol., 2020

Faster privacy-preserving location proximity schemes for circles and polygons.
IET Inf. Secur., 2020

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2020

Linear-Complexity Private Function Evaluation is Practical.
IACR Cryptol. ePrint Arch., 2020

PEM: Privacy-preserving Epidemiological Modeling.
IACR Cryptol. ePrint Arch., 2020

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
IACR Cryptol. ePrint Arch., 2020

Secure Two-Party Computation in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

SAFE: A Secure and Efficient Long-Term Distributed Storage System.
IACR Cryptol. ePrint Arch., 2020

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference.
IACR Cryptol. ePrint Arch., 2020

Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

CryptoSPN: Privacy-Preserving Sum-Product Network Inference.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Offline Model Guard: Secure and Private ML on Mobile Devices.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

CryptoSPN: Expanding PPML beyond Neural Networks.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

Engineering Privacy-Preserving Machine Learning Protocols.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Privacy-preserving PLDA speaker verification using outsourced secure computation.
Speech Commun., 2019

SoK: Modular and Efficient Private Decision Tree Evaluation.
Proc. Priv. Enhancing Technol., 2019

Improved Multiplication Triple Generation over Rings via RLWE-based AHE.
IACR Cryptol. ePrint Arch., 2019

Efficient Circuit-based PSI with Linear Communication.
IACR Cryptol. ePrint Arch., 2019

Mobile Private Contact Discovery at Scale.
IACR Cryptol. ePrint Arch., 2019

Efficiently Stealing your Machine Learning Models.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Proceedings of the Interspeech 2019, 2019

Web Application for Privacy-preserving Scheduling using Secure Computation.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Secure and Private Function Evaluation with Intel SGX.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Scalable Private Set Intersection Based on OT Extension.
ACM Trans. Priv. Secur., 2018

Efficient Circuit-based PSI via Cuckoo Hashing.
IACR Cryptol. ePrint Arch., 2018

Faster Privacy-Preserving Location Proximity Schemes.
IACR Cryptol. ePrint Arch., 2018

Pushing the Communication Barrier in Secure Computation using Lookup Tables.
IACR Cryptol. ePrint Arch., 2018

Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018

VoiceGuard: Secure and Private Speech Processing.
Proceedings of the Interspeech 2018, 2018

Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
Proceedings of the 8th International Conference on Localization and GNSS, 2018

Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Toward Practical Secure Stable Matching.
Proc. Priv. Enhancing Technol., 2017

Private Set Intersection for Unequal Set Sizes with Mobile Applications.
Proc. Priv. Enhancing Technol., 2017

Privacy-Preserving Interdomain Routing at Internet Scale.
Proc. Priv. Enhancing Technol., 2017

More Efficient Oblivious Transfer Extensions.
J. Cryptol., 2017

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
IACR Cryptol. ePrint Arch., 2017

More Efficient Universal Circuit Constructions.
IACR Cryptol. ePrint Arch., 2017

SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Privacy-Preserving Whole-Genome Variant Queries.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO.
IACR Cryptol. ePrint Arch., 2016

Valiant's Universal Circuit is Practical.
IACR Cryptol. ePrint Arch., 2016

Ciphers for MPC and FHE.
IACR Cryptol. ePrint Arch., 2016

GarbledCPU: a MIPS processor for secure computation in hardware.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Towards Securing Internet eXchange Points Against Curious onlooKers.
Proceedings of the 2016 Applied Networking Research Workshop, 2016

2015
Phasing: Private Set Intersection using Permutation-based Hashing.
IACR Cryptol. ePrint Arch., 2015

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2015

Time to Rethink: Trust Brokerage Using Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Automated Synthesis of Optimized Circuits for Secure Computation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Faster Private Set Intersection based on OT Extension.
IACR Cryptol. ePrint Arch., 2014

Automatic Protocol Selection in Secure Two-Party Computations.
IACR Cryptol. ePrint Arch., 2014

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.
IACR Cryptol. ePrint Arch., 2014

Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT".
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

GSHADE: faster privacy-preserving distance computation and biometric identification.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

RAID-PIR: Practical Multi-Server PIR.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
J. Comput. Secur., 2013

More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
IACR Cryptol. ePrint Arch., 2013

GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.
Proceedings of the Financial Cryptography and Data Security, 2013

Faster secure two-party computation with less memory.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

CrowdShare: Secure Mobile Resource Sharing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Engineering secure two-party computation protocols
PhD thesis, 2012

Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation.
Springer, ISBN: 978-3-642-30041-7, 2012

2011
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2011

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm.
IACR Cryptol. ePrint Arch., 2011

Secure Set Intersection with Untrusted Hardware Tokens.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version).
Proceedings of the Communications and Multimedia Security, 2011

AmazonIA: when elasticity snaps back.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptol. ePrint Arch., 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptol. ePrint Arch., 2010

TASTY: Tool for Automating Secure Two-partY computations.
IACR Cryptol. ePrint Arch., 2010

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2010

Token-Based Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten.
Proceedings of the perspeGKtive 2010, 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Efficient Privacy-Preserving Face Recognition.
IACR Cryptol. ePrint Arch., 2009

Secure Two-Party Computation is Practical.
IACR Cryptol. ePrint Arch., 2009

Practical Secure Evaluation of Semi-Private Functions.
IACR Cryptol. ePrint Arch., 2009

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptol. ePrint Arch., 2009

Embedded SFE: Offloading Server and Network using Hardware Tokens.
IACR Cryptol. ePrint Arch., 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptol. ePrint Arch., 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice.
IACR Cryptol. ePrint Arch., 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Automatic Generation of Sigma-Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.
IACR Cryptol. ePrint Arch., 2008

Automatic Generation of Sound Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2008

Practical Secure Function Evaluation.
Proceedings of the Informatiktage 2008, 2008

Improved Garbled Circuit: Free XOR Gates and Applications.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008


  Loading...