User profiles for S. Krenn

Stephan Krenn

AIT Austrian Institute of Technology GmbH
Verified email at ait.ac.at
Cited by 2478

Minimally invasive hallux valgus surgery: a critical review of the evidence

HJ Trnka, S Krenn, R Schuh - International orthopaedics, 2013 - Springer
This systematic review aims to illustrate the published results of “minimally invasive”
procedures for correction of hallux valgus. Based on former systematic reviews on that topic, the …

Cache games--bringing access-based cache attacks on AES to practice

D Gullasch, E Bangerter, S Krenn - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
… processes (a spy process S and a security sensitive victim … , S observes the timings of its
own memory accesses, which depend on the state of the cache. These measurements allow S

Learning with rounding, revisited: New reduction, properties and applications

J Alwen, S Krenn, K Pietrzak, D Wichs - Annual Cryptology Conference, 2013 - Springer
… , we know that s maintains entropy conditioned on seeing A, ⌊ A · s⌋p and therefore … s, aux
such that the support of s is S and H∞(s|aux) ≥ k, we have: (aux, a1,..., am, Ext(s; a1),..., Ext(s

Multiface: A dataset for neural face rendering

…, A Hypes, T Koska, S Krenn, S Lombardi… - arXiv preprint arXiv …, 2022 - arxiv.org
… We use a conditional VAE model [8] as a baseline, and evaluate the model’s reconstruction
quality with respect to different network architectures, which includes spatial biases, a texture …

Better zero-knowledge proofs for lattice encryption and their application to group signatures

F Benhamouda, J Camenisch, S Krenn… - … Conference on the …, 2014 - Springer
… If S is a set, we write s ←$ S to denote that s was drawn uniformly at random from … ’s responses
must not depend on its secret inputs.However, in our protocols, the prover’s response will …

Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures

J Camenisch, D Derler, S Krenn, HC Pöhls… - … -Key Cryptography–PKC …, 2017 - Springer
… If S is a set, we write \(a \leftarrow S\) to denote that a is chosen uniformly at random from S.
For a message \(m = (m[1], m[2], \ldots , m[\ell ])\), we call m[i] a block, while \(\ell \in \mathbb {…

Commitments and efficient zero-knowledge proofs from learning parity with noise

A Jain, S Krenn, K Pietrzak, A Tentes - … on the Theory and Application of …, 2012 - Springer
… answers to all three challenges we can extract s , e where y = A.s ⊕ e and e has low weight.
… The common input to P, V is A and y, P’s secret input is (e, s). The protocol flow is then given …

Audio-visual speech codecs: Rethinking audio-visual speech enhancement by re-synthesis

K Yang, D Marković, S Krenn… - Proceedings of the …, 2022 - openaccess.thecvf.com
… audio and visual streams of an individual’s speech, where S′ contains various sources of
… E denote full transformation S ↦→ Z and D denote the full generative speech model Z ↦→S. …

Using behavior change communication to lead a comprehensive family planning program: the Nigerian Urban Reproductive Health Initiative

S Krenn, L Cobb, S Babalola, M Odeku… - Global Health: Science …, 2014 - ghspjournal.org
… © Krenn et al. This is an open-access article distributed under the terms of the Creative
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in …

Efficient zero-knowledge proofs for commitments from learning with errors over rings

F Benhamouda, S Krenn, V Lyubashevsky… - … symposium on research …, 2015 - Springer
We extend a commitment scheme based on the learning with errors over rings ( $$\mathsf{RLWE}$$
RLWE ) problem, and present efficient companion zero-knowledge proofs of …