i

Dieser Webauftritt wurde archiviert und wird nicht mehr aktualisiert.

Bei technischen Fragen kontaktieren Sie bitte das Webteam. Es gilt die Datenschutzerklärung der TU Darmstadt.

Publikationen des Sonderforschungsbereich 666

Headergrafik Maschinenbau
Exportieren als [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Gruppiere nach: Publikationsjahr | Autor(en) | Typ des Eintrags
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | Y | Z
Es werden nur Einträge angezeigt, bei denen keine untergeordnete Organisationseinheit ausgewählt wurde. Anzahl: 644.

A

Alkeilani Alkadri, Nabil ; Harasser, Patrick ; Janson, Christian (2021):
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs.
20th International Conference on Cryptology and Network Security (CANS 2021), Vienna, Austria, 13.-15.12.2021, [Konferenzveröffentlichung]

Aumayr, Lukas ; Ersoy, Oguzhan ; Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maffei, Matteo ; Moreno-Sanchez, Pedro ; Riahi, Siavash (2021):
Bitcoin-Compatible Virtual Channels.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Konferenzveröffentlichung]

Alhassan, Masaud Y. ; Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2020):
Efficient and Scalable Universal Circuits.
In: Journal of Cryptology (JoC), Springer, DOI: 10.1007/s00145-020-09346-z,
[Artikel]

Alkim, Erdem ; Barreto, Paulo S. L. M. ; Bindel, Nina ; Krämer, Juliane ; Longa, Patrick ; Ricardini, Jefferson E. (2020):
The Lattice-Based Digital Signature Scheme qTESLA.
18th International Conference on Applied Cryptography and Network Security (ACNS 2020), virtual Conference, 19-22.10.2020, [Konferenzveröffentlichung]

Acar, Abbas ; Fereidooni, Hossein ; Abera, Tigist ; Sikder, Amit Kumsr ; Miettinen, Markus ; Aksu, Hidayet ; Conti, Mauro ; Sadeghi, Ahmad-Reza (2020):
Peek-a-Boo: I see your smart home activities, even encrypted!
S. 207-218, WiSec 2020: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, virtual Conference, July 08.-10., 2020, [Konferenzveröffentlichung]

Adepu, Sridhar ; Brasser, Ferdinand ; Garcia, Luis ; Rodler, Michael ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Zonouz, Saman A. (2020):
Control Behavior Integrity for Distributed Cyber-Physical Systems.
In: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), S. 1-15,
k. A., ACM/IEEE, 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, Australia, 22.-24. April, 2020, ISBN 978-1-7281-5501-2,
DOI: 10.1109/ICCPS48487.2020.00011,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications.
S. 484-502, Springer, 24th International Conference on Financial Cryptography and Data Security (FC'20), Kota Kinabalu, Malaysia, 10.-14.02., ISBN 978-3-030-51279-8,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Bansarkhani, Rachid El ; Buchmann, Johannes (2020):
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts.
S. 41-61, Springer, The 25th Australasian Conference on Information Security and Privacy (ACISP'20), Perth, Australia, 30.11.-02.12., ISBN 978-3-030-55303-6,
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil ; Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Krämer, Juliane ; Riahi, Siavash ; Struck, Patrick (2020):
Deterministic Wallets in a Quantum World.
ACM, The 27th ACM Conference on Computer and Communications Security (CCS 2020), virtual Conference, 09.-13.11., [Konferenzveröffentlichung]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien N. ; Mezini, Mira (2019):
Investigating Next Steps in Static API-Misuse Detection.
In: MSR, In: Proceedings of the 16th International Conference on Mining Software Repositories,
k.A., IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, Sun 26 - Mon 27 May 2019, [Konferenzveröffentlichung]

Aschermann, Cornelius ; Frassetto, Tommaso ; Holz, Thorsten ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Teuchert, Daniel (2019):
Nautilus: Fishing for Deep Bugs with Grammars.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Abera, Tigist ; Bahmani, Raad ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2019):
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous System.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Tehranipoor, Fatemeh ; Katzenbeisser, Stefan (2018):
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-23,
[Konferenzveröffentlichung]

Albrecht, Martin R. ; Curtis, Benjamin R. ; Deo, Amit ; Davidson, Alex ; Player, Rachel ; Postlethwaite, Eamonn W. ; Virdia, Fernando ; Wunderer, Thomas (2018):
Estimate all the {LWE, NTRU} schemes!
In: LNCS, In: SCN 2018,
11th Conference on Security and Cryptography for Networks, Amalfi, Italy, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Mühlhäuser, Max (2018):
Towards Secure Distributed Trust Management on a Global Scale.
S. 49-54, ACM, IoT S&P’18: ACM SIGCOMM 2018 Workshop on IoT Security and Privacy, Budapest, Hungary, 20.-25.08, ISBN 978-1-4503-5905-4,
DOI: 10.1145/3229565.3229569,
[Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Chandy, John A. ; Tehranipoor, Fatemeh (2018):
An Overview of DRAM-Based Security Primitives.
In: Cryptography 2018, 2 (7), MDPI, DOI: 10.3390/cryptography2020007,
[Artikel]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2018):
SCIoT: A Secure and sCalable end-to-end management framework for IoT Devices.
23rd European Symposium on Research in Computer Security (ESORICS 2018), Barcelona, Spain, 2018, [Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Arul, Tolga ; Fan, Yufan ; Hatzfeld, Christian ; Schaller, André ; Xiong, Wenjie ; Jain, Manishkumar ; Saleem, Umair ; Lotichius, Jan ; Gabmeyer, Sebastian ; Szefer, Jakub ; Katzenbeisser, Stefan (2018):
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security.
In: Cryptography, 2 (3), MDPI, ISSN 2410-387X,
DOI: 10.3390/cryptography2030013,
[Artikel]

Amler, Hendrik (2018):
Evaluation of payment channel networks for micropayments.
TU Darmstadt, [Masterarbeit]

Alhassan, Masaud Y. (2018):
Improving scalability of universal circuits for large-scale private function evaluation.
TU Darmstadt, [Masterarbeit]

Ahmad, Saad (2018):
Using Physical Unclonable Functions (PUFs) for Data-Link Layer Authenticity Verification to Mitigate Attacks on IEEE 802.11ad Beam Training.
TU Darmstadt, [Masterarbeit]

Alexopoulos, Nikolaos ; Habib, Sheikh Mahbub ; Schulz, Steffen ; Mühlhäuser, Max (2018):
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework.
In: Cryptography and Security, (Preprint), 1. Version, arXiv, 1801.05764, [Report]

Amann, Sven ; Nguyen, Hoan Anh ; Nadi, Sarah ; Nguyen, Tien ; Mezini, Mira (2018):
A Systematic Evaluation of API-Misuse Detectors.
In: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, [Artikel]

Albrecht, Martin ; Göpfert, Florian ; Vidria, Fernando ; Wunderer, Thomas (2017):
Revisiting the Expected Cost of Solving uSVP and Applications to LWE.
In: ASIACRYPT 2017 - Advances in Cryptology,
Springer, [Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Gabmeyer, Sebastian ; Arul, Tolga ; Katzenbeisser, Stefan (2017):
An extensive classification and analysis of attacks against Physical Unclonable Functions (PUFs).
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 7 - 8 December 2017, DOI: 10.13140/RG.2.2.25411.91689,
[Konferenzveröffentlichung]

Ay, Serafettin (2017):
Detecting WiFi Covert Channels.
Darmstadt, Technische Universität, [Masterarbeit]

Afridi, Hassaan Ali Khan (2017):
Investigating the relation between bugs and vulnerabilities in the Debian ecosystem.
Darmstadt, Technische Universität, [Masterarbeit]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Mühlhäuser, Max (2017):
Towards Blockchain-Based Collaborative Intrusion Detection Systems.
S. 107-118, Springer, 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017), Lucca, Italy, 08.-13.10 2017, ISBN 978-3-319-99842-8,
DOI: 10.1007/978-3-319-99843-5_10,
[Konferenzveröffentlichung]

Arias, Orlando ; Gens, David ; Jin, Yier ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2017):
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization.
In: 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2017),
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Daubert, Jörg ; Mühlhäuser, Max ; Habib, Sheikh Mahbub (2017):
Beyond the Hype: On Using Blockchains in Trust Management for Authentication.
In: IEEE TrustCom 2017, S. 546-553,
IEEE, Sydney, Australia, 1-4 August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.283,
[Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Kiayias, Aggelos ; Talviste, Riivo ; Zacharias, Thomas (2017):
MCMix: Anonymous Messaging via Secure Multiparty Computation.
In: 26th USENIX Security Symposium, S. 1217-1234,
USENIX Association, Vancouver, BC, Canada, 16-18 August 2018, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos ; Vasilomanolakis, Emmanouil ; Ivanko, Natalia Reka ; Frieß, Tamara ; Mühlhäuser, Max (2017):
TRIDEnT: Trustworthy collaboRative Intrusion DETection (POSTER).
USENIX Association, 26th USENIX Security Symposium, Vancouver, Canada, 16.-18.08.2017, [Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Schaller, André ; Fan, Yufan ; Xiong, Wenjie ; Tehranipoor, Fatemeh ; Arul, Tolga ; Gabmeyer, Sebastian ; Szefer, Jakub ; Chandy, John A. ; Katzenbeisser, Stefan (2017):
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications.
26th Crypto-Day, Nürnberg, Germany, 01.-02.06.2017, [Konferenzveröffentlichung]

Asharov, Gilad ; Demmler, Daniel ; Schapira, Michael ; Schneider, Thomas ; Segev, Gil ; Shenker, Scott ; Zohner, Michael (2017):
Privacy-Preserving Interdomain Routing at Internet Scale.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (3), S. 143-163. De Gruyter Open, DOI: 10.1515/popets-2017-0033,
[Artikel]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2017):
More Efficient Oblivious Transfer Extensions.
In: Journal of Cryptology (JoC), 30 (3), S. 805-858. Springer, DOI: 10.1007/s00145-016-9236-6,
[Artikel]

Alkeilani Alkadri, Nabil ; Buchmann, Johannes ; Bansarkhani, Rachid El ; Krämer, Juliane (2017):
A Framework to Select Parameters for Lattice-Based Cryptography.
In: Cryptology ePrint Archive, 2017 (615), S. 1-37. International Association for Cryptologic Research (IACR), [Artikel]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Eaton, Edward ; Gutoski, Gus ; Krämer, Juliane ; Pawlega, Filip (2017):
Revisiting TESLA in the quantum random oracle model.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Konferenzveröffentlichung]

Alexopoulos, Nikolaos (2017):
Student Research Abstract: On Enhancing Trust in Cryptographic Solutions.
In: Proceedings of the 32nd Annual ACM Symposium on Applied Computing,
New York, NY, USA, ACM, Marrakech, Morocco, 3-6 April 2017, DOI: 10.1145/3019612.3019921,
[Konferenzveröffentlichung]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Ekberg, Jan-Erik ; Nyman, Thomas ; Paverd, Andrew ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Anagnostopoulos, Nikolaos Athanasios ; Katzenbeisser, Stefan ; Rosenstihl, Markus ; Schaller, André ; Gabmeyer, Sebastian ; Arul, Tolga (2016):
Low-temperature data remanence attacks against intrinsic SRAM PUFs.
[Report]

Ambrosin, Moreno ; Conti, Mauro ; Ibrahim, Ahmad ; Neven, Gregory ; Sadeghi, Ahmad-Reza ; Schunter, Matthias (2016):
POSTER: Toward a Secure and Scalable Attestation.
In: ACM WiSEC 2016,
[Konferenzveröffentlichung]

Abera, Tigist ; Asokan, N. ; Davi, Lucas ; Koushanfar, Farinaz ; Praverd, Andrew ; Tsudik, Gene ; Sadeghi, Ahmad-Reza (2016):
Things, Trouble, Trust: On Building Trust in IoT Systems.
In: 53rd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Akleylek, Sedat ; Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Marson, Giorgia Azzurra (2016):
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
In: International Conference on Cryptology AFRICACRYPT 2016, S. 10,
Springer, Fes, Morocco, [Konferenzveröffentlichung]

Alber, Gernot ; Trautmann, Nils (2016):
Cooperative quantum electrodynamical processes in an ellipsoidal cavity.
In: Journal of Physics: Conference Series, 672, IOP Publishing Ltd., ISSN 1742-6596,
DOI: 10.1088/1742-6596/672/1/012004,
[Artikel]

Amann, Sven ; Nadi, Sarah ; Nguyen, Hoan A. ; Nguyen, Tien N. ; Mezini, Mira (2016):
MUBench: A Benchmark for API-Misuse Detectors.
In: MSR'16, In: Proceedings of the 13th International Conference on Mining Software Repositories,
13th International Conference on Mining Software Repositories, Austin, Texas, USA, May 14–15, 2016, [Konferenzveröffentlichung]

Akleylek, Sedat ; Dagdelen, Özgür ; Tok, Zaliha Yüce (2016):
On the Efficiency of Polynomial Multiplication for Lattice-Based Cryptography on GPUs Using CUDA.
In: LNCS, 9540, In: Cryptography and Information Security in the Balkans, S. 155-168,
Springer, Koper, Slovenia, [Konferenzveröffentlichung]

Alagic, Gorjan ; Broadbent, Anne ; Fefferman, Bill ; Gagliardoni, Tommaso ; Schaffner, Christian ; Jules, Michael St. (2016):
Computational Security of Quantum Encryption.
In: Lecture Notes in Computer Science - ICITS, 10015, In: Information Theoretic Security : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, S. 47-71, Cham, Springer, ISBN 978-3-319-49174-5,
[Buchkapitel]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA: Scalable Embedded Device Attestation.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Arzt, Steven ; Nadi, Sarah ; Ali, Karim ; Bodden, Eric ; Erdweg, Sebastian ; Mezini, Mira (2015):
Towards Secure Integration of Cryptographic Software.
In: Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software, OOPSLA Onward!, Piitsburgh, 25.10.2015, [Konferenzveröffentlichung]

Asokan, N. ; Brasser, Ferdinand ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Tsudik, Gene ; Wachsmann, Christian (2015):
SEDA - Technical Report.
[Report]

Alkim, Erdem ; Bindel, Nina ; Buchmann, Johannes ; Dagdelen, Özgür ; Schwabe, Peter (2015):
TESLA: Tightly-Secure Efficient Signatures from Standard Lattices.
In: Cryptology ePrints Archive, 2015 (755), S. 1-24. International Association for Cryptologic Research (IACR), [Artikel]

Amin, Osama (2015):
Implementation and Evaluation of PUF based Cryptographic Key Generation Schemes on FPGA.
Darmstadt, Technische Universität, [Masterarbeit]

Arias, Orlando ; Davi, Lucas ; Hanreich, Matthias ; Jin, Yier ; Koeberl, Patrick ; Paul, Debayan ; Sadeghi, Ahmad-Reza ; Sullivan, Dean (2015):
HAFIX: Hardware-Assisted Flow Integrity Extension.
In: 52nd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Alkeilani Alkadri, Nabil (2015):
Post-Quantum Commitment Schemes.
Darmstadt, Technische Universität, [Masterarbeit]

Albrecht, Martin ; Rechberger, Christian ; Schneider, Thomas ; Tiessen, Tyge ; Zohner, Michael (2015):
Ciphers for MPC and FHE.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, S. 430-454,
Springer, DOI: 10.1007/978-3-662-46800-5_17,
[Konferenzveröffentlichung]

Asharov, Gilad ; Lindell, Yehuda ; Schneider, Thomas ; Zohner, Michael (2015):
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
In: 34. Advances in Cryptology -- EUROCRYPT 2015, S. 673-701,
Springer, DOI: 10.1007/978-3-662-46800-5_26,
[Konferenzveröffentlichung]

Araujo, Frederico ; Hamlen, Kevin ; Biedermann, Sebastian ; Katzenbeisser, Stefan (2014):
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation.
In: ACM, In: Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, S. 942-953,
Scottsdale, AZ, USA, [Konferenzveröffentlichung]

B

Brzuska, Christina ; Couteau, Geoffrey ; Karanko, Phila ; Rohrbach, Felix (2021):
On Derandomizing Yao’s Weak-to-Strong OWF Construction.
In: Lecture Notes in Computer Science, 13043, In: Theory of Cryptography, S. 429-456,
Springer, 19th International Conference on Theory of Cryptography (TCC 2021), Raleigh, USA, 08.-11.11.2021, ISBN 978-3-030-90452-4,
DOI: 10.1007/978-3-030-90453-1_15,
[Konferenzveröffentlichung]

Brendel, Jacqueline ; Fiedler, Rune ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2021):
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
(Preprint), IACR, 2021/769, [Report]

Bozdemir, Beyza ; Canard, Sebastian ; Ermis, Orhan ; Möllering, Helen ; Önen, Melek ; Schneider, Thomas (2021):
Privacy-preserving density-based clustering.
16th ACM ASIA Conference on Computer and Communications Security (ASIACCS'21), virtual Conference, 07.-11.06.2021, [Konferenzveröffentlichung]

Bahmani, Raad ; Brasser, Ferdinand ; Dessouky, Ghada ; Jauernig, Patrick ; Klimmek, Matthias ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2021):
CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08., [Konferenzveröffentlichung]

Baumgärtner, Lars ; Dmitrienko, Alexandra ; Freisleben, Bernd ; Gruler, Alexander ; Höchst, Jonas ; Kühlberg, Joshua ; Mezini, Mira ; Mitev, Richard ; Miettinen, Markus ; Muhamedagic, Anel ; Nguyen, Thien Duc ; Penning, Alvar ; Pustelnik, Frederik ; Roos, Filipp ; Sadeghi, Ahmad-Reza ; Schwarz, Michael ; Uhl, Christian (2020):
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, S. 458-467,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Extended Abstract).
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, Orlando, USA, 09.-13.11., [Konferenzveröffentlichung]

Buchmann, Johannes ; Dessouky, Ghada ; Frassetto, Tommaso ; Kiss, Ágnes ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Traverso, Giulia ; Zeitouni, Shaza (2020):
SAFE: A Secure and Efficient Long-Term Distributed Storage System.
8th International Workshop on Security in Blockchain and Cloud Computing (SBC'20), Taipei, Taiwan, June 1-5, 2020, [Konferenzveröffentlichung]

Büscher, Niklas ; Demmler, Daniel ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Krämer, Juliane ; Rathee, Deevashwer ; Schneider, Thomas ; Struck, Patrick (2020):
Secure Two-Party Computation in a Quantum world.
18th International Conference on Applied Cryptography and Network Security (ACNS'20), virtual Conference, 19.-22.10.2020, [Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A mixed-protocol machine learning framework for private inference.
15th International Conference on Availability, Reliability and Security (ARES'20), virtual Conference, 25.-28.08, [Konferenzveröffentlichung]

Boemer, Fabian ; Cammarota, Rosario ; Demmler, Daniel ; Schneider, Thomas ; Yalame, Mohammad Hossein (2020):
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Konferenzveröffentlichung]

Bayerl, Sebastian P. ; Frassetto, Tommaso ; Jauernig, Patrick ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Weinert, Christian (2020):
Offline Model Guard: Secure and Private ML on Mobile Devices.
23. Design, Automation and Test in Europe Conference (DATE '20), Grenoble, France, 09. – 13. March 2020, [Konferenzveröffentlichung]

Bauspieß, Pia ; Kolberg, Jascha ; Demmler, Daniel ; Krämer, Juliane ; Busch, Christoph (2020):
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection.
IEEE, 12th IEEE International Workshop on Information Forensics and Security (WIFS 2020), virtual Conference, 06.-11.12., [Konferenzveröffentlichung]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2020):
Security Reductions for White-Box Key-Storage in Mobile Payments.
Asiacrypt 2020 - 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, Korea, 06.-10.12., [Konferenzveröffentlichung]

Brandt, Markus ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Optimal Transport Layer for Secure Computation.
SECRYPT 2020-The 17th International Conference on Security and Cryptography, virtual Conference, 08.-10.07., [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian ; Stebila, Douglas (2020):
Towards Post-Quantum Security for Signal's X3DH Handshake.
27th Selected Areas in Cryptography (SAC 2020), virtual Conference, 19.-23.10., [Konferenzveröffentlichung]

Brasser, Ferdinand ; Capkun, Srdjan ; Dmitrienko, Alexandra ; Frassetto, Tommaso ; Kostiainen, Kari ; Sadeghi, Ahmad-Reza (2019):
DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization.
ACSAC - 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 9-13, [Konferenzveröffentlichung]

Bayerl, Sebastian P. ; Brasser, Ferdinand ; Busch, Christoph ; Frassetto, Tommaso ; Jauernig, Patrick ; Kolberg, Jascha ; Nautsch, Andreas ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Stapf, Emmanuel ; Treiber, Amos ; Weinert, Christian (2019):
Privacy-preserving speech processing via STPC and TEEs (Poster).
2. Privacy Preserving Machine Learning (PPML) – CCS 2019 Workshop, London, 15. November 2019, [Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2019):
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms.
Cryptology ePrint Archive, 2019/1356, [Report]

Brendel, Jacqueline (2019):
Future-Proofing Key Exchange Protocols.
Darmstadt, Technische Universität,
DOI: 10.25534/tuprints-00009642,
[Dissertation]

Buchmann, Johannes ; Geihs, Matthias ; Hamacher, Kay ; Katzenbeisser, Stefan ; Stammler, Sebastian (2019):
Long-term integrity protection of genomic data.
In: EURASIP Journal on Information Security, S. 16. SpringerOpen, DOI: 10.1186/s13635-019-0099-x,
[Artikel]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix (2019):
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids.
S. 521-541, ESORICS 2019 - The European Symposium on Research in Computer Security, Luxembourg, 23.-27.09.2019, ISBN 978-3-030-29962-0,
[Konferenzveröffentlichung]

Bindel, Nina ; Braun, Johannes ; Gladiator, Luca ; Stöckert, Tobias ; Wirth, Johannes (2019):
X.509-Compliant Hybrid Certificates for the Post-Quantum Transition.
In: Journal of Open Source Software, 4 (40), The Open Journal, ISSN 2475-9066,
DOI: 10.21105/joss.01606,
[Artikel]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane
Khalid, Zine-Dine (Hrsg.) (2019):
A new Parallelization for p3Enum and Parallelized Generation of Optimized Pruning Functions.
S. 931-940, HPCS 2019- International Conference on High Performance Computing & Simulation, Dublin, Irland, 15.-19.07., [Konferenzveröffentlichung]

Batina, Lejla ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
In: Proceedings of the 56th Annual Design Automation Conference 2019,
k.A., ACM, Design Automation Conference 2019, Las Vegas, NV, USA, June 02 - 06, 2019, [Konferenzveröffentlichung]

Burger, Michael ; Bischof, Christian ; Krämer, Juliane (2019):
p3Enum: A new Parameterizable and Shared-Memory Parallelized Shortest Vector Problem Solver.
In: 19th INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, S. 535-542,
Springer, Faro, Portugal, 12.-14.06.2019, DOI: 10.1007/978-3-030-22750-0_48,
[Konferenzveröffentlichung]

Brendel, Jacqueline ; Gerber, Nina (2019):
Sichere Instant Messaging Apps.
In: Datenschutz und Datensicherheit - DuD, 43 (5), S. 276-280. Springer, ISSN 1862-2607 (elektronische Version); 1614-0702 (gedruckte Version),
DOI: 10.1007/s11623-019-1107-5,
[Artikel]

Bindel, Nina ; Brendel, Jacqueline ; Fischlin, Marc ; Goncalves, Brian ; Stebila, Douglas (2019):
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange.
Chongqing, China, PQCrypto 2019, May 8-10, 2019, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Gens, David ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2019):
SANCTUARY: ARMing TrustZone with User-space Enclaves.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Bansarkhani, Rachid El (2019):
LARA - A Design Concept for Lattice-based Encryption.
S. 377-395, FC 2019: 23rd International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and Nevis, February 18.-22., 2019, ISBN 978-3-030-32100-0,
DOI: 10.1007/978-3-030-32101-7_23,
[Konferenzveröffentlichung]

Bock, Estuardo Alpirez ; Brzuska, Chris ; Fischlin, Marc ; Janson, Christian ; Michiels, Wil (2019):
Security Reductions for White-Box Key-Storage in Mobile Payments.
In: ePrint, [Artikel]

Büscher, Niklas (2018):
Compilation for More Practical Secure Multi-Party Computation.
Darmstadt, Technische Universität,
[Dissertation]

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit ; Shulman, Haya ; Waidner, Michael (2018):
Domain Validation ++ for MitM-Resilient PKI.
ACM CCS 2018, Toronto, Canada, 15.-19.10. 2018, [Konferenzveröffentlichung]

Burger, Michael ; Bischof, Christian ; Calotoiu, Alexandru ; Wunderer, Thomas ; Wolf, Felix (2018):
Exploring the Performance Envelope of the LLL Algorithm.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Konferenzveröffentlichung]

Büscher, Niklas ; Demmler, Daniel ; Katzenbeisser, Stefan ; Kretzmer, David ; Schneider, Thomas (2018):
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation.
In: 25. ACM Conference on Computer and Communications Security (CCS'18), S. 847-861,
ACM, DOI: 10.1145/3243734.3243786,
[Konferenzveröffentlichung]

Bansarkhani, Rachid El (2018):
LARA - A Design Concept for Lattice-based Encryption.
In: ePrint Archive, (Report 2017/049), [Report]

Brasser, Ferdinand ; Frassetto, Tommaso ; Riedhammer, Korbinian ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Weinert, Christian (2018):
VoiceGuard: Secure and Private Speech Processing.
In: Interspeech 2018, S. 1303-1307,
International Speech Communication Association (ISCA), DOI: 10.21437/Interspeech.2018-2032,
[Konferenzveröffentlichung]

Baack, Leon (2018):
Optimisation of parts of a set-up for quantum key distribution.
TU Darmstadt, [Bachelorarbeit]

Buescher, Niklas ; Weber, Alina ; Katzenbeisser, Stefan (2018):
Towards Practical RAM based Secure Computation.
In: European Symposium on Research in Computer Security (ESORICS),
ESORICS 2018, Barcelona, Spain, 3.9.-7.9. 2018, [Konferenzveröffentlichung]

Bindel, Nina ; Buchmann, Johannes ; Göpfert, Florian ; Schmidt, Markus (2018):
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples.
In: Journal of Mathematical Cryptology, de Gruyter, [Artikel]

Bielsa, Guillermo ; Palacios, Joan ; Loch, Adrian ; Steinmetzer, Daniel ; Cesari, Paolo ; Widmer, Joerg (2018):
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points.
IEEE International Conference on Computer Communications (INFOCOM), Honolulu, Hawaii, USA, 15-19 April 2018, [Konferenzveröffentlichung]

Brandy, Malte (2018):
Asymptotische Eigenschaften iterierter Quantenoperationen.
TU Darmstadt, [Masterarbeit]

Bindel, Nina (2018):
On the Security of Lattice-Based Signature Schemes in a Post-Quantum World.
Darmstadt, Technische Universität,
[Dissertation]

Brandt, Markus ; Shulman, Haya ; Waidner, Michael (2018):
Internet As a Source of Randomness.
S. 64-70, HotNets '18: 17th ACM Workshop on Hot Topics in Networks, Redmond, USA, November 2018, DOI: 10.1145/3286062.3286072,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Dhavlle, Abhijitt ; Frassetto, Tommaso ; Dinakarrao, Sai Manoj Pudukotai ; Rafatirad, Setareh ; Sadeghi, Ahmad-Reza ; Sasan, Avesta ; Sayadi, Hossein ; Zeitouni, Shaza ; Homayoun, Houman (2018):
Advances and Throwbacks in Hardware-assisted Security: Special Session.
In: CASES '18, S. 15:1-15:10, Piscataway, NJ, USA, IEEE Press, Proceedings of the International Conference on Compilers, Architecture and Synthesis for Embedded Systems, Piscataway, NJ, USA, ISBN 978-1-5386-5564-1,
[Konferenzveröffentlichung]

Buchmann, Johannes ; Holzer, Patrick ; Wunderer, Thomas (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
In: INDOCRYPT 2017 - 18th International Conference on Cryptology in India,
Springer, [Konferenzveröffentlichung]

Bindel, Nina ; Krämer, Juliane ; Schreiber, Johannes (2017):
Hampering fault attacks against lattice-based signature schemes - countermeasures and their efficiency.
In: CODES/ISSS ’17 Companion,
Springer, [Konferenzveröffentlichung]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions.
In: ProvSec 2017 - The 11th International Conference on Provable Security,
Springer, [Konferenzveröffentlichung]

Böck, Leon (2017):
On P2P botnet monitoring in adverse conditions.
Darmstadt, Technische Universität, [Masterarbeit]

Brendel, Jacqueline ; Fischlin, Marc
Foley, Simon N. ; Gollmann, Dieter ; Snekkenes, Einar (Hrsg.) (2017):
Zero Round-Trip Time for the Extended Access Control Protocol.
In: Lecture notes in computer science, 1, In: Computer Security – ESORICS 2017. 22nd European Symposium on Research in Computer Security, Proceedings, S. 297-314, Cham, Springer International Publishing, ISBN 978-3-319-66401-9,
DOI: 10.1007/978-3-319-66402-6,
[Buchkapitel]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory.
In: USENIX Security '17, In: 26th USENIX Security Symposium,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Müller, Urs ; Dmitrienko, Alexandra ; Kostiainen, Kari ; Capkun, Srdjan ; Sadeghi, Ahmad-Reza (2017):
Software Grand Exposure: SGX Cache Attacks Are Practical.
In: WOOT, In: 11th USENIX Workshop on Offensive Technologies,
[Konferenzveröffentlichung]

Brendel, Jacqueline ; Fischlin, Marc ; Günther, Felix ; Janson, Christian
Katz, Jonathan ; Shacham, Hovav (Hrsg.) (2017):
PRF-ODH: Relations, Instantiations, and Impossibility Results.
In: CRYPTO 2017 - 37th International Cryptology Conference, S. 651-681,
Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Buchmann, Johannes ; Lauter, Kristin ; Mosca, Michele (2017):
Postquantum Cryptography - State of the Art.
In: IEEE Security & Privacy, 15, S. 12-13. [Artikel]

Butin, Denis (2017):
Hash-Based Signatures: State of Play.
In: IEEE Security & Privacy, 15 (4), S. 37-43. DOI: 10.1109/MSP.2017.3151334,
[Artikel]

Büscher, Niklas ; Katzenbeisser, Stefan (2017):
Compilation for Secure Multi-party Computation.
Springer Briefs in Computer Science, ISBN 978-3-319-67521-3,
[Buch]

Bugge, Sebastian (2017):
Solving Learning With Errors Instances Using Quantum Reductions.
Darmstadt, Technische Universität, [Masterarbeit]

Buldas, Ahto ; Geihs, Matthias ; Buchmann, Johannes (2017):
Long-Term Secure Commitments via Extractable-Binding Commitments.
In: LNCS, In: ACISP 2017 - 22nd Australasian Conference on Information Security and Privacy,
Springer, Auckland, New Zealand, [Konferenzveröffentlichung]

Bindel, Nina ; Herath, Udyani ; McKague, Matthew ; Stebila, Douglas (2017):
Transitioning to a Quantum-Resistant Public Key Infrastructure.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
Springer, Utrecht, the Netherlands, [Konferenzveröffentlichung]

Boukoros, Spyros ; Karvelas, Nikolaos ; Katzenbeisser, Stefan (2017):
A lightweight protocol for privacy preserving division.
In: IWCMC 2017 - 13th International Wireless Communications and Mobile Computing Conference,
IEEE, Valencia Spain, [Konferenzveröffentlichung]

Bindel, Nina (2017):
Ein deutsches digitales Signaturverfahren auf dem Weg zum internationalen kryptographischen Standard.
In: Digitale Gesellschaft zwischen Risikobereitschaft und Sicherheitsbedürfnis- Tagungsband zum 15. Deutschen IT-Sicherheitskongress,
SecuMedia Verlag, [Konferenzveröffentlichung]

Buchmann, Johannes ; Braun, Johannes ; Demirel, Denise ; Geihs, Matthias (2017):
Quantum Cryptography: a view from classical cryptography.
In: Quantum Science and Technology, 2 (2), DOI: 10.1088/2058-9565/aa69cd,
[Artikel]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2017):
SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, S. 461-468,
New York, ACM, ASIA CCS '17, Abu Dhabi, UAE, April 2-6, 2017, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053043,
[Konferenzveröffentlichung]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas ; Struck, Patrick (2017):
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
In: LNCS, In: C2SI 2017 - Codes, Cryptology and Information Security - Second International Conference in honor of Professor Claude Carlet, S. 142-160,
Springer, Rabat, Morocco, ISBN 978-3-319-55589-8,
[Konferenzveröffentlichung]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane ; Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra (2017):
Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.
S. 225-241, Proceedings of the 10th International Symposium on Foundations & Practice of Security (FPS), [Konferenzveröffentlichung]

Brendel, Jacqueline ; Demirel, Denise (2016):
Efficient Proactive Secret Sharing.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Bansarkhani, Rachid El ; Sturm, Jan (2016):
An Efficient Lattice-based Multisignature Scheme with Applications to Bitcoins.
In: 15th International Conference on Cryptology and Network Security - CANS 2016,
Milan, Italy, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks.
In: Cryptography and Security, [Artikel]

Buescher, Niklas ; Kretzmer, David ; Jindal, Arnav ; Katzenbeisser, Stefan (2016):
Scalable Secure Computation from ANSI-C.
In: WIFS - IEEE International Workshop on Information Forensics and Security,
IEEE, [Konferenzveröffentlichung]

Bieber, Julian (2016):
Generalizing Semi-Private Function Evaluation.
TU Darmstadt, [Bachelorarbeit]

Buescher, Niklas ; Holzer, Andreas ; Weber, Alina ; Katzenbeisser, Stefan (2016):
Compiling Low Depth Circuits for Practical Secure Computation.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2016):
Formal Policy-based Provenance Audit.
In: The 11th International Workshop on Security - IWSEC 2016,
sola city Conference Center, Akihabara-Ochanomizu District, Tokyo, Japan, [Konferenzveröffentlichung]

Bansarkhani, Rachid El ; El Kaafarani, Ali (2016):
Post-Quantum Attribute-Based Signatures from Lattice Assumptions.
In: Cryptology ePrint Archive, 2016 (823), S. 1-28. International Association for Cryptologic Research (IACR), [Artikel]

Bindel, Nina ; Buchmann, Johannes ; Krämer, Juliane (2016):
Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks.
In: FDTC 2016 - Fault Diagnosis and Tolerance in Cryptography,
IEEE Conference Publication, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Braun, Johannes ; Buchmann, Johannes ; Demirel, Denise ; Fujiwara, Mikio ; Geihs, Matthias ; Moriai, Shiho ; Sasaki, Masahide ; Waseda, Atsushi (2016):
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, S. 1-13,
New York, ACM, ASIA CCS '17, Abu Dhabi, UEA, April 2-6, 2017, ISBN 978-1-4503-4944-4,
[Konferenzveröffentlichung]

Brasser, Ferdinand ; Ganapathy, Vinod ; Iftode, Liviu ; Kim, Daeyoung ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Regulating ARM TrustZone Devices in Restricted Spaces.
In: 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
[Konferenzveröffentlichung]

Buchmann, Johannes ; Büscher, Niklas ; Katzenbeisser, Stefan ; Krämer, Juliane ; Micciancio, Daniele ; Siim, Sander ; Vredendaal, Christine van ; Walter, Michael ; Göpfert, Florian (2016):
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge.
In: ASIAPKC 16 - 3rd ACM International Workshop on ASIA Public-Key Cryptography,
ACM, Xi'an, China, [Konferenzveröffentlichung]

Buchmann, Johannes ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas (2016):
High-Performance and Lightweight Lattice-Based Public-Key Encryption.
In: IoTPTS '16 - 2nd ACM International Workshop on IoT Privacy, Trust, and Security,
ACM, Xi'an, China, [Konferenzveröffentlichung]

Buchmann, Johannes ; Demirel, Denise ; Schabhüser, Lucas (2016):
Privately and Publicly Verifiable Computing Techniques.
In: SpringerBriefs in Computer Science, Cham, Springer International Publishing - Springer, ISBN 978-3-319-53797-9,
[Buch]

Buchmann, Johannes ; Göpfert, Florian ; Player, Rachel ; Wunderer, Thomas (2016):
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: International Conference on Cryptology AFRICACRYPT 2016,
Springer, Fes, Morocco, [Konferenzveröffentlichung]

Bernhard, David ; Fischlin, Marc ; Warinschi, Bogdan (2016):
On the Hardness of Proving CCA-Security of Signed ElGamal.
In: LNCS, In: Public-Key Cryptography - PKC 2016, S. 24,
Springer, Taipei, Taiwan, ISBN 978-3-662-49384-7,
DOI: 10.1007/978-3-662-49384-7_3,
[Konferenzveröffentlichung]

Braden, Kjell ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2016):
Leakage-Resilient Layout Randomization for Mobile Devices.
In: 23rd Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Brendel, Jacqueline (2016):
Efficient Proactive Secret Sharing.
Darmstadt, Technische Universität, [Masterarbeit]

Brasser, Ferdinand ; Rasmussen, Kasper ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2016):
Remote Attestation for Low-End Embedded Devices: the Prover's Perspective.
In: DAC '16, In: Proceedings of the 53nd Annual Design Automation Conference,
ACM, [Konferenzveröffentlichung]

Borgwart, Andreas ; Boukoros, Spyros ; Shulman, Haya ; Waidner, Michael ; Royeen, Carel van (2015):
Detection and Forensics of Domains Hijacking.
In: IEEE Global Communications Conference,
IEEE, San Diego, CA, USA, [Konferenzveröffentlichung]

Böck, Leon ; Karuppayah, Shankar ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2015):
Hide And Seek: Detecting Sensors in P2P Botnets.
In: Communications and Network Security (CNS), 2015 IEEE Conference on, S. 731-732,
IEEE, Florence, Italy, DOI: 10.1109/CNS.2015.7346908,
[Konferenzveröffentlichung]

Buescher, Niklas ; Katzenbeisser, Stefan (2015):
Faster Secure Computation through Automatic Parallelization.
In: 24th USENIX Security Symposium (USENIX Security'15),
USENIX Association, Washington, D.C., USA, [Konferenzveröffentlichung]

Brasser, Ferdinand ; Koeberl, Patrick ; Mahjoub, Brahim El ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2015):
TyTAN: Tiny Trust Anchor for Tiny Devices.
In: 52nd Design Automation Conference (DAC) 2015,
[Konferenzveröffentlichung]

Bansarkhani, Rachid El ; Buchmann, Johannes (2015):
High Performance Lattice-based CCA-secure Encryption.
In: Cryptology ePrint Archive, S. 20. [Artikel]

Bansarkhani, Rachid El ; Dagdelen, Özgür ; Buchmann, Johannes (2015):
Augmented Learning with Errors: The Untapped Potential of the Error Term.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, Puerto Rico, January 26 - 30, 2015, S. 20,
Springer, Isla Verde, Puerto Rico, [Konferenzveröffentlichung]

Biedermann, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2015):
Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, S. 5-13. [Artikel]

Bollmann, Dominik ; Lortz, Steffen ; Mantel, Heiko ; Starostin, Artem (2015):
An Automatic Inference of Minimal Security Types.
In: Proceedings of the 11th International Conference on Information Systems Security (ICISS),
[Konferenzveröffentlichung]

Braun, Johannes (2014):
Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication.
In: IEEE Conference on Communications and Network Security (IEEE CNS 2014 Poster Session),
San Francisco, USA, [Konferenzveröffentlichung]

Buchmann, Johannes ; Bischof, Christian ; Dagdelen, Özgür ; Fitzpatrick, Robert ; Göpfert, Florian ; Mariano, Artur (2014):
Nearest Planes in Practice.
In: International Conference on Cryptography and Information security -BalkanCryptSec 2014,
Istanbul, Turkey, [Konferenzveröffentlichung]

C

Cremers, Cas ; Düzlü, Samed ; Fiedler, Rune ; Fischlin, Marc ; Janson, Christian (2021):
BUFFing signature schemes beyond unforgeability and the case of post-quantum signature.
42nd IEEE Symposium on Security and Privacy, virtual Conference, 23.-27.05.2021, [Konferenzveröffentlichung]

Cammarota, Rosario ; Schunter, Matthias ; Rajan, Anand ; Boemer, Fabian ; Kiss, Ágnes ; Treiber, Amos ; Weinert, Christian ; Schneider, Thomas ; Stapf, Emmanuel ; Sadeghi, Ahmad-Reza ; Demmler, Daniel ; Chen, Huili ; Hussain, Siam Umar ; Riazi, M. Sadegh ; Koushanfar, Farinaz ; Gupta, Saransh ; Rosing, Tajan Simunic ; Chaudhuri, Kamalika ; Nejatollahi, Hamid ; Dutt, Nikil ; Imani, Mohsen ; Laine, Kim ; Dubey, Anuj ; Aysu, Aydin ; Sadat Hosseini, Fateme ; Yang, Chengmo ; Wallace, Eric ; Norton, Pamela (2020):
Trustworthy AI Inference Systems: An Industry Research View.
In: Cryptography and Security, (Preprint), Version 1, arXiv, 2008.04449, [Report]

Cloosters, Tobias ; Rodler, Michael ; Davi, Lucas (2020):
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves.
29th USENIX Security Symposium, virtual Conference, August 12.–14.2020, [Konferenzveröffentlichung]

Classen, Jiska ; Hollick, Matthias (2019):
Inside Job: Diagnosing Bluetooth Lower Layers Using Off-the-Shelf Devices.
12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'19), Miami, FL, USA, May 15.-17., 2019, DOI: 10.1145/3317549.3319727,
[Konferenzveröffentlichung]

Classen, Jiska ; Wegemer, Daniel (2018):
Fitbit Firmware Hacking.
Recon,
[Anderes]

Carpent, Xavier ; Eldefrawy, Karim ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices.
ACM, Design Automation Conference, San Francisco, USA, 2018, June 24-29, [Konferenzveröffentlichung]

Classen, Jiska ; Wegemer, Daniel ; Patras, Paul ; Spink, Tom ; Hollick, Matthias (2018):
Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
In: PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT),
ACM, [Konferenzveröffentlichung]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2017):
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers.
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), S. 120-133,
ACM, DOI: 10.1145/3143361.3143362,
[Konferenzveröffentlichung]

Chauhan, Prankur (2017):
Improvement and integration of software tools for the evaluation and realization of Physical Unclonable Functions (PUFs) into an open-source library of cryptographic component (CogniCrypt).
Darmstadt, Technische Universität, [Masterarbeit]

Cremer, Manuel (2017):
Test Cases for Detecting the Lucky 13 Vulnerability with SPASCA.
TU Darmstadt, [Bachelorarbeit]

Chen, Joe ; Steinmetzer, Daniel ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2017):
Pseudo Lateration: Millimeter-Wave Localization Using a Single RF Chain.
In: IEEE WCNC,
[Konferenzveröffentlichung]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Konferenzveröffentlichung]

Classen, Jiska ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer.
In: 3rd ACM Workshop on Visible Light Communication Systems, [Artikel]

Chiesa, Marco ; Demmler, Daniel ; Canini, Marco ; Schapira, Michael ; Schneider, Thomas (2016):
Towards Securing Internet eXchange Points Against Curious onlooKers.
In: ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW'16), S. 32-34,
ACM, DOI: 10.1145/2959424.2959427,
[Konferenzveröffentlichung]

Conti, Mauro ; Crane, Stephen ; Frassetto, Tommaso ; Homescu, Andrei ; Koppen, Georg ; Larsen, Per ; Liebchen, Christopher ; Perry, Mike ; Sadeghi, Ahmad-Reza (2016):
Selfrando: Securing the Tor Browser against De-anonymization Exploits.
In: The annual Privacy Enhancing Technologies Symposium (PETS),
[Konferenzveröffentlichung]

Classen, Jiska (2016):
Software Defined Radio – Open Source Wireless Hacking.
[Anderes]

Correia, Fabio ; Mariano, Artur ; Proença, Alberto ; Bischof, Christian ; Agrell, Erik (2016):
Parallel Improved Schnorr-Euchner Enumeration SE++ for the CVP and SVP.
In: PDP 2016 - 24th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, S. 596-603,
Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Cam-Winget, Nancy ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Can IoT be Secured: Emerging Challenges in Connecting the Unconnected.
In: 53rd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Classen, Jiska (2015):
Building and Breaking Wireless Security.
[Anderes]

Conti, Mauro ; Crane, Stephen ; Davi, Lucas ; Franz, Michael ; Larsen, Per ; Liebchen, Christopher ; Negro, Marco ; Qunaibit, Mohaned ; Sadeghi, Ahmad-Reza (2015):
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Crane, Stephen ; Volckaert, Stijn ; Schuster, Felix ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Sutter, Bjorn De ; Franz, Michael (2015):
It's a TRAP: Table Randomization and Protection against Function Reuse Attacks.
In: 22nd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Classen, Jiska ; Chen, Joe ; Steinmetzer, Daniel ; Hollick, Matthias ; Knightly, Edward (2015):
The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications.
In: 2nd ACM Workshop on Visible Light Communication Systems, S. 6,
Paris, France, [Konferenzveröffentlichung]

Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2015):
Practical Covert Channels for WiFi Systems.
In: IEEE Conference on Communications and Network Security (CNS), S. 8,
Florence, Italy, [Konferenzveröffentlichung]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Return to Where? You Can't Exploit What You Can't Find.
In: Blackhat USA,
[Konferenzveröffentlichung]

Cabarcas, Daniel ; Demirel, Denise ; Göpfert, Florian ; Lancrenon, Jean ; Wunderer, Thomas (2015):
An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme.
[Report]

Crane, Stephen ; Liebchen, Christopher ; Homescu, Andrei ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Brunthaler, Stefan ; Franz, Michael (2015):
Readactor: Practical Code Randomization Resilient to Memory Disclosure.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Konferenzveröffentlichung]

Classen, Jiska ; Braun, Johannes ; Volk, Florian ; Hollick, Matthias ; Buchmann, Johannes ; Mühlhäuser, Max (2015):
A Distributed Reputation System for Certification Authority Trust Management.
In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium),
Helsinki, Finland, [Konferenzveröffentlichung]

D

Dessouky, Ghada ; Gruler, Alexander ; Mahmoody, Pouya ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2022):
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
S. 1-18, Network and Distributed Systems Security (NDSS) Symposium 2022, San Diego, USA, 24.-28.04.2022, [Konferenzveröffentlichung]

Das, Poulami ; Erwig, Andreas ; Faust, Sebastian ; Loss, Julian ; Riahi, Siavash (2021):
The Exact Security of BIP32 Wallets.
In: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, S. 1020-1042,
ACM, 2021 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 15.-19.11.2021, ISBN 978-1-4503-8454-4,
DOI: 10.1145/3460120.3484807,
[Konferenzveröffentlichung]

Demmler, Daniel ; Katzenbeisser, Stefan ; Schneider, Thomas ; Schuster, Tom ; Weinert, Christian (2021):
Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation.
Preprint, 18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08-07.2021, [Konferenzveröffentlichung]

Dessouky, Ghada ; Frassetto, Tommaso ; Jauernig, Patrick ; Sadeghi, Ahmad-Reza (2020):
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design.
In: IEEE Security & Privacy, IEEE, ISSN 1540-7993,
DOI: 10.1109/MSEC.2020.2994978,
[Artikel]

Dessouky, Ghada ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Enclave Computing on RISC-V: A Brighter Future for Security?
1st International Workshop on Secure RISC-V Architecture Design Exploration (SECRISC-V), co-located with ISPASS-2020, Boston, USA, 5.-7. April, 2020, [Konferenzveröffentlichung]

Dalskov, Anders ; Keller, Marcel ; Orlandi, Claudio ; Shrishak, Kris ; Shulman, Haya (2020):
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC.
ESORICS 2020-The 25th European Symposium on Research in Computer Security, virtual Conference, 14.-18.09, [Konferenzveröffentlichung]

Davies, Gareth T. ; Janson, Christian ; Martin, Daniel P. (2020):
Client-oblivious OPRAM.
The 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-27.08., [Konferenzveröffentlichung]

Dessouky, Ghada ; Frassetto, Tommaso ; Sadeghi, Ahmad-Reza (2020):
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments.
In: USENIX Security,
k.A., USENIX Association, 29th USENIX Security Syposium, Boston, MA, USA, 12.-14.08.2020, [Konferenzveröffentlichung]

Dessouky, Ghada ; Jauernig, Patrick ; Mentens, Nele ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
DAC'20-Design Automation Conference 2020, virtual Conference, 20.-24.07., [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Janson, Christian ; Struck, Patrick (2019):
Sponges Resist Leakage: The Case of Authenticated Encryption.
ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 08.-12.12., [Konferenzveröffentlichung]

Das, Poulami ; Faust, Sebastian ; Loss, Julian (2019):
A Formal Treatment of Deterministic Wallets.
ACM CCS 2019 - Symposium on Computer and Communications Security, London, UK, November, 11th -15th, [Konferenzveröffentlichung]

Dessouky, Ghada ; Zeitouni, Shaza ; Ibrahim, Ahmad ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2019):
CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems.
New York, IEEE, 2019 International Conference On Computer Aided Design (ICCAD), The Westin Westminster Westminster, CO, 4.-7. November 2019, [Konferenzveröffentlichung]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostáková, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Konferenzveröffentlichung]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2019):
HardFails: Insights into Software-Exploitable Hardware Bugs.
28th USENIX Security Symposium, Santa Clara, CA, USA, 14.-16.08.2019, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Hesse, Julia ; Hostakova, Kristina (2019):
Multiparty Virtual State Channels.
In: Eurocrypt 2019,
Darmstadt, IACR, 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, [Konferenzveröffentlichung]

Das, Poulami ; Eckey, Lisa ; Frassetto, Tommaso ; Gens, David ; Hostakova, Kristina ; Jauernig, Patrick ; Faust, Sebastian ; Sadeghi, Ahmad-Reza (2019):
FastKitten: Practical Smart Contracts on Bitcoin.
Cryptology ePrint Archive, Report 2019/154, [Report]

Demmler, Daniel (2019):
Towards Practical Privacy-Preserving Protocols.
Darmstadt, Technische Universität,
[Dissertation]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian ; Malinowski, Daniel (2019):
Perun: Virtual Payment Hubs over Cryptocurrencies.
S. 327-340, IEEE Computer Society, 39th IEEE Symposium on Security and Privacy, THE HYATT REGENCY, SAN FRANCISCO, CA, MAY 21-23, 2018, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Faust, Sebastian ; Zebrowski, Karol (2019):
Simple Refreshing in the Noisy Leakage Model.
IACR, The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8.12.-12.12. 2019, [Konferenzveröffentlichung]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: LNCS, In: The 11th International Symposium on Foundations & Practice of Security (FPS),
Springer, The 11th International Symposium on Foundations & Practice of Security (FPS), Montreal, Canada, 13, 14 and 15 November 2018, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fischlin, Marc (2018):
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
In: LNCS, In: Advances in Cryptology – ASIACRYPT 2018,
Springer, Asiacrypt 2018 - the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, Australia, December 02-06, 2018, [Konferenzveröffentlichung]

Dziembowski, Stefan ; Eckey, Lisa ; Faust, Sebastian (2018):
FairSwap: How to fairly exchange digital goods.
In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Konferenzveröffentlichung]

Dix, Isabella (2018):
A Type System and an Implementation for Detecting the Lucky13 Vulnerability with SPASCA.
TU Darmstadt, [Masterarbeit]

Dziembowski, Stefan ; Faust, Sebastian ; Hostakova, Kristina (2018):
General State Channel Networks.
2018, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
ACM, 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, 15-19 October 2018, [Konferenzveröffentlichung]

Dodhy, Anam (2018):
Misuses of Parameters for Cryptographic APIs.
TU Darmstadt, [Masterarbeit]

Dessouky, Ghada ; Abera, Tigist ; Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza (2018):
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution.
37th IEEE International Conference On Computer Aided Design 2018 (ICCAD’18), 2018, [Konferenzveröffentlichung]

Demmler, Daniel ; Rindal, Peter ; Rosulek, Mike ; Trieu, Ni (2018):
PIR-PSI: Scaling Private Contact Discovery.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), S. 159-178. De Gruyter Open, DOI: 10.1515/popets-2018-0037,
[Artikel]

Deaconescu, Razvan ; Carabas, Costin ; Manda, Iulia ; Enck, William ; Chiroiu, Mihai ; Li, Ninghui ; Sadeghi, Ahmad-Reza (2018):
iOracle: Automated Evaluation of Access Control Policies in iOS.
In: AsiaCCS, In: 13th ASIA Conference on Information, Computer and Communications Security,
[Konferenzveröffentlichung]

Deligeorgopoulos, Efstathios (2018):
Evaluation of Proactive Secret Sharing for Long-Term Secure Storage.
TU Darmstadt, [Masterarbeit]

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael (2018):
Off-path Attacks Against PKI.
S. 2213-2215, ACM SIGSAG Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 2018, DOI: 10.1145/3243734.3278516,
[Konferenzveröffentlichung]

Dessouky, Ghada ; Gens, David ; Haney, Patrick ; Persyn, Garrett ; Kanuparthi, Arun K. ; Khattri, Hareesh ; Fung, Jason M. ; Sadeghi, Ahmad-Reza ; Rajendran, Jeyavijayan (2018):
When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs.
In: Cryptography and Security, abs/1812.00197, [Artikel]

Deller, Yannick (2017):
Zweidimensionale Surface-Kodes und ihre Anwendungen.
TU Darmstadt, [Bachelorarbeit]

Demmler, Daniel ; Hamacher, Kay ; Schneider, Thomas ; Stammler, Sebastian (2017):
Privacy-Preserving Whole-Genome Variant Queries.
In: 16. International Conference on Cryptology And Network Security (CANS'17),
Springer, [Konferenzveröffentlichung]

Demmler, Daniel ; Holz, Marco ; Schneider, Thomas (2017):
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks.
In: 15. International Conference on Applied Cryptography and Network Security (ACNS'17), S. 599-619,
Springer, DOI: 10.1007/978-3-319-61204-1_30,
[Konferenzveröffentlichung]

Dessouky, Ghada ; Zeitouni, Shaza ; Nyman, Thomas ; Paverd, Andrew ; Davi, Lucas ; Koeberl, Patrick ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
54th Design Automation Conference (DAC'17), [Konferenzveröffentlichung]

Dantas, Yuri Gil ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2017):
An Experimental Study of a Bucketing Approach.
In: Quantitative Aspects of Programming Languages and Systems,
Uppsala, Sweden, [Konferenzveröffentlichung]

Davi, Lucas ; Gens, David ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2017):
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza ; Zohner, Michael (2017):
Pushing the Communication Barrier in Secure Computation using Lookup Tables.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23097,
[Konferenzveröffentlichung]

Dewald, Florian ; Mantel, Heiko ; Weber, Alexandra (2017):
AVR Processors as a Platform for Language-Based Security.
S. 427-445, Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS), [Konferenzveröffentlichung]

Deshotels, Luke ; Deaconescu, Razvan ; Chiroiu, Mihai ; Davi, Lucas ; Enck, William ; Sadeghi, Ahmad-Reza (2016):
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
In: 23rd ACM Conference on Computer and Communications Security (CCS),
[Konferenzveröffentlichung]

Demirel, Denise ; Krenn, Stephan ; Loruenser, Thomas ; Traverso, Giulia (2016):
Efficient Third Party Auditing for a Distributed Storage System.
In: International Conference on Availability, Reliability and Security - ARES 2016,
IEEE, Salzburg, Austria, [Konferenzveröffentlichung]

Dowling, Benjamin ; Günther, Felix ; Herath, Udyani ; Stebila, Douglas (2016):
Secure Logging Schemes and Certificate Transparency.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016),
Springer, Heraklion, Crete, Greece, [Konferenzveröffentlichung]

Daubert, Jörg ; Fischer, Mathias ; Grube, Tim ; Schiffner, Stefan ; Kikiras, Panayotis ; Mühlhäuser, Max (2016):
AnonPubSub: Anonymous Publish-Subscribe Overlays.
In: Computer Communications, 76, S. 42-53. Elsevier, ISSN 0140-3664,
DOI: 10.1016/j.comcom.2015.11.004,
[Artikel]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G. (2016):
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol.
In: International Journal of Information Security, 15 (6), S. 637-657. Springer, ISSN 1615-5270,
[Artikel]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2016):
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol.
In: Cryptology ePrint Archive, 2016 (81), S. 1-33. International Association for Cryptologic Research (IACR), [Artikel]

Daubert, Jörg ; Grube, Tim ; Fischer, Mathias ; Mühlhäuser, Max (2016):
On the anonymity of privacy-preserving many-to-many communication in the presence of node churn and attacks.
In: Proceedings of the 13th Annual IEEE Consumer Communications & Networking Conference (CCNC), S. 738-744,
IEEE, Las Vegas, USA, ISBN 978-1-4673-9292-1,
DOI: 10.1109/CCNC.2016.7444871,
[Konferenzveröffentlichung]

Daubert, Jörg (2016):
Anonymous Publish-Subscribe Overlays.
Darmstadt, Technische Universität Darmstadt,
[Dissertation]

Davi, Lucas ; Sadeghi, Ahmad-Reza (2015):
Building Secure Defenses Against Code-Reuse Attacks.
Cham, Springer International Publishing, ISBN 978-3-319-25544-6,
DOI: 10.1007/978-3-319-25546-0,
[Buch]

Dagdelen, Özgür ; Gajek, Sebastian ; Göpfert, Florian (2015):
Learning With Errors in the Exponent.
In: LNCS, In: 18th International Conference on information Security and Cryptology (ICISC) 2015,
Springer, Seoul, Korea, [Konferenzveröffentlichung]

Demmler, Daniel ; Dessouky, Ghada ; Koushanfar, Farinaz ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2015):
Automated Synthesis of Optimized Circuits for Secure Computation.
In: 22. ACM Conference on Computer and Communications Security (CCS'15), S. 1504-1517,
ACM, DOI: 10.1145/2810103.2813678,
[Konferenzveröffentlichung]

Dowling, Benjamin ; Fischlin, Marc ; Günther, Felix ; Stebila, Douglas (2015):
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015), S. 1197-1210,
ACM, Denver, Colorado, USA, [Konferenzveröffentlichung]

Demirel, Denise ; Lancrenon, Jean (2015):
How to Securely Prolong the Computational Bindingness of Pedersen Commitments.
[Report]

Davi, Lucas ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza ; Snow, Kevin ; Monrose, Fabian (2015):
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
In: 22nd Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Demmler, Daniel ; Schneider, Thomas ; Zohner, Michael (2015):
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Internet Society, 22. Annual Network and Distributed System Security Symposium (NDSS'15), San Diego, CA, 8-11 February 2015, ISBN 1-891562-38-X,
DOI: 10.14722/ndss.2015.23113,
[Konferenzveröffentlichung]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
S. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Konferenzveröffentlichung]

Dagdelen, Özgür ; Bansarkhani, Rachid El ; Göpfert, Florian ; Güneysu, Tim ; Oder, Tobias ; Pöppelmann, Thomas ; Sanchez, Ana Helena ; Schwabe, Peter (2014):
High-speed signatures from standard lattices.
In: Latincrypt 2014,
Florianópolis, Brazil, [Konferenzveröffentlichung]

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc ; Gagliardoni, Tommaso ; Günther, Felix ; Marson, Giorgia Azzurra ; Mittelbach, Arno ; Paterson, Kenneth G.
Chen, Liqun ; Mitchell, Chris (Hrsg.) (2014):
Unpicking PLAID: A Cryptographic Analysis of an ISO-standards-track Authentication Protocol.
In: Lecture Notes in Computer Science, In: Security Standardisation Research : Proceedings of the 1st International Conference on Research in Security Standardisation (SSR), S. 1-25, Cham, Springer, ISBN 978-3-319-14054-4,
[Buchkapitel]

E

Edlund, Martin ; Mantel, Heiko ; Weber, Alexandra ; Weißmantel, Tim (2022):
Graphical User Interfaces for a Qualitative and a Quantitative Side-Channel Analysis Tool. (Verlagsversion)
Darmstadt, DOI: 10.26083/tuprints-00020262,
[Report]

Erwig, Andreas ; Faust, Sebastian ; Hostáková, Kristina ; Maitra, Monosij ; Riahi, Siavash (2021):
Two-Party Adaptor Signatures From Identification Schemes.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 09.-13.05.2021, [Konferenzveröffentlichung]

Eckey, Lisa ; Faust, Sebastian ; Schlosser, Benjamin (2020):
OptiSwap: Fast Optimistic Fair Exchange.
S. 543-557, ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10., ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384749,
[Konferenzveröffentlichung]

Erwig, Andreas ; Hesse, Julia ; Orlt, Maximilian ; Riahi, Siavash (2020):
Fuzzy Asymmetric Password-Authenticated Key Exchange.
26th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt 2020), virtual Conference, 07.-11.12., [Konferenzveröffentlichung]

Earley, Timothy (2018):
Extending the Language Coverage of Side-Channel Finder AVR.
TU Darmstadt, [Bachelorarbeit]

Ece, Olcay (2018):
Security of E-Mail-Encryption.
TU Darmstadt, [Bachelorarbeit]

Eichberg, Michael ; Kübler, Florian ; Helm, Dominik ; Reif, Michael ; Salvaneschi, Guido ; Mezini, Mira (2018):
Lattice Based Modularization of Static Analyses.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, S. 113-118,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236509,
[Konferenzveröffentlichung]

Erwig, Andreas ; Fischlin, Marc ; Hald, Martin ; Helm, Dominik ; Kiel, Robert ; Kübler, Florian ; Kümmerlin, Michael ; Laenge, Jakob ; Rohrbach, Felix (2017):
Redactable Graph Hashing, Revisited.
In: ACISP 2017,
[Konferenzveröffentlichung]

Erbenich, Vanessa (2016):
On the Efficiency of Lattice-Based Encryption.
Darmstadt, Technische Universität, [Bachelorarbeit]

Egert, Rolf ; Fischlin, Marc ; Gens, David ; Jacob, Sven ; Senker, Matthias ; Tillmans, Jörg (2015):
Privately computing set-union and set-intersection cardinality via bloom filters.
In: Information Security and Privacy (ACISP), S. 413-430. Springer International, [Artikel]

F

Fitzke, Erik ; Krebs, Robin ; Haase, Thorsten ; Mengler, Max ; Alber, Gernot ; Walther, Thomas (2022):
Time-dependent POVM reconstruction for single-photon avalanche photo diodes using adaptive regularization.
In: New Journal of Physics, 24, IOP Publishing, ISSN 1367-2630,
DOI: 10.1088/1367-2630/ac5004,
[Artikel]

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2022):
Financially Backed Covert Security.
International Conference on Practice and Theory of Public-Key Cryptography 2022, virtual Conference, 08.-11.03.2022, DOI: 10.1007/978-3-030-97131-1_4,
[Konferenzveröffentlichung]

Fomichev, Mikhail ; Hesse, Julia ; Almon, Lars ; Lippert, Timm ; Han, Jun ; Hollick, Matthias (2021):
FastZIP: faster and more secure zero-interaction pairing.
In: MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, S. 440-452,
ACM, 19th Annual International Conference on Mobile Systems, Applications, and Services, virtual Conference, 24.06.-02.07.2021, ISBN 9781450384438,
DOI: 10.1145/3458864.3467883,
[Konferenzveröffentlichung]

Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Möllering, Helen ; Nguyen, Thien Duc ; Rieger, Phillip ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Yalame, Mohammad Hossein ; Zeitouni, Shaza (2021):
SAFELearn: Secure Aggregation for private FEderated Learning.
4th Deep Learning and Security Workshop (DLS'21), virtual Conference, 27.05.2021, [Konferenzveröffentlichung]

Fischlin, Marc ; Rohrbach, Felix (2021):
Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge.
24th International Conference on Practice and Theory of Public-Key Cryptography, virtual Conference, 9.-13.05.2021, [Konferenzveröffentlichung]

Faust, Sebastian ; Hazay, Carmit ; Kretzler, David ; Schlosser, Benjamin (2021):
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2021), Zagreb, Croatia, 17.-21.10.2021, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2021):
Zero-Interaction Security-Towards Sound Experimental Validation. (Postprint)
In: GetMobile: Mobile Computing and Communications, 23 (2), Association for Computing Machinery (ACM), ISSN 2375-0529, e-ISSN 2375-0537,
DOI: 10.26083/tuprints-00018518,
[Artikel]

Fischlin, Marc ; Günther, Felix ; Muth, Philipp (2020):
Information-Theoretic Security of Cryptographic Channels.
In: Information and Communications Security, S. 295-311,
Springer Nature, 22nd International Conference on Information and Communications Security (ICICS 2020), virtual Conference, 24.-26.08.2021, ISBN 978-3-030-61078-4,
DOI: 10.1007/978-3-030-61078-4_17,
[Konferenzveröffentlichung]

Fischlin, Marc ; Harasser, Patrick ; Janson, Christian (2020):
Signatures from Sequential-OR Proofs.
EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10.-14. May 2020, [Konferenzveröffentlichung]

Felsen, Susanne ; Kiss, Ágnes ; Schneider, Thomas ; Weinert, Christian (2019):
Secure and Private Function Evaluation with Intel SGX.
CCSW 2019 - The ACM Cloud Computing Security Workshop, London, UK, November, 11th, 2019, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Hollick, Matthias (2019):
Zero-Interaction Security - Towards Sound Experimental Validation.
In: GetMobile: Mobile Computing and Communications, 23 (2), S. 16-21. ISSN 23750529,
DOI: 10.1145/3372300.3372304,
[Artikel]

Fladung, Lukas ; Nikolopoulos, Georgios M. ; Alber, Gernot ; Fischlin, Marc (2019):
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys.
In: Cryptography, 3 (4), MDPI, DOI: 10.3390/cryptography3040025,
[Artikel]

Fischlin, Marc ; Haagh, Helene (2019):
How to Sign with White-Boxed AES.
Santiago de Chile, Springer, Latincrypt 2019, Oct. 2–4, 2019, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Maass, Max ; Almon, Lars ; Molina, Alejandro ; Hollick, Matthias (2019):
Perils of Zero-Interaction Security in the Internet of Things.
In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 3 (1), ACM, DOI: 10.1145/3314397,
[Artikel]

Felsen, Susanne (2019):
Secure Two-Party Computation: ABY versus Intel SGX.
TU Darmstadt, [Masterarbeit]

Fischlin, Marc ; Günther, Felix (2019):
Modeling Memory Faults in Signature and Encryption Schemes.
In: eprint, eprint.iacr.org, [Artikel]

Fasihi Yazdi, Mohsen (2018):
Study on Security Level of "Security Stack Exchange": How Trustable are Code Snippet on this Plattform?!
TU Darmstadt, [Masterarbeit]

Fischlin, Marc ; Mazaheri, Sogol (2018):
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.
In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF),
IEEE, 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK, 9.-12.7. 2018, DOI: 10.1109/CSF.2018.00013,
[Konferenzveröffentlichung]

Frassetto, Tommaso ; Jauernig, Patrick ; Liebchen, Christopher ; Sadeghi, Ahmad-Reza (2018):
IMIX: In-Process Memory Isolation EXtension.
In: Proceedings of the 27th USENIX Security Symposium, S. 83-97,
27th USENIX Security Symposium - Technical Sessions Track 2, Baltimore, MD, USA, 15.-17.08.2018, ISBN 978-1-939133-04-5,
[Konferenzveröffentlichung]

Fischlin, Marc ; Harasser, Patrick (2018):
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent.
In: Springer International Publishing, LNCS 10892, In: Applied Cryptography and Network Security - ACNS 2018, S. 202-220,
16th International Conference, ACNS 2018, Leuven, Belgium, 2.7.-4.7. 2018, [Konferenzveröffentlichung]

Franke, Fabian (2018):
Learning the Beams.
TU Darmstadt, [Masterarbeit]

Fladung, Lukas (2017):
Semiclassical Laser Cooling of Trapped Ions in a One-Dimensional Standing Wave.
TU Darmstadt, [Bachelorarbeit]

Fereidooni, Hossein ; Classen, Jiska ; Spink, Tom ; Patras, Paul ; Miettinen, Markus ; Sadeghi, Ahmad-Reza ; Hollick, Matthias ; Conti, Mauro (2017):
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit.
In: Proceedings of the 20th International Symposium on Research in Attacks, Intrusions and Defenses (RAID),
Atlanta, Georgia, USA, [Konferenzveröffentlichung]

Fomichev, Mikhail ; Álvarez, Flor ; Steinmetzer, Daniel ; Gardner-Stephen, Paul ; Hollick, Matthias (2017):
Survey and Systematization of Secure Device Pairing.
In: IEEE Communications Surveys & Tutorials, 20 (1), S. 517-550. DOI: 10.1109/COMST.2017.2748278,
[Artikel]

Funke, Sebastian ; Wiesmaier, Alexander ; Daubert, Jörg (2017):
Constrained PET Composition for Measuring Enforced Privacy.
In: Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES), S. 1-10,
ACM, DOI: 10.1145/3098954.3098968,
[Konferenzveröffentlichung]

Fuhry, Benny ; Bahmani, Raad ; Brasser, Ferdinand ; Hahn, Florian ; Kerschbaum, Florian ; Sadeghi, Ahmad-Reza (2017):
HardIDX: Practical and Secure Index with SGX.
In: Conference on Data and Applications Security and Privacy (DBSec),
[Konferenzveröffentlichung]

Funke, Sebastian
Daubert, Jörg (Hrsg.) (2017):
IoT Architektur zum Schutz von Privatsphäre Ende-zu-Ende.
In: Proceedings of the DACH Security 2017, S. 1-10,
München, DACH Security 2017, [Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix (2017):
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017),
IEEE, Paris, France, [Konferenzveröffentlichung]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Feldmann, Anja ; Heyder, Philipp ; Kreutzer, Michael ; Schmid, Stefan ; Seifert, Jean-Pierre ; Shulman, Haya ; Thimmaraju, Kashyap ; Waidner, Michael ; Sieberg, Jens (2016):
NetCo: Reliable Routing with Unreliable Routers.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) Workshops,
Toulouse, France, [Konferenzveröffentlichung]

Fischlin, Marc ; Günther, Felix ; Schmidt, Benedikt ; Warinschi, Bogdan (2016):
Key Confirmation in Key Exchange: A Formal Treatment and Implications for TLS 1.3.
In: 37th IEEE Symposium on Security and Privacy (S&P 2016),
IEEE, San Jose, California, USA, [Konferenzveröffentlichung]

Frydrych, Holger ; Marthaler, Michael ; Alber, Gernot (2015):
Pulse-controlled quantum gate sequences on a strongly coupled qubit chain.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062322,
[Artikel]

Fischlin, Marc ; Günther, Felix ; Marson, Giorgia Azzurra ; Paterson, Kenneth G. (2015):
Data Is a Stream: Security of Stream-Based Channels.
In: Advances in Cryptology - CRYPTO 2015, S. 545-564,
Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Frydrych, H. ; Hoskovec, A. ; Jex, I. ; Alber, G. (2015):
Selective dynamical decoupling for quantum state transfer.
In: Journal of Physics B: Atomic, Molecular and Optical Physics, 48 (2), IOP Publishing Ltd., ISSN 0953-4075,
DOI: 10.1088/0953-4075/48/2/025501,
[Artikel]

Fehr, Victoria ; Fischlin, Marc (2015):
Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version).
In: IACR Cryptology ePrint Archive, 2015, S. 765. [Artikel]

Fischlin, Marc ; Günther, Felix (2014):
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol.
In: CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, S. 12,
ACM, Scottsdale, Arizona, USA, [Konferenzveröffentlichung]

G

Gajewski, Marvin ; Haase, Thorsten ; Alber, Gernot (2021):
Dissipation-enabled resonant adiabatic quantum state transfer: Entanglement generation and quantum cloning.
In: Physical Review A, 104 (5), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.104.052608,
[Artikel]

Gonzalez, Ruben ; Hülsing, Andreas ; Kannwischer, Matthias ; Krämer, Juliane ; Lange, Tanja ; Stöttinger, Marc ; Waitz, Elisabeth ; Wiggers, Thom ; Yang, Bo-Yin (2021):
Verifying Post-Quantum Signatures in 8kB of RAM.
In: LNCS, 12841, In: Post-Quantum Cryptography, S. 215-233,
Springer, 12th International Conference on Post-Quantum Cryptography, virtual Conference, 20.-22.07.2021, ISBN 978-3-030-81292-8,
DOI: 10.1007/978-3-030-81293-5_12,
[Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Krämer, Juliane ; Struck, Patrick (2021):
Quantum Indistinguishability for Public Key Encryption.
In: Lecture Notes in Computer Science, In: Post-Quantum Cryptography : 12th International Workshop, PQCrypto 2021 Proceedings,
k. A., Springer, PQCrypto 2021 The Twelfth International Conference on Post-Quantum Cryptography, virtual Conference, July 20-22, 2021, ISBN 978-3-030-81292-8,
[Konferenzveröffentlichung]

Glanz, Leonid ; Müller, Patrick ; Baumgärtner, Lars ; Reif, Michael ; Anthonysamy, Pauline ; Mezini, Mira (2020):
Hidden in Plain Sight:Obfuscated Strings Threatening Your Privacy.
In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, S. 694-707,
ACM, 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS '20), virtual Conference, 05.-09.10, ISBN 978-1-4503-6750-9,
DOI: 10.1145/3320269.3384745,
[Konferenzveröffentlichung]

Günther, Daniel ; Kiss, Ágnes ; Scheidel, Lukas ; Schneider, Thomas (2019):
Poster: Framework for Semi-private Function Evaluation with Application to Secure Insurance Rate Calculation.
ACM, ACM CCS 2019, London, November 11-15, 2019, DOI: 10.1145/3319535.3363251,
[Konferenzveröffentlichung]

Geihs, Matthias ; Nikiforov, Oleg ; Demirel, Denise ; Sauer, Alexander ; Butin, Denis ; Günther, Felix ; Alber, Gernot ; Walther, Thomas ; Buchmann, Johannes (2019):
The Status of Quantum-Based Long-Term Secure Communication over the Internet.
In: IEEE Transactions on Sustainable Computing, IEEE, ISSN 2377-3782,
DOI: htps://doi.org/10.1109/TSUSC.2019.2913948,
[Artikel]

Geihs, Matthias ; Schabhüser, Lucas ; Buchmann, Johannes (2019):
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
In: LNCS, Springer, International Conference on Codes, Cryptology, and Information Security (C2SI) 2019, Rabat, Morocco, April 22 - 24, 2019, [Konferenzveröffentlichung]

Geihs, Matthias ; Buchmann, Johannes (2018):
ELSA: Efficient Long-Term Secure Storage of Large Datasets.
In: Information Security and Cryptology- ICISC 2018, S. 269-286,
Springer Nature, 21st Annual International Conference on Information Security and Cryptology, Seoul, Korean, 28.-30.11.2018, ISBN 978-3-030-12145-7,
DOI: 10.1007/978-3-030-12146-4_17,
[Konferenzveröffentlichung]

Gil Dantas, Yuri ; Hamann, Tobias ; Mantel, Heiko (2018):
A Comparative Study across Static and Dynamic Side-Channel Countermeasures.
In: The 11th International Symposium on Foundations & Practice of Security (FPS), Springer, [Artikel]

Guski, Florian (2018):
Simulation of the Quantum Hybrid Attack in Q#.
TU Darmstadt, [Bachelorarbeit]

Günther, Daniel (2018):
Private Function Evaluation with Universal Circuits.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

Göhring, Matthias ; Shulman, Haya ; Waidner, Michael (2018):
Path MTU Discovery Considered Harmful.
ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, 2.-5.7.2018, [Konferenzveröffentlichung]

Geihs, Matthias ; Karvelas, Nikolaos ; Katzenbeisser, Stefan ; Buchmann, Johannes (2018):
PROPYLA: Privacy Preserving Long-Term Secure Storage.
In: ACM, In: SCC Workshop @ AsiaCCS 2018,
Songdo, Incheon, Korea, The Sixth International Workshop on Security in Cloud Computing (SCC), [Konferenzveröffentlichung]

Gajewski, Marvin (2018):
Asymptotische Eigenschaften offener quantenoptischer Systeme.
TU Darmstadt, [Bachelorarbeit]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
CodeMatch: Obfuscation Won't Conceal Your Repackaged App.
In: Software Engineering und Software Management 2018, S. 117-118, Gesellschaft für Informatik, [Buchkapitel]

Gens, David ; Schmitt, Simon ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2018):
K-Miner: Uncovering Memory Corruption in Linux.
In: 25th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Geihs, Matthias (2018):
Long-Term Protection of Integrity and Confidentiality – Security Foundations and System Constructions.
Darmstadt, Technische Universität,
[Dissertation]

Gil Dantas, Yuri ; Gay, Richard ; Hamann, Tobias ; Mantel, Heiko ; Schickel, Johannes (2018):
An Evaluation of Bucketing in Systems with Non-Deterministic Timing Behavior.
33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection (IFIP SEC), [Konferenzveröffentlichung]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
S. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Konferenzveröffentlichung]

Garcia Cordero, Carlos ; Vasilomanolakis, Emmanouil ; Mühlhäuser, Max (2017):
ID2T - The Intrusion Detection Dataset Generation Toolkit.
Black Hat Europe 2017, London, United Kingdom, 04.-07.12.2017, [Konferenzveröffentlichung]

Günther, Daniel ; Kiss, Ágnes ; Schneider, Thomas (2017):
More Efficient Universal Circuit Constructions.
In: 23. Advances in Cryptology -- ASIACRYPT 2017, S. 443-470,
Springer, DOI: 10.1007/978-3-319-70697-9_16,
[Konferenzveröffentlichung]

Glanz, Leonid ; Amann, Sven ; Eichberg, Michael ; Reif, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2017):
CodeMatch: Obfuscation Won’t Conceal Your Repackaged App.
In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, S. 638-648,
Paderborn, Germany, Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ISBN 978-1-4503-5105-8,
DOI: 10.1145/3106237.3106305,
[Konferenzveröffentlichung]

Günther, Felix ; Mazaheri, Sogol (2017):
A Formal Treatment of Multi-key Channels.
In: CRYPTO 2017 - 37th International Cryptology Conference,
Springer, Santa Barbara, CA, USA, [Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Karvelas, Nikolaos ; Katzenbeisser, S. (2017):
ORAMs in a Quantum World.
In: PQCrypto 2017 - 8th International Workshop Post-Quantum Cryptography,
Springer, Utrecht, The Netherlands, [Konferenzveröffentlichung]

Göpfert, Florian ; Vredendaal, Christine van ; Wunderer, Thomas (2017):
A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE.
In: PQCrypto 2017 - Eighth International Conference on Post-Quantum Cryptography,
[Konferenzveröffentlichung]

Günther, Felix ; Hale, Britta ; Jager, Tibor ; Lauer, Sebastian (2017):
0-RTT Key Exchange with Full Forward Secrecy.
In: Eurocrypt 2017 - 36th International Conference on the Theory and Applications of Cryptographic Techniques,
Springer, [Konferenzveröffentlichung]

Günther, Daniel (2017):
Valiant's Universal Circuit - Towards a Modular Construction and Implementation.
Darmstadt, Technische Universität, [Bachelorarbeit]

Günther, Felix ; Poettering, Bertram (2017):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: International Journal of Information Security, 16 (3), S. 281-297. Springer, ISSN 1615-5270,
[Artikel]

Gay, Richard ; Hu, Jinwei ; Mantel, Heiko ; Schickel, Johannes (2017):
Towards Accelerated Usage Control based on Access Correlations.
S. 245-261, Proceedings of the 22nd Nordic Conference on Secure IT Systems (NordSec), [Konferenzveröffentlichung]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2016):
A security analysis of techniques for long-term integrity protection.
In: 2016 Privacy, Security and Trust Conference,
Auckland, New Zealand, [Konferenzveröffentlichung]

Gagliardoni, Tommaso ; Hülsing, Andreas ; Schaffner, Christian (2016):
Semantic Security and Indistinguishability in the Quantum World.
In: LNCS, In: Advances in Cryptology – CRYPTO 2016, S. 60-89,
Springer, DOI: 10.1007/978-3-662-53015-3_3,
[Konferenzveröffentlichung]

Göpfert, Florian (2016):
Securely Instantiating Cryptographic Schemes Based on the Learning with Errors Assumption.
Darmstadt, Technische Universität,
[Dissertation]

Günther, Felix ; Poettering, Bertram (2015):
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes.
In: 20th Australasian Conference on Information Security and Privacy (ACISP 2015), S. 195-212,
Springer, Queensland University of Technology (QUT), Brisbane, Australia, [Konferenzveröffentlichung]

Ganji, Fatemeh ; Krämer, Juliane ; Seifert, Jean-Pierre ; Tajik, Shahin (2015):
Lattice Basis Reduction Attack against Physically Unclonable Functions.
In: 22nd ACM Conference on Computer and Communications Security (CCS 2015),
Denver, Colorado, US, [Konferenzveröffentlichung]

Geihs, Matthias ; Demirel, Denise ; Buchmann, Johannes (2015):
On the Security of Long-lived Archiving Systems based on the Evidence Record Syntax.
In: Codes, Cryptology and Information Security,
Springer, Mohammed V University, Rabat, Morocco, [Konferenzveröffentlichung]

Günther, Felix ; Manulis, Mark ; Peter, Andreas
Gritzalis, Dimitris ; Kiayias, Aggelos ; Askoxylakis, Ioannis (Hrsg.) (2014):
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
In: LNCS, In: Cryptology and Network Security (13th International Conference, CANS 2014), S. 321-336,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-12280-9,
[Konferenzveröffentlichung]

H

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop.
30th USENIX Security Symposium, virtual Conference, 11.-13.08.2021, [Konferenzveröffentlichung]

Heinrich, Alexander ; Hollick, Matthias ; Schneider, Thomas ; Stute, Milan ; Weinert, Christian (2021):
AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop.
In: WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, S. 371-373,
ACM, 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28.06.–01.07.2021, ISBN 978-1-4503-8349-3,
DOI: 10.1145/3448300.3468252,
[Konferenzveröffentlichung]

Heldmann, Tim ; Schneider, Thomas ; Tkachenko, Oleksandr ; Weinert, Christian ; Yalame, Mohammad Hossein (2021):
LLVM-based Circuit Compilation for Practical Secure Computation.
In: LNCS, 12727, In: Applied Cryptography and Network Security: Proceedings Part II, S. 99-121,
Springer, 19th International Conference on Applied Cryptography and Network Security (ACNS'21), virtual Conference, 21.-24.06.2021, ISBN 978-3-030-78374-7,
DOI: 10.1007/978-3-030-78375-4_5,
[Konferenzveröffentlichung]

Haase, Thorsten ; Alber, Gernot ; Stojanovic, Vladimir M. (2021):
Conversion from W to Greenberger-Horne-Zeilinger states in the Rydberg-blockade regime of neutral-atom systems.
In: Physical Review A, 103 (3), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.032427,
[Artikel]

Hagen, Christoph ; Weinert, Christian ; Sendner, Christoph ; Dmitrienko, Alexandra ; Schneider, Thomas (2021):
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Internet Society, 28. Annual Network and Distributed System Security Symposium (NDSS'21), San Diego, California, USA, 21.-24.02. 2021, [Konferenzveröffentlichung]

Hedge, Aditya ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
SoK: Efficient Privacy-preserving Clustering.
21st Privacy Enhancing Technologies Symposium (PETS 2021), virtual Conference, 12.-16.07.2021, [Konferenzveröffentlichung]

Helm, Dominik ; Kübler, Florian ; Reif, Michael ; Eichberg, Michael (2020):
Modular Collaborative Program Analysis in OPAL.
S. 184-196, ACM, 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2020), virtual Conference, 06.-16.11., DOI: 10.1145/3368089.3409765,
[Konferenzveröffentlichung]

Holz, Marco ; Kiss, Ágnes ; Rathee, Deevashwer ; Schneider, Thomas (2020):
Linear-Complexity Private Function Evaluation is Practical.
25. European Symposium on Research in Computer Security (ESORICS'20), virtual Conference, 14.-18.09.2020, [Konferenzveröffentlichung]

Heinze, Dennis ; Classen, Jiska ; Rohrbach, Felix (2020):
MagicPairing: Apple’s Take on Securing Bluetooth Peripherals.
13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, VIRTUAL, July 08.-10., 2020, DOI: 10.1145/3395351.3399343,
[Konferenzveröffentlichung]

Helm, Dominik ; Kübler, Florian ; Kölzer, Jan Thomas ; Haller, Philipp ; Eichberg, Michael ; Salvaneschi, Guido ; Mezini, Mira (2020):
A Programming Model for Semi-implicit Parallelization of Static Analyses.
S. 428-439, ACM, ISSTA '20: 29th SIGSOFT International Symposium on Software Testing and Analysis, virtual Conference, 18.-22.07., ISBN 978-1-4503-8008-9,
DOI: 10.1145/3395363.3397367,
[Konferenzveröffentlichung]

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Konferenzveröffentlichung]

Helm, Dominik ; Kübler, Florian ; Eichberg, Michael ; Reif, Michael ; Mezini, Mira (2018):
A unified lattice model and framework for purity analyses.
In: Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, S. 340-350,
ACM, ASE 2018, Corum, Montpellier, France, 3.-7.9.2018, DOI: 10.1145/3238147.3238226,
[Konferenzveröffentlichung]

Humbert, Marcel Nikolas (2018):
Einführung in die Störungstheorie der Allgemeinen Relativitätstheorie.
TU Darmstadt, [Bachelorarbeit]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Konferenzveröffentlichung]

Helm, Dominik (2018):
A Framework for Modular Purity Analyses.
TU Darmstadt, [Masterarbeit]

Hald, Martin (2018):
Cryptographic Analysis of the Bitmessage Protocol.
TU Darmstadt, [Masterarbeit]

Hanreich, Matthias (2018):
Security Analysis and Firmware Modification of Fitbit Fitness Trackers.
TU Darmstadt, [Masterarbeit]

Hofmann, Daniel (2018):
Charakterisierung von verschränkten Photonenpaaren.
TU Darmstadt, [Masterarbeit]

Holzer, Patrick (2017):
Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p^α q^β.
TU Darmstadt, [Masterarbeit]

Hauck, Markus ; Savvides, Savvas ; Eugster, Patrick ; Mezini, Mira ; Salvaneschi, Guido (2016):
SecureScala: Scala embedding of secure computations.
In: Proceedings of the 2016 7th ACM SIGPLAN Symposium on Scala,
ACM, [Konferenzveröffentlichung]

Holz, Marco (2016):
Effective Protection of Sensitive Metadata in Online Communication Networks.
TU Darmstadt, [Bachelorarbeit]

Habib, Sheikh Mahbub ; Volk, Florian ; Hauke, Sascha ; Mühlhäuser, Max
Ko, Ryan ; Choo, Kim-Kwang Raymond (Hrsg.) (2015):
Computational trust methods for security quantification in the cloud ecosystem.
In: The cloud security ecosystem : technical, legal, business and management issues, S. 463-493, Amsterdam Heidelberg, Elsevier Syngress, ISBN 978-0-12-801595-7,
DOI: 10.1016/B978-0-12-801595-7.00021-5,
[Buchkapitel]

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19), S. 80-84. [Artikel]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC, In: 30th Annual Computer Security Applications Conference, S. 356-365,
New Orleans, LA, USA, [Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC),
ACSAC, IEEE, New Orleans, Louisiana, U.S., [Konferenzveröffentlichung]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014,
Berlin, Germany, [Konferenzveröffentlichung]

I

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
HEALED: HEaling & Attestation for Low-end Embedded Devices.
23rd International Conference Financial Cryptography and Data Security (FC 2019), 2019, [Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2018):
US-AID: Unattended Scalable Attestation of IoT Devices.
37th IEEE International Symposium on Reliable Distributed Systems (SRDS 2018), 2018, [Konferenzveröffentlichung]

Islam, Md. Monirul (2017):
Automating Trustworthiness Assessment of Mobile Applications.
Darmstadt, Technische Universität, [Masterarbeit]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Zeitouni, Shaza (2017):
SeED: Secure Non-Interactive Attestation for Embedded Devices.
In: 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017),
Boston, USA, [Konferenzveröffentlichung]

Ibrahim, Ahmad ; Sadeghi, Ahmad-Reza ; Tsudik, Gene ; Zeitouni, Shaza (2016):
DARPA: Device Attestation Resilient to Physical Attacks.
In: ACM WiSEC 2016,
[Konferenzveröffentlichung]

J

Jauernig, Patrick ; Sadeghi, Ahmad-Reza ; Stapf, Emmanuel (2020):
Trusted Execution Environments: Properties, Applications, and Challenges.
In: IEEE Security & Privacy, 18 (2), S. 56-60. IEEE, e-ISSN 1558-4046,
DOI: 10.1109/MSEC.2019.2947124,
[Artikel]

Javadi, Mohammad ; Yalame, Mohammad Hossein ; Mahdiani, Hamid Reza (2020):
Small Constant Mean-Error Imprecise Adder/Multiplier for Efficient VLSI Implementation of MAC-based Applications.
In: Transactions on Computers, 2020, IEEE, ISSN 0018-9340, e-ISSN 1557-9956,
DOI: 10.1109/TC.2020.2972549,
[Artikel]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
The Impact of DNS Insecurity on Time.
DSN2020 - 50th International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07, [Konferenzveröffentlichung]

Jeitner, Philipp ; Shulman, Haya ; Waidner, Michael (2020):
Secure Consensus Generation with Distributed DoH.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
Faster Privacy-Preserving Location Proximity Schemes for Circles and Polygons.
In: IET Information Security, DOI: 10.1049/iet-ifs.2019.0125,
[Artikel]

Järvinen, Kimmo ; Leppäkoski, Helena ; Lohan, Elena Simona ; Richter, Philipp ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2019):
PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing.
In: 4. IEEE European Symposium on Security and Privacy (EuroS&P'19),
[Konferenzveröffentlichung]

Järvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, Zheng (2018):
Faster Privacy-Preserving Location Proximity Schemes.
In: 17. International Conference on Cryptology And Network Security (CANS'18), S. 3-22,
Springer, DOI: 10.1007/978-3-030-00434-7_1,
[Konferenzveröffentlichung]

Jauernig, Patrick Thomas (2017):
SMOV: Lighweight In-Process Memory Isolation.
Darmstadt, Technische Universität, [Bachelorarbeit]

Jawed, Kashif (2016):
An Investigation and Implementation for the Effect of Row Hammering in Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM).
Darmstadt, Technische Universität, [Masterarbeit]

K

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Balancing Quality and Efficiency in Private Clustering with Affinity Propagation.
18th International Conference on Security and Cryptography (SECRYPT'21), virtual Conference, 06.-08.07.2021, [Konferenzveröffentlichung]

Keller, Hannah ; Möllering, Helen ; Schneider, Thomas ; Yalame, Mohammad Hossein (2021):
Privacy - Preserving Clustering.
In: crypto day matters : Beiträge vom 32. Kryptotag,
Gesellschaft für Informatik e.V. / FG KRYPTO, 32. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik, virtual Conference, 15.01.2021, DOI: 10.18420/cdm-2021-32-42,
[Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security.
11th International Conference on Post-Quantum Cryptography (PQCrypto 2020), virtual Conference, 21.-23.09.2020, [Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.
11th International Workshop on Constructive Side-Channel Analysis and Secure Design(COSADE 2020), Lugano, Switzerland, 05.-07.10.2020, [Konferenzveröffentlichung]

Kenjar, Zijo ; Frassetto, Tommaso ; Gens, David ; Franz, Michael ; Sadeghi, Ahmad-Reza (2020):
V0LTpwn: Attacking x86 Processor Integrity from Software.
29th USENIX Security Symposium, Boston, USA, August 12–14, 2020, [Konferenzveröffentlichung]

Krämer, Juliane ; Struck, Patrick (2020):
Security of Public Key Encryption against Resetting Attacks.
21st International Conference on Cryptology in India (Indocrypt 2020), virtual Conference, 13.-16.12., [Konferenzveröffentlichung]

Krüger, Stefan ; Ali, Karim ; Bodden, Eric (2020):
CogniCrypt_GEN - Generating Code for the Secure Usage of Crypto APIs.
International Symposium on Code Generation and Optimization, San Diego, CA, USA, February 22.-26., 2020, [Konferenzveröffentlichung]

Krämer, Juliane ; Marzougui, Soundes (2019):
Post-Quantum Cryptography in Embedded Systems.
In: ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security,
ACM, 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 26.-29.08.2019, ISBN 978-1-4503-7164-3,
DOI: 10.1145/3339252.3341475,
[Konferenzveröffentlichung]

Köhler, Mirco ; Salvaneschi, Guido (2019):
Automated Refactoring to Reactive Programming.
ASE'19 - The 34th International Conference on Automated Software Engineering, San Diego, Ca, USA, November 10.-15.,2019, DOI: 10.1109/ASE.2019.00082,
[Konferenzveröffentlichung]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2019):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: IEEE Transactions on Software Engineering, 2019, Institute of Electrical and Electronics Engineers, ISSN 1939-3520,
DOI: 10.1109/TSE.2019.2948910,
[Artikel]

Krämer, Juliane (2019):
Post-Quantum Cryptography and its Application to the IoT.
In: Informatik Spektrum, 42 (5), S. 343-344. Springer Heidelberg, ISSN 0170-6012,
DOI: 10.1007/s00287-019-01200-2,
[Artikel]

Kales, Daniel ; Rechberger, Christian ; Schneider, Thomas ; Senker, Matthias ; Weinert, Christian (2019):
Mobile Private Contact Discovery at Scale.
USENIX, 28. USENIX Security Symposium (USENIX Security'19), [Konferenzveröffentlichung]

Kiss, Ágnes ; Naderpour, Masoud ; Liu, Jian ; Asokan, N. ; Schneider, Thomas (2019):
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2, De Gruyter Open, [Artikel]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2019):
Web Application for Privacy-Preserving Scheduling using Secure Computation.
In: 16. International Conference on Security and Cryptography (SECRYPT'19),
SciTePress, [Konferenzveröffentlichung]

Krämer, Juliane ; Loiero, Mirjam (2019):
Fault Attacks on UOV and Rainbow.
10th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2019), Darmstadt, Germany, 03.-05.04., [Konferenzveröffentlichung]

Krüger, Stefan ; Hermann, Ben (2019):
Can an online service predict gender?: on the state-of-the-art in gender identification from texts.
GE@ICSE 2019 : 2nd Workshop on Gender Equality in Software Engineering, Montreal, Canada, May 27, 2019, DOI: 10.1109/GE.2019.00012,
[Konferenzveröffentlichung]

Keshavaprakash, Manoj (2018):
A Benchmark for New and Existing Model Comparison.
TU Darmstadt, [Masterarbeit]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: crypto day matters: Beiträge vom 29. Kryptotag,
Gesellschaft für Informatik e.V., Kryptotag29: 29. Krypto-Tag @ Bosch, Renningen, Germany, 06.-07.09.2018, DOI: 10.18420/cdm-2018-29-24,
[Konferenzveröffentlichung]

Kumar, Manish ; Anagnostopoulos, Nikolaos Athanasios ; Fan, Yufan ; Katzenbeisser, Stefan (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and Their Security Applications.
28th Crypto-Day, Kirchheim bei München, Germany, 07.- 08.06.2018, DOI: 10.18420/cdm-2018-28-22,
[Konferenzveröffentlichung]

Kiss, Ágnes ; Schick, Oliver ; Schneider, Thomas (2018):
Web Application for Privacy-Preserving Scheduling (Poster).
27. USENIX Security Symposium: USENIX Security'18 : Poster Session, Baltimore, MD, USA, August 15–17, 2018, [Konferenzveröffentlichung]

Kumar, Manish (2018):
Advanced Reconfigurable Physical Unclonable Functions(AR-PUFs) and their security applications.
TU Darmstadt, [Masterarbeit]

Kannwischer, Matthias ; Genêt, Aymeric ; Butin, Denis ; Krämer, Juliane ; Buchmann, Johannes (2018):
Differential Power Analysis of XMSS and SPHINCS.
In: LNCS, 10815, S. 168-188, Springer, 9th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2018), Singapore, 23.-24.04., ISBN 978-3-319-89640-3,
DOI: 10.1007/978-3-319-89641-0_10,
[Konferenzveröffentlichung]

Krüger, Stefan ; Späth, Johannes ; Ali, Karim ; Bodden, Eric ; Mezini, Mira (2018):
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs.
In: 32nd European Conference on Object-Oriented Programming (ECOOP 2018), S. 10:1-10:27,
Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Amsterdam, The Netherlands, 15.-21.07.2018, DOI: 10.4230/LIPIcs.ECOOP.2018.10,
[Konferenzveröffentlichung]

Kiel, Robert (2018):
Zero-Knowledge Contingent Payments.
TU Darmstadt, [Masterarbeit]

Karvelas, Nikolaos ; Treiber, Amos ; Katzenbeisser, Stefan (2018):
Examining Leakage of Access Counts in ORAM Constructions.
In: WPES'18: Proceedings of the 2018 Workshop on Privacy in the Electronic Society, S. 66-70,
ACM, CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, Canada, 15.10.2018, ISBN 978-1-4503-5989-4,
DOI: 10.1145/3267323.3268963,
[Konferenzveröffentlichung]

Kübler, Florian (2017):
Foundations of a refinement-based framework for escape analyses.
Darmstadt, Technische Universität, [Masterarbeit]

Krüger, Stefan ; Nadi, Sarah ; Reif, Michael ; Ali, Karim ; Mezini, Mira ; Bodden, Eric ; Göpfert, Florian ; Günther, Felix ; Weinert, Christian ; Demmler, Daniel ; Kamath, Ram (2017):
CogniCrypt: Supporting Developers in using Cryptography.
In: Automated Software Engineering (ASE'17),
Piscataway, NJ, USA, ACM, Piscataway, NJ, USA, DOI: 10.1109/ASE.2017.8115707,
[Konferenzveröffentlichung]

Kornhuber, Tim (2017):
Implementation of a physical layer for visible light communication using the OpenVLC platform.
Darmstadt, Technische Universität, [Bachelorarbeit]

Kümpel, Michael (2017):
Implementierung des unteren MAC-Layers für die OpenVLC-Hardware.
Darmstadt, Technische Universität, [Bachelorarbeit]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan (2017):
Using Oblivious RAM in Genomic Studies.
In: DPM 2017 - Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops,
Springer, Oslo, Norway, [Konferenzveröffentlichung]

Karvelas, Nikolaos ; Senftleben, Marius ; Katzenbeisser, Stefan (2017):
Microblogging in a Privacy-Preserving way.
In: ARES 2017 - 12th International Conference on Availability, Reliability and Security,
ACM, Reggio Calabria, Italy, [Konferenzveröffentlichung]

Kiss, Ágnes ; Liu, Jian ; Schneider, Thomas ; Asokan, N. ; Pinkas, Benny (2017):
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (4), S. 177-197. De Gruyter Open, DOI: 10.1515/popets-2017-0044,
[Artikel]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
SCAPI: a scalable attestation protocol to detect software and physical attacks.
In: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, S. 75-86,
ACM, [Konferenzveröffentlichung]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Counting in the Dark: Caches Discovery and Enumeration in the Internet.
In: IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Denver, CO, USA, [Konferenzveröffentlichung]

Klein, Amit ; Shulman, Haya ; Waidner, Michael (2017):
Internet-Wide Study of DNS Cache Injections.
In: IEEE International Conference on Computer Communications (INFOCOM),
Atlanta, GA, USA, [Konferenzveröffentlichung]

Kohnhäuser, Florian ; Büscher, Niklas ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan (2017):
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks.
In: arXiv, [Artikel]

Kohnhäuser, Florian ; Katzenbeisser, Stefan (2016):
Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices.
In: 21st European Symposium on Research in Computer Security (ESORICS 2016), S. 320-338,
Springer, Heraklion, Greece, ISBN 978-3-319-45741-3,
DOI: 10.1007/978-3-319-45741-3_17,
[Konferenzveröffentlichung]

Klir, Thomas (2016):
Design and Implementation of an Archiving System Providing Long-Term Integrity and Long-Term Confidentiality.
Darmstadt, Technische Universität, [Bachelorarbeit]

Karuppayah, Shankar ; Vasilomanolakis, Emmanouil ; Haas, Steffen ; Fischer, Mathias ; Mühlhäuser, Max (2016):
BoobyTrap: On Autonomously Detecting and Characterizing Crawlers in P2P Botnets.
In: 2016 IEEE International Conference on Communications,
IEEE, IEEE International Conference on Communications (ICC 2016), Kuala Lumpur, Malaysia, 22.-27.05.2016, ISBN 978-1-4799-6664-6,
DOI: 10.1109/ICC.2016.7510885,
[Konferenzveröffentlichung]

Kiss, Ágnes ; Schneider, Thomas (2016):
Valiant's Universal Circuit is Practical.
In: 35. Advances in Cryptology -- EUROCRYPT 2016, S. 699-728,
Springer, DOI: 10.1007/978-3-662-49890-3_27,
[Konferenzveröffentlichung]

Krämer, Juliane ; Kiss, Ágnes ; Stüber, Anke (2015):
On the Optimality of Differential Fault Analyses on CLEFIA.
In: 6. International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS'15), S. 181-196,
Springer, DOI: 10.1007/978-3-319-32859-1_15,
[Konferenzveröffentlichung]

Koeberl, Patrick ; Phegade, Vinay ; Rajan, Anand ; Schneider, Thomas ; Schulz, Steffen ; Zhdanova, Maria (2015):
Time to Rethink: Trust Brokerage using Trusted Execution Environments.
In: 8. International Conference on Trust and Trustworthy Computing (TRUST'15), S. 181-190,
Springer, DOI: 10.1007/978-3-319-22846-4_11,
[Konferenzveröffentlichung]

Kohnhäuser, Florian ; Schaller, André ; Katzenbeisser, Stefan (2015):
PUF-based Software Protection for Low-end Embedded Devices.
In: 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), S. 3-21,
Springer, Heraklion, Crete, Greece, ISBN 978-3-319-22846-4,
DOI: 10.1007/978-3-319-22846-4_1,
[Konferenzveröffentlichung]

Karvelas, Nikolaos ; Peter, Andreas ; Katzenbeisser, Stefan ; Tews, Erik ; Hamacher, Kay (2014):
Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM.
In: ACM, In: Proceedings of the 13th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 2, 2014, S. 25-35,
Scottsdale, AZ, USA, DOI: 10.1145/2665943.2665962,
[Konferenzveröffentlichung]

Kohnhäuser, Florian (2014):
PUF-based Software Integrity Protection.
Darmstadt, Technische Universität, [Masterarbeit]

Kong, Joonho ; Koushanfar, Farinaz ; Pendyala, Praveen ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian (2014):
PUFatt: Embedded Platform Attestation Based on Novel Processor-Based PUFs.
In: Design Automation Conference (DAC) 2014, S. 1-6,
ACM Press, [Konferenzveröffentlichung]

L

Lauinger, Johannes ; Baumgärtner, Lars ; Wickert, Anna-Katharina ; Mezini, Mira (2020):
Uncovering the Hidden Dangers: Finding Unsafe Go Code in the Wild.
In: Proceedings : 2020 IEEE 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, S. 410-417,
IEEE, TrustCom 2020, virtual Conference, 29.12.2020-01.01.2021, ISBN 978-0-7381-4380-4,
[Konferenzveröffentlichung]

Lohr, Matthias ; Schlosser, Benjamin ; Jürjens, Jan ; Staab, Matthias (2020):
Cost Fairness for Blockchain-Based Two-Party Exchang Protocols.
3rd IEEE International Conference on Blockchain, virtual Conference, 02.-06.11.2020, [Konferenzveröffentlichung]

Liu, Mo-meng ; Krämer, Juliane ; Hu, Yu-pu ; Buchmann, Johannes (2018):
Quantum security analysis of a lattice-based oblivious transfer protocol.
In: LNCS, In: Frontiers of Information Technology & Electronic Engineering, 18 (9), S. 1348-1369. Springer, ISSN 2095-9184 (Print) 2095-9230 (Online),
[Artikel]

Lemos, Marcilio O. O. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2018):
On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks.
In: Journal of Logical and Algebraic Methods in Programming, 94, S. 45-67. Elsevier, ISSN 2352-2216,
[Artikel]

Li, Ximeng ; Mantel, Heiko ; Schickel, Johannes ; Tasch, Markus ; Weber, Alexandra ; Toteva, Iva (2017):
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer.
[Report]

Langfeld, Benedikt (2017):
Vorbereitende Arbeiten zum Feldtest eines Systems zum Quantenschlüsselaustausch.
Darmstadt, Technische Universität, [Bachelorarbeit]

Lettner, Julian ; Kollenda, Benjamin ; Homescu, Andrei ; Larsen, Per ; Schuster, Felix ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten ; Franz, Michael (2016):
Subversive-C: Abusing and Protecting Dynamic Message Dispatch.
In: USENIX Annual Technical Conference (ATC),
[Konferenzveröffentlichung]

Larsen, Per ; Brunthaler, Stefan ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Franz, Michael (2015):
Automated Software Diversity.
In: Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool, DOI: 10.2200/S00686ED1V01Y201512SPT014,
[Buch]

Lerch, Johannes ; Späth, Johannes ; Bodden, Eric ; Mezini, Mira (2015):
Access-Path Abstraction: Scaling Field-Sensitive Data-Flow Analysis with Unbounded Access Paths.
In: Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), S. 619-629,
Washington, DC, USA, IEEE Computer Society, Automated Software Engineering (ASE), 2015 30th IEEE/ACM International Conference on, Lincoln, Nebraska, USA, 9.-13. November 2015, [Konferenzveröffentlichung]

Lateef, Muhammad Raees (2015):
Design, Implementation and Evaluation of a Lightweight Attestation Scheme for Embedded Systems.
Darmstadt, Technische Universität, [Masterarbeit]

M

Muth, Philipp ; Geihs, Matthias ; Arul, Tolga ; Buchmann, Johannes ; Katzenbeisser, Stefan (2021):
ELSA: efficient long-term secure storage of large datasets (full version). (Verlagsversion)
In: EURASIP Journal on Information Security, 2020 (9), S. 1-20. Springer, ISSN 2510-523X,
DOI: 10.26083/tuprints-00017511,
[Artikel]

Mantel, Heiko ; Scheidel, Lukas ; Schneider, Thomas ; Weber, Alexandra ; Weinert, Christian ; Weißmantel, Tim (2020):
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation.
19. International Conference on Cryptology And Network Security (CANS'20), virtual Conference, 14.-16.12., [Konferenzveröffentlichung]

Mitev, Richard ; Pazii, Anna ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza (2020):
LeakyPick: IoT Audio Spy Detector.
In: ICPS Proceedings, In: ACSAC '20: Annual Computer Security Applications Conference, S. 694-705,
ACM, 36th Annual Computer Security Applications Conference, virtual Conference, 07.-11.12.2020, ISBN 978-1-4503-8858-0,
DOI: 10.1145/3427228.3427277,
[Konferenzveröffentlichung]

Mantz, Dennis ; Classen, Jiska ; Schulz, Matthias ; Hollick, Matthias (2019):
InternalBlue - Bluetooth Binary Patching and Experimentation Framework.
The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys ’19), Seoul, South Korea, June 17.-21., 2019, DOI: 10.1145/3307334.3326089,
[Konferenzveröffentlichung]

Mantel, Heiko ; Probst, Christian (2019):
On the Meaning and Purpose of Attack Trees.
The 32nd IEEE Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA, Jun 25, 2019 - Jun 28, 2019, [Konferenzveröffentlichung]

Marchal, Samuel ; Miettinen, Markus ; Nguyen, Thien Duc ; Sadeghi, Ahmad-Reza ; Asokan, N. (2019):
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications, [Artikel]

Maier, Christine ; Brydges, Tiff ; Jurcevic, Petar ; Trautmann, Nils ; Hempel, Cornelius ; Lanyon, Ben P. ; Hauke, Philipp ; Blatt, Rainer ; Roos, Christian F. (2019):
Environment-Assisted Quantum Transport in a 10-qubit Network.
In: PHYSICAL REVIEW LETTERS, 122 (5), S. 050501. American Physical Society, DOI: 10.1103/PhysRevLett.122.050501,
[Artikel]

Mohamed, Reham ; O'Connor, Terrance ; Miettinen, Markus ; Enck, William ; Sadeghi, Ahmad-Reza
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang (Urheber) (2019):
HONEYSCOPE: IoT Device Protection with Deceptive Network Views,.
In: Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, [Buchkapitel]

McCracken, Gabriel (2018):
A Field Theory for Quantum Markov Processes.
TU Darmstadt, [Bachelorarbeit]

Marakis, Vassilios (2018):
Anwendung der semiklassischen Näherung auf Probleme des Zentralkraftfeldes und der Quantendefekttheorie.
TU Darmstadt, [Masterarbeit]

Mitev, Richard (2018):
Lyin’ Alexa - Skill-Based Man-in-the-Middle Attack on Virtual Assistants.
TU Darmstadt, [Masterarbeit]

Mantz, Dennis (2018):
InternalBlue – A Bluetooth Experimentation Framework Based on Mobile Device Reverse Engineering.
TU Darmstadt, [Masterarbeit]

Mehmedovic, Damir (2018):
Wi-Fi Based Key Exchange On Android Smartphones.
TU Darmstadt, [Bachelorarbeit]

Miettinen, Markus ; Nguyen, Thien Duc ; Asokan, N. ; Sadeghi, Ahmad-Reza (2018):
Revisiting Context-Based Pairing in IoT.
In: Proceedings of the 55th Design Automation Conference (DAC), S. 32:1-32:6,
ACM, 55th Design Automation Conference (DAC), San Francisco, CA, USA, 24.-29.06. 2018, [Konferenzveröffentlichung]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2018):
How Secure is Green IT? The Case of Software-Based Energy Side Channels.
Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS), [Konferenzveröffentlichung]

Muneeb, Ahmed (2017):
mproving a Linux Device Driver for Visible Light Communication.
Darmstadt, Technische Universität, [Masterarbeit]

Müller, Patrick (2017):
Reconstruction of Obfuscated Strings.
TU Darmstadt, [Masterarbeit]

Mantel, Heiko ; Schickel, Johannes ; Weber, Alexandra ; Weber, Friedrich (2017):
Vulnerabilities Introduced by Features for Software-based Energy Measurement.
[Report]

Meister, Richard (2017):
Design and evaluation of a hybrid SDR testbed for visible light communication and Wi-Fi.
Darmstadt, Technische Universität, [Masterarbeit]

Mulholland, John ; Mosca, Michele ; Braun, Johannes (2017):
The Day the Cryptography Dies.
In: IEEE Security & Privacy, 15 (4), S. 14-21. DOI: 10.1109/MSP.2017.3151325,
[Artikel]

Marson, Giorgia Azzurra ; Poettering, Bertram (2017):
Security Notions for Bidirectional Channels.
In: IACR Transactions on Symmetric Cryptology, 2017 (1), S. 405-426. DOI: 10.13154/tosc.v2017.i1.405-426,
[Artikel]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2017):
A Parallel Variant of LDSieve for the SVP on Lattices.
In: 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP),
IEEE, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), DOI: 10.1109/PDP.2017.60,
[Konferenzveröffentlichung]

Mantel, Heiko ; Weber, Alexandra ; Köpf, Boris (2017):
A Systematic Study of Cache Side Channels across AES Implementations.
S. 213-230, Proceedings of the 9th International Symposium on Engineering Secure Software and Systems (ESSoS), [Konferenzveröffentlichung]

Mariano, Artur ; Correia, Fabio ; Bischof, Christian (2016):
A vectorized, cache efficient LLL implementation.
In: VECPAR 2016 - 12th International Meeting on High Performance Computing for Computational Science,
Porto, Portugal, [Konferenzveröffentlichung]

McLaughlin, Stephen ; Konstantinou, Charalambos ; Wang, Xueyang ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Maniatakos, Michail ; Karri, Ramesh (2016):
The Cybersecurity Landscape in Industrial Control Systems.
In: Proceedings of the IEEE, 104 (5), S. 1039-1057. DOI: 10.1109/JPROC.2015.2512235,
[Artikel]

Mariano, Artur ; Bischof, Christian (2016):
Enhancing the scalability, tractability and memory usage of HashSieve on multi-core CPUs.
In: PDP2016,
Conference Publishing Services (CPS), Heraklion Crete, Greece, [Konferenzveröffentlichung]

Mantel, Heiko ; Starostin, Artem (2015):
Transforming Out Timing Leaks, More or Less.
In: LNCS, In: Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015) - Part I, S. 20,
Springer, Vienna, Austria, [Konferenzveröffentlichung]

Mariano, Artur ; Laarhoven, Thijs ; Bischof, Christian (2015):
Parallel (Probable) Lock-Free Hash Sieve: A Practical Sieving Algorithm for the SVP.
S. 590-599, IEEE, 44th International Conference on Parallel Processing (ICPP 2015), Beijing, China, 01.-04.09., ISSN 01903918,
DOI: 10.1109/ICPP.2015.68,
[Konferenzveröffentlichung]

Medeiros, Flávio ; Kästner, Christian ; Ribeiro, Márcio ; Nadi, Sarah ; Gheyi, Rohit (2015):
The Love/Hate Relationship with the C Preprocessor: An Interview Study.
In: European Conference on Object-Oriented Programming, S. 999-1022,
Prague, Czech Republic, [Konferenzveröffentlichung]

N

Nguyen, Thien Duc ; Rieger, Phillip ; Yalame, Mohammad Hossein ; Möllering, Helen ; Fereidooni, Hossein ; Marchal, Samuel ; Miettinen, Markus ; Mirhoseini, Azalia ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Zeitouni, Shaza (2021):
FLGUARD: Secure and Private Federated Learning.
In: arXiv-Computer Science, In: Crytography and Security, (Preprint), [Artikel]

Niesler, Christian ; Surminski, Sebastian ; Davi, Lucas (2021):
HERA: Hotpatching of Embedded Real-time Applications.
Internet Society, 28th Network and Distributed System Security Symposium (NDSS) 2021, virtual Conference, 21.-25.02.2021, [Konferenzveröffentlichung]

Nguyen, Thien Duc ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Long Live Randomization: On Privacy-Preserving Contact Tracing in Pandemic.
In: MTD'20: Proceedings of the 7th ACM Workshop on Moving Target Defense,
ACM, CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 09.-13.11.2020, ISBN 978-1-4503-8085-0,
DOI: 10.1145/3411496.3421229,
[Konferenzveröffentlichung]

Nieminen, Raine ; Järvinen, Kimmo (2020):
Practical Privacy-Preserving Indoor Localization based on Secure Two-Party Computation.
In: IEEE Transactions on Mobile Computing, IEEE, ISSN 1536-1233,
DOI: 10.1109/TMC.2020.2990871,
[Artikel]

Nguyen, Thien Duc ; Rieger, Phillip ; Miettinen, Markus ; Sadeghi, Ahmad-Reza (2020):
Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System.
Workshop on Decentralized IoT Systems and Security (DISS) @ NDSS Symposium 2020, San Diego, USA, 23.-26.02. 2020, [Konferenzveröffentlichung]

Nautsch, Andreas ; Jiménez, Abelino ; Treiber, Amos ; Kolberg, Jascha ; Jasserand, Catherine ; Kindt, Els ; Delgado, Héctor ; Todisco, Massimiliano ; Hmani, Mohamed Amine ; Mtibaa, Aymen ; Abdelraheem, Mohammed Ahmed ; Abad, Alberto ; Teixeira, Francisco ; Matrouf, Driss ; Gomez-Barrero, Marta ; Petrovska-Delacrétaz, Dijana ; Chollet, Gérard ; Evans, Nicholas ; Schneider, Thomas ; Bonastre, Jean-François ; Raj, Bhiksha ; Trancoso, Isabel ; Busch, Christoph (2019):
Preserving Privacy in Speaker and Speech Characterisation.
In: Computer Speech and Language, 58, S. 441-480. Elsevier, ISSN 0885-2308,
DOI: 10.1016/j.csl.2019.06.001,
[Artikel]

Nguyen, Giang Nam (2019):
Developing Performance Models for Codes with Exponential Runtime Behavior.
Darmstadt, TU Darmstadt, [Masterarbeit]

Nikolopoulos, Georgios M. (2019):
Optical scheme for cryptographic commitments with physical unclonable keys.
In: Optical Express, 27 (20), S. 29367-29379. DOI: 10.1364/OE.27.029367,
[Artikel]

Nautsch, Andreas ; Patino, Jose ; Treiber, Amos ; Stafylakis, Themos ; Mezira, Petr ; Todisco, Massimiliano ; Schneider, Thomas ; Evans, Nicholas (2019):
Privacy-Preserving Speaker Recognition with Cohort Score Normalisation.
Interspeech 2019, Graz, Austria, 15.-19.09.2019, [Konferenzveröffentlichung]

Nikolopoulos, Georgios M. (2019):
Cryptographic one-way function based on boson sampling.
18, In: Quantum Information Processing, 2019 (8), S. 259. Springer Nature, ISSN 1570-0755, e-ISSN 1573-1332,
DOI: 10.1007/s11128-019-2372-9,
[Artikel]

Nguyen, Thien Duc ; Marchal, Samuel ; Miettinen, Markus ; Fereidooni, Hossein ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
In: The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019),
[Konferenzveröffentlichung]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2019):
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
ACM/IEEE, Design Automation Conference (DAC), 2019, [Konferenzveröffentlichung]

Nanjunde Gowda, Vidyashree (2018):
Benchmarking Static Misuse or Bug Detectors Using Software Vulnerabilities.
TU Darmstadt, [Masterarbeit]

Nguyen, Lisa ; Krüger, Stefan ; Hill, Patrick ; Ali, Karim ; Bodden, Eric (2018):
VisuFlow: a Debugging Environment for Static Analyses.
In: ICSE,
ACM, [Konferenzveröffentlichung]

Neubauer, Sven (2018):
Angriffsanalyse einer TETRA-Basisstation.
TU Darmstadt, [Bachelorarbeit]

Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Weber, Alexandra ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2018):
Side-Channel Analysis of Privacy Amplification in Postprocessing Software for a Quantum Key Distribution System.
[Report]

Neumann, Klara Maria (2017):
Aufbau von Empfängerstationen für ein System zum Quantenschlüsselaustausch.
TU Darmstadt, [Bachelorarbeit]

Nauth, Julian (2017):
Charakterisierung von Bellschen Ungleichungen bei nicht-perfekter Detektion.
TU Darmstadt, [Bachelorarbeit]

Nielsen, Jesper Buus ; Schneider, Thomas ; Trifiletti, Roberto (2017):
Constant Round Maliciously Secure 2PC with Function-Independent Preprocessing using LEGO.
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17),
Internet Society, DOI: 10.14722/ndss.2017.23075,
[Konferenzveröffentlichung]

Nyman, Thomas ; Dessouky, Ghada ; Zeitouni, Shaza ; Lehikoinen, Aaro ; Paverd, Andrew ; Asokan, N. ; Sadeghi, Ahmad-Reza (2017):
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: Cryptography and Security, abs/1705.10295, [Artikel]

Nadi, Sarah ; Krüger, Stefan ; Mezini, Mira ; Bodden, Eric (2016):
"Jumping Through Hoops" Why do Java Developers Struggle With Cryptography APIs?
In: International Conference on Software Engineering,
ACM, Austin, Texas, USA, [Konferenzveröffentlichung]

Nadi, Sarah ; Krüger, Stefan (2016):
Variability Modeling of Cryptographic Components (Clafer Experience Report).
In: Proceedings of the Tenth International Workshop on Variability Modelling of Software-intensive Systems, Tenth International Workshop on Variability Modelling of Software-intensive Systems, Salvador, Brazil, 27. - 29.1.2016, [Konferenzveröffentlichung]

Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2015):
Universality in random quantum networks.
In: Physical Review A, 92 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.92.062335,
[Artikel]

O

Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021):
Enclave-Based Secure Programming with JE.
In: Proceedings: 2021 IEEE Secure Development Conference, S. 71-78,
IEEE, 6th IEEE Secure Development Conference (SecDev 2021), virtual Conference, 18.-20.10.2021, ISBN 978-1-6654-3170-5,
DOI: 10.1109/SecDev51306.2021.00026,
[Konferenzveröffentlichung]

Oak, Aditya ; Ahmadian, Amir M. ; Balliu, Musard ; Salvaneschi, Guido (2021):
Language Support for Secure Software Development with Enclaves.
34th IEEE Computer Security Foundations Symposium (CSF 2021), virtual Conference, 21.-24.06.2021, [Konferenzveröffentlichung]

Oesch, Sean ; Abu-Salma, Ruba ; Krämer, Juliane ; Wu, Justin ; Diallo, Oumar ; Ruoti, Scott (2020):
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
ACM, Annual Computer Security Applications Conference (ACSAC 2020), virtual Conference, 07.-11.12., [Konferenzveröffentlichung]

O'Connor, T. J. ; Mohamed, Reham ; Miettinen, Markus ; Enck, William ; Reaves, Bradley ; Sadeghi, Ahmad-Reza (2019):
HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices.
Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami, FL, USA, [Konferenzveröffentlichung]

Oak, Aditya ; Mezini, Mira ; Salvaneschi, Guido (2019):
Language Support for Multiple Privacy Enhancing Technologies.
ACM, Conference Companion of the 3rd International Conference on Art, Science, and Engineering of Programming, [Konferenzveröffentlichung]

Oliveira Nunes, Ivan de ; Dessouky, Ghada ; Ibrahim, Ahmad ; Rattanavipanon, Norrathep ; Sadeghi, Ahmad-Reza ; Tsudik, Gene (2019):
Towards Systematic Design of Collective Remote Attestation Protocols.
IEEE, The 39th International Conference on Distributed Computing Systems (ICDCS) 2019, Dallas, TX, USA, 7-10 July 2019, ISBN 978-1-7281-2520-6,
DOI: 10.1109/ICDCS.2019.00120,
[Konferenzveröffentlichung]

P

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
IEEE, 14th IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'21), virtual Conference, 13.-14.12.2021, [Konferenzveröffentlichung]

Patra, Arpita ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Mohammad Hossein (2021):
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
30th USENIX Security Symposium (USENIX Security'21), Vancouver, Canada, 11.-13.08.2021, [Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yanai, Avishay (2019):
Efficient Circuit-based PSI with Linear Communication.
In: 38. Advances in Cryptology -- EUROCRYPT 2019,
Springer, [Konferenzveröffentlichung]

Palacios, Joan ; Steinmetzer, Daniel ; Loch, Adrian ; Hollick, Matthias ; Widmer, Joerg (2018):
Adaptive Codebook Optimization for Beam-Training on Off-The-Shelf IEEE 802.11ad Devices.
MobiCom 2018 - 24th ACM Annual International Conference on Mobile Computing and Networking, New Delhi, India, 29.10.-2.11.2018, DOI: 10.1145/3241539.3241576,
[Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Weinert, Christian ; Wieder, Udi (2018):
Efficient Circuit-based PSI via Cuckoo Hashing.
In: 37. Advances in Cryptology -- EUROCRYPT 2018, S. 125-157,
Springer, DOI: 10.1007/978-3-319-78372-7_5,
[Konferenzveröffentlichung]

Pinkas, Benny ; Schneider, Thomas ; Zohner, Michael (2018):
Scalable Private Set Intersection Based on OT Extension.
In: ACM Transactions on Privacy and Security (TOPS), 21 (2), S. 7:1-7:35. DOI: 10.1145/3154794,
[Artikel]

Portela, Bernardo ; Barbosa, Manuel ; Scerri, Guillaume ; Warinschi, Bogdan ; Bahmani, Raad ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2017):
Secure Multiparty Computation from SGX.
In: Financial Cryptography and Data Security,
[Konferenzveröffentlichung]

Pascoal, Túlio A. ; Dantas, Yuri Gil ; Fonseca, Iguatemi E. ; Nigam, Vivek (2017):
Slow TCAM Exhaustion DDoS Attack.
In: IFIP SEC 2017 - 32nd International Conference on ICT Systems Security and Privacy Protection, S. 17-31,
Springer, [Konferenzveröffentlichung]

Pfeiffer, Martin ; Kwiotek, Jan-Pascal ; Classen, Jiska ; Klose, Robin ; Hollick, Matthias (2016):
Analyzing TETRA Location Privacy and Network Availability.
In: SPSM '16, S. 117-122, New York, NY, USA, ACM, 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, Vienna, Austria, DOI: 10.1145/2994459.2994463,
[Konferenzveröffentlichung]

Proksch, Sebastian ; Lerch, Johannes ; Mezini, Mira (2015):
Intelligent Code Completion with Bayesian Networks.
In: ACM Transactions on Software Engineering and Methodology (TOSEM), 25 (1), S. 3:1-3:31. ACM Press, [Artikel]

Pinkas, Benny ; Schneider, Thomas ; Segev, Gil ; Zohner, Michael (2015):
Phasing: Private Set Intersection using Permutation-based Hashing.
In: 24. USENIX Security Symposium (USENIX Security'15), S. 515-530,
USENIX, [Konferenzveröffentlichung]

R

Roth, Tobias ; Helm, Dominik ; Reif, Michael ; Mezini, Mira (2022):
CiFi: Versatile Analysis of Class and Field Immutability.
In: GI-Edition Lecture Notes in Informatics: Proceedings, P320, In: Software Engineering 2022: Fachtagung des GI-Fachbereichs Softwaretechnik, S. 81-82,
Gesellschaft für Informatik e.V., Software Engineering 2022, virtual Conference, 21.-25.02.2022, ISSN 1617-5468, ISBN 978-3-88579-714-2,
DOI: 10.18420/se2022-ws-027,
[Konferenzveröffentlichung]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2021):
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts.
30th USENIX Security Symposium, Vancouver, Canada, 11.-13.08.2021, [Konferenzveröffentlichung]

Reif, Michael ; Kübler, Florian ; Helm, Dominik ; Hermann, Ben ; Eichberg, Michael ; Mezini, Mira (2020):
TACAI: An Intermediate Representation Based on Abstract Interpretation.
S. 2-7, SOAP 2020-9th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis, London, UK, June 2020, ISBN 9781450379977,
DOI: 10.1145/3394451.3397204,
[Konferenzveröffentlichung]

Roth, Johannes ; Karatsiolis, Vangelis ; Krämer, Juliane (2020):
Classic McEliece Implementation with Low Memory Footprint.
19th Smart Card Research and Advanced Application Conference (CARDIS 2020), virtual Conference, 18.-19.11., [Konferenzveröffentlichung]

Reith, Robert Nikolai ; Schneider, Thomas ; Tkachenko, Oleksandr (2019):
Efficiently Stealing your Machine Learning Models.
In: Proceedings of the 2019 Workshop on Privacy in the Electronic Society,
WPES'19 - 18. Workshop on Privacy in the Electronic Society, London, UK, November, 11th, [Konferenzveröffentlichung]

Rathee, Deevashwer ; Schneider, Thomas ; Shukla, K. K. (2019):
Improved multiplication triple generation over rings via RLWE-based AHE.
18. International Conference on Cryptology And Network Security (CANS'19), Fuzhou, China, 25-27 October 2019, [Konferenzveröffentlichung]

Reif, Michael ; Kübler, Florian ; Eichberg, Michael ; Helm, Dominik ; Mezini, Mira (2019):
Judge: Identifying, Understanding, and Evaluating Sources of Unsoundness in Call Graphs.
S. 251-261, 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19), Beijing, China, 15.07.-19.0.7. 2019, ISBN 978-1-4503-6224-5,
DOI: 10.1145/3293882.3330555,
[Konferenzveröffentlichung]

Ranly, Paul Moritz (2019):
On the feasibility of hierarchical secret sharing-based distributed storage systems.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Roth, Kai (2019):
Entwicklung eines Schlüsselverwaltungssystems zum Quantenschlüsselaustausch.
Darmstadt, TU Darmstadt, [Masterarbeit]

Rodler, Michael ; Li, Wenting ; Karame, Ghassan O. ; Davi, Lucas (2019):
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS),
26th Annual Network & Distributed System Security Symposium (NDSS), Catamaran Resort Hotel & Spa, San Diego, CA, [Konferenzveröffentlichung]

Reith, Robert Nikolai (2018):
Silently Learning your Support Vector Machines Models.
TU Darmstadt, [Bachelorarbeit]

Reif, Michael ; Eichberg, Michael ; Kübler, Florian ; Mezini, Mira (2018):
Systematic Evaluation of the Unsoundness of Call Graph Construction Algorithms for Java.
In: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, S. 107-112,
ACM, SOAP 2018, Amsterdam, Netherlands, DOI: 10.1145/3236454.3236503,
[Konferenzveröffentlichung]

Rowe, Steven (2018):
Blockchain-based market for alert data exchange in Collaborative Intrusion Detection Systems.
TU Darmstadt, [Bachelorarbeit]

Richter, Philipp ; Yang, Zheng ; Tkachenko, Oleksandr ; Leppäkoski, Helena ; Järvinen, Kimmo ; Schneider, Thomas (2018):
Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting.
In: 8. International Conference on Localization and GNSS (ICL-GNSS'18), S. 1-6,
IEEE, DOI: 10.1109/ICL-GNSS.2018.8440910,
[Konferenzveröffentlichung]

Riazi, M. Sadegh ; Weinert, Christian ; Tkachenko, Oleksandr ; Songhori, Ebrahim M. ; Schneider, Thomas ; Koushanfar, Farinaz (2018):
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), S. 707-721,
ACM, DOI: 10.1145/3196494.3196522,
[Konferenzveröffentlichung]

Reif, Michael ; Eichberg, Michael ; Mezini, Mira
Tichy, Matthias ; Bodden, Eric ; Kuhrmann, Marco ; Wagner, Stefan ; Steghöfer, Jan-Philipp (Hrsg.) (2018):
Call Graph Construction for Java Libraries.
S. 119-120, Bonn, Gesellschaft für Informatik, Software Engineering und Software Management 2018, Bonn, [Konferenzveröffentlichung]

Rudd, Robert ; Skowyra, Richard ; Bigelow, David ; Dedhia, Veer ; Hobson, Thomas ; Crane, Stephen ; Liebchen, Christopher ; Larsen, Per ; Davi, Lucas ; Franz, Michael ; Sadeghi, Ahmad-Reza ; Okhravi, Hamed (2017):
Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
In: 24th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Riazi, M. Sadegh ; Songhori, Ebrahim M. ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2017):
Toward Practical Secure Stable Matching.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), (1), S. 62-78. De Gruyter Open, DOI: 10.1515/popets-2017-0005,
[Artikel]

Rauzy, Pablo ; Kiss, Ágnes ; Krämer, Juliane ; Seifert, Jean-Pierre (2016):
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.
In: Constructive Side-Channel Analysis and Secure Design - 7. International Workshop (COSADE'16), S. 111-129,
Springer, DOI: 10.1007/978-3-319-43283-0_7,
[Konferenzveröffentlichung]

Rieß, Susanne (2016):
An Analysis of Lattice-Based Key Exchange Protocols.
TU Darmstadt, [Masterarbeit]

Reif, Michael ; Eichberg, Michael ; Hermann, Ben ; Lerch, Johannes ; Mezini, Mira (2016):
Call graph construction for Java libraries.
S. 474-486, Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, DOI: 10.1145/2950290.2950312,
[Konferenzveröffentlichung]

S

Surminski, Sebastian ; Niesler, Christian ; Brasser, Ferdinand ; Davi, Lucas ; Sadeghi, Ahmad-Reza (2021):
RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints.
In: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, S. 2890-2905,
ACM, 2021 ACM SIGSAC Conference on Computer and Communications Security, virtual Conference, 15.-19.11.2021, ISBN 978-1-4503-8454-4,
DOI: 10.1145/3460120.3484788,
[Konferenzveröffentlichung]

Stojanovic, Vladimir M. (2021):
Scalable W-type entanglement resource in neutral-atom arrays with Rydberg-dressed resonant dipole-dipole interaction.
In: Physical Review A, 103 (2), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.103.022410,
[Artikel]

Sokolowski, Daniel ; Lehr, Jan-Patrick ; Bischof, Christian ; Salvaneschi, Guido (2020):
Leveraging Hybrid Cloud HPC with Multitier Reactive Programming.
In: Proceedings of SuperCompCloud 2020: 3rd Workshop on Interoperability of Supercomputing and Cloud Technologies, S. 27-32,
IEEE, 3rd International Workshop on Interoperability of Supercomputing and Cloud Technologies, Virtual Conference, 11.11.2020, ISBN 978-0-7381-1055-4,
DOI: 10.1109/SuperCompCloud51944.2020.00010,
[Konferenzveröffentlichung]

Schneider, Thomas (2020):
Engineering Privacy-Preserving Machine Learning Protocols.
2020 Workshop on Privacy-Preserving Machine Learning in Practice (PPMLP’20), virtual Conference, 09.11., [Konferenzveröffentlichung]

Salvaneschi, Guido ; Wirth, Johannes ; Weisenburger, Pascal (2020):
A survey of multitier programming.
In: ACM Computing Surveys, 53 (4), ACM, ISSN 03600300,
DOI: 10.1145/3397495,
[Artikel]

Shrishak, Kris ; Shulman, Haya (2020):
Limiting the Power of RPKI Authorities.
ACM, Proceedings of the Applied Networking Research Workshop (ANRW'20), Online Workshop, 30.-31.07., [Konferenzveröffentlichung]

Stojanovic, Vladimir M. (2020):
Bare-Excitation Ground State of a Spinless-Fermion–Boson Model and W-State Engineering in an Array of Superconducting Qubits and Resonators.
In: Physical Review Letters, 124 (19), S. 190504. ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.124.190504,
[Artikel]

Stojanovic, Vladimir M. (2020):
Entanglement-spectrum characterization of ground-state nonanalyticities in coupled excitation-phonon models.
In: Physical Review B, 101 (13), American Physical Society, ISSN 2469-9950,
DOI: 10.1103/PhysRevB.101.134301,
[Artikel]

Stonner, David Jakob ; Kysela, Jaroslav ; Weir, Graeme ; Novotny, Jaroslav ; Alber, Gernot ; Jex, Igor (2020):
Deterministic twirling with low resources.
In: Physics letters A, 384 (8), Elsevier, ISSN 0375-9601,
DOI: 10.1016/j.physleta.2019.126179,
[Artikel]

Schneider, Thomas ; Treiber, Amos (2020):
A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC".
In: IEEE Transactions on Parallel and Distributed Systems, IEEE, DOI: 10.1109/TPDS.2019.2939313,
[Artikel]

Sauer, Alexander ; Alber, Gernot (2020):
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming.
4, In: Cryptography, 2020 (1), MDPI, DOI: 10.3390/cryptography4010002,
[Artikel]

Schneider, Markus ; Shulman, Haya ; Sidis, Adi ; Sidis, Ravid ; Waidner, Michael (2020):
Diving into Email Bomb Attack.
DSN 2020-International Conference on Dependable Systems and Networks, virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya (2020):
MPC for Securing Internet Infrastructure.
IEEE, 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), virtual Conference, 29.06.-02.07., [Konferenzveröffentlichung]

Schuster, Tom (2019):
Optimizing HyCC with Compiler Intermediate Representation.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Stonner, David Jakob (2019):
Construction of Random Unitary Operations for Asymptotic Preparation of Werner States.
Darmstadt, Technische Universität Darmstadt, [Bachelorarbeit]

Schneider, Thomas ; Tkachenko, Oleksandr (2019):
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
ACM, 14. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'19), [Konferenzveröffentlichung]

Songhori, Ebrahim ; Riazi, M. Sadegh ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2019):
ARM2GC: Succinct Garbled Processor for Secure Computation.
Las Vegas, USA, Design Automation Conference (DAC), 2019 56th ACM/EDAC/IEEE, Las Vegas, USA, June, 2.-6., [Konferenzveröffentlichung]

Speth, Jonathan (2019):
How secure are business applications? An in-depth study on the security of business applications.
Darmstadt, TU Darmstadt, [Bachelorarbeit]

Schulz, Philipp (2019):
Developing Secure Distributed Systems with Modular Tierless Programming.
TU Darmstadt, [Masterarbeit]

Srivatsa, Jeevan Karanam (2019):
Benchmarking of Data Provenance Computation Methods to Support Debugging in Apache Spark.
TU Darmstadt, [Masterarbeit]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Context Hiding Multi-Key Linearly Homomorphic Authenticators.
In: Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, S. 493-513,
Springer, San Francisco, CA, USA, March 4–8, 2019, [Konferenzveröffentlichung]

Surminski, Sebastian ; Rodler, Michael ; Davi, Lucas (2019):
Poster: Automated Evaluation of Fuzzers.
Internet Society, NDSS 2019 : 26th Annual Network and Distributed System Security Symposium, San Diego, California, 24 – 27 February 2019, [Konferenzveröffentlichung]

Salvaneschi, Guido ; Köhler, Mirko ; Sokolowski, Daniel ; Haller, Philipp ; Erdweg, Sebastian ; Mezini, Mira (2019):
Language-Integrated Privacy-Aware Distributed Queries. (Verlagsversion)
In: Proceedings of the ACM on Programming Languages, 3 (OOPSLA), S. 1-30. Association for Computing Machinery, ISSN 2475-1421,
DOI: 10.25534/tuprints-00014553,
[Artikel]

Schabhüser, Lucas ; Butin, Denis ; Buchmann, Johannes (2019):
Function-Dependent Commitments from Homomorphic Authenticators.
Springer, 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, 3-5 July 2019, [Konferenzveröffentlichung]

Schmid, Jakob (2018):
Independent Compilation for the Arithmetic Black Box.
TU Darmstadt, [Masterarbeit]

Schneider, Thomas ; Tkachenko, Oleksandr (2018):
Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases.
In: 17. Workshop on Privacy in the Electronic Society (WPES’18), S. 71-75,
ACM, DOI: 10.1145/3267323.3268956,
[Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Skoric, Boris ; Katzenbeisser, Stefan ; Szefer, Jakub (2018):
Decay-Based DRAM PUFs in Commodity Devices.
In: IEEE Transactions on Dependable and Secure Computing (TDSC), [Artikel]

Sharma, Ratika (2018):
Testing the effects of voltage variations on PUF implementations in Commercial Off-The-Shelf (COTS) devices.
TU Darmstadt, [Masterarbeit]

Schabhüser, Lucas ; Butin, Denis ; Demirel, Denise ; Buchmann, Johannes (2018):
Function-Dependent Commitments for Verifiable Multi-Party Computation.
In: LNCS, In: Information Security - 21st International Conference, ISC 2018,
Guildford, UK, [Konferenzveröffentlichung]

Senker, Matthias (2018):
PSI Meets Signal: Integrating a Malicious-Secure Private Contact Discovery Solution in an Open-Source Instant Messaging Service.
TU Darmstadt, [Masterarbeit]

Schaad, Andreas ; Grohmann, Bjoern ; Winzenried, Oliver ; Brasser, Ferdinand ; Sadeghi, Ahmad-Reza (2018):
Towards a Cloud-based System for Software Protection and Licensing.
In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2, S. 698-702,
k.A., SciTePress, Secrypt 2018, Porto, Portugal, 26.-28.07.2018, ISBN 978-989-758-319-3,
DOI: 10.5220/0006899506980702,
[Konferenzveröffentlichung]

Steinmetzer, Daniel ; Yuan, Yimin ; Hollick, Matthias (2018):
Beam-Stealing: Intercepting the Sector Sweep to Launch Man-in-the-Middle Attacks on Wireless IEEE 802.11ad Networks.
S. 12-22, 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Stockholm, Sweden, Jun 18, 2018 - Jun 20, 2018, DOI: 10.1145/3212480.3212499,
[Konferenzveröffentlichung]

Scheidel, Lukas (2018):
Distributed Path ORAM.
TU Darmstadt, [Bachelorarbeit]

Saleem, Umair Muhammad (2018):
Flash-based Physical Unclonable Functions (PUFs) using Commercial Off-The-Shelf (COTS) NAND Flash Memory.
TU Darmstadt, [Masterarbeit]

Steinmetzer, Daniel ; Wegemer, Daniel ; Hollick, Matthias (2018):
A Practical IEEE 802.11ad Research Platform: The Hidden Potential of Off -the-Shelf Devices.
In: 3rd NSF Millimeter-Wave RCN Workshop,
3rd NSF Millimeter-Wave RCN Workshop, [Konferenzveröffentlichung]

Shrishak, Kris ; Shulman, Haya ; Waidner, Michael (2018):
Removing the Bottleneck for Practical 2PC.
S. 2300-2302, ACM SIGSAG Conference on Computer and Communications Security (ACM CCS), Toronto, Canada, 15.-19. Oct. 2018, DOI: 10.1145/3243734.3278521,
[Konferenzveröffentlichung]

Schürl, Stefan (2017):
Entwicklung eines FPGA-Systems zur hochauflösenden Zeitmessung.
TU Darmstadt, [Masterarbeit]

Sarangdhar, Ravi ; Fan, Yufan ; Anagnostopoulos, Nikolaos Athanasios ; Gayer, Udo ; Flederer, Frank ; Mikschl, Tobias ; Arul, Tolga ; John, Philipp R. ; Hierholz, Kirsten ; Montenegro, Sergio ; Katzenbeisser, Stefan (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Angewandte Kryptographie of Gesellschaft für Informatik e.V, 27th Crypto-Day, Frankfurt (Oder), Germany, 07.-08.12.2017, DOI: 10.13140/RG.2.2.33800.52483,
[Konferenzveröffentlichung]

Schick, Oliver (2017):
Web application for privacy-preserving scheduling.
Darmstadt, Technische Universität, [Bachelorarbeit]

Singh, Govind (2017):
o Static Bug Finders Identify API Misuses?
Darmstadt, Technische Universität, [Masterarbeit]

Steinmetzer, Daniel ; Wegemer, Daniel ; Schulz, Matthias ; Widmer, Jörg ; Hollick, Matthias (2017):
Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices.
ACM, CoNEXT ’17: The 13th International Conference on emerging Networking EXperiments and Technologies, DOI: 10.1145/3143361.3143384,
[Konferenzveröffentlichung]

Sarangdhar, Ravi (2017):
An investigation of the effects of radiation on current key storage solutions and on Physical Unclonable Functions (PUFs) being used as key storage.
Darmstadt, Technische Universität, [Masterarbeit]

Schreiber, Johannes (2017):
Countermeasures Against First Order Fault Attacks Using the Example of ring-TESLA.
Darmstadt, Technische Universität, [Bachelorarbeit]

Sitnikov, Konstantin (2017):
A Survey on Post-Quantum Key Exchange.
Darmstadt, Technische Universität, [Bachelorarbeit]

Späth, Johannes ; Ali, Karim ; Bodden, Eric (2017):
IDEal: Efficient and Precise Alias-aware Dataflow Analysis.
In: 2017 International Conference on Object-Oriented Programming, Languages and Applications (OOPSLA/SPLASH),
ACM Press, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Loch, Adrian ; García-García, Amanda ; Widmer, Jörg ; Hollick, Matthias (2017):
Mitigating Lateral Interference: Adaptive Beam Switching for Robust Millimeter-Wave Networks.
In: 1st ACM Workshop on Millimeter Wave Networks and Sensing Systems (mmNets 2017), S. 6,
ACM, Snowbird, Utah, USA, ISBN 978-1-4503-5143-0/17/10,
DOI: 10.1145/3130242.3130244,
[Konferenzveröffentlichung]

Schurig, Sebastian (2017):
Development of a user interface and implementation of specific software tools for the evaluation and realization of PUFs with respect to security applications.
Darmstadt, Technische Universität, [Masterarbeit]

Schaller, André ; Xiong, Wenjie ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Gabmeyer, Sebastian ; Katzenbeisser, Stefan ; Szefer, Jakub (2017):
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security.
In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
Institute of Electrical and Electronics Engineers (IEEE), McLean, VA, USA, [Konferenzveröffentlichung]

Schmidt, Markus (2017):
Estimation of the Hardness of the Learning with Errors Problem with a Given Number of Samples.
Darmstadt, Technische Universität, [Masterarbeit]

Schaller, André ; Stanko, Taras ; Skoric, Boris ; Katzenbeisser, Stefan (2017):
Eliminating Leakage in Reverse Fuzzy Extractors.
In: IEEE Transactions on Information Forensics and Security, [Artikel]

Schulz, Steffen ; Schaller, André ; Kohnhäuser, Florian ; Katzenbeisser, Stefan (2017):
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors.
In: LNCS, In: ESORICS 2017 - European Symposium on Research in Computer Security, S. 437-455,
Springer, Oslo, Norway, ISBN 978-3-319-66398-2,
DOI: 10.1007/978-3-319-66399-9_24,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2017):
One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet.
In: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation, S. 131-144,
USENIX Association, 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27.-29.03. 2017, [Konferenzveröffentlichung]

Schroth, Nils (2016):
Demonstrator for Privacy-Preserving Face Recognition.
TU Darmstadt, [Bachelorarbeit]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Towards a Policy-Agnostic Control-Flow Integrity Implementation.
In: Black Hat Europe,
[Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Schunter, Matthias ; Ibrahim, Ahmad ; Conti, Mauro ; Neven, Gregory (2016):
SANA: Secure and Scalable Aggregate Network Attestation.
In: 23rd ACM Conference on Computer and Communications Security (CCS) 2016,
CCS 2016, [Konferenzveröffentlichung]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Computations over Distributed Data.
In: The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016),
Philadelphia, PA USA, [Konferenzveröffentlichung]

Schaller, André ; Xiong, Wenjie ; Gabmeyer, Sebastian ; Anagnostopoulos, Nikolaos Athanasios ; Saleem, Umair ; Katzenbeisser, Stefan ; Szefer, Jakub
Gierlichs, Benedikt ; Poschmann, Axel (Hrsg.) (2016):
Run-time Accessible DRAM PUFs in Commodity Devices.
In: Lecture Notes in Computer Science (LNCS), 9813, In: Cryptographic Hardware and Embedded Systems (CHES 2016), S. 432-453,
Springer, Santa Barbara, California, USA, ISBN 978-3-662-53140-2,
DOI: 10.1007/978-3-662-53140-2_21,
[Konferenzveröffentlichung]

Sadeghi, Ahmad-Reza ; Dessouky, Ghada (2016):
POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs.
In: ACM WiSec 2016,
[Konferenzveröffentlichung]

Schultes, Tobias ; Grau, Markus ; Steinmetzer, Daniel ; Hollick, Matthias (2016):
Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices (Demo).
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks 2016 (ACM WiSec'16),
[Konferenzveröffentlichung]

Späth, Johannes ; Nguyen, Lisa ; Ali, Karim ; Bodden, Eric (2016):
Boomerang: Demand-Driven Flow-Sensitive, Field-Sensitive, and Context-Sensitive Pointer Analysis.
In: European Conference on Object-Oriented Programming, S. 25,
Dagstuhl, Rome, Italy, [Konferenzveröffentlichung]

Schabhüser, Lucas ; Demirel, Denise ; Buchmann, Johannes (2016):
An Unconditionally Hiding Auditing Procedure for Multi-Party Computations.
In: IACR - Cryptology ePrint Archive, [Artikel]

Songhori, Ebrahim ; Zeitouni, Shaza ; Dessouky, Ghada ; Schneider, Thomas ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2016):
GarbledCPU: A MIPS Processor for Secure Computation in Hardware.
In: 53. Annual Design Automation Conference (DAC'16), S. 73:1-73:6,
ACM, DOI: 10.1145/2897937.2898027,
[Konferenzveröffentlichung]

Sullivan, Dean ; Arias, Orlando ; Davi, Lucas ; Larsen, Per ; Sadeghi, Ahmad-Reza ; Jin, Yier (2016):
Strategy Without Tactics: Policy-Agnostic Hardware-Enhanced Control-Flow Integrity.
In: 53rd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2016):
Is the Internet Ready for DNSSEC: Evaluating Pitfalls in the Naming Infrastructure.
In: In Traffic Monitoring and Analysis (TMA),
Louvain La Neuve, Belgium, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
Exploring Millimeter-Wave Network Scenarios with Ray-tracing based Simulations in mmTrace.
In: IEEE Infocom 2016 Poster Presentation (Infocom'16 Posters),
San Francisco, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Classen, Jiska ; Hollick, Matthias (2016):
mmTrace: Modeling Millimeter-wave Indoor Propagation with Image-based Ray-tracing.
In: Millimeter-wave Networking Workshop (mmNet 2016), [Artikel]

Sadeghi, Ahmad-Reza ; Armknecht, Frederik (2016):
Towards a Unified Security Model for Physically Unclonable Functions.
In: CT-RSA - Cryptographers' Track at the RSA Conference,
[Konferenzveröffentlichung]

Schaller, André ; Skoric, Boris ; Katzenbeisser, Stefan (2015):
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
In: 5th International Workshop on Trustworthy Embedded Devices (TrustED 2015), S. 15-20,
Denver, Colorado, USA, ISBN 978-1-4503-3828-8,
DOI: 10.1145/2808414.2808417,
[Konferenzveröffentlichung]

Shulman, Haya ; Waidner, Michael (2015):
DNSSEC for Cyber Forensics.
In: EURASIP J. Information Security, (16), S. 14. [Artikel]

Shulman, Haya ; Waidner, Michael (2015):
Towards Security of Internet's Naming Infrastructure.
In: Computer Security ESORICS,
Vienna, Austria, [Konferenzveröffentlichung]

Steinmetzer, Daniel ; Chen, Joe ; Classen, Jiska ; Knightly, Edward ; Hollick, Matthias (2015):
Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves.
In: IEEE Conference on Communications and Network Security 2015 (CNS),
Florence, DOI: 10.1109/CNS.2015.7346844,
[Konferenzveröffentlichung]

Songhori, Ebrahim ; Sadeghi, Ahmad-Reza ; Koushanfar, Farinaz (2015):
Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis.
In: 52nd Design Automation Conference (DAC),
[Konferenzveröffentlichung]

Steinmetzer, Daniel ; Schulz, Matthias ; Hollick, Matthias (2015):
Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief.
In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec),
New York, ISBN 978-1-4503-3623-9/15/06,
DOI: 10.1145/2766498.2766514,
[Konferenzveröffentlichung]

Schuster, Felix ; Tendyck, Thomas ; Liebchen, Christopher ; Davi, Lucas ; Sadeghi, Ahmad-Reza ; Holz, Thorsten (2015):
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications.
In: 36th IEEE Symposium on Security and Privacy (Oakland),
[Konferenzveröffentlichung]

Songhori, Ebrahim ; Hussain, Siam ; Sadeghi, Ahmad-Reza ; Schneider, Thomas ; Koushanfar, Farinaz (2015):
TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits.
In: 36. IEEE Symposium on Security and Privacy (IEEE S&P'15), S. 411-428,
IEEE, DOI: 10.1109/SP.2015.32,
[Konferenzveröffentlichung]

Shulman, Haya ; Ezra, Shiran (2014):
Poster: On the Resilience of DNS Infrastructure.
In: ACM Conference on Computer and Communications Security (ACM CCS),
ACM, Scottsdale, Arizona, USA, [Konferenzveröffentlichung]

Shulman, Haya (2014):
Pretty Bad Privacy: Pitfalls of DNS Encryption.
In: Proceedings of the 13th annual ACM workshop on Privacy in the electronic society, S. 191-200 (9),
Scottsdale, Arizona, USA, [Konferenzveröffentlichung]

T

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks.
ACM, Privacy Preserving Machine Learning in Practice (PPMLP'20) – CCS 2020 Workshop, virtual Conference, 09.-13.11.20202, ISBN 978-1-4503-8088-1,
[Konferenzveröffentlichung]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Expanding PPML beyond Neural Networks (Contributed Talk).
The 2nd Privacy-Preserving Machine Learning Workshop, virtual Conference, 16.08.2020, [Konferenzveröffentlichung]

Tillmanns, Jörn ; Classen, Jiska ; Rohrbach, Felix ; Hollick, Matthias (2020):
Firmware Insider: Bluetooth Randomness is Mostly Random.
14th USENIX Workshop on Offensive Technologies (WOOT 2020), virtual Conference, 11.08., [Konferenzveröffentlichung]

Treiber, Amos ; Molina, Alejandro ; Weinert, Christian ; Schneider, Thomas ; Kersting, Kristian (2020):
CryptoSPN: Privacy-preserving Sum-Product Network Inference.
24th European Conference on Artificial Intelligence (ECAI'20), Santiago de Compostela, 8.-12. June 2020, [Konferenzveröffentlichung]

Treiber, Amos ; Nautsch, Andreas ; Kolberg, Jascha ; Schneider, Thomas ; Busch, Christoph (2019):
Privacy-preserving PLDA speaker verification using outsourced secure computation.
In: Speech Communication, Elsevier, DOI: 10.1016/j.specom.2019.09.004,
[Artikel]

Traverso, Giulia (2019):
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
Darmstadt, Technische Universität, FG Informatik,
[Dissertation]

Truong, Hien Thi Thu ; Toivonen, Juhani ; Nguyen, Thien Duc ; Soriente, Claudio ; Tarkoma, Sasu ; Asokan, N. (2019):
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
k.A., IEEE International Conference on Pervasive Computing and Communications (PerCom2019), Kyoto, Japan, March 2019, [Konferenzveröffentlichung]

Tkachenko, Oleksandr (2018):
Privacy-Preserving Genomics on a Large Scale.
In: 29. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag),
Fachgruppe Kryptographie in der Gesellschaft für Informatik (GI), Bosch Renningen, Germany, 6.-7.9.2018, [Konferenzveröffentlichung]

Tkachenko, Oleksandr ; Weinert, Christian ; Schneider, Thomas ; Hamacher, Kay (2018):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
In: 13. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'18), S. 221-235,
ACM, DOI: 10.1145/3196494.3196541,
[Konferenzveröffentlichung]

Treiber, Amos (2018):
Access Count Leakage in Oblivious RAMs.
TU Darmstadt, [Masterarbeit]

Tariq, Taha (2018):
Web application for privacy-preserving assignments.
TU Darmstadt, [Masterarbeit]

Trautmann, N. ; Hauke, P. (2018):
Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks.
In: Physical Review A, 97 (2), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.97.023606,
[Artikel]

Traverso, Giulia ; Butin, Denis ; Buchmann, Johannes ; Palesandro, Alex (2018):
Coalition-Resistant Peer Rating for Long-Term Confidentiality.
In: PST 2018 - 16th Annual Conference on Privacy, Security and Trust,
IEEE Computer Society, PST 2018 - 16th Annual Conference on Privacy, Security and Trust, Belfast, Northern Ireland, United Kingdom, August 28-30, 2018, [Konferenzveröffentlichung]

Tkachenko, Oleksandr (2017):
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
TU Darmstadt, [Masterarbeit]

Traverso, Giulia ; Garcia Cordero, Carlos ; Nojoumian, Mehrdad ; Azarderakhsh, Reza ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2017):
Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
15th Annual Conference on Privacy, Security and Trust (PST), Calgary, Canada, 28.-30.8. 2017, DOI: 10.1109/pst.2017.00040,
[Konferenzveröffentlichung]

Trautmann, N. ; Ferenczi, Gergely ; Croke, Sarah ; Barnett, Stephen (2017):
Holographic quantum imaging: reconstructing spatial properties via two-particle interference.
In: Journal of Optics, 19 (5), IOP Publishing Ltd., ISSN 2040-8978,
DOI: 10.1088/2040-8986/aa67b6,
[Artikel]

Toteva, Iva (2017):
Advancing Tool Support for the Detection of Side-Channel.
Darmstadt, Technische Universität, [Masterarbeit]

Trautmann, Nils ; Sonnleitner, Matthias ; Barnett, Stephen (2017):
Will a Decaying Atom Feel a Friction Force?
In: Physical Review Letters, 118 (5), APS Physics, ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.118.053601,
[Artikel]

Traverso, Giulia ; Demirel, Denise ; Habib, Sheikh Mahbub ; Buchmann, Johannes (2016):
AS³: Adaptive Social Secret Sharing for Distributed Storage Systems.
In: 2016 Privacy, Security and Trust Conference,
IEEE, Auckland, New Zealand, [Konferenzveröffentlichung]

Trautmann, Nils ; Alber, Gernot ; Leuchs, Gerd (2016):
Efficient single-photon absorption by a trapped moving atom.
In: Physical Review A, 94 (3), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.94.033832,
[Artikel]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Dynamic and Verifiable Hierarchical Secret Sharing.
In: 9th International Conference on Information Theoretic Security - ICITS 2016,
Springer, Tacoma, Washington, USA, [Konferenzveröffentlichung]

Traverso, Giulia ; Demirel, Denise ; Buchmann, Johannes (2016):
Homomorphic Signature Schemes - A survey.
In: SpringerBriefs in Computer Science, Springer, ISBN Softcover 978-3-319-32114-1 - ebook 978-3-319-32115-8,
DOI: 10.1007/978-3-319-32115-8,
[Buch]

Trautmann, Nils ; Alber, Gernot (2016):
Dissipation-enabled efficient excitation transfer from a single photon to a single quantum emitter.
In: Physical Review A, 93, APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.93.053807,
[Artikel]

Trautmann, Nils ; Hauke, Philipp (2016):
Quantum simulation of the dynamical Casimir effect with trapped ions.
In: New Journal of Physics, 18, IOP Publishing Ltd., ISSN 1367-2630,
DOI: 10.1088/1367-2630/18/4/043029,
[Artikel]

Trautmann, N. ; Alber, G. ; Agarwal, G. S. ; Leuchs, G. (2015):
Time-Reversal-Symmetric Single-Photon Wave Packets for Free-Space Quantum Communication.
In: Physical Review Letters, 114 (17), APS Physics, ISSN 0031-9007,
DOI: 10.1103/PhysRevLett.114.173601,
[Artikel]

Trautmann, N. ; Bernad, J. Z. ; Sondermann, M. ; Alber, G. ; Sanchez-Soto, L. L. ; Leuchs, G. (2014):
Generation of entangled matter qubits in two opposing parabolic mirrors.
In: Physical Review A, 90 (6), APS Physics, ISSN 2469-9926,
DOI: 10.1103/PhysRevA.90.063814,
[Artikel]

U

Ullrich, Fabian (2018):
Analysing and Evaluating Interface, Communication, and Web Security in Productive IoT Ecosystems.
TU Darmstadt, [Masterarbeit]

V

Villeneuve, Come du Crest de (2018):
Evaluation of the Efficiency of different Architectures and Pathfinding Algorithms.
TU Darmstadt, [Masterarbeit]

Varky, Jacek (2018):
TeePay – Using Trusted Execution Environments for Off-chain Payment.
TU Darmstadt, [Masterarbeit]

Vasilomanolakis, Emmanouil ; Wolf, Jan Helge ; Böck, Leon ; Mühlhäuser, Max ; Karuppayah, Shankar (2017):
I Trust my Zombies: a Trust-enabled Botnet.
In: Blackhat Europe,
London, UK, [Konferenzveröffentlichung]

Vasilomanolakis, Emmanouil ; Stahn, Michael ; Garcia Cordero, Carlos ; Mühlhäuser, Max (2016):
On Probe-Response Attacks in Collaborative Intrusion Detection Systems.
In: IEEE Conference on Communications and Network Security, S. 279 - 286,
IEEE, Philadelphia, USA, ISBN 978-1-5090-3065-1,
DOI: 10.1109/CNS.2016.7860495,
[Konferenzveröffentlichung]

Vigil, Martín ; Demirel, Denise ; Habib, Sheikh Mahbub ; Hauke, Sascha ; Buchmann, Johannes ; Mühlhäuser, Max (2016):
LoT: a Reputation-based Trust System for Long-term Archiving.
In: SECURWARE 2016, S. 262-270,
Thinkmind Digital Library, Nice, France, ISBN 978-1-61208-493-0,
[Konferenzveröffentlichung]

Volk, Florian ; Trüschler, Nadine ; Mühlhäuser, Max (2015):
Rating Decomposition with Conjoint Analysis and Machine Learning.
In: CENTRIC 2015: The Eighth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, S. 36-41,
IARIA, Barcelona, Spain, ISBN 978-1-61208-440-4,
[Konferenzveröffentlichung]

Vigil, Martín ; Buchmann, Johannes ; Cabarcas, Daniel ; Weinert, Christian ; Wiesmaier, Alexander (2015):
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey.
In: Computers & Security, 50, S. 16-32. [Artikel]

Vigil, Martín ; Weinert, Christian ; Demirel, Denise ; Buchmann, Johannes (2014):
An efficient time-stamping solution for long-term digital archiving.
In: IEEE 33rd International Performance Computing and Communications Conference (IPCCC), S. 1-8,
Austin, TX, USA, DOI: 10.1109/PCCC.2014.7017099,
[Konferenzveröffentlichung]

W

Wickert, Anna-Katharina ; Baumgärtner, Lars ; Breitfelder, Florian ; Mezini, Mira (2021):
Python Crypto Misuses in the Wild.
15th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM ’21), virtual Conference, 11.-15.10.2021, DOI: 10.6084/m9.figshare.16499085.v1,
[Konferenzveröffentlichung]

Weber, Alexandra ; Nikiforov, Oleg ; Sauer, Alexander ; Schickel, Johannes ; Alber, Gernot ; Mantel, Heiko ; Walther, Thomas (2021):
Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography.
26th European Symposium on Research in Computer Security (ESORICS), virtual Conference, 04.-08.2021, [Konferenzveröffentlichung]

Weisenburger, Pascal ; Salvaneschi, Guido (2020):
Implementing a Language for Distributed Systems: Choices and Experiences with Type Level and Macro Programming in Scala.
In: The Art, Science, and Engineering of Programming, 4 (3), S. 17:1-17:29. AOSA, Inc, ISSN 2473-7321,
DOI: 10.22152/programming-journal.org/2020/4/17,
[Artikel]

Wickert, Anna-Katharina ; Reif, Michael ; Eichberg, Michael ; Dodhy, Anam ; Mezini, Mira (2019):
A Dataset of Parametric Cryptographic Misuses.
IEEE, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), [Konferenzveröffentlichung]

Wegert, Leonard (2019):
Preparations for Assembling Franson Interferometers in a Quantum Key Distributuion Setup.
TU Darmstadt, [Bachelorarbeit]

Weiser, Samuel ; Werner, Mario ; Brasser, Ferdinand ; Malenko, Maja ; Mangard, Stefan ; Sadeghi, Ahmad-Reza (2019):
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
In: 26th Annual Network & Distributed System Security Symposium (NDSS),
[Konferenzveröffentlichung]

Wunderer, Thomas (2018):
A Detailed Analysis of the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack.
In: Journal of Mathematical Cryptology (JMC), De Gruyter, [Artikel]

Wunderer, Thomas ; Burger, Michael ; Nguyen, Giang Nam (2018):
Parallelizing the Hybrid Lattice Reduction and Meet-in-the-Middle Attack.
In: CSE-2018,
IEEE Computer Society, CSE 2018 – 21st IEEE International Conference on Computational Science and Engineering, Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania, 29.-31.10.2018, [Konferenzveröffentlichung]

Wunderer, Thomas ; Wang, Yuntao (2018):
Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE.
In: Springer LNCS, In: ISPEC 2018,
Tokyo, Japan, 14th International Conference on Information Security Practice and Experience (ISPEC 2018), [Konferenzveröffentlichung]

Wijden, Marius van der (2018):
Payment and State Channels in practice.
TU Darmstadt, [Masterarbeit]

Wolf, Yannic (2018):
Eine Faserverstärkerstufe für den Quantenhub.
TU Darmstadt, [Bachelorarbeit]

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität,
[Dissertation]

Wainakh, Aidmar (2017):
On the Analysis & Generation of Synthetic Attack for Intrusion Detection Systems.
Darmstadt, Technische Universität, [Masterarbeit]

Weinert, Christian ; Demirel, Denise ; Vigil, Martín ; Geihs, Matthias ; Buchmann, Johannes (2017):
MoPS: A Modular Protection Scheme for Long-Term Storage.
In: 12. ACM Asia Conference on Information, Computer and Communications Security (ASIACCS'17), S. 436-448,
ACM, ISBN 978-1-4503-4944-4,
DOI: 10.1145/3052973.3053025,
[Konferenzveröffentlichung]

Wunderer, Thomas (2016):
Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates.
In: Cryptology ePrint Archive, 2016 (733), S. 1-35. International Association for Cryptologic Research (IACR), [Artikel]

Weinert, Christian (2016):
Building a Modular Long-Term Archiving System.
Darmstadt, Technische Universität, [Bachelorarbeit]

Wachsmann, Christian ; Sadeghi, Ahmad-Reza (2014):
Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions.
In: Synthesis Lectures on Information Security, Privacy, and Trust, 12, San Rafael, Morgan & Claypool Publishers, ISBN 9781627055093,
DOI: 10.2200/S00622ED1V01Y201412SPT012,
[Buch]

Y

Yuan, Yimin (2017):
Investigating Practical Man-in-the-middle Network Attacks on IEEE 802.11ad.
Darmstadt, Technische Universität, [Masterarbeit]

Yalame, Mohammad Hossein ; Farzam, Mohammad Hossein ; Sarmadi, Siavash Bayat (2017):
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer.
In: 8. International Conference on Applications and Techniques in Information Security (ATIS'17),
Springer, [Konferenzveröffentlichung]

Z

Zeitouni, Shaza ; Dessouky, Ghada ; Sadeghi, Ahmad-Reza (2021):
SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities.
6th IEEE European Symposium on Security and Privacy (Euro S&P 2021), virtual Conference, 06.-10.09.2021, [Konferenzveröffentlichung]

Zeitouni, Shaza ; Vliegen, Jo ; Frassetto, Tommaso ; Koch, Dirk ; Sadeghi, Ahmad-Reza ; Mentens, Nele (2021):
Trusted Configuration in Cloud FPGAs.
29th IEEE International Symposium on Field-Programmable Custom Computing Machines, virtual Conference, 09.-12.05.2021, [Konferenzveröffentlichung]

Zeitouni, Shaza ; Stapf, Emmanuel ; Fereidooni, Hossein ; Sadeghi, Ahmad-Reza (2020):
On the Security of Strong Memristor-based Physically Unclonable Functions.
Design Automation Conference 2020, virtual Conference, 19.-22.07., [Konferenzveröffentlichung]

Zaidan, Firas (2019):
Developing a Fuzzing Framework for ARM TrustZone.
Darmstadt, TU Darmstadt, [Masterarbeit]

Zucker, René (2019):
Erstellung eines Python-Interfaces für die Erforschung von Polytopen in der Quanteninformationstheorie.
Darmstadt, TU Darmstadt, Fachbereich Informatik, [Bachelorarbeit]

Zeitouni, Shaza ; Gens, David ; Sadeghi, Ahmad-Reza (2018):
It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs.
In: Design Automation Conference (DAC) 2018,
[Konferenzveröffentlichung]

Zeitouni, Shaza ; Dessouky, Ghada ; Arias, Orlando ; Sullivan, Dean ; Ibrahim, Ahmad ; Jin, Yier ; Sadeghi, Ahmad-Reza (2017):
ATRIUM: Runtime Attestation Resilient Under Memory Attacks.
In: 2017 International Conference On Computer Aided Design (ICCAD'17),
Irvine, California, US, [Konferenzveröffentlichung]

Zeitouni, Shaza ; Oren, Yossef ; Wachsmann, Christian ; Koeberl, Patrick ; Sadeghi, Ahmad-Reza (2016):
Remanence Decay Side-Channel: The PUF Case.
In: IEEE Transactions on Information Forensics and Security, 99, DOI: TIFS.2015.2512534,
[Artikel]

Zhou, Shurui ; Al-Kofahi, Jafar ; Nguyen, Tien ; Kaestner, Christian ; Nadi, Sarah (2015):
Extracting Configuration Knowledge from Build Files with Symbolic Analysis.
In: 3rd International Workshop on Release Engineering, S. 4,
Florence, Italy, [Konferenzveröffentlichung]

Zhang, Jiang ; Zhang, Zhenfeng ; Ding, Jintai ; Snook, Michael ; Dagdelen, Özgür (2015):
Authenticated Key Exchange from Ideal Lattices.
In: EUROCRYPT 2015,
Sofia, Bulgaria, [Konferenzveröffentlichung]

Diese Liste wurde am Mon May 16 01:39:20 2022 CEST generiert.