default search action
Michael Steiner 0001
Person information
- affiliation: Intel Labs, Hillsboro, OR, USA
- affiliation (former): IBM Research
- affiliation (former): Universität des Saarlandes, Germany
Other persons with the same name
- Michael Steiner 0002 — University College of Teacher Education, Vienna, Austria
- Michael Steiner 0003 — Alpen-Adria-Universität Klagenfurt, Austria
- Michael Steiner 0004 — Universität Witten/Herdecke, Germany
- Michael Steiner 0005 — Universität Münster, Germany
- Michael Steiner 0006 — SQS AG, Cologne, Germany
- Michael Steiner 0007 — MAGNA STEYR Fahrzeugtechnik, Gray, Austria
- Michael Steiner 0008 — Karl-Franzens-Universität Gray, Austria
- Michael Steiner 0009 — ARC Seibersdorf research, Austria (and 1 more)
- Michael Steiner 0010 — Johannes Kepler University, Linz, Austria
- Michael Steiner 0011 — Graz University of Technology, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim:
SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification. NDSS 2024 - [i14]Sejun Kim, Wen Wang, Duhyeong Kim, Adish Vartak, Michael Steiner, Rosario Cammarota:
Towards a Polynomial Instruction Based Compiler for Fully Homomorphic Encryption Accelerators. IACR Cryptol. ePrint Arch. 2024: 707 (2024) - 2023
- [c24]Rashmi Agrawal, Jung Ho Ahn, Flávio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, Wen Wang:
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application. WAHC@CCS 2023: 23-34 - [i13]Rashmi Agrawal, Jung Ho Ahn, Flávio Bergamaschi, Ro Cammarota, Jung Hee Cheon, Fillipe D. M. de Souza, Huijing Gong, Minsik Kang, Duhyeong Kim, Jongmin Kim, Hubert de Lassus, Jai Hyun Park, Michael Steiner, Wen Wang:
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application. IACR Cryptol. ePrint Arch. 2023: 1462 (2023) - 2022
- [c23]Fan Sang, Ming-Wei Shih, Sangho Lee, Xiaokuan Zhang, Michael Steiner, Mona Vij, Taesoo Kim:
PRIDWEN: Universally Hardening SGX Programs via Load-Time Synthesis. USENIX ATC 2022: 455-472
2010 – 2019
- 2019
- [c22]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CCSW 2019: 185-199 - [c21]Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik:
VRASED: A Verified Hardware/Software Co-Design for Remote Attestation. USENIX Security Symposium 2019: 1429-1446 - 2018
- [i12]Thomas Knauth, Michael Steiner, Somnath Chakrabarti, Li Lei, Cedric Xing, Mona Vij:
Integrating Remote Attestation with Transport Layer Security. CoRR abs/1801.05863 (2018) - [i11]Mic Bowman, Andrea Miele, Michael Steiner, Bruno Vavala:
Private Data Objects: an Overview. CoRR abs/1807.05686 (2018) - [i10]Fritz Alder, N. Asokan, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. CoRR abs/1810.06080 (2018) - [i9]Karim Eldefrawy, Ivan Oliveira Nunes, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik:
Formally Verified Hardware/Software Co-Design for Remote Attestation. CoRR abs/1811.00175 (2018) - 2015
- [c20]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. ESORICS (2) 2015: 123-145 - [i8]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. IACR Cryptol. ePrint Arch. 2015: 927 (2015) - 2014
- [c19]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - [i7]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. IACR Cryptol. ePrint Arch. 2014: 853 (2014) - 2013
- [c18]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. CCS 2013: 875-888 - [c17]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. CRYPTO (1) 2013: 353-373 - [i6]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2013: 169 (2013) - [i5]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. IACR Cryptol. ePrint Arch. 2013: 720 (2013) - 2011
- [c16]Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. ACNS 2011: 431-448 - 2010
- [c15]Suresh Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David C. Toll:
Designing a Side Channel Resistant Random Number Generator. CARDIS 2010: 49-64 - [i4]Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. IACR Cryptol. ePrint Arch. 2010: 213 (2010)
2000 – 2009
- 2009
- [c14]Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan:
Risks of the CardSpace Protocol. ISC 2009: 278-293 - 2008
- [c13]Frederik De Keukelaere, Sumeer Bhola, Michael Steiner, Suresh Chari, Sachiko Yoshihama:
SMash: secure component model for cross-domain mashups on unmodified browsers. WWW 2008: 535-544 - 2006
- [c12]Ran Canetti, Shai Halevi, Michael Steiner:
Mitigating Dictionary Attacks on Password-Protected Local Storage. CRYPTO 2006: 160-179 - [i3]Ran Canetti, Shai Halevi, Michael Steiner:
Mitigating Dictionary Attacks on Password-Protected Local Storage. IACR Cryptol. ePrint Arch. 2006: 276 (2006) - 2005
- [c11]Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 - [c10]Ran Canetti, Shai Halevi, Michael Steiner:
Hardness Amplification of Weakly Verifiable Puzzles. TCC 2005: 17-33 - 2004
- [i2]Ran Canetti, Shai Halevi, Michael Steiner:
Hardness amplification of weakly verifiable puzzles. IACR Cryptol. ePrint Arch. 2004: 329 (2004) - 2003
- [j11]Michael Steiner:
Regional knowledge networks as evolving social technologies. Int. J. Technol. Manag. 26(2/3/4): 326-345 (2003) - 2002
- [b1]Michael Steiner:
Secure group key agreement. Saarland University, Saarbrücken, Germany, 2002, pp. 1-200 - [c9]Michael Backes, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
Polynomial Fairness and Liveness. CSFW 2002: 160-174 - [i1]Ahmad-Reza Sadeghi, Michael Steiner:
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. IACR Cryptol. ePrint Arch. 2002: 126 (2002) - 2001
- [j10]Chun-Li Lin, Hung-Min Sun, Michael Steiner, Tzonelih Hwang:
Three-party encrypted key exchange without server public-keys. IEEE Commun. Lett. 5(12): 497-499 (2001) - [j9]Michael Steiner, Peter Buhler, Thomas Eirich, Michael Waidner:
Secure password-based cipher suite for TLS. ACM Trans. Inf. Syst. Secur. 4(2): 134-157 (2001) - [c8]Ahmad-Reza Sadeghi, Michael Steiner:
Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference. EUROCRYPT 2001: 244-261 - 2000
- [j8]N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
State of the art in electronic payment systems. Adv. Comput. 53: 425-449 (2000) - [j7]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000) - [j6]Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Commun. 18(4): 628-639 (2000) - [j5]Michael Steiner, Gene Tsudik, Michael Waidner:
Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distributed Syst. 11(8): 769-780 (2000) - [c7]Peter Buhler, Thomas Eirich, Michael Waidner, Michael Steiner:
Secure Password-Based Cipher Suite for TLS. NDSS 2000 - [e1]Gérard Lacoste, Birgit Pfitzmann, Michael Steiner, Michael Waidner:
SEMPER - Secure Electronic Marketplace for Europe. Lecture Notes in Computer Science 1854, Springer 2000, ISBN 3-540-67825-5
1990 – 1999
- 1999
- [j4]N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner:
Authenticating public terminals. Comput. Networks 31(8): 861-870 (1999) - 1998
- [j3]José L. Abad Peiro, N. Asokan, Michael Steiner, Michael Waidner:
Designing a Generic Payment Service. IBM Syst. J. 37(1): 72-88 (1998) - [c6]Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
Authenticated Group Key Agreement and Friends. CCS 1998: 17-26 - [c5]Michael Steiner, Gene Tsudik, Michael Waidner:
CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 - [c4]N. Asokan, Els Van Herreweghen, Michael Steiner:
Towards a Framework for Handling Disputes in Payment Systems. USENIX Workshop on Electronic Commerce 1998 - 1997
- [j2]N. Asokan, Philippe A. Janson, Michael Steiner, Michael Waidner:
The State of the Art in Electronic Payment Systems. Computer 30(9): 28-35 (1997) - 1996
- [c3]Michael Steiner, Gene Tsudik, Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication. CCS 1996: 31-37 - 1995
- [j1]Michael Steiner, Gene Tsudik, Michael Waidner:
Refinement and Extension of Encrypted Key Exchange. ACM SIGOPS Oper. Syst. Rev. 29(3): 22-30 (1995) - [c2]Mihir Bellare, Amir Herzberg, Michael Steiner, Gene Tsudik, Michael Waidner, Ralf C. Hauser, Juan A. Garay:
iKP - A Family of Secure Electronic Payment Protocols. USENIX Workshop on Electronic Commerce 1995 - [c1]Ralf C. Hauser, Michael Steiner:
Generic Extensions of WWW Browsers. USENIX Workshop on Electronic Commerce 1995
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint