What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michael Steiner
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ndss
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification.
Fan Sang
Jaehyuk Lee
Xiaokuan Zhang
Meng Xu
Scott Constable
Yuan Xiao
Michael Steiner
Mona Vij
Taesoo Kim
2019
conf/ccs
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX.
Fritz Alder
N. Asokan
Arseny Kurnikov
Andrew Paverd
Michael Steiner
2019
conf/uss
VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Ivan De Oliveira Nunes
Karim Eldefrawy
Norrathep Rattanavipanon
Michael Steiner
Gene Tsudik
2015
conf/esorics
Rich Queries on Encrypted Data: Beyond Exact Matches.
Sky Faber
Stanislaw Jarecki
Hugo Krawczyk
Quan Nguyen
Marcel-Catalin Rosu
Michael Steiner
2014
conf/ndss
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
David Cash
Joseph Jaeger
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2013
conf/ccs
Outsourced symmetric private information retrieval.
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2013
conf/crypto
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
David Cash
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2011
conf/acns
Composable Security Analysis of OS Services.
Ran Canetti
Suresh Chari
Shai Halevi
Birgit Pfitzmann
Arnab Roy
Michael Steiner
Wietse Z. Venema
2006
conf/crypto
Mitigating Dictionary Attacks on Password-Protected Local Storage.
Ran Canetti
Shai Halevi
Michael Steiner
2005
conf/fc
A Privacy-Protecting Coupon System.
Liqun Chen
Matthias Enzmann
Ahmad-Reza Sadeghi
Markus Schneider
Michael Steiner
2005
conf/tcc
Hardness Amplification of Weakly Verifiable Puzzles.
Ran Canetti
Shai Halevi
Michael Steiner
2001
conf/eurocrypt
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference.
Ahmad-Reza Sadeghi
Michael Steiner
2000
conf/ndss
Secure Password-Based Cipher Suite for TLS.
Peter Buhler
Thomas Eirich
Michael Waidner
Michael Steiner
1998
conf/ccs
Authenticated Group Key Agreement and Friends.
Giuseppe Ateniese
Michael Steiner
Gene Tsudik
1996
conf/ccs
Diffie-Hellman Key Distribution Extended to Group Communication.
Michael Steiner
Gene Tsudik
Michael Waidner
Coauthors
Ahmad-Reza Sadeghi
(2)
Andrew Paverd
(1)
Arnab Roy
(1)
Arseny Kurnikov
(1)
Birgit Pfitzmann
(1)
Charanjit S. Jutla
(3)
David Cash
(2)
Fan Sang
(1)
Fritz Alder
(1)
Gene Tsudik
(3)
Giuseppe Ateniese
(1)
Hugo Krawczyk
(4)
Ivan De Oliveira Nunes
(1)
Jaehyuk Lee
(1)
Joseph Jaeger
(1)
Karim Eldefrawy
(1)
Liqun Chen
(1)
Marcel-Catalin Rosu
(4)
Markus Schneider
(1)
Matthias Enzmann
(1)
Meng Xu
(1)
Michael Steiner
(15)
Michael Waidner
(2)
Mona Vij
(1)
N. Asokan
(1)
Norrathep Rattanavipanon
(1)
Peter Buhler
(1)
Quan Nguyen
(1)
Ran Canetti
(3)
Scott Constable
(1)
Shai Halevi
(3)
Sky Faber
(1)
Stanislaw Jarecki
(4)
Suresh Chari
(1)
Taesoo Kim
(1)
Thomas Eirich
(1)
Wietse Z. Venema
(1)
Xiaokuan Zhang
(1)
Yuan Xiao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to