Computation on encrypted data using dataflow authentication A Fischer, B Fuhry, J Kußmaul, J Janneck, F Kerschbaum, E Bodden ACM Transactions on Privacy and Security 25 (3), 1-36, 2022 | 18 | 2022 |
Ring Signatures for Deniable AKEM: Gandalf’s Fellowship P Gajland, J Janneck, E Kiltz Annual International Cryptology Conference, 305-338, 2024 | 7 | 2024 |
The Pre-Shared Key Modes of HPKE J Alwen, J Janneck, E Kiltz, B Lipp International Conference on the Theory and Application of Cryptology and …, 2023 | 3 | 2023 |
A method for securely comparing integers using binary trees A Tueno, J Janneck, D Boehm Proceedings on Privacy Enhancing Technologies, 2023 | 3 | 2023 |
Private Computation On Set Intersection With Sublinear Communication J Janneck, A Tueno, J Kußmaul, M Akram Cryptology ePrint Archive, 2022 | 3 | 2022 |
Executing encrypted data using secure enclave A Fischer, J Janneck, J Kussmaul, F Kerschbaum US Patent 11,429,750, 2022 | 2 | 2022 |
PASAPTO: Policy-aware Security and Performance Trade-off Analysis--Computation on Encrypted Data with Restricted Leakage A Fischer, J Janneck, J Kussmaul, N Krätzschmar, F Kerschbaum, ... 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 230-245, 2020 | 2 | 2020 |
Secure integer comparison using binary trees A Tueno, J Janneck US Patent 12,155,754, 2024 | 1 | 2024 |
A Closer Look at Falcon P Gajland, J Janneck, E Kiltz Cryptology ePrint Archive, 2024 | 1 | 2024 |
Secure Branching Program Evaluation J Janneck, A Boudi, A Tueno, M Akram Cryptology ePrint Archive, 2022 | 1 | 2022 |
Shadowfax: Combiners for Deniability P Gajland, V Hwang, J Janneck Cryptology ePrint Archive, 2025 | | 2025 |
Private set intersection from branching programs A Tueno, J Janneck US Patent App. 17/752,326, 2023 | | 2023 |
Generation of optimal program variation A Fischer, J Janneck, J Kussmaul, N Kraetzschmar, F Kerschbaum US Patent 11,354,218, 2022 | | 2022 |
Secure Branching Programs J Janneck, A Tueno, A Boudi crypto day matters 33, 10.18420/cdm-2021-33-11, 2021 | | 2021 |