Cryptography-based security solutions and cryptographic primitives can only support trust if sound implementations exist and users and developers are supported in integrating them into their applications. Thus, the goal of this project area is to develop methods and technologies that allow for secure implementation of cryptography and enable users and developers who may not be cryptography experts in properly applying cryptography.

E3 - Compiler for Privacy-Preserving Protocols


The use of IT applications often requires users to reveal privacy-sensitive data. Privacy-preserving protocols allow overcoming this privacy dilemma. However, the efficient implementation and deployment of privacy preserving protocols, especially on new computing architectures, remains a tedious challenge. The goal of project E3 is to develop a compiler for the automatic generation of optimized privacy-preserving protocols. Thereby, the compiler will enable non-expert developers to efficiently use privacy-preserving protocols that are custom-tailored for their specific deployment scenario.


Ágnes Kiss

Engineering Cryptographic Protocols Group.


  • Secure multi-party computation.
  • Graph theory.
  • Countermeasures against fault attacks and side-channel analysis.

Daniel Demmler

Engineering Cryptographic Protocols Group.


  • Design, implementation and evaluation of secure computation and private information retrieval protocols.
  • Privacy-preserving applications and their practical realization.

CROSSING Publications E3

Additional Attributes


More Efficient Universal Circuit Constructions

Daniel Günther, Ágnes Kiss, Thomas Schneider
In: ASIACRYPT 2017 - Advances in Cryptology, December 2017

SIXPACK: Securing Internet eXchange Points Against Curious onlooKers

Marco Chiesa, Daniel Demmler, Marco Canini, Michael Schapira, Thomas Schneider
In: 13. International Conference on emerging Networking EXperiments and Technologies (CoNEXT'17), December 2017

CogniCrypt: Supporting Developers in using Cryptography

Stefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, Ram Kamath
In: Automated Software Engineering (ASE'17), November 2017

Private Set Intersection for Unequal Set Sizes with Mobile Applications

Ágnes Kiss, Jian Liu, Thomas Schneider, N. Asokan, Benny Pinkas
In: PoPETs - Proceedings on Privacy Enhancing Technologies, July 2017

Toward Practical Secure Stable Matching

M. Sadegh Riazi, Ebrahim Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: Proceedings on Privacy Enhancing Technologies (PoPETs), July 2017

Valiant's Universal Circuit - Towards a Modular Construction and Implementation

Daniel Günther
March 2017
[Thesis (Master, Bachelor, Diploma)]

Privacy-Preserving Interdomain Routing at Internet Scale

Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
In: PoPETs - Proceedings on Privacy Enhancing Technologies, February 2017

Pushing the communication barrier in secure computation using lookup tables

Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), February 2017
The Internet society

Constant round maliciously secure 2PC with function-independent preprocessing using LEGO

Jesper Nielsen, Thomas Schneider, Roberto Trifiletti
In: 24. Annual Network and Distributed System Security Symposium (NDSS'17), February 2017
The Internet Society

SFB 1119 - Contact

Contact E3

Thomas Schneider
Engineering Cryptographic Protocols Group
Technische Universität Darmstadt
Mornewegstraße 32
64293 Darmstadt

Ahmad-Reza Sadeghi
Technische Universität Darmstadt
System Security Lab
Mornewegstrasse 32
64293 Darmstadt


Funded by

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang