Dr. Thomas Schneider

I am independent Claude Shannon Research Group Leader of the Engineering Cryptographic Protocols (ENCRYPTO) group at the Center for Research in Security and Privacy (CRISP), formerly European Center for Security and Privacy By Design (EC SPRIDE) at the Computer Science department of Technical University Darmstadt.

Before, I was a PostDoc in the System Security Lab at the Center for advanced Security Research Darmstadt (CASED).

My research focuses on applied cryptography, privacy, and computer security, including Privacy-Preserving Protocols, Compilers for Cryptographic Protocols, Hardware-Assisted Cryptographic Protocols, and Cloud Computing Security.

You can find further information on my personal webpage.

Download my CV here.

Contact

S4|14 5.3.14
Mornewegstraße 32
64293 Darmstadt

+49 6151 16-27300

thomas.schneider(a-t)crisp-da.de

Publications

Additional Attributes

Type

More efficient oblivious transfer extensions with security for malicious adversaries

Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
In: 34th Advances in Cryptology - EUROCRYPT 2015, April 2015
[Online-Edition: https://www.cosic.esat.kuleuven.be/eurocrypt_2015/]
[Inproceedings]

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Daniel Demmler, Thomas Schneider, Michael Zohner
In: Network and Distributed System Security Symposium (NDSS'15), February 2015
[Inproceedings]

Time to rethink: Trust brokerage using trusted execution environments

Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova
In: 8th International Conference on Trust & Trustworthy Computing (TRUST'15), 2015
Springer
[Online-Edition: www.ics.forth.gr/trust2015/]
[Inproceedings]

RAID-PIR: Practical multi-server PIR

Daniel Demmler, Amir Herzberg, Thomas Schneider
In: 6th ACM Cloud Computing Security Workshop (ACM CCSW'14), November 2014
ACM
[Inproceedings]

Faster private set intersection based on OT extension

Benny Pinkas, Thomas Schneider, Michael Zohner
In: 23rd USENIX Security Symposium (USENIX Security'14), August 2014
[Inproceedings]

Ad-hoc secure two-party computation on mobile devices using hardware tokens

Daniel Demmler, Thomas Schneider, Michael Zohner
In: 23rd USENIX Security Symposium (USENIX Security'14), August 2014
[Inproceedings]

Automatic Protocol Selection in Secure Two-Party Computations

Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
In: 12th International Conference on Applied Cryptography and Network Security (ACNS'14), June 2014
Springer
[Inproceedings]

GSHADE: Faster privacy-preserving distance computation and biometric identification

Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, Michael Zohner
In: 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), June 2014
ACM
[Inproceedings]

Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”

Matthias Schneider, Thomas Schneider
In: 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), June 2014
ACM
[Inproceedings]

More Efficient Oblivious Transfer and Extensions for Faster Secure Computation

Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
In: 20th ACM Conference on Computer and Communications Security (CCS'13), November 2013
ACM
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang