Christian Weinert
Christian Weinert
Verified email at - Homepage
Cited by
Cited by
Chameleon: A hybrid secure computation framework for machine learning applications
MS Riazi, C Weinert, O Tkachenko, EM Songhori, T Schneider, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Efficient circuit-based PSI via cuckoo hashing
B Pinkas, T Schneider, C Weinert, U Wieder
Annual International Conference on the Theory and Applications of …, 2018
Cognicrypt: Supporting developers in using cryptography
S Krüger, S Nadi, M Reif, K Ali, M Mezini, E Bodden, F Göpfert, F Günther, ...
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey
M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier
Computers & Security 50, 16-32, 2015
VoiceGuard: Secure and Private Speech Processing.
F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ...
Interspeech 18, 1303-1307, 2018
Mobile private contact discovery at scale
D Kales, C Rechberger, T Schneider, M Senker, C Weinert
28th USENIX Security Symposium (USENIX Security 19), 1447-1464, 2019
Offline model guard: Secure and private ML on mobile devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020
Large-scale privacy-preserving statistical computations for distributed genome-wide association studies
O Tkachenko, C Weinert, T Schneider, K Hamacher
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Secure and private function evaluation with Intel SGX
S Felsen, Á Kiss, T Schneider, C Weinert
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
CryptoSPN: Privacy-preserving sum-product network inference
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
arXiv preprint arXiv:2002.00801, 2020
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
C Hagen, C Weinert, C Sendner, A Dmitrienko, T Schneider
IACR Cryptol. ePrint Arch. 2020, 1119, 2020
Mops: a modular protection scheme for long-term storage
C Weinert, D Demirel, M Vigil, M Geihs, J Buchmann
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
A Heinrich, M Hollick, T Schneider, M Stute, C Weinert
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
An efficient time-stamping solution for long-term digital archiving
M Vigil, C Weinert, D Demirel, J Buchmann
2014 IEEE 33rd International Performance Computing and Communications …, 2014
A performance analysis of long-term archiving techniques
M Vigil, C Weinert, K Braden, D Demirel, J Buchmann
2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014
Privacy-preserving speech processing via STPC and TEEs (Poster)
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
Trustworthy AI Inference Systems: An Industry Research View
R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ...
arXiv preprint arXiv:2008.04449, 2020
LLVM-Based Circuit Compilation for Practical Secure Computation
T Heldmann, T Schneider, O Tkachenko, C Weinert, H Yalame
International Conference on Applied Cryptography and Network Security, 99-121, 2021
RiCaSi: rigorous cache side channel mitigation via selective circuit compilation
H Mantel, L Scheidel, T Schneider, A Weber, C Weinert, T Weißmantel
International Conference on Cryptology and Network Security, 505-525, 2020
CryptoSPN: Expanding PPML beyond Neural Networks
A Treiber, A Molina, C Weinert, T Schneider, K Kersting
Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20