Publications

This page is a summary of my publications with links to background information: bibtex entry, preprint as pdf, presentation slides, link to publisher, web site of event/journal, and abstract.
A classification into categories (books, book chapters, conference papers, journal articles, patents, theses, etc.) is given in my full CV.
See also my profiles at DBLP, Google Scholar, ArnetMiner, and Microsoft Academic Search.

[51] Julien Bringer, Hervé Chabanne, Mélanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner. GSHADE: Faster privacy-preserving distance computation and biometric identification. In 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). ACM, June 11-13, 2014. To appear. [ bib | DOI | web | abstract ]
[50] Matthias Schneider and Thomas Schneider. Notes on non-interactive secure comparison in “image feature extraction in the encrypted domain with privacy-preserving SIFT”. In 2nd ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC'14). ACM, June 11-13, 2014. To appear. [ bib | DOI | web ]
[49] Florian Kerschbaum, Thomas Schneider, and Axel Schröpfer. Automatic protocol selection in secure two-party computations. In 12th International Conference on Applied Cryptography and Network Security (ACNS'14), LNCS. Springer, June 10-13, 2014. To appear. Full version available at http://eprint.iacr.org/2014/200. [ bib | web | abstract ]
[48] Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More efficient oblivious transfer and extensions for faster secure computation. In 20th ACM Conference on Computer and Communications Security (CCS'13), pages 535-548. ACM, November 4-8, 2013. Full version available at http://eprint.iacr.org/2013/552; code at http://encrypto.de/code/OTExtension. [ bib | DOI | pdf | web | abstract ]
[47] N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider, and Stanislaus Stelle. CrowdShare: Secure mobile resource sharing. In 11th International Conference on Applied Cryptography and Network Security (ACNS'13), volume 7954 of LNCS, pages 432-440. Springer, June 25-28, 2013. [ bib | DOI | pdf | web | abstract ]
[46] Wilko Henecka and Thomas Schneider. Faster secure two-party computation with less memory. In 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS'13), pages 437-446. ACM, May 7-10, 2013. [ bib | DOI | pdf | slides | web | abstract ]
[45] Thomas Schneider and Michael Zohner. GMW vs. Yao? Efficient secure two-party computation with low depth circuits. In 17th International Conference on Financial Cryptography and Data Security (FC'13), volume 7859 of LNCS, pages 275-292. Springer, April 1-5, 2013. [ bib | DOI | pdf | web | abstract ]
[44] Florian Kerschbaum, Thomas Schneider, and Axel Schröpfer. Automatic protocol selection in secure two-party computations. 20th Network & Distributed System Security Symposium (NDSS'13), February 24-27, 2013. Short Talk. [ bib | pdf | web ]
[43] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design. Journal of Computer Security (JCS), 21(2):283-315, 01 2013. Preliminary version available at http://eprint.iacr.org/2010/079. [ bib | DOI | pdf | web | abstract ]
[42] Thomas Schneider and Michael Zohner. Efficient secure two-party computation. In 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), December 7, 2012. [ bib | web ]
[41] Pille Pullonen, Dan Bogdanov, and Thomas Schneider. The design and implementation of a two-party protocol suite for SHAREMIND 3. Technical report, CYBERNETICA Institute of Information Security, 2012. T-4-17. [ bib | pdf ]
[40] Thomas Schneider. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer-Verlag Berlin Heidelberg, August 4, 2012. http://thomaschneider.de/engineeringSFEbook. [ bib | DOI | pub ]
[39] Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, and Thomas Schneider. CTL: A platform-independent crypto tools library based on dataflow programming paradigm. In 16th International Conference on Financial Cryptography and Data Security (FC'12), volume 7397 of LNCS, pages 299-313. Springer, February 27 - March 2, 2012. Full version available at http://eprint.iacr.org/2011/679. [ bib | DOI | pdf | web | abstract ]
[38] Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, and Thomas Schneider. Twin Clouds: Secure cloud computing with low latency. In 12th Communications and Multimedia Security Conference (CMS'11), volume 7025 of LNCS, pages 32-44. Springer, October 19-21, 2011. Best Paper Award. [ bib | DOI | pdf | web | abstract ]
[37] Sven Bugiel, Thomas Pöppelmann, Stefan Nürnberger, Ahmad-Reza Sadeghi, and Thomas Schneider. AmazonIA: When elasticity snaps back. In 18th ACM Conference on Computer and Communications Security (CCS'11), pages 389-400. ACM, October 17-21, 2011. See http://trust.cased.de/AMID. [ bib | DOI | pdf | web | abstract ]
[36] Mauro Barni, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, and Thomas Schneider. Privacy-preserving ECG classification with branching programs and neural networks. IEEE Transactions on Information Forensics and Security (TIFS), 6(2):452-468, June 2011. [ bib | DOI | pdf | web | abstract ]
[35] Thomas Schneider. Reden ist Silber - Schweigen ist Gold: Datensparsamkeit durch effizientes Rechnen unter Verschlüsselung. In 12. Deutscher IT-Sicherheitskongress des BSI: Sicher in die digitale Welt von morgen, pages 191-198. SecuMedia-Verlag, 10.-12. Mai, 2011. [ bib | pdf | slides | pub | web | abstract ]
[34] Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, and Thomas Schneider. Twin Clouds: An architecture for secure cloud computing (Extended Abstract). Workshop on Cryptography and Security in Clouds (WCSC'11), March 15-16, 2011. [ bib | pdf | slides | web | abstract ]
[33] Marc Fischlin, Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider, and Ivan Visconti. Secure set intersection with untrusted hardware tokens. In 11th Cryptographers' Track at the RSA Conference (CT-RSA'11), volume 6558 of LNCS, pages 1-16. Springer, February 14-18, 2011. [ bib | DOI | pdf | slides | web | abstract ]
[32] Thomas Schneider. Engineering Secure Two-Party Computation Protocols - Advances in Design, Optimization, and Applications of Efficient Secure Function Evaluation. PhD thesis, Ruhr-University Bochum, Germany, February 9, 2011. [ bib | pdf | abstract ]
[31] Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Efficient secure two-party computation with untrusted hardware tokens. In Ahmad-Reza Sadeghi and David Naccache, editors, Towards Hardware Intrinsic Security: Foundation and Practice, Information Security and Cryptography, pages 367-386. Springer-Verlag Berlin Heidelberg, 2010. [ bib | DOI ]
[30] Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. TASTY: Tool for Automating Secure Two-partY computations. In 17th ACM Conference on Computer and Communications Security (CCS'10), pages 451-462. ACM, October 4-8, 2010. Full version available at http://eprint.iacr.org/2010/365. http://tastyproject.net. [ bib | DOI | pdf | slides | web | abstract ]
[29] José Bacelar Almeida, Endre Bangerter, Manuel Barbosa, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. A certifying compiler for zero-knowledge proofs of knowledge based on sigma-protocols. In 15th European Symposium on Research in Computer Security (ESORICS'10), volume 6345 of LNCS, pages 151-167. Springer, September 20-22, 2010. Full version available at http://eprint.iacr.org/2010/339. [ bib | DOI | pdf | web | abstract ]
[28] Ahmad-Reza Sadeghi and Thomas Schneider. Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten. In Workshop Innovative und sichere Informationstechnologie für das Gesundheitswesen von morgen (perspeGKtive'10), volume P-174 of LNI, pages 11-25. Bonner Köllen Verlag, September 8, 2010. [ bib | pdf | slides | pub | web | abstract ]
[27] Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Garbled circuits for leakage-resilience: Hardware implementation and evaluation of one-time programs. In 12th International Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), volume 6225 of LNCS, pages 383-397. Springer, August 17-20, 2010. Full version available at http://eprint.iacr.org/2010/276. [ bib | DOI | pdf | slides | web | abstract ]
[26] Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. YAZKC: Yet Another Zero-Knowledge Compiler. 19th USENIX Security Symposium (Security'10) Poster Session, August 11-13, 2010. [ bib | pdf | poster | web | abstract ]
[25] Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy. Token-based cloud computing - secure outsourcing of data and arbitrary computations with lower latency. In 3rd International Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, volume 6101 of LNCS, pages 417-429. Springer, June 21-23, 2010. [ bib | DOI | pdf | slides | web | abstract ]
[24] Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Embedded SFE: Offloading server and network using hardware tokens. In 14th International Conference on Financial Cryptography and Data Security (FC'10), volume 6052 of LNCS, pages 207-221. Springer, January 25-28, 2010. Full version available at http://eprint.iacr.org/2009/591. [ bib | DOI | pdf | slides | web | abstract ]
[23] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In 8th International Conference on Cryptology And Network Security (CANS'09), volume 5888 of LNCS, pages 1-20. Springer, December 12-14, 2009. Full version available at http://eprint.iacr.org/2009/411. [ bib | DOI | pdf | slides | web | abstract ]
[22] Benny Pinkas, Thomas Schneider, Nigel P. Smart, and Stephen C. Williams. Secure two-party computation is practical. In 15th Advances in Cryptology - ASIACRYPT 2009, volume 5912 of LNCS, pages 250-267. Springer, December 6-10, 2009. Full version available at http://eprint.iacr.org/2009/314. [ bib | DOI | pdf | web | abstract ]
[21] Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Annika Paus, Ahmad-Reza Sadeghi, and Thomas Schneider. Efficient privacy-preserving classification of ECG signals. In 1st IEEE International Workshop on Information Forensics and Security (IEEE WIFS'09), pages 91-95. IEEE, December 6-9, 2009. [ bib | DOI | pdf | abstract ]
[20] Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. Efficient privacy-preserving face recognition. In 12th International Conference on Information Security and Cryptology (ICISC'09), volume 5984 of LNCS, pages 229-244. Springer, December 2-4, 2009. Full version available at http://eprint.iacr.org/2009/507. [ bib | DOI | pdf | web | abstract ]
[19] Ahmad-Reza Sadeghi and Thomas Schneider. Ask your e-doctor without telling: Privacy-preserving medical diagnostics. Section Days of Ruhr-University Bochum Research School, November 6, 2009. (Poster prize awarded). [ bib | poster | web ]
[18] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 12-13, 2009. [ bib | pdf | web | abstract ]
[17] Endre Bangerter, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, and Joe-Kai Tsay. On the design and implementation of efficient zero-knowledge proofs of knowledge. In ECRYPT workshop on Software Performance Enhancements for Encryption and Decryption and Cryptographic Compilers (SPEED-CC'09), October 12-13, 2009. Implementation available at http://zkc.cace-project.eu. [ bib | pdf | web | abstract ]
[16] Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, and Thomas Schneider. Secure evaluation of private linear branching programs with medical applications. In 14th European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of LNCS, pages 424-439. Springer, September 21-25, 2009. Full version available at http://eprint.iacr.org/2009/195. [ bib | DOI | pdf | slides | web | abstract ]
[15] Endre Bangerter, Thomas Briner, Wilko Henecka, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. Automatic generation of sigma-protocols. In 6th European Workshop on Public Key Services, Applications and Infrastructures (EUROPKI'09), volume 6391 of LNCS, pages 67-82. Springer, September 10-11, 2009. [ bib | DOI | pdf | web | abstract ]
[14] Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, and Thomas Schneider. Combining signal processing and cryptographic protocol design for efficient ECG classification. In 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 10, 2009. [ bib | pdf | web | abstract ]
[13] Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. How to combine homomorphic encryption and garbled circuits - improved circuits and computing the minimum distance efficiently. In 1st International Workshop on Signal Processing in the EncryptEd Domain (SPEED'09), September 10, 2009. [ bib | pdf | slides | web | abstract ]
[12] Annika Paus, Ahmad-Reza Sadeghi, and Thomas Schneider. Practical secure evaluation of semi-private functions. In 7th International Conference on Applied Cryptography and Network Security (ACNS'09), volume 5536 of LNCS, pages 89-106. Springer, June 2-5, 2009. Implementation available at http://www.trust.rub.de/FairplaySPF. Full version available at http://eprint.iacr.org/2009/124. [ bib | DOI | pdf | slides | abstract ]
[11] Endre Bangerter, Jan Camenisch, Stephan Krenn, Ahmad-Reza Sadeghi, and Thomas Schneider. Automatic generation of sound zero-knowledge protocols. 28th Advances in Cryptology - EUROCRYPT 2009 Poster Session, April 26-30, 2009. Full version available at http://eprint.iacr.org/2008/471. [ bib | pdf | poster | web | abstract ]
[10] Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, and Joe-Kai Tsay. Bringing zero-knowledge proofs of knowledge to practice. In 17th International Workshop on Security Protocols (SPW'09), volume 7028 of LNCS, pages 51-62. Springer, April 1-3, 2009. Full version available at http://eprint.iacr.org/2009/211. [ bib | DOI | pdf | web | abstract ]
[9] Ahmad-Reza Sadeghi and Thomas Schneider. Generalized universal circuits for secure evaluation of private functions with application to data classification. In 11th International Conference on Information Security and Cryptology (ICISC'08), volume 5461 of LNCS, pages 336-353. Springer, December 3-5, 2008. Full version available at http://eprint.iacr.org/2008/453. [ bib | DOI | pdf | slides | web | abstract ]
[8] Vladimir Kolesnikov and Thomas Schneider. Secure function evaluation techniques for circuits containing XOR gates with applications to universal circuits. U.S. patent no 8443205 (applied October 24, 2008; issued May 14, 2013), October 2008. [ bib | pub | abstract ]
[7] Vladimir Kolesnikov and Thomas Schneider. Improved garbled circuit: Free XOR gates and applications. In 35th International Colloquium on Automata, Languages and Programming (ICALP'08), volume 5126 of LNCS, pages 486-498. Springer, July 6-13, 2008. [ bib | DOI | pdf | slides | web | abstract ]
[6] Vladimir Kolesnikov, Thomas Schneider, and Volker Strehl. Practical secure function evaluation. In 8. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), volume WSI-2008-02, April 11, 2008. [ bib | pdf | slides | web ]
[5] Thomas Schneider. Practical secure function evaluation. In Fachwissenschaftlicher Informatik-Kongress (Informatiktage 2008), volume S-6 of LNI, pages 37-40. GI, March 14, 2008. [ bib | pdf | poster | pub | web ]
[4] Thomas Schneider. Practical secure function evaluation. Master's thesis, University Erlangen-Nürnberg, Germany, February 27, 2008. http://thomaschneider.de/theses/da/. [ bib | pdf | abstract ]
[3] Vladimir Kolesnikov and Thomas Schneider. Universal circuit for secure function evaluation. U.S. patent no 8175854 (applied July 14, 2008; issued May 8, 2012), July 2008. [ bib | pub | abstract ]
[2] Vladimir Kolesnikov and Thomas Schneider. A practical universal circuit construction and secure evaluation of private functions. In 12th International Conference on Financial Cryptography and Data Security (FC'08), volume 5143 of LNCS, pages 83-97. Springer, January 28-31, 2008. Implementation available at http://thomaschneider.de/FairplayPF. [ bib | DOI | pdf | slides | pub | web | abstract ]
[1] Thomas Schneider. Secure task migration and interprocess communication in reconfigurable, distributed, embedded systems. Bachelor's thesis, University Erlangen-Nürnberg, Germany, July 10, 2007. http://thomaschneider.de/theses/sa/. [ bib | pdf ]
Subpages (4): Abstracts Bibtex Book Coauthors