Prof. Dr.-Ing. Thomas Schneider

I am a professor for Cybersecurity / Engineering Cryptographic Protocols (ENCRYPTO) at the Department of Computer Science of Technische Universität Darmstadt, Germany.

Before, I was independent Claude Shannon research group leader at the Center for Research in Security and Privacy (CRISP) (formerly European Center for Security and Privacy By Design (EC SPRIDE)) and postdoc in the System Security Lab at the Center for advanced Security Research Darmstadt (CASED).

My research focuses on applied cryptography, privacy, and computer security, including Privacy-Preserving Protocols, Compilers for Cryptographic Protocols, Hardware-Assisted Cryptographic Protocols, and Cloud Computing Security.

You can find further information on my personal webpage.

Download my CV here.

Contact

S4|14 5.3.14
Mornewegstraße 32
64293 Darmstadt

+49 6151 16-27300

thomas.schneider(a-t)cs.tu-darmstadt.de

Publications

Additional Attributes

Type

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits

Ebrahim Songhori, Siam Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), May 2015
[Inproceedings]

Ciphers for MPC and FHE

Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner
In: 34th Advances in Cryptology - EUROCRYPT 2015, April 2015
Springer
[Online-Edition: https://www.cosic.esat.kuleuven.be/eurocrypt_2015/]
[Inproceedings]

More efficient oblivious transfer extensions with security for malicious adversaries

Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner
In: 34th Advances in Cryptology - EUROCRYPT 2015, April 2015
[Online-Edition: https://www.cosic.esat.kuleuven.be/eurocrypt_2015/]
[Inproceedings]

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Daniel Demmler, Thomas Schneider, Michael Zohner
In: Network and Distributed System Security Symposium (NDSS'15), February 2015
[Inproceedings]

Time to rethink: Trust brokerage using trusted execution environments

Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova
In: 8th International Conference on Trust & Trustworthy Computing (TRUST'15), 2015
Springer
[Online-Edition: www.ics.forth.gr/trust2015/]
[Inproceedings]

RAID-PIR: Practical multi-server PIR

Daniel Demmler, Amir Herzberg, Thomas Schneider
In: 6th ACM Cloud Computing Security Workshop (ACM CCSW'14), November 2014
ACM
[Inproceedings]

Faster private set intersection based on OT extension

Benny Pinkas, Thomas Schneider, Michael Zohner
In: 23rd USENIX Security Symposium (USENIX Security'14), August 2014
[Inproceedings]

Ad-hoc secure two-party computation on mobile devices using hardware tokens

Daniel Demmler, Thomas Schneider, Michael Zohner
In: 23rd USENIX Security Symposium (USENIX Security'14), August 2014
[Inproceedings]

Automatic Protocol Selection in Secure Two-Party Computations

Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
In: 12th International Conference on Applied Cryptography and Network Security (ACNS'14), June 2014
Springer
[Inproceedings]

GSHADE: Faster privacy-preserving distance computation and biometric identification

Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, Michael Zohner
In: 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14), June 2014
ACM
[Inproceedings]
A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Webseitenanalyse: Mehr Informationen
zum Seitenanfangzum Seitenanfang