Follow
Sebastian Berndt
Title
Cited by
Cited by
Year
Fully dynamic bin packing revisited
S Berndt, K Jansen, KM Klein
Mathematical Programming 179 (1), 109-155, 2020
632020
Algorithm substitution attacks from a steganographic perspective
S Berndt, M Liśkiewicz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
402017
Jdrasil: A modular library for computing tree decompositions
M Bannach, S Berndt, T Ehlers
16th International Symposium on Experimental Algorithms (SEA 2017), 2017
322017
Practical access to dynamic programming on tree decompositions
M Bannach, S Berndt
Algorithms 12 (8), 172, 2019
232019
Learning residual alternating automata
S Berndt, M Liśkiewicz, M Lutter, R Reischuk
Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017
232017
ASAP: algorithm substitution attacks on cryptographic protocols
S Berndt, J Wichelmann, C Pott, TH Traving, T Eisenbarth
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
132022
Online bin covering with limited migration
S Berndt, L Epstein, K Jansen, A Levin, M Maack, L Rohwedder
arXiv preprint arXiv:1904.06543, 2019
122019
Positive-instance driven dynamic programming for graph searching
M Bannach, S Berndt
Algorithms and Data Structures: 16th International Symposium, WADS 2019 …, 2019
112019
On the gold standard for security of universal steganography
S Berndt, M Liśkiewicz
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
102018
Util:: lookup: Exploiting key decoding in cryptographic libraries
F Sieck, S Berndt, J Wichelmann, T Eisenbarth
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
92021
New Bounds for the Vertices of the Integer Hull∗
S Berndt, K Jansen, KM Klein
Symposium on Simplicity in Algorithms (SOSA), 25-36, 2021
92021
SNI-in-the-head: Protecting MPC-in-the-head protocols against side-channel analysis
O Seker, S Berndt, L Wilke, T Eisenbarth
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
92020
Provable secure universal steganography of optimal rate: Provably secure steganography does not necessarily imply one-way functions
S Berndt, M Liśkiewicz
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
82016
Load balancing: The long road from theory to practice
S Berndt, MA Deppert, K Jansen, L Rohwedder
2022 Proceedings of the Symposium on Algorithm Engineering and Experiments …, 2022
62022
Side-channel protections for Picnic signatures
DF Aranha, S Berndt, T Eisenbarth, O Seker, A Takahashi, L Wilke, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 239-282, 2021
62021
" act natural!": Having a private chat on a public blockchain
T Tiemann, S Berndt, T Eisenbarth, M Liskiewicz
Cryptology ePrint Archive, 2021
52021
Robust online algorithms for certain dynamic packing problems
S Berndt, V Dreismann, K Grage, K Jansen, I Knof
International Workshop on Approximation and Online Algorithms, 43-59, 2019
52019
Help, My Signal has Bad Device! Breaking the Signal Messenger’s Post-Compromise Security Through a Malicious Device
J Wichelmann, S Berndt, C Pott, T Eisenbarth
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
42021
Solving packing problems with few small items using rainbow matchings
M Bannach, S Berndt, M Maack, M Mnich, A Lassota, M Rau, M Skambath
arXiv preprint arXiv:2007.02660, 2020
42020
Hard Communication Channels for Steganography
S Berndt, M Liskiewicz
27th International Symposium on Algorithms and Computation (ISAAC 2016), 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20