H-Index & Metrics Top Publications
Thomas Schneider

Thomas Schneider

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 38 Citations 8,096 109 World Ranking 4929 National Ranking 228

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Internal medicine
  • Algorithm

Thomas Schneider spends much of his time researching Secure multi-party computation, Theoretical computer science, Secure two-party computation, Encryption and Cryptography. His Secure multi-party computation research is multidisciplinary, relying on both Block size, Block cipher and Cipher. Thomas Schneider interconnects Overhead, Permutation, Integer, Arithmetic and Intersection in the investigation of issues within Theoretical computer science.

His study in Secure two-party computation is interdisciplinary in nature, drawing from both Symmetric-key algorithm, Distributed computing and Oblivious transfer. The Homomorphic encryption research Thomas Schneider does as part of his general Encryption study is frequently linked to other disciplines of science, such as Gigabit Ethernet, therefore creating a link between diverse domains of science. Cryptography is a subfield of Computer security that he investigates.

His most cited work include:

  • Secure Two-Party Computation Is Practical (626 citations)
  • Improved Garbled Circuit: Free XOR Gates and Applications (531 citations)
  • TASTY: tool for automating secure two-party computations (336 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Secure multi-party computation, Theoretical computer science, Cryptography, Protocol and Computation. His Secure multi-party computation research is multidisciplinary, incorporating perspectives in Homomorphic encryption and Distributed computing. His Distributed computing research is multidisciplinary, relying on both Compiler and Cloud computing.

While the research belongs to areas of Theoretical computer science, he spends his time largely on the problem of Oblivious transfer, intersecting his research to questions surrounding Random oracle and Hash function. His Cryptography study frequently links to other fields, such as Encryption. Thomas Schneider specializes in Protocol, namely Secure two-party computation.

He most often published in these fields:

  • Secure multi-party computation (20.68%)
  • Theoretical computer science (15.79%)
  • Cryptography (14.66%)

What were the highlights of his more recent work (between 2018-2021)?

  • Secure multi-party computation (20.68%)
  • Protocol (13.16%)
  • Cryptography (14.66%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Secure multi-party computation, Protocol, Cryptography, Manufacturing engineering and Inference. His Secure multi-party computation study integrates concerns from other disciplines, such as Homomorphic encryption, Encryption, Backdoor and Word. The concepts of his Protocol study are interwoven with issues in Computation, Edit distance and Information retrieval.

Thomas Schneider studies Computation, focusing on Secure two-party computation in particular. His Cryptography research integrates issues from Computer network, Probabilistic logic and Theoretical computer science. His Theoretical computer science research includes elements of Block and Private set intersection.

Between 2018 and 2021, his most popular works were:

  • Preserving privacy in speaker and speech characterisation (27 citations)
  • Efficient Circuit-Based PSI with Linear Communication (17 citations)
  • SoK: Modular and Efficient Private Decision Tree Evaluation (16 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Internal medicine
  • Algorithm

His primary scientific interests are in Secure multi-party computation, Protocol, Cryptography, Computer network and Computation. His Secure multi-party computation research incorporates themes from Adversary, Backdoor and Private set intersection. Particularly relevant to Secure two-party computation is his body of work in Protocol.

His work deals with themes such as Arithmetic circuits, Oblivious transfer and Parallel computing, which intersect with Secure two-party computation. His biological study spans a wide range of topics, including Probabilistic logic, Encryption and Biometrics. His studies in Computation integrate themes in fields like Homomorphic encryption and Multiplication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Improved Garbled Circuit: Free XOR Gates and Applications

Vladimir Kolesnikov;Thomas Schneider.
international colloquium on automata languages and programming (2008)

711 Citations

Secure Two-Party Computation Is Practical

Benny Pinkas;Thomas Schneider;Nigel P. Smart;Stephen C. Williams.
international conference on the theory and application of cryptology and information security (2009)

626 Citations

TASTY: tool for automating secure two-party computations

Wilko Henecka;Stefan K ögl;Ahmad-Reza Sadeghi;Thomas Schneider.
computer and communications security (2010)

410 Citations

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Daniel Demmler;Thomas Schneider;Michael Zohner.
network and distributed system security symposium (2015)

398 Citations

Efficient privacy-preserving face recognition

Ahmad-Reza Sadeghi;Thomas Schneider;Immo Wehrenberg.
international conference on information security and cryptology (2009)

364 Citations

More efficient oblivious transfer and extensions for faster secure computation

Gilad Asharov;Yehuda Lindell;Thomas Schneider;Michael Zohner.
computer and communications security (2013)

338 Citations

Randomized Trial of Low-Volume PEG Solution Versus Standard PEG + Electrolytes for Bowel Cleansing Before Colonoscopy

Christian Ell;Wolfgang Fischbach;Hans-Joachim Bronisch;Stefan Dertinger.
The American Journal of Gastroenterology (2008)

298 Citations

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima

Vladimir Kolesnikov;Ahmad-Reza Sadeghi;Thomas Schneider.
cryptology and network security (2009)

256 Citations

Twin Clouds: An Architecture for Secure Cloud Computing

Sven Bugiel;Stefan Nürnberger;Ahmad-Reza Sadeghi;Thomas Schneider.
(2011)

237 Citations

Twin Clouds: An Architecture for Secure Cloud Computing (Extended Abstract)

Sven Bugiel;Stefan Nürnberger;Ahmad-Reza Sadeghi;Thomas Schneider.
(2011)

224 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Thomas Schneider

Vladimir Kolesnikov

Vladimir Kolesnikov

Georgia Institute of Technology

Publications: 39

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 35

Florian Kerschbaum

Florian Kerschbaum

University of Waterloo

Publications: 32

Yehuda Lindell

Yehuda Lindell

Bar-Ilan University

Publications: 28

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 27

Nigel P. Smart

Nigel P. Smart

KU Leuven

Publications: 27

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 26

Benny Pinkas

Benny Pinkas

Bar-Ilan University

Publications: 26

Mauro Barni

Mauro Barni

University of Siena

Publications: 22

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 20

Mariana Raykova

Mariana Raykova

Google (United States)

Publications: 19

Dan Boneh

Dan Boneh

Stanford University

Publications: 18

Hervé Chabanne

Hervé Chabanne

Télécom ParisTech

Publications: 18

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 16

Kevin R. B. Butler

Kevin R. B. Butler

University of Florida

Publications: 16

Something went wrong. Please try again later.