Research

Below you can find a list of my published journal articles, research papers, and technical reports.

For more information, please see my Google Scholar profile.

PhD Thesis:

Journal Articles:

  • Benny Pinkas, Thomas Schneider, and Michael Zohner. Scalable Private Set Intersection based on OT Extension. In ACM Transactions on Privacy and Security Volume 21(2), 7:1-7:35 (2018). [ code | eprint ]

  • Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More Efficient Oblivious Transfer Extensions. In Journal of Cryptology, Volume 30(3), 805-858 (2017). [ pdf | code | eprint ]

  • Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, and Johannes Buchmann: Improved algebraic side-channel attack on AES. In Journal of Cryptographic Engineering, Volume 3: 139-156 (2013).

Research Papers:

  • Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, and Michael Zohner. Privacy-Perserving Inter-Domain Routing at Large Scale. In Proceedings of Privacy Enhancing Technologies (PETS'17).

  • Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, and Michael Zohner. Pushing the Communication Barrier in Secure Computation using Lookup Tables. In Network and Distributed System Security (NDSS'17), February 26 - March 01, 2017. [ code | eprint ]

  • Benny Pinkas, Thomas Schneider, Gil Segev, and Michael Zohner. Phasing: Private Set Intersection using Permutation-based Hashing. In 24th USENIX Security Symposium, August 12-14, 2015. [ pdf | special-purpose protocols; circuit-based protocols | slides | eprint ]

  • Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. In Eurocrypt'15, volume 9056 of LNCS, pages 673-701, Springer, April 26-30, 2015. [ pdf | code | eprint ]

    • Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner. Ciphers for MPC and FHE. In Eurocrypt'15, volume 9056 of LNCS, pages 430-454, Springer, April 26-30, 2015. [ pdf ]

  • Daniel Demmler, Thomas Schneider, and Zohner. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In Network and Distributed System Security (NDSS'15), Feburary 8-11, 2015. [ pdf | code | slides ]

  • Daniel Demmler, Thomas Schneider, and Michael Zohner. Ad-hoc secure two-party computation on mobile devices using hardware tokens. In 23rd USENIX Security Symposium, August 20-22, 2014. [ pdf | eprint ]

  • Benny Pinkas, Thomas Schneider, and Michael Zohner. Faster private set intersection based on OT extension. In 23rd USENIX Security Symposium, August 20-22, 2014. [ pdf | code | slides | eprint ]

  • Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner. GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification. In 2nd ACM Workshop on Information Hiding and Multimedia Security, June 11-13, 2014. [ pdf | code | slides ]

  • Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. More efficient oblivious transfer and extensions for faster secure computation. In 20th ACM Conference on Computer and Communications Security (CCS'13). ACM, November 4-8, 2013. [ pdf | code | slides | eprint ].

  • Thomas Schneider and Michael Zohner. GMW vs. Yao? Efficient secure two-party computation with low depth circuits. In 17th International Conference on Financial Cryptography and Data Security (FC'13), volume 7859 of LNCS, pages 275-292. Springer, April 1-5, 2013. [ pdf | code | slides ]

  • Michael Zohner, Michael Kasper, and Marc Stöttinger: Butterfly-Attack on Skein's Modular Addition. In 3rd Workshop on Constructive Side-Channel Analysis (COSADE'12), volume 7275 of LNCS, pages 215-230, Springer, May 3-4, 2012.

  • Annelie Heuser and Michael Zohner: Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. In 3rd Workshop on Constructive Side-Channel Analysis (COSADE'12), volume 7275 of LNCS, pages 249-264, Springer, May 3-4, 2012.

  • Michael Zohner, Michael Kasper, Marc Stöttinger, and Sorin A. Huss: Side channel analysis of the SHA-3 finalists. In Design, Automation & Test in Europe Conference & Exhibition (DATE'12), IEEE 2012 ISBN 978-1-4577-2145-8, pages 1012-1017, March 12-16, 2012. 1012-1017.

  • Michael Zohner, Marc Stöttinger, Sorin A. Huss, and Oliver Stein: An adaptable, modular, and autonomous side-channel vulnerability evaluator. In 5th International Symposium on Hardware-Oriented Security and Trust (HOST'12), IEEE 2012 ISBN 978-1-4673-2341-3, pages 43-48, June 3-4, 2012.

    • Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, and Johannes Buchmann: Improved algebraic side-channel attack on AES. In 5th International Symposium on Hardware-Oriented Security and Trust (HOST'12), IEEE 2012 ISBN 978-1-4673-2341-3, pages 146-151, June 3-4, 2012. [ eprint ].

Technical Reports:

  • Thomas Schneider and Michael Zohner. Efficient secure two-party computation. In 17. Workshop der Fachgruppe Kryptographie in der Gesellschaft für Informatik (Kryptotag), December 7, 2012.

  • Michael Zohner, Michael Kasper, and Marc Stöttinger: Side channel analysis of the SHA-3 finalists. In 3rd SHA-3 Candidate Conference, March, 22-23, 2012.

  • Michael Zohner, Michael Kasper, and Marc Stöttinger: Side channel analysis of the SHA-3 finalists. In 1st International Conference on Trustworthy Embedded Devices (TrustED'11), September, 15-16, 2011.