default search action
Tobias Nilges
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c12]Satrajit Ghosh, Tobias Nilges:
An Algebraic Approach to Maliciously Secure Private Set Intersection. EUROCRYPT (3) 2019: 154-185 - 2018
- [c11]Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:
Reusing Tamper-Proof Hardware in UC-Secure Protocols. Public Key Cryptography (1) 2018: 463-493 - 2017
- [c10]Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges:
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. ASIACRYPT (1) 2017: 629-659 - [c9]Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti:
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. CCS 2017: 2263-2276 - [i10]Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges:
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. IACR Cryptol. ePrint Arch. 2017: 409 (2017) - [i9]Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti:
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. IACR Cryptol. ePrint Arch. 2017: 790 (2017) - [i8]Satrajit Ghosh, Tobias Nilges:
An Algebraic Approach to Maliciously Secure Private Set Intersection. IACR Cryptol. ePrint Arch. 2017: 1064 (2017) - 2016
- [c8]Valerie Fetzer, Jörn Müller-Quade, Tobias Nilges:
A Formal Treatment of Privacy in Video Data. ESORICS (2) 2016: 406-424 - [i7]Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. IACR Cryptol. ePrint Arch. 2016: 201 (2016) - [i6]Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens. IACR Cryptol. ePrint Arch. 2016: 615 (2016) - [i5]Tobias Nilges:
Efficient Resettably Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2016: 1009 (2016) - 2015
- [b1]Tobias Nilges:
The Cryptographic Strength of Tamper-Proof Hardware. Karlsruhe Institute of Technology, 2015 - [j1]Jörn Müller-Quade, Matthias Huber, Tobias Nilges:
Daten verschlüsselt speichern und verarbeiten in der Cloud. Datenschutz und Datensicherheit 39(8): 531-535 (2015) - [c7]Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens. ICITS 2015: 197-213 - [c6]Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. ProvSec 2015: 23-42 - [c5]Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens. TCC (1) 2015: 319-344 - [i4]Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. CoRR abs/1502.03487 (2015) - [i3]Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. IACR Cryptol. ePrint Arch. 2015: 104 (2015) - 2014
- [c4]Matthias Huber, Jörn Müller-Quade, Tobias Nilges, Carolin Thal:
A Provably Privacy Preserving Video Surveillance Architecture for an Assisted Living Community. GI-Jahrestagung 2014: 563-574 - [i2]Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens. IACR Cryptol. ePrint Arch. 2014: 555 (2014) - 2013
- [c3]Matthias Huber, Jörn Müller-Quade, Tobias Nilges:
Defining Privacy Based on Distributions of Privacy Breaches. Number Theory and Cryptography 2013: 211-225 - [c2]Tobias Nilges, Jörn Müller-Quade, Matthias Huber:
Structural Composition Attacks on Anonymized Data. Sicherheit 2013: 443-460 - [c1]Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges:
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens. TCC 2013: 642-661 - 2011
- [i1]Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges:
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions. IACR Cryptol. ePrint Arch. 2011: 675 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint