D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 39 Citations 8,835 169 World Ranking 5999 National Ranking 278

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Internal medicine
  • Algorithm

Thomas Schneider spends much of his time researching Secure multi-party computation, Theoretical computer science, Secure two-party computation, Encryption and Cryptography. His Secure multi-party computation research is multidisciplinary, relying on both Block size, Block cipher and Cipher. Thomas Schneider interconnects Overhead, Permutation, Integer, Arithmetic and Intersection in the investigation of issues within Theoretical computer science.

His study in Secure two-party computation is interdisciplinary in nature, drawing from both Symmetric-key algorithm, Distributed computing and Oblivious transfer. The Homomorphic encryption research Thomas Schneider does as part of his general Encryption study is frequently linked to other disciplines of science, such as Gigabit Ethernet, therefore creating a link between diverse domains of science. Cryptography is a subfield of Computer security that he investigates.

His most cited work include:

  • Secure Two-Party Computation Is Practical (626 citations)
  • Improved Garbled Circuit: Free XOR Gates and Applications (531 citations)
  • TASTY: tool for automating secure two-party computations (336 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Secure multi-party computation, Theoretical computer science, Cryptography, Protocol and Computation. His Secure multi-party computation research is multidisciplinary, incorporating perspectives in Homomorphic encryption and Distributed computing. His Distributed computing research is multidisciplinary, relying on both Compiler and Cloud computing.

While the research belongs to areas of Theoretical computer science, he spends his time largely on the problem of Oblivious transfer, intersecting his research to questions surrounding Random oracle and Hash function. His Cryptography study frequently links to other fields, such as Encryption. Thomas Schneider specializes in Protocol, namely Secure two-party computation.

He most often published in these fields:

  • Secure multi-party computation (20.68%)
  • Theoretical computer science (15.79%)
  • Cryptography (14.66%)

What were the highlights of his more recent work (between 2018-2021)?

  • Secure multi-party computation (20.68%)
  • Protocol (13.16%)
  • Cryptography (14.66%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Secure multi-party computation, Protocol, Cryptography, Manufacturing engineering and Inference. His Secure multi-party computation study integrates concerns from other disciplines, such as Homomorphic encryption, Encryption, Backdoor and Word. The concepts of his Protocol study are interwoven with issues in Computation, Edit distance and Information retrieval.

Thomas Schneider studies Computation, focusing on Secure two-party computation in particular. His Cryptography research integrates issues from Computer network, Probabilistic logic and Theoretical computer science. His Theoretical computer science research includes elements of Block and Private set intersection.

Between 2018 and 2021, his most popular works were:

  • Preserving privacy in speaker and speech characterisation (27 citations)
  • Efficient Circuit-Based PSI with Linear Communication (17 citations)
  • SoK: Modular and Efficient Private Decision Tree Evaluation (16 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Internal medicine
  • Algorithm

His primary scientific interests are in Secure multi-party computation, Protocol, Cryptography, Computer network and Computation. His Secure multi-party computation research incorporates themes from Adversary, Backdoor and Private set intersection. Particularly relevant to Secure two-party computation is his body of work in Protocol.

His work deals with themes such as Arithmetic circuits, Oblivious transfer and Parallel computing, which intersect with Secure two-party computation. His biological study spans a wide range of topics, including Probabilistic logic, Encryption and Biometrics. His studies in Computation integrate themes in fields like Homomorphic encryption and Multiplication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Improved Garbled Circuit: Free XOR Gates and Applications

Vladimir Kolesnikov;Thomas Schneider.
international colloquium on automata languages and programming (2008)

773 Citations

Secure Two-Party Computation Is Practical

Benny Pinkas;Thomas Schneider;Nigel P. Smart;Stephen C. Williams.
international conference on the theory and application of cryptology and information security (2009)

648 Citations

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Daniel Demmler;Thomas Schneider;Michael Zohner.
network and distributed system security symposium (2015)

521 Citations

TASTY: tool for automating secure two-party computations

Wilko Henecka;Stefan K ögl;Ahmad-Reza Sadeghi;Thomas Schneider.
computer and communications security (2010)

451 Citations

Efficient privacy-preserving face recognition

Ahmad-Reza Sadeghi;Thomas Schneider;Immo Wehrenberg.
international conference on information security and cryptology (2009)

420 Citations

More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.

Gilad Asharov;Yehuda Lindell;Thomas Schneider;Michael Zohner.
IACR Cryptology ePrint Archive (2013)

393 Citations

Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications

M. Sadegh Riazi;Christian Weinert;Oleksandr Tkachenko;Ebrahim M. Songhori.
computer and communications security (2018)

305 Citations

Randomized Trial of Low-Volume PEG Solution Versus Standard PEG + Electrolytes for Bowel Cleansing Before Colonoscopy

Christian Ell;Wolfgang Fischbach;Hans-Joachim Bronisch;Stefan Dertinger.
The American Journal of Gastroenterology (2008)

298 Citations

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima

Vladimir Kolesnikov;Ahmad-Reza Sadeghi;Thomas Schneider.
cryptology and network security (2009)

289 Citations

Twin Clouds: An Architecture for Secure Cloud Computing

Sven Bugiel;Stefan Nürnberger;Ahmad-Reza Sadeghi;Thomas Schneider.
(2011)

271 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Thomas Schneider

Vladimir Kolesnikov

Vladimir Kolesnikov

Georgia Institute of Technology

Publications: 39

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 35

Florian Kerschbaum

Florian Kerschbaum

University of Waterloo

Publications: 32

Yehuda Lindell

Yehuda Lindell

Bar-Ilan University

Publications: 28

Stefan Katzenbeisser

Stefan Katzenbeisser

University of Passau

Publications: 27

Nigel P. Smart

Nigel P. Smart

KU Leuven

Publications: 27

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 26

Benny Pinkas

Benny Pinkas

Bar-Ilan University

Publications: 26

Mauro Barni

Mauro Barni

University of Siena

Publications: 22

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 20

Mariana Raykova

Mariana Raykova

Google (United States)

Publications: 19

Dan Boneh

Dan Boneh

Stanford University

Publications: 18

Hervé Chabanne

Hervé Chabanne

Télécom ParisTech

Publications: 18

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 16

Kevin R. B. Butler

Kevin R. B. Butler

University of Florida

Publications: 16

Ivan Damgård

Ivan Damgård

Aarhus University

Publications: 16

Trending Scientists

Pádraig Cunningham

Pádraig Cunningham

University College Dublin

Karin Strauss

Karin Strauss

Microsoft (United States)

Thomas J. Chemmanur

Thomas J. Chemmanur

Boston College

Xiaolin Hu

Xiaolin Hu

Tsinghua University

Zhangxin Chen

Zhangxin Chen

University of Calgary

Tobin Allen King

Tobin Allen King

Silverbrook Research Pty Ltd

Reiner Anwander

Reiner Anwander

University of Tübingen

Erwin Buncel

Erwin Buncel

Queen's University

Ene Metspalu

Ene Metspalu

University of Tartu

Véronique Chevalier

Véronique Chevalier

Institut Pasteur

Anna Tramontano

Anna Tramontano

Sapienza University of Rome

Dennis L. Gallagher

Dennis L. Gallagher

Marshall Space Flight Center

Ruth M. Ruprecht

Ruth M. Ruprecht

Harvard University

Donald K. Clifton

Donald K. Clifton

University of Washington

Claus Hellerbrand

Claus Hellerbrand

University of Erlangen-Nuremberg

William E. Becker

William E. Becker

Indiana University

Something went wrong. Please try again later.