Follow
Jonas Janneck
Jonas Janneck
Verified email at rub.de
Title
Cited by
Cited by
Year
Computation on encrypted data using dataflow authentication
A Fischer, B Fuhry, J Kußmaul, J Janneck, F Kerschbaum, E Bodden
ACM Transactions on Privacy and Security 25 (3), 1-36, 2022
172022
A method for securely comparing integers using binary trees
A Tueno, J Janneck, D Boehm
Proceedings on Privacy Enhancing Technologies, 2023
32023
The Pre-Shared Key Modes of HPKE
J Alwen, J Janneck, E Kiltz, B Lipp
International Conference on the Theory and Application of Cryptology and …, 2023
22023
Private Computation On Set Intersection With Sublinear Communication
J Janneck, A Tueno, J Kußmaul, M Akram
Cryptology ePrint Archive, 2022
22022
PASAPTO: Policy-aware Security and Performance Trade-off Analysis--Computation on Encrypted Data with Restricted Leakage
A Fischer, J Janneck, J Kussmaul, N Krätzschmar, F Kerschbaum, ...
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 230-245, 2020
22020
Executing encrypted data using secure enclave
A Fischer, J Janneck, J Kussmaul, F Kerschbaum
US Patent 11,429,750, 2022
12022
Secure Branching Program Evaluation
J Janneck, A Boudi, A Tueno, M Akram
Cryptology ePrint Archive, 2022
12022
Ring Signatures for Deniable AKEM: Gandalf's Fellowship
P Gajland, J Janneck, E Kiltz
Cryptology ePrint Archive, 2024
2024
Private set intersection from branching programs
A Tueno, J Janneck
US Patent App. 17/752,326, 2023
2023
Secure integer comparison using binary trees
A Tueno, J Janneck
US Patent App. 17/525,372, 2023
2023
Generation of optimal program variation
A Fischer, J Janneck, J Kussmaul, N Kraetzschmar, F Kerschbaum
US Patent 11,354,218, 2022
2022
Secure Branching Programs
J Janneck, A Tueno, A Boudi
Gesellschaft für Informatik eV/FG KRYPTO, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–12