Publications
Publications
Function-Dependent Commitments for Verifiable Multi-Party Computation
Schabhüser, Lucas; Butin, Denis; Demirel, Denise; Buchmann, Johannes
Information Security - 21st International Conference, ISC 2018
[Conference Proceedings]
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting
Richter, Philipp; Yang, Zheng; Tkachenko, Oleksandr; Leppäkoski, Helena; Järvinen, Kimmo; Schneider, Thomas
8. International Conference on Localization and GNSS (ICL-GNSS'18)
[Conference Proceedings]
How Secure is Green IT? The Case of Software-Based Energy Side Channels
Mantel, Heiko; Schickel, Johannes; Weber, Alexandra; Weber, Friedrich
ESORICS 2018
[Conference Proceedings]
Differential Power Analysis of XMSS and SPHINCS
Kannwischer, Matthias; Genêt, Aymeric; Butin, Denis; Krämer, Juliane; Buchmann, Johannes
9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018)
[Conference Proceedings]
Faster Privacy-Preserving Location Proximity Schemes
Järvinen, Kimmo; Kiss, Ágnes; Schneider, Thomas; Tkachenko, Oleksandr; Yang, Zheng
Cryptology and Network Security, p.3-22
[Conference Proceedings]
PROPYLA: Privacy Preserving Long-Term Secure Storage
Geihs, Matthias; Karvelas, Nikolaos; Katzenbeisser, Stefan; Buchmann, Johannes
SCC Workshop @ AsiaCCS 2018
[Conference Proceedings]
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Fischlin, Marc; Harasser, Patrick
Applied Cryptography and Network Security - ACNS 2018, p.202-220
[Conference Proceedings]
PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Proceedings on Privacy Enhancing Technologies (PoPETs), p.159-178
[Journal Article]
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus
Journal of Mathematical Cryptology
[Journal Article]
An Overview of DRAM-Based Security Primitives
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Chandy, John A.; Tehranipoor, Fatemeh
Cryptography
[Journal Article]
Towards Secure Distributed Trust Management on a Global Scale
Alexopoulos, Nikolaos; Habib, Sheikh Mahbub; Mühlhäuser, Max
IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy
[Conference Proceedings]
Estimate all the {LWE, NTRU} schemes!
Albrecht, Martin R.; Curtis, Benjamin R.; Deo, Amit; Davidson, Alex; Player, Rachel; Postlethwaite, Eamonn W.; Virdia, Fernando; Wunderer, Thomas
SCN 2018
[Conference Proceedings]
Towards Practical RAM based Secure Computation
Buescher, Niklas; Weber, Alina; Katzenbeisser, Stefan
European Symposium on Research in Computer Security (ESORICS)
[Conference Proceedings]
IMIX: In-Process Memory Isolation EXtension
Frassetto, Tommaso; Jauernig, Patrick; Liebchen, Christopher; Sadeghi, Ahmad-Reza
Proceedings of the 27th USENIX Security Symposium, p.83-97
[Conference Proceedings]
Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
IEEE Transactions on Dependable and Secure Computing (TDSC)
[Journal Article]
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications
Kumar, Manish; Anagnostopoulos, Nikolaos Athanasios; Fan, Yufan; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Tehranipoor, Fatemeh; Katzenbeisser, Stefan
28th Crypto-Day
[Conference Proceedings]
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Schaller, André; Xiong, Wenjie; Jain, Manishkumar; Saleem, Umair; Lotichius, Jan; Gabmeyer, Sebastian; Szefer, Jakub; Katzenbeisser, Stefan
Cryptography
[Journal Article]
VoiceGuard: Secure and Private Speech Processing
Brasser, Ferdinand; Frassetto, Tommaso; Riedhammer, Korbinian; Sadeghi, Ahmad-Reza; Schneider, Thomas; Weinert, Christian
Interspeech 2018
[Conference Proceedings]
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
Büscher, Niklas; Demmler, Daniel; Katzenbeisser, Stefan; Kretzmer, David; Schneider, Thomas
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, p.847-861
[Conference Proceedings]