Thomas Schneider
#169,467
Most Influential Person Now
Thomas Schneider's AcademicInfluence.com Rankings
Thomas Schneidercomputer-science Degrees
Computer Science
#10342
World Rank
#10854
Historical Rank
Database
#7319
World Rank
#7580
Historical Rank

Download Badge
Computer Science
Thomas Schneider's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Thomas Schneider Influential?
(Suggest an Edit or Addition)Thomas Schneider's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Improved Garbled Circuit: Free XOR Gates and Applications (2008) (716)
- Secure Two-Party Computation is Practical (2009) (697)
- ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation (2015) (568)
- TASTY: tool for automating secure two-party computations (2010) (400)
- More efficient oblivious transfer and extensions for faster secure computation (2013) (346)
- Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications (2018) (339)
- Efficient Privacy-Preserving Face Recognition (2009) (331)
- Ciphers for MPC and FHE (2015) (283)
- Faster Private Set Intersection Based on OT Extension (2014) (275)
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima (2009) (269)
- Twin Clouds: An Architecture for Secure Cloud Computing (2011) (260)
- Phasing: Private Set Intersection Using Permutation-based Hashing (2015) (220)
- Scalable Private Set Intersection Based on OT Extension (2018) (218)
- Privacy-Preserving ECG Classification With Branching Programs and Neural Networks (2011) (189)
- TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits (2015) (184)
- Token-Based Cloud Computing (2010) (155)
- Secure Evaluation of Private Linear Branching Programs with Medical Applications (2009) (139)
- AmazonIA: when elasticity snaps back (2011) (130)
- A Practical Universal Circuit Construction and Secure Evaluation of Private Functions (2008) (125)
- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits (2013) (119)
- Efficient Circuit-based PSI via Cuckoo Hashing (2018) (115)
- Getting the foot out of the pelvis: modeling problems affecting use of SNOMED CT hierarchies in practical applications (2011) (109)
- Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) (2011) (96)
- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries (2015) (95)
- Efficient Circuit-based PSI with Linear Communication (2019) (94)
- ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation (2020) (93)
- Private Set Intersection for Unequal Set Sizes with Mobile Applications (2017) (85)
- Automated Synthesis of Optimized Circuits for Secure Computation (2015) (82)
- GSHADE: faster privacy-preserving distance computation and biometric identification (2014) (78)
- Practical Secure Evaluation of Semi-Private Functions (2009) (72)
- Mobile Private Contact Discovery at Scale (2019) (66)
- Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency (2010) (64)
- MP2ML: a mixed-protocol machine learning framework for private inference (2020) (62)
- Valiant's Universal Circuit is Practical (2016) (61)
- HyCC: Compilation of Hybrid Protocols for Practical Secure Computation (2018) (61)
- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version) (2010) (59)
- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols (2010) (56)
- Pushing the Communication Barrier in Secure Computation using Lookup Tables (2017) (56)
- RAID-PIR: Practical Multi-Server PIR (2014) (55)
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification (2009) (55)
- SAFELearn: Secure Aggregation for private FEderated Learning (2021) (54)
- Automatic Protocol Selection in Secure Two-Party Computations (2013) (53)
- Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO (2017) (53)
- More Efficient Oblivious Transfer Extensions (2017) (48)
- VoiceGuard: Secure and Private Speech Processing (2018) (47)
- Embedded SFE: Offloading Server and Network Using Hardware Tokens (2010) (45)
- A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design (2013) (43)
- Faster secure two-party computation with less memory (2013) (43)
- Secure Set Intersection with Untrusted Hardware Tokens (2011) (42)
- SoK: Modular and Efficient Private Decision Tree Evaluation (2019) (42)
- FLAME: Taming Backdoors in Federated Learning (2021) (38)
- Privacy-Preserving Interdomain Routing at Internet Scale (2017) (37)
- FLGUARD: Secure and Private Federated Learning (2021) (37)
- From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design (2010) (34)
- Offline Model Guard: Secure and Private ML on Mobile Devices (2020) (34)
- Measurement and comparison of individual external doses of high-school students living in Japan, France, Poland and Belarus—the ‘D-shuttle’ project— (2015) (33)
- Efficient privacy-preserving classification of ECG signals (2009) (33)
- More Efficient Universal Circuit Constructions (2017) (33)
- Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies (2018) (31)
- PILOT: Practical Privacy-Preserving Indoor Localization Using OuTsourcing (2019) (30)
- MOTION – A Framework for Mixed-Protocol Multi-Party Computation (2022) (30)
- Efficiently Stealing your Machine Learning Models (2019) (29)
- Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens (2014) (29)
- Practical Secure Function Evaluation (2008) (28)
- Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT" (2014) (28)
- GarbledCPU: A MIPS processor for secure computation in hardware (2016) (28)
- Automatic Generation of Sound Zero-Knowledge Protocols (2008) (27)
- How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently (2009) (26)
- SIXPACK: Securing Internet eXchange Points Against Curious onlooKers (2017) (24)
- Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation (2012) (24)
- The Design and Implementation of a Two-Party Protocol Suite for SHAREMIND 3 (2012) (24)
- CrowdShare: Secure Mobile Resource Sharing (2013) (21)
- EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs (2019) (21)
- Secure and Private Function Evaluation with Intel SGX (2019) (21)
- Efficient and Scalable Universal Circuits (2020) (20)
- Improved Multiplication Triple Generation over Rings via RLWE-based AHE (2019) (20)
- Faster Privacy-Preserving Location Proximity Schemes (2018) (18)
- Twin Clouds: Secure Cloud Computing with (2011) (17)
- Privacy-Preserving Whole-Genome Variant Queries (2017) (16)
- Time to Rethink: Trust Brokerage Using Trusted Execution Environments (2015) (15)
- Automatic Generation of Sigma-Protocols (2009) (15)
- All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers (2020) (14)
- Inventory of Forest Attributes to Support the Integration of Non-provisioning Ecosystem Services and Biodiversity into Forest Planning—from Collecting Data to Providing Information (2021) (13)
- Towards Securing Internet eXchange Points Against Curious onlooKers (2016) (12)
- Engineering Secure Two-Party Computation Protocols (2012) (12)
- Modular Design of Efficient Secure Function Evaluation Protocols (2010) (11)
- Towards Efficient Privacy-Preserving Similar Sequence Queries on Outsourced Genomic Databases (2018) (11)
- PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop (2021) (11)
- Toward Practical Secure Stable Matching (2017) (10)
- Mirror system of the RICH detector of the NA62 experiment (2017) (10)
- On the Design and Implementation of Ecient Zero-Knowledge Proofs of Knowledge (2009) (10)
- Privacy-preserving PLDA speaker verification using outsourced secure computation (2019) (10)
- Privacy-preserving Density-based Clustering (2021) (10)
- Balancing Quality and Efficiency in Private Clustering with Affinity Propagation (2021) (9)
- Production of Sm-153 With Very High Specific Activity for Targeted Radionuclide Therapy (2021) (9)
- Trustworthy AI Inference Systems: An Industry Research View (2020) (9)
- SoK: Efficient Privacy-preserving Clustering (2021) (9)
- CryptoSPN: Privacy-preserving Sum-Product Network Inference (2020) (9)
- Secure Two-Party Computation in a Quantum World (2020) (9)
- Privacy-Preserving Speaker Recognition with Cohort Score Normalisation (2019) (9)
- Linear-Complexity Private Function Evaluation is Practical (2020) (8)
- MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference (2020) (8)
- PEM: Privacy-preserving Epidemiological Modeling (2020) (8)
- CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (2012) (7)
- A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in “SPOC” (2019) (7)
- Single photoelectron time resolution studies of the PICOSEC-Micromegas detector (2020) (7)
- Faster privacy-preserving location proximity schemes for circles and polygons (2020) (6)
- OnionPIR: Effective Protection of Sensitive Metadata in Online Communication Networks (2016) (6)
- Contribution to the knowledge of the Moroccan Odonata , with first records of Orthetrum sabina , and an overview of first and last dates for all species (2015) (6)
- Automorphisms of Hilbert's non-desarguesian affine plane and its projective closure (2007) (5)
- Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version) (2010) (5)
- R‐Wave Detection by Subcutaneous ECG. Possible Use for Analyzing R‐R Variability (2001) (5)
- LLVM-Based Circuit Compilation for Practical Secure Computation (2021) (5)
- Snowmass 2021 White Paper Instrumentation Frontier 05 -- White Paper 1: MPGDs: Recent advances and current R&D (2022) (5)
- Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation (2019) (5)
- Received Signal Strength Quantization for Secure Indoor Positioning via Fingerprinting (2018) (5)
- SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation (2021) (4)
- SoK: Cryptanalysis of Encrypted Search with LEAKER – A framework for LEakage AttacK Evaluation on Real-world data (2022) (4)
- Privacy-Preserving Interdomain Routing at Internet Scale ( Full Version ) ? (2017) (4)
- Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (2010) (4)
- GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications (2021) (4)
- In-Memory Databases and Their Impact on Our (Future) Organizations (2019) (4)
- YACZK: Yet Another Compiler for Zero-Knowledge (Poster Abstract) (2010) (4)
- Privacy-preserving speech processing via STPC and TEEs (Poster) (2019) (3)
- Prompt production in pp collisions at (2010) (3)
- Efficient Privacy-Preserving Face Recognition ( Full Version ) ? (2009) (3)
- Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster) (2009) (2)
- SAFELearn: Secure Aggregation for private FEderated Learning (Full Version) (2021) (2)
- ScionFL: Secure Quantized Aggregation for Federated Learning (2022) (2)
- SAFE: A Secure and Efficient Long-Term Distributed Storage System (2020) (2)
- Microchannel cooling for the LHCb VELO Upgrade I (2021) (2)
- AirCollect: efficiently recovering hashed phone numbers leaked via Apple AirDrop (2021) (2)
- SPIKE: secure and private investigation of the kidney exchange problem (2022) (2)
- RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation (2020) (2)
- Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation (2021) (2)
- Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten (2010) (2)
- Basics of Efficient Secure Function Evaluation (2012) (2)
- A laboratory for conceiving Essential Biodiversity Variables (EBVs)—The ‘Data pool initiative for the Bohemian Forest Ecosystem’ (2021) (2)
- CryptoSPN: Expanding PPML beyond Neural Networks (2020) (2)
- Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data (2021) (2)
- Privacy-Preserving Epidemiological Modeling on Mobile Graphs (2022) (1)
- Schnelle hochauflösende optische Spektrumanalyse (2008) (1)
- Towards robust PICOSEC Micromegas precise timing detectors (2023) (1)
- Data Protection Law and Multi-Party Computation: Applications to Information Exchange between Law Enforcement Agencies (2022) (1)
- FAPRIL: Towards Faster Privacy-Preserving Fingerprint-Based Localization (2022) (1)
- Comments on “Privacy-Enhanced Federated Learning Against Poisoning Adversaries” (2023) (1)
- Secure Maximum Weight Matching Approximation on General Graphs (2022) (1)
- More Efficient Oblivious Transfer Extensions (2016) (1)
- VASA: Vector AES Instructions for Security Applications (2021) (1)
- Efficient Circuit-based PSI via Cuckoo Hashing ( Full Version ) ? (2019) (1)
- Products (1969) (1)
- A Health Needs Assessment Among Milwaukee's Homeless. (2022) (1)
- Linear-Complexity Private Function Evaluation is Practical (Full Version) (2020) (1)
- Engineering Privacy-Preserving Machine Learning Protocols (2020) (1)
- A large area 100 channel Picosec Micromegas detector with sub 20 ps time resolution (2023) (1)
- Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification (2009) (1)
- Aktuell (2018) (0)
- Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations (2022) (0)
- Personen + Unternehmen (2022) (0)
- Produkte (2022) (0)
- People + Companies (2018) (0)
- People + Companies (2018) (0)
- Precise timing and recent advancements with segmented anode PICOSEC Micromegas prototypes (2022) (0)
- Aktuell Produkte (2019) (0)
- People + Companies (2018) (0)
- Products (2018) (0)
- Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs (2022) (0)
- Comparison-Based MPC in Star Topology (Full Version) (2022) (0)
- Personen + Unternehmen (2022) (0)
- People + Companies (2019) (0)
- Forschung (2018) (0)
- Products (2018) (0)
- Produkte (2018) (0)
- Produkte (2018) (0)
- Personen + Unternehmen (2021) (0)
- Personen + Unternehmen (2019) (0)
- Produkte (2022) (0)
- Produkte (2018) (0)
- Products (2018) (0)
- Bücher (2018) (0)
- Revisiting Hybrid Private Information Retrieval (2021) (0)
- People + Companies (2018) (0)
- Web Application for Privacy-Preserving Scheduling (Poster) (2018) (0)
- Efficient and Scalable Universal Circuits (2020) (0)
- Diskordanz und Konversion der Rezeptorexpression von Hirnmetastasen des Mammakarzinoms: Nicht-invasive Radiomics-basierte Rezeptorstatusprädiktion (2019) (0)
- Research (1984) (0)
- Hardware-Assisted Ad-Hoc Secure Two-Party Computation on Smartphones (2013) (0)
- Personen + Unternehmen (2021) (0)
- Products (1969) (0)
- Products (2018) (0)
- Personen + Unternehmen (2018) (0)
- Classification of Finite Highly Regular Vertex-Coloured Graphs (2020) (0)
- TUD-CS-2013-0084 CrowdShare : Secure Mobile Resource Sharing (2015) (0)
- Personen + Unternehmen (2019) (0)
- Personen + Unternehmen (2018) (0)
- Personen + Unternehmen (2019) (0)
- Products (2018) (0)
- Bücher (2018) (0)
- News Products (2018) (0)
- Produkte (2018) (0)
- Modular Design of Efficient SFE Protocols (2012) (0)
- News People + Companies (2019) (0)
- Personen + Unternehmen (2022) (0)
- Personen + Unternehmen (2018) (0)
- Risikofaktoren für den Erwerb einer sporadischen ambulant erworbenen Legionärskrankheit: Zwischenergebnisse der Berliner LeTriWa-Studie zu Legionellen im Trinkwasser (2019) (0)
- Bücher (2018) (0)
- People + Companies (2018) (0)
- Privacy - Preserving Clustering (2021) (0)
- DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop[1.5ex] (Full Version) [1.5ex] (2021) (0)
- Vancouver call for action to strengthen expertise in radiological protection worldwide. (2023) (0)
- Personen + Unternehmen (2019) (0)
- Produkte (2019) (0)
- Perspectives on tolerability and reasonableness (2022) (0)
- Produkte (2018) (0)
- Long-Term Time Variability of Temperature, Gas Abundance and Cloud Fields in Jupiter from Thermal Emission Observations (2014) (0)
- Produkte (2021) (0)
- Top-down vs. Bottom-up (2021) (0)
- Aktuell (2018) (0)
- Produkte (2019) (0)
- Aktuell Produkte (2019) (0)
- A multisource approach helps to detect a forest as a reference site in an intensively used rural landscape (Uckermark, NE Germany) (2021) (0)
- Personen + Unternehmen (2018) (0)
- People + Companies (2018) (0)
- People + Companies (2018) (0)
- Von Nieder- bis Hochvolttechnik (2021) (0)
- Research (2018) (0)
- Web Application for Privacy-preserving Scheduling using Secure Computation (2019) (0)
- Produkte (2018) (0)
- People + Companies (2018) (0)
- Poster: Efficient Three-Party Shuffling Using Precomputation (2022) (0)
- Hardware-Assisted Garbled Circuit Protocols (2012) (0)
- Produkte (2022) (0)
- Privacy-Preserving Medical Diagnostics (2009) (0)
- Bücher (2018) (0)
- Produkte (2018) (0)
- Advancing the Parameter-elevation Regressions on Independent Slopes Model (PRISM) to Accommodate Atmospheric River Influences Using a Hierarchical Estimation Structure (2014) (0)
- HyFL: A Hybrid Approach For Private Federated Learning (2023) (0)
- Circuit Optimizations and Constructions (2012) (0)
- Produkte (2018) (0)
- Products (2018) (0)
- Improved Universal Circuits using Lookup Tables (2022) (0)
- Produkte (2018) (0)
- Sub-25 ps timing measurements with 10 × 10 cm<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="inline" id="d1e423" altimg="si7.svg"><mml:msup><mml:mrow /><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math> PICOSEC Micromegas detectors (2022) (0)
- SoK: Privacy-preserving Clustering (Extended Abstract) ∗ (2021) (0)
- Bücher (2018) (0)
- Secure Set Intersection with Untrusted Hardware Tokens (Full Version) (2011) (0)
- Improved Multiplication Triple Generation over Rings via SHE (2019) (0)
- Mineralogisch-petrographische Untersuchungen an Pegmatit-Aplit-Systemen von Ehrenfriedersdorf (1994) (0)
- Products (1971) (0)
- Personen + Unternehmen (2019) (0)
- Products (2018) (0)
- Bücher (2018) (0)
- Personen + Unternehmen (2018) (0)
- Efficient Secure Two-Party Computation (2012) (0)
- Steildächer – einfacher als Flachdächer? (2020) (0)
- Forschung (2018) (0)
- Produkte (2018) (0)
- Bücher (2018) (0)
- CTL: A Platform-Independent Crypto Tools Library Based on Dataow Programming Paradigm (Extended Edition) ? (2012) (0)
- Produkte (2021) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Thomas Schneider?
Thomas Schneider is affiliated with the following schools: