LUIS Über uns Team
Dr. Michael Brenner

Dr. Michael Brenner

Portraitfoto Michael Brenner Portraitfoto Michael Brenner
Dr. Michael Brenner
Portraitfoto Michael Brenner Portraitfoto Michael Brenner
Dr. Michael Brenner
Positions
Management
Workstations and Security Section
Deputy Head
Leibniz Universität IT Services (LUIS)
Department Officers for IT Security
Leibniz Universität IT Services (LUIS)

Arbeitsbereiche

  • Arbeitsplatz-PC
  • IT-Sicherheit
  • Identitätsmanagement
  • Zentrale Dienste Mail, Kalender, DDI (DNS, DHCP, IPAM), XMPP, Matrix
  • Stellv. Informationssicherheitsbeauftragter der LUH

Wissenschaftliche Tätigkeiten

Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC)

Homomorphic Cryptography Standards

  • 2019 4. Homomorphic Encryption Standards Meeting in Santa Clara
  • 2018 3. Homomorphic Encryption Standards Meeting in Toronto (U Toronto)
  • 2018 2. Homomorphic Encryption Standards Meeting in Cambridge (MIT)
  • 2017 1. Homomorphic Encryption Standards Meeting in Redmond (Microsoft Research)

Links

The Open Source hcrypt Project
HomomorphicEncryption.org Standards Consortium

Publikationen

Showing results 11 - 15 out of 41

Wiese L, Homann D, Waage T, Brenner M. Homomorphe Verschlüsselung für Cloud-Datenbanken: Übersicht und Anforderungsanalyse. In SICHERHEIT 2018. Gesellschaft fur Informatik (GI). 2018. p. 221-234
Brenner M, (ed.), Rohloff K, (ed.). 21st International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2017 Workshops BITCOIN, TA, VOTING, WAHC and WTSC. Springer Verlag, 2017.
Brenner M, Dai W, Halevi S, Kyoohyung H, Jalali A, Kim M et al. White Paper: Standardizing an API for RLWE-Based Homomorphic Encryption. HomomorphicEncryption.org Consortium. 2017.
Brenner M, (ed.), Rohloff K, (ed.). 20th International Conference on Financial Cryptography and Data Security, Proceedings of the FC 2016 Workshops BITCOIN, VOTING and WAHC. Springer Verlag, 2016.
Brenner M, Schmidt J. Angriff der Krypto-Zombies - Warum Verschlüsselung mit Hintertüren unsere Sicherheit gefährdet. c't Magazin für Computertechnik. 2016;(11/2016):64-67.