Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Hye-Jin Jeong
Tidjani Négadi
Vikash Prasad
Heather Souter
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
MICHAEL ZOHNER
Author Info
Open Visualization
Name
Affiliation
Papers
MICHAEL ZOHNER
Integrated Circuits and Systems Lab, Technische Universität Darmstadt, Darmstadt, Germany,Center for Advanced Security Research Darmstadt (CASED), Darmstadt, Germany
18
Collaborators
Citations
PageRank
28
409
13.44
Referers
Referees
References
792
509
455
Search Limit
100
792
Publications (18 rows)
Collaborators (28 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Pushing the Communication Barrier in Secure Computation using Lookup Tables
6
0.39
2018
Scalable Private Set Intersection Based on OT Extension
17
0.56
2018
Privacy-Preserving Interdomain Routing at Internet Scale
8
0.44
2017
More Efficient Oblivious Transfer Extensions
6
0.47
2017
Phasing: Private Set Intersection using Permutation-based Hashing
27
0.79
2015
ABY -- A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
64
1.33
2015
More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries
36
0.93
2015
Ciphers for MPC and FHE
14
0.63
2015
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
5
0.41
2014
GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification
19
0.71
2014
Faster Private Set Intersection based on OT Extension
50
1.31
2014
AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework.
2
0.40
2013
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
83
1.94
2013
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
34
0.90
2013
Improved Algebraic Side-Channel Attack on AES.
18
0.79
2013
Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines.
15
0.64
2012
Butterfly-Attack on skein's modular addition
3
0.41
2012
An adaptable, modular, and autonomous side-channel vulnerability evaluator.
2
0.39
2012
1