User profiles for S. Krenn
Stephan KrennAIT Austrian Institute of Technology GmbH Verified email at ait.ac.at Cited by 2478 |
Minimally invasive hallux valgus surgery: a critical review of the evidence
HJ Trnka, S Krenn, R Schuh - International orthopaedics, 2013 - Springer
This systematic review aims to illustrate the published results of “minimally invasive”
procedures for correction of hallux valgus. Based on former systematic reviews on that topic, the …
procedures for correction of hallux valgus. Based on former systematic reviews on that topic, the …
Cache games--bringing access-based cache attacks on AES to practice
D Gullasch, E Bangerter, S Krenn - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
… processes (a spy process S and a security sensitive victim … , S observes the timings of its
own memory accesses, which depend on the state of the cache. These measurements allow S …
own memory accesses, which depend on the state of the cache. These measurements allow S …
Learning with rounding, revisited: New reduction, properties and applications
… , we know that s maintains entropy conditioned on seeing A, ⌊ A · s⌋p and therefore … s, aux
such that the support of s is S and H∞(s|aux) ≥ k, we have: (aux, a1,..., am, Ext(s; a1),..., Ext(s…
such that the support of s is S and H∞(s|aux) ≥ k, we have: (aux, a1,..., am, Ext(s; a1),..., Ext(s…
Multiface: A dataset for neural face rendering
…, A Hypes, T Koska, S Krenn, S Lombardi… - arXiv preprint arXiv …, 2022 - arxiv.org
… We use a conditional VAE model [8] as a baseline, and evaluate the model’s reconstruction
quality with respect to different network architectures, which includes spatial biases, a texture …
quality with respect to different network architectures, which includes spatial biases, a texture …
Better zero-knowledge proofs for lattice encryption and their application to group signatures
… If S is a set, we write s ←$ S to denote that s was drawn uniformly at random from … ’s responses
must not depend on its secret inputs.However, in our protocols, the prover’s response will …
must not depend on its secret inputs.However, in our protocols, the prover’s response will …
Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures
… If S is a set, we write \(a \leftarrow S\) to denote that a is chosen uniformly at random from S.
For a message \(m = (m[1], m[2], \ldots , m[\ell ])\), we call m[i] a block, while \(\ell \in \mathbb {…
For a message \(m = (m[1], m[2], \ldots , m[\ell ])\), we call m[i] a block, while \(\ell \in \mathbb {…
Commitments and efficient zero-knowledge proofs from learning parity with noise
… answers to all three challenges we can extract s , e where y = A.s ⊕ e and e has low weight.
… The common input to P, V is A and y, P’s secret input is (e, s). The protocol flow is then given …
… The common input to P, V is A and y, P’s secret input is (e, s). The protocol flow is then given …
Audio-visual speech codecs: Rethinking audio-visual speech enhancement by re-synthesis
K Yang, D Marković, S Krenn… - Proceedings of the …, 2022 - openaccess.thecvf.com
… audio and visual streams of an individual’s speech, where S′ contains various sources of
… E denote full transformation S ↦→ Z and D denote the full generative speech model Z ↦→S. …
… E denote full transformation S ↦→ Z and D denote the full generative speech model Z ↦→S. …
Using behavior change communication to lead a comprehensive family planning program: the Nigerian Urban Reproductive Health Initiative
S Krenn, L Cobb, S Babalola, M Odeku… - Global Health: Science …, 2014 - ghspjournal.org
… © Krenn et al. This is an open-access article distributed under the terms of the Creative
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in …
Commons Attribution License, which permits unrestricted use, distribution, and reproduction in …
Efficient zero-knowledge proofs for commitments from learning with errors over rings
We extend a commitment scheme based on the learning with errors over rings ( $$\mathsf{RLWE}$$
RLWE ) problem, and present efficient companion zero-knowledge proofs of …
RLWE ) problem, and present efficient companion zero-knowledge proofs of …