Daniel Demmler, M.Sc.

I am a Ph.D. student and member of the Engineering Cryptographic Protocols (ENCRYPTO) group at the Center for Research in Security and Privacy (CRISP).

My research focuses on the design, implementation and evaluation of secure multi-party computation and private information retrieval protocols, as well as privacy-preserving applications and their practical realization.

In case you want to contact me securely, send me an encrypted e-mail using my undefinedPGP public key. Its fingerprint: 91DC D028 AA37 E1F9 4D06 1BD3 8740 013C 6881 7144.


S4|14 5.3.10
Mornewegstraße 32
64293 Darmstadt

+49 6151 16-27301



Additional Attributes


OnionPIR: Effective protection of sensitive metadata in online communication networks

Daniel Demmler, Marco Holz, Thomas Schneider
In: ACNS'17 - 15. International Conference on Applied Cryptography and Network Security, July 2017
[Online-Edition: https://cy2sec.comm.eng.osaka-u.ac.jp/acns2017/]

Privacy-Preserving Interdomain Routing at Internet Scale

Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
In: PoPETs - Proceedings on Privacy Enhancing Technologies, February 2017

Towards Securing Internet eXchange Points Against Curious onlooKers (Short Paper)

Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, Thomas Schneider
In: ACM, IRTF & ISOC Applied Networking Research Workshops (ANRW'16), July 2016
[Online-Edition: https://irtf.org/anrw/2016/]

Automated Synthesis of Optimized Circuits for Secure Computation

Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni
In: 22nd ACM Conference on Computer and Communications Security (CCS'15), October 2015

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Daniel Demmler, Thomas Schneider, Michael Zohner
In: Network and Distributed System Security Symposium (NDSS'15), February 2015

RAID-PIR: Practical multi-server PIR

Daniel Demmler, Amir Herzberg, Thomas Schneider
In: 6th ACM Cloud Computing Security Workshop (ACM CCSW'14), November 2014

Ad-hoc secure two-party computation on mobile devices using hardware tokens

Daniel Demmler, Thomas Schneider, Michael Zohner
In: 23rd USENIX Security Symposium (USENIX Security'14), August 2014

Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones

Daniel Demmler, Thomas Schneider, Michael Zohner
In: 19. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), November 2013
[Online-Edition: http://fg-krypto.gi.de/krypto-tag/19-kryptotag.html]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang