Tobias Nilges

According to our database1, Tobias Nilges authored at least 17 papers between 2011 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.
IACR Cryptol. ePrint Arch., 2017

An Algebraic Approach to Maliciously Secure Private Set Intersection.
IACR Cryptol. ePrint Arch., 2017

TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
IACR Cryptol. ePrint Arch., 2017

2016
Efficient Resettably Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2016

From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
IACR Cryptol. ePrint Arch., 2016

A Formal Treatment of Privacy in Video Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
The Cryptographic Strength of Tamper-Proof Hardware.
PhD thesis, 2015

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens.
IACR Cryptol. ePrint Arch., 2015

Daten verschlüsselt speichern und verarbeiten in der Cloud.
Datenschutz und Datensicherheit, 2015

2014
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2014

A Provably Privacy Preserving Video Surveillance Architecture for an Assisted Living Community.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Structural Composition Attacks on Anonymized Data.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Defining Privacy Based on Distributions of Privacy Breaches.
Proceedings of the Number Theory and Cryptography, 2013

2011
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions.
IACR Cryptol. ePrint Arch., 2011


  Loading...