Thomas Schneider spends much of his time researching Secure multi-party computation, Theoretical computer science, Secure two-party computation, Encryption and Cryptography. His Secure multi-party computation research is multidisciplinary, relying on both Block size, Block cipher and Cipher. Thomas Schneider interconnects Overhead, Permutation, Integer, Arithmetic and Intersection in the investigation of issues within Theoretical computer science.
His study in Secure two-party computation is interdisciplinary in nature, drawing from both Symmetric-key algorithm, Distributed computing and Oblivious transfer. The Homomorphic encryption research Thomas Schneider does as part of his general Encryption study is frequently linked to other disciplines of science, such as Gigabit Ethernet, therefore creating a link between diverse domains of science. Cryptography is a subfield of Computer security that he investigates.
His primary areas of investigation include Secure multi-party computation, Theoretical computer science, Cryptography, Protocol and Computation. His Secure multi-party computation research is multidisciplinary, incorporating perspectives in Homomorphic encryption and Distributed computing. His Distributed computing research is multidisciplinary, relying on both Compiler and Cloud computing.
While the research belongs to areas of Theoretical computer science, he spends his time largely on the problem of Oblivious transfer, intersecting his research to questions surrounding Random oracle and Hash function. His Cryptography study frequently links to other fields, such as Encryption. Thomas Schneider specializes in Protocol, namely Secure two-party computation.
His primary areas of study are Secure multi-party computation, Protocol, Cryptography, Manufacturing engineering and Inference. His Secure multi-party computation study integrates concerns from other disciplines, such as Homomorphic encryption, Encryption, Backdoor and Word. The concepts of his Protocol study are interwoven with issues in Computation, Edit distance and Information retrieval.
Thomas Schneider studies Computation, focusing on Secure two-party computation in particular. His Cryptography research integrates issues from Computer network, Probabilistic logic and Theoretical computer science. His Theoretical computer science research includes elements of Block and Private set intersection.
His primary scientific interests are in Secure multi-party computation, Protocol, Cryptography, Computer network and Computation. His Secure multi-party computation research incorporates themes from Adversary, Backdoor and Private set intersection. Particularly relevant to Secure two-party computation is his body of work in Protocol.
His work deals with themes such as Arithmetic circuits, Oblivious transfer and Parallel computing, which intersect with Secure two-party computation. His biological study spans a wide range of topics, including Probabilistic logic, Encryption and Biometrics. His studies in Computation integrate themes in fields like Homomorphic encryption and Multiplication.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Improved Garbled Circuit: Free XOR Gates and Applications
Vladimir Kolesnikov;Thomas Schneider.
international colloquium on automata languages and programming (2008)
Secure Two-Party Computation Is Practical
Benny Pinkas;Thomas Schneider;Nigel P. Smart;Stephen C. Williams.
international conference on the theory and application of cryptology and information security (2009)
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
Daniel Demmler;Thomas Schneider;Michael Zohner.
network and distributed system security symposium (2015)
TASTY: tool for automating secure two-party computations
Wilko Henecka;Stefan K ögl;Ahmad-Reza Sadeghi;Thomas Schneider.
computer and communications security (2010)
Efficient privacy-preserving face recognition
Ahmad-Reza Sadeghi;Thomas Schneider;Immo Wehrenberg.
international conference on information security and cryptology (2009)
More Efficient Oblivious Transfer and Extensions for Faster Secure Computation.
Gilad Asharov;Yehuda Lindell;Thomas Schneider;Michael Zohner.
IACR Cryptology ePrint Archive (2013)
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi;Christian Weinert;Oleksandr Tkachenko;Ebrahim M. Songhori.
computer and communications security (2018)
Randomized Trial of Low-Volume PEG Solution Versus Standard PEG + Electrolytes for Bowel Cleansing Before Colonoscopy
Christian Ell;Wolfgang Fischbach;Hans-Joachim Bronisch;Stefan Dertinger.
The American Journal of Gastroenterology (2008)
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Vladimir Kolesnikov;Ahmad-Reza Sadeghi;Thomas Schneider.
cryptology and network security (2009)
Twin Clouds: An Architecture for Secure Cloud Computing
Sven Bugiel;Stefan Nürnberger;Ahmad-Reza Sadeghi;Thomas Schneider.
(2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Technical University of Darmstadt
Georgia Institute of Technology
Bar-Ilan University
Charité - University Medicine Berlin
University of California, San Diego
University of Erlangen-Nuremberg
University of Erlangen-Nuremberg
University of Kent
Bar-Ilan University
University of Waterloo
University College Dublin
Microsoft (United States)
Boston College
Tsinghua University
University of Calgary
Silverbrook Research Pty Ltd
University of Tübingen
Queen's University
University of Tartu
Institut Pasteur
Sapienza University of Rome
Marshall Space Flight Center
Harvard University
University of Washington
University of Erlangen-Nuremberg
Indiana University