Daniel Demmler
Daniel Demmler
Postdoc, Uni Hamburg
Verified email at informatik.uni-hamburg.de
Title
Cited by
Cited by
Year
ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
D Demmler, T Schneider, M Zohner
NDSS, 2015
2842015
Automated Synthesis of Optimized Circuits for Secure Computation
D Demmler, G Dessouky, F Koushanfar, AR Sadeghi, T Schneider, ...
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
592015
CogniCrypt: supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
392017
RAID-PIR: Practical Multi-Server PIR
D Demmler, A Herzberg, T Schneider
ACM Cloud Computing Security Workshop (ACM CCSW'14), 2014
372014
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
D Demmler, T Schneider, M Zohner
23rd USENIX Security Symposium (USENIX Security'14), 2014
312014
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens (Full Version)
D Demmler, T Schneider, M Zohner
http://eprint.iacr.org/2014/467, 2014
31*2014
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation
N Büscher, D Demmler, S Katzenbeisser, D Kretzmer, T Schneider
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
272018
Privacy-Preserving Interdomain Routing at Internet Scale (Full Version)⋆
G Asharov, D Demmler, M Schapira, T Schneider, G Segev, S Shenker, ...
27*
PIR-PSI: Scaling private contact discovery
D Demmler, P Rindal, M Rosulek, N Trieu
Proceedings on Privacy Enhancing Technologies 2018 (4), 159-178, 2018
222018
SIXPACK: Securing Internet eXchange Points Against Curious onlooKers
M Chiesa, D Demmler, M Canini, M Schapira, T Schneider
Proceedings of the 13th International Conference on emerging Networking …, 2017
152017
Towards securing internet exchange points against curious onlookers
M Chiesa, D Demmler, M Canini, M Schapira, T Schneider
Proceedings of the 2016 Applied Networking Research Workshop, 32-34, 2016
142016
Privacy-preserving whole-genome variant queries
D Demmler, K Hamacher, T Schneider, S Stammler
International Conference on Cryptology and Network Security, 71-92, 2017
92017
OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks
D Demmler, M Holz, T Schneider
International Conference on Applied Cryptography and Network Security, 599-619, 2017
12017
MP2ML: a mixed-protocol machine learning framework for private inference
F Boemer, R Cammarota, D Demmler, T Schneider, H Yalame
Proceedings of the 15th International Conference on Availability …, 2020
2020
Secure Two-Party Computation in a Quantum World.
N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ...
IACR Cryptol. ePrint Arch. 2020, 411, 2020
2020
Towards Practical Privacy-Preserving Protocols
D Demmler
Technische Universität, 2019
2019
Hardware-Assisted Two-Party Secure Computation on Mobile Devices
D Demmler
TU Darmstadt, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–17