Dr. rer. nat. Sebastian Berndt
Ratzeburger Allee 160
23562 Lübeck
Email: | s.berndt(at)uni-luebeck.de |
Phone: | +49 451 3101 5323 |
Publications
2025
Jonas
Sander,
Sebastian
Berndt,
Ida
Bruhns, and
Thomas
Eisenbarth,
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2025, pp. 420-449, 2025. IACR.
DOI: | 10.46586/tches.v2025.i1.420-449 |
2024
Ida
Bruhns,
Sebastian
Berndt,
Jonas
Sander, and
Thomas
Eisenbarth,
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
Slalom at the Carnival: Privacy-preserving Inference with Masks from Public Knowledge, IACR Commun. Cryptol. , vol. 1, no. 3, pp. 40, 2024.
DOI: | 10.62056/AKP-49QGXQ |
File: | akp-49qgxq |
Paula
Arnold,
Sebastian
Berndt,
Thomas
Eisenbarth, and
Maximilian
Orlt,
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
Polynomial sharings on two secrets: Buy one, get one free, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , 2024. pp. 671-706.
DOI: | 10.46586/tches.v2024.i3.671-706 |
File: | 11691 |
2023
Florian
Sieck,
Zhiyuan
Zhang,
Sebastian
Berndt,
Chitchanok
Chuengsatiansup,
Thomas
Eisenbarth, and
Yuval
Yarom,
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dec.2023. pp. 457-500.
TeeJam: Sub-Cache-Line Leakages Strike Back, in IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) , Dec.2023. pp. 457-500.
DOI: | 10.46586/tches.v2024.i1.457-500 |
Weblink: | https://tches.iacr.org/index.php/TCHES/article/view/11259 |
Bibtex: | @article{Sieck_Zhang_Berndt_Chuengsatiansup_Eisenbarth_Yarom_2023, title={TeeJam: Sub-Cache-Line Leakages Strike Back}, volume={2024}, url={https://tches.iacr.org/index.php/TCHES/article/view/11259}, DOI={10.46586/tches.v2024.i1.457-500}, number={1}, journal={IACR Transactions on Cryptographic Hardware and Embedded Systems}, author={Sieck, Florian and Zhang, Zhiyuan and Berndt, Sebastian and Chuengsatiansup, Chitchanok and Eisenbarth, Thomas and Yarom, Yuval}, year={2023}, month={Dec.}, pages={457–500} } |
Thore
Tiemann,
Sebastian
Berndt,
Thomas
Eisenbarth, and
Maciej
Liskiewicz,
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
"Act natural!": Exchanging Private Messages on Public Blockchains, in 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023 , IEEE, 2023. pp. 292-308.
DOI: | 10.1109/EuroSP57164.2023.00026 |
Weblink: | https://doi.ieeecomputersociety.org/10.1109/EuroSP57164.2023.00026 |
Weblink: | https://eprint.iacr.org/2021/1073 |
File: | Dateilink |
Bibtex: | @inproceedings{tiemann2023actnatural, author = {Thore Tiemann and Sebastian Berndt and Thomas Eisenbarth and Maciej Liskiewicz}, title = {"Act natural!": Exchanging Private Messages on Public Blockchains}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {292--308}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00026}, doi = {10.1109/EUROSP57164.2023.00026} } |
Sebastian
Berndt,
Thomas
Eisenbarth,
Sebastian
Faust,
Marc
Gourjon,
Maximilian
Orlt, and
Okan
Seker,
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377-409.
Combined Fault and Leakage Resilience: Composability, Constructions and Compiler, in Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part III , Helena Handschuh and Anna Lysyanskaya, Eds. Cham: Springer, 2023. pp. 377-409.
DOI: | 10.1007/978-3-031-38548-3_13 |
ISBN: | 978-3-031-38548-3 |
File: | 978-3-031-38548-3_13 |
Pascal
Bemmann,
Sebastian
Berndt,
Denis
Diemert,
Thomas
Eisenbarth, and
Tibor
Jager,
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
Subversion-Resilient Authenticated Encryption Without Random Oracles, in Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II , Mehdi Tibouchi and Xiaofeng Wang, Eds. Springer, 2023. pp. 460-483.
DOI: | 10.1007/978-3-031-33491-7_17 |
File: | 978-3-031-33491-7_17 |
2022
Sebastian
Berndt,
Jan
Wichelmann,
Claudius
Pott,
Tim-Henrik
Traving, and
Thomas
Eisenbarth,
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols, in Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security , ACM, 2022. pp. 712-726.
DOI: | 10.1145/3488932.3517387 |
ISBN: | 9781450391405 |
File: | 3488932.3517387 |
2021
Diego F.
Aranha,
Sebastian
Berndt,
Thomas
Eisenbarth,
Okan
Seker,
Akira
Takahashi,
Luca
Wilke, and
Greg
Zaverucha,
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
Side-Channel Protections for Picnic Signatures, IACR Transactions on Cryptographic Hardware and Embedded Systems , vol. 2021, no. 4, pp. 239-282, 2021.
DOI: | 10.46586/tches.v2021.i4.239-282 |
File: | 9066 |
Florian
Sieck,
Sebastian
Berndt,
Jan
Wichelmann, and
Thomas
Eisenbarth,
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries, in CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security , Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi, Eds. ACM, 2021. pp. 2456-2473.
DOI: | 10.1145/3460120.3484783 |
File: | 3460120.3484783 |
Sebastian
Berndt,
Klaus
Jansen, and
Alexandra
Lassota,
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
Tightness of Sensitivity and Proximity Bounds for Integer Linear Programs, in {SOFSEM} 2021: Theory and Practice of Computer Science - 47th International Conference on Current Trends in Theory and Practice of Computer Science, {SOFSEM} 2021, Bolzano-Bozen, Italy, January 25-29, 2021, Proceedings , Tom{\'{a}}s Bures and Riccardo Dondi and Johann Gamper and Giovanna Guerrini and Tomasz Jurdzinski and Claus Pahl and Florian Sikora and Prudence W. H. Wong, Eds. Springer, 2021. pp. 349--360.
DOI: | 10.1007/978-3-030-67731-2_25 |
File: | 978-3-030-67731-2_25 |
Jan
Wichelmann,
Sebastian
Berndt,
Claudius
Pott, and
Thomas
Eisenbarth,
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device, in Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings , Leyla Bilge and Lorenzo Cavallaro and Giancarlo Pellegrino and Nuno Neves, Eds. Springer, 2021. pp. 88-105.
DOI: | 10.1007/978-3-030-80825-9_5 |
File: | 978-3-030-80825-9_5 |
Sebastian
Berndt,
Kilian
Grage,
Klaus
Jansen,
Lukas
Johannsen, and
Maria
Kosche,
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
Robust Online Algorithms for Dynamic Choosing Problems, in Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings , Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque, Eds. Springer, 2021. pp. 38--49.
DOI: | 10.1007/978-3-030-80049-9_4 |
File: | 978-3-030-80049-9_4 |
Sebastian
Berndt,
Klaus
Jansen, and
Kim{-}Manuel
Klein,
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
New Bounds for the Vertices of the Integer Hull, in 4th Symposium on Simplicity in Algorithms, {SOSA} 2021, Virtual Conference, January 11-12, 2021 , Hung Viet Le and Valerie King, Eds. {SIAM}, 2021. pp. 25--36.
DOI: | 10.1137/1.9781611976496.3 |
File: | 1.9781611976496.3 |
Sebastian
Berndt,
Max A.
Deppert,
Klaus
Jansen, and
Lars
Rohwedder,
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
Load Balancing: The Long Road from Theory to Practice, CoRR , vol. abs/2107.13638, 2021.
File: | 2107.13638 |
2020
Max
Bannach,
Sebastian
Berndt,
Marten
Maack,
Matthias
Mnich,
Alexandra
Lassota,
Malin
Rau, and
Malte
Skambath,
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Solving Packing Problems with Few Small Items Using Rainbow Matchings, in MFCS 2020 , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020.
Okan
Seker,
Sebastian
Berndt,
Luca
Wilke, and
Thomas
Eisenbarth,
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis, in CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security , Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna, Eds. ACM, 2020. pp. 1033-1049.
DOI: | 10.1145/3372297.3417889 |
File: | 3372297.3417889 |
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
PACE Solver Description: PID (star), in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 28:1--28:4.
Max
Bannach,
Sebastian
Berndt,
Martin
Schuster, and
Marcel
Wienöbst,
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
PACE Solver Description: Fluid, in IPEC , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020. pp. 27:1--27:3.
Sebastian
Berndt, and
Maciej
Liskiewicz,
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
On the universal steganography of optimal rate, Inf. Comput. , vol. 275, pp. 104632, 2020.
2019
Sebastian
Berndt,
Leah
Epstein,
Klaus
Jansen,
Asaf
Levin,
Marten
Maack, and
Lars
Rohwedder,
Online Bin Covering with Limited Migration, in ESA , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019. pp. 18:1--18:14.
Online Bin Covering with Limited Migration, in ESA , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019. pp. 18:1--18:14.
Max
Bannach, and
Sebastian
Berndt,
Positive-Instance Driven Dynamic Programming for Graph Searching, in WADS , Springer, 2019. pp. 43--56.
Positive-Instance Driven Dynamic Programming for Graph Searching, in WADS , Springer, 2019. pp. 43--56.
Sebastian
Berndt,
Valentin
Dreismann,
Kilian
Grage,
Klaus
Jansen, and
Ingmar
Knof,
Robust Online Algorithms for Certain Dynamic Packing Problems, in WAOA , Springer, 2019. pp. 43--59.
Robust Online Algorithms for Certain Dynamic Packing Problems, in WAOA , Springer, 2019. pp. 43--59.
2018
Sebastian Berndt,
Computing Tree Width: From Theory to Practice and Back, in CiE , Springer, 2018. pp. 81--88.
Computing Tree Width: From Theory to Practice and Back, in CiE , Springer, 2018. pp. 81--88.
Sebastian
Berndt, and
Maciej
Liskiewicz,
On the Gold Standard for Security of Universal Steganography, in EUROCRYPT (1) , Springer, 2018. pp. 29--60.
On the Gold Standard for Security of Universal Steganography, in EUROCRYPT (1) , Springer, 2018. pp. 29--60.
- Staff
- Thomas Eisenbarth
- Esfandiar Mohammadi
- Paula Arnold
- Jeremy Boy
- Finn Burmester
- Till Eifert
- Tim Gellersen
- Jonah Heller
- Kristoffer Hempel
- Timothy Imort
- Moritz Kirschte
- Marven Kummerfeldt
- Johannes Liebenow
- Nils Loose
- Felix Mächtle
- Felix Maurer
- Sebastian Meiser
- Anna Pätschke
- Pajam Pauls
- Thorsten Peinemann
- Christopher Peredy
- Tammo Polle
- Yannik Potdevin
- Claudius Pott
- Anja Rabich
- Jonas Sander
- Ines Schiebahn
- Yara Schütt
- Jan-Niclas Serr
- Florian Sieck
- Annika Strang
- Thore Tiemann
- Alexander Treff
- Jan Wichelmann
- Luca Wilke