Tobias Nilges

According to our database1, Tobias Nilges authored at least 17 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
An Algebraic Approach to Maliciously Secure Private Set Intersection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Efficient Resettably Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2016

A Formal Treatment of Privacy in Video Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
The Cryptographic Strength of Tamper-Proof Hardware.
PhD thesis, 2015

Daten verschlüsselt speichern und verarbeiten in der Cloud.
Datenschutz und Datensicherheit, 2015

General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Proceedings of the Provable Security, 2015

Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

2014
A Provably Privacy Preserving Video Surveillance Architecture for an Assisted Living Community.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Structural Composition Attacks on Anonymized Data.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Defining Privacy Based on Distributions of Privacy Breaches.
Proceedings of the Number Theory and Cryptography, 2013

2011
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions.
IACR Cryptol. ePrint Arch., 2011


  Loading...