Follow
Sebastian Berndt
Sebastian Berndt
Technische Hochschule Lübeck
Verified email at th-luebeck.de - Homepage
Title
Cited by
Cited by
Year
Fully dynamic bin packing revisited
S Berndt, K Jansen, KM Klein
Mathematical Programming 179 (1), 109-155, 2020
752020
Algorithm substitution attacks from a steganographic perspective
S Berndt, M Liśkiewicz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
432017
Jdrasil: A modular library for computing tree decompositions
M Bannach, S Berndt, T Ehlers
16th International Symposium on Experimental Algorithms (SEA 2017), 2017
322017
Practical access to dynamic programming on tree decompositions
M Bannach, S Berndt
Algorithms 12 (8), 172, 2019
242019
Learning residual alternating automata
S Berndt, M Liśkiewicz, M Lutter, R Reischuk
Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017
222017
ASAP: algorithm substitution attacks on cryptographic protocols
S Berndt, J Wichelmann, C Pott, TH Traving, T Eisenbarth
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
212022
Util:: lookup: Exploiting key decoding in cryptographic libraries
F Sieck, S Berndt, J Wichelmann, T Eisenbarth
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
152021
New Bounds for the Vertices of the Integer Hull∗
S Berndt, K Jansen, KM Klein
Symposium on Simplicity in Algorithms (SOSA), 25-36, 2021
142021
Online bin covering with limited migration
S Berndt, L Epstein, K Jansen, A Levin, M Maack, L Rohwedder
arXiv preprint arXiv:1904.06543, 2019
132019
SNI-in-the-head: Protecting MPC-in-the-head protocols against side-channel analysis
O Seker, S Berndt, L Wilke, T Eisenbarth
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
112020
Positive-instance driven dynamic programming for graph searching
M Bannach, S Berndt
Algorithms and Data Structures: 16th International Symposium, WADS 2019 …, 2019
112019
Load balancing: The long road from theory to practice
S Berndt, MA Deppert, K Jansen, L Rohwedder
2022 Proceedings of the Symposium on Algorithm Engineering and Experiments …, 2022
102022
On the gold standard for security of universal steganography
S Berndt, M Liśkiewicz
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
102018
Combined fault and leakage resilience: Composability, constructions and compiler
S Berndt, T Eisenbarth, S Faust, M Gourjon, M Orlt, O Seker
Annual International Cryptology Conference, 377-409, 2023
92023
Provable secure universal steganography of optimal rate: Provably secure steganography does not necessarily imply one-way functions
S Berndt, M Liśkiewicz
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
82016
Side-channel protections for Picnic signatures
DF Aranha, S Berndt, T Eisenbarth, O Seker, A Takahashi, L Wilke, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 239-282, 2021
72021
Robust online algorithms for certain dynamic packing problems
S Berndt, V Dreismann, K Grage, K Jansen, I Knof
International Workshop on Approximation and Online Algorithms, 43-59, 2019
62019
TeeJam: Sub-Cache-Line Leakages Strike Back
F Sieck, Z Zhang, S Berndt, C Chuengsatiansup, T Eisenbarth, Y Yarom
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (1 …, 2024
52024
Dash: Accelerating distributed private machine learning inference with arithmetic garbled circuits
J Sander, S Berndt, I Bruhns, T Eisenbarth
arXiv preprint arXiv:2302.06361, 2023
52023
" act natural!": Having a private chat on a public blockchain
T Tiemann, S Berndt, T Eisenbarth, M Liskiewicz
Cryptology ePrint Archive, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20