┴gnes Kiss
┴gnes Kiss
CISPA Helmholtz Center for Information Security
Verified email at cispa.de
Title
Cited by
Cited by
Year
Private set intersection for unequal set sizes with mobile applications
┴ Kiss, J Liu, T Schneider, N Asokan, B Pinkas
Proceedings on Privacy Enhancing Technologies 2017 (4), 177-197, 2017
572017
Valiant’s universal circuit is practical
┴ Kiss, T Schneider
Annual International Conference on the Theory and Applications ofá…, 2016
502016
More efficient universal circuit constructions
D GŘnther, ┴ Kiss, T Schneider
International Conference on the Theory and Application of Cryptology andá…, 2017
342017
Sok: modular and efficient private decision tree evaluation
┴ Kiss, M Naderpour, J Liu, N Asokan, T Schneider
Proceedings on Privacy Enhancing Technologies 2019 (2), 187-208, 2019
222019
Efficient and Scalable Universal Circuits.
MY Alhassan, D GŘnther, ┴ Kiss, T Schneider
IACR Cryptology ePrint Archive 2019, 348, 2019
152019
Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT
┴ Kiss, J Krńmer, P Rauzy, JP Seifert
International Workshop on Constructive Side-Channel Analysis and Secureá…, 2016
142016
Secure and private function evaluation with intel sgx
S Felsen, ┴ Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Securityá…, 2019
122019
Faster privacy-preserving location proximity schemes
K Jńrvinen, ┴ Kiss, T Schneider, O Tkachenko, Z Yang
International Conference on Cryptology and Network Security, 3-22, 2018
102018
On the optimality of differential fault analyses on CLEFIA
┴ Kiss, J Krńmer, A StŘber
International Conference on Mathematical Aspects of Computer and Informationá…, 2015
72015
Linear-Complexity Private Function Evaluation is Practical
M Holz, ┴ Kiss, D Rathee, T Schneider
European Symposium on Research in Computer Security, 401-420, 2020
22020
Trustworthy AI Inference Systems: An Industry Research View
R Cammarota, M Schunter, A Rajan, F Boemer, ┴ Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
12020
Linear-complexity private function evaluation is practical (full version)
M Holz, ┴ Kiss, D Rathee, T Schneider
Cryptology ePrint Archive, Report 2020/853, 2020
12020
Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation
D GŘnther, ┴ Kiss, L Scheidel, T Schneider
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communicationsá…, 2019
12019
Faster privacy-preserving location proximity schemes for circles and polygons
K Jńrvinen, ┴ Kiss, T Schneider, O Tkachenko, Z Yang
IET Information Security 14 (3), 254-265, 2019
12019
SAFE: A Secure and Efficient Long-Term Distributed Storage System
J Buchmann, G Dessouky, T Frassetto, ┴ Kiss, AR Sadeghi, T Schneider, ...
Proceedings of the 8th International Workshop on Security in Blockchain andá…, 2020
2020
Web Application for Privacy-preserving Scheduling using Secure Computation.
┴ Kiss, O Schick, T Schneider
ICETE (2), 456-463, 2019
2019
Testing Self-Secure Exponentiation Countermeasures Against the Bellcore Attack
┴ Kiss, JP Seifert
2014
Experimenting Differential Fault Analyses on CLEFIA
A Kiss
20 th Crypto-Day, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–18