Introduction N Büscher, S Katzenbeisser Compilation for Secure Multi-party Computation, 1-4, 2017 | 380* | 2017 |
HyCC: Compilation of hybrid protocols for practical secure computation N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 80 | 2018 |
Scapi: a scalable attestation protocol to detect software and physical attacks F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 51 | 2017 |
Breaking reCAPTCHA: a holistic approach via shape recognition P Baecher, N Büscher, M Fischlin, B Milde Future Challenges in Security and Privacy for Academia and Industry: 26th …, 2011 | 49 | 2011 |
Salad: Secure and lightweight attestation of highly dynamic and disruptive networks F Kohnhäuser, N Büscher, S Katzenbeisser Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 42 | 2018 |
Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering. N Buescher, S Boukoros, S Bauregger, S Katzenbeisser Proc. Priv. Enhancing Technol. 2017 (4), 198-214, 2017 | 38 | 2017 |
Compiling low depth circuits for practical secure computation N Büscher, A Holzer, A Weber, S Katzenbeisser Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 32 | 2016 |
Faster secure computation through automatic parallelization N Buescher, S Katzenbeisser 24th {USENIX} Security Symposium ({USENIX} Security 15), 531-546, 2015 | 27 | 2015 |
Creating cryptographic challenges using multi-party computation: The LWE challenge J Buchmann, N Büscher, F Göpfert, S Katzenbeisser, J Krämer, ... Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016 | 25 | 2016 |
A practical attestation protocol for autonomous embedded systems F Kohnhäuser, N Büscher, S Katzenbeisser 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 263-278, 2019 | 17 | 2019 |
On compiling boolean circuits optimized for secure multi-party computation N Büscher, M Franz, A Holzer, H Veith, S Katzenbeisser Formal Methods in System Design 51, 308-331, 2017 | 14 | 2017 |
Scalable secure computation from ANSI-C N Buescher, D Kretzmer, A Jindal, S Katzenbeisser 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 13 | 2016 |
Secure two-party computation in a quantum world N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ... Applied Cryptography and Network Security: 18th International Conference …, 2020 | 12 | 2020 |
Compilation for secure multi-party computation N Büscher, S Katzenbeisser Springer International Publishing, 2017 | 7 | 2017 |
Towards practical RAM based secure computation N Buescher, A Weber, S Katzenbeisser Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 4 | 2018 |
Compilation for more practical secure multi-party computation N Büscher Technische Universität, 2018 | 3 | 2018 |
Implementing the Global Cellular Automata on CUDA B Milde, N Buescher, M Goesele PARS: Parallel-Algorithmen,-Rechnerstrukturen und-Systemsoftware: Vol. 28, No. 1, 2011 | 1 | 2011 |
Scalable Attestation Resilient to Physical Attacks for Embedded Devices in Mesh Networks F Kohnhäuser, N Büscher, S Gabmeyer, S Katzenbeisser arXiv preprint arXiv:1701.08034, 2017 | | 2017 |
Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols N Büscher, S Katzenbeisser, N Büscher, S Katzenbeisser Compilation for Secure Multi-party Computation, 61-77, 2017 | | 2017 |
Compiling Parallel Circuits N Büscher, S Katzenbeisser, N Büscher, S Katzenbeisser Compilation for Secure Multi-party Computation, 43-59, 2017 | | 2017 |