Follow
Christian Weinert
Christian Weinert
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia conference on computer and communications …, 2018
5382018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Annual International Conference on the Theory and Applications of …, 2018
1882018
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
1332017
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
1212019
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
772015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
672018
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
482020
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
372018
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
362019
All the numbers are US: large-scale abuse of contact discovery in mobile messengers
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
Cryptology ePrint Archive, 2020
342020
{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
30th USENIX Security Symposium (USENIX Security 21), 3577-3594, 2021
222021
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
International Conference on Applied Cryptography and Network Security, 99-121, 2021
122021
Trustworthy AI inference systems: An industry research view
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
122020
Cryptospn: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
arXiv preprint arXiv:2002.00801, 2020
92020
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
92014
Towards practical secure neural network inference: the journey so far and the road ahead
ZÁ Mann, C Weinert, D Chabal, JW Bos
ACM Computing Surveys 56 (5), 1-37, 2023
82023
Contact discovery in mobile messengers: Low-cost attacks, quantitative analyses, and efficient mitigations
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
ACM Transactions on Privacy and Security 26 (1), 1-44, 2022
72022
Scionfl: Secure quantized aggregation for federated learning
Y Ben-Itzhak, H Möllering, B Pinkas, T Schneider, A Suresh, O Tkachenko, ...
CoRR, vol. abs/2210.07376, 2022
72022
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
H Mantel, L Scheidel, T Schneider, A Weber, C Weinert, T Weißmantel
Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020
72020
Mops: a modular protection scheme for long-term storage
C Weinert, D Demirel, M Vigil, M Geihs, J Buchmann
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20