Sebastian Berndt

ORCID: 0000-0003-4177-8081
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optimization and Search Problems
  • Cryptography and Data Security
  • Optimization and Packing Problems
  • Cryptographic Implementations and Security
  • Complexity and Algorithms in Graphs
  • Advanced Graph Theory Research
  • Scheduling and Optimization Algorithms
  • Security and Verification in Computing
  • Advanced Manufacturing and Logistics Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Coding theory and cryptography
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Formal Methods in Verification
  • Privacy-Preserving Technologies in Data
  • Advanced Optimization Algorithms Research
  • Auction Theory and Applications
  • Atomic and Molecular Physics
  • graph theory and CDMA systems
  • Chaos-based Image/Signal Encryption
  • Machine Learning and Algorithms
  • semigroups and automata theory
  • Adversarial Robustness in Machine Learning
  • Algorithms and Data Compression
  • Advanced Authentication Protocols Security

Johannes Gutenberg University Mainz
2022-2025

University of Lübeck
2015-2024

Technical University of Applied Sciences Lübeck
2024

Alexion (Germany)
2023

Technical University of Munich
2021

Kiel University
2014-2020

TU Dresden
2015

10.1007/s10107-018-1325-x article EN Mathematical Programming 2018-09-01

Abstract The atomic structure of neptunium (Np) was investigated by two-step resonance ionization spectroscopy. study involved exploring ground-state transitions as well following to high-lying states just below the potential (IP) or auto-ionizing above IP. That resulted in identification schemes, suitable for trace analysis and nuclear investigations. lifetimes two excited located at 25,342.48 $$\, \text {cm}^{-1} $$ <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"> <mml:mrow>...

10.1140/epjd/s10053-024-00833-7 article EN cc-by The European Physical Journal D 2024-05-01

The goal of an algorithm substitution attack (ASA), also called a subversion (SA), is to replace honest implementation cryptographic tool by subverted one which allows leak private information while generating output indistinguishable from the output. Bellare, Paterson, and Rogaway provided at CRYPTO '14 formal security model capture this kind attacks constructed practically implementable ASAs against large class symmetric encryption schemes. At CCS'15, Ateniese, Magri, Venturi extended...

10.1145/3133956.3133981 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

We report on high-resolution laser spectroscopy studies $^{249\text{--}253}\mathrm{Cf}$ with spectral linewidths in the order of 100 MHz carried out at RISIKO mass separator Mainz University. In total three atomic ground-state transitions were investigated and hyperfine parameters for odd-$A$ isotopes isotope shift all examined have been determined from measured spectra. The measurements allowed tracking changes mean-squared charge radii across deformed nuclear shell closure $N=152$, whereby...

10.1103/physrevc.107.034313 article EN cc-by Physical review. C 2023-03-21

While the theoretical aspects concerning computation of tree width - one most important graph parameters are well understood, it is not clear how can be computed practically. We present open source Java library Jdrasil that implements several different state art algorithms for this task. By experimentally comparing these algorithms, we show default choices made in lead to an competitive implementation (it took third place first PACE challenge) while also being easy use and extend.

10.4230/lipics.sea.2017.28 article EN Symposium on Experimental and Efficient Algorithms 2017-01-01

Parameterized complexity theory has led to a wide range of algorithmic breakthroughs within the last few decades, but practicability these methods for real-world problems is still not well understood. We investigate one fundamental approaches this field: dynamic programming on tree decompositions. Indisputably, key technique in parameterized algorithms and modern algorithm design. Despite enormous impact approach theory, it very little influence practical implementations. The reasons...

10.3390/a12080172 article EN cc-by Algorithms 2019-08-16

The security of digital communication relies on few cryptographic protocols that are used to protect internet traffic, from web sessions instant messaging. These and the primitives they rely have been extensively studied considered secure. Yet, sophisticated attackers often able bypass rather than break mechanisms. Kleptography or algorithm substitution attacks (ASA) describe techniques place backdoors right into primitives. While highly relevant as a building block, we show real danger ASAs...

10.1145/3488932.3517387 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2022-05-24

Residuality plays an essential role for learning finite automata. While residual deterministic and non-deterministic automata have been understood quite well, fundamental questions concerning alternating (AFA) remain open. Recently, Angluin, Eisenstat, Fisman (2015) initiated a systematic study of AFAs proposed algorithm called AL* – extension the popular L* to learn AFAs. Based on computer experiments they conjectured that produces AFAs, but not able give proof. In this paper we disprove...

10.1609/aaai.v31i1.10891 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2017-02-13

The adoption of machine learning solutions is rapidly increasing across all parts society. As the models grow larger, both training and inference increasingly outsourced, e.g. to cloud service providers. This means that potentially sensitive data processed on untrusted platforms, which bears inherent security privacy risks. In this work, we investigate how protect distributed systems, focusing deep convolutional neural networks. most common best-performing mixed MPC approaches are based HE,...

10.46586/tches.v2025.i1.420-449 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2024-12-09

The adoption of machine learning solutions is rapidly increasing across all parts society. Cloud service providers such as Amazon Web Services, Microsoft Azure and the Google Platform aggressively expand their Machine-Learning-as-a-Service offerings. While widespread has huge potential for both research industry, large-scale evaluation possibly sensitive data on untrusted platforms bears inherent security privacy risks. Since computation time expensive, performance a critical factor...

10.48550/arxiv.2302.06361 preprint EN other-oa arXiv (Cornell University) 2023-01-01

We consider the fully dynamic bin packing problem, where items arrive and depart in an online fashion repacking of previously packed is allowed. The goal is, course, to minimize both number bins used as well amount repacking. A recently introduced way measuring costs at each timestep migration factor, defined total size repacked divided by arriving or departing item. Concerning trade-off between if we wish achieve asymptotic competitive ratio 1 + epsilon for bins, a relatively simple...

10.4230/lipics.approx-random.2015.135 article EN International Workshop and International Workshop on Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques 2015-01-01

MPC-in-the-head based protocols have recently gained much popularity and are at the brink of seeing widespread usage. With use come spectres implementation issues attacks such as side-channel attacks. We show that implementations implementing paradigm vulnerable to As a case study, we choose ZKBoo-protocol Giacomelli, Madsen, Orlandi (USENIX 2016) even single leaked value is sufficient break security protocol. To this attack not just theoretical vulnerability, apply differential power...

10.1145/3372297.3417889 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

In medical research, there are constantly new findings that lead to insights and novel treatments. Hence, physicians always need stay up-to-date provide high-quality patient care. Virtual reality is unique among the available learning methods as it offers opportunity collaboratively explore inside of human body experience understand complex workings interventions. We realized such a VR-Learning-System assessed its potential with experts (n = 9). Initial results indicate prefer system,...

10.1109/vrw58643.2023.00133 article EN 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) 2023-03-01

The microarchitectural behavior of modern CPUs is mostly hidden from developers and users computer software. Due to a plethora attacks exploiting behavior, security-critical software must, e.g., ensure their code constant-time, which cumbersome usually results in slower programs. In practice, small leakages are deemed not exploitable still remain the codebase. For example, sub-cache-line have previously been investigated CacheBleed MemJam attacks, impractical on platforms.In this work, we...

10.46586/tches.v2024.i1.457-500 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2023-12-04

We present the first complexity-theoretic secure steganographic protocol which, for any communication channel, is provably secure, reliable, and has nearly optimal bandwidth. Our system unconditionally i.e. our proof does not rely on unproven assumption, like e.g. existence of one-way functions. This disproves claim that functions access to a channel oracle are both necessary sufficient conditions steganography, in sense reliable steganography exists independently

10.1145/2909827.2930796 article EN 2016-06-10

Implementations of cryptographic libraries have been scrutinized for secret-dependent execution behavior exploitable by microarchitectural side-channel attacks. To prevent unintended leakages, most moved to constant-time implementations primitives. There also efforts certify use in sensitive areas, like Microsoft CNG and Botan, with specific attention leakage behavior.

10.1145/3460120.3484783 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

10.1016/j.ic.2020.104632 article EN publisher-specific-oa Information and Computation 2020-10-14
Coming Soon ...