BibTeX records: Frederik Armknecht

download as .bib file

@article{DBLP:journals/popets/ArmknechtHS23,
  author       = {Frederik Armknecht and
                  Youzhe Heng and
                  Rainer Schnell},
  title        = {Strengthening Privacy-Preserving Record Linkage using Diffusion},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {2},
  pages        = {298--311},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0054},
  doi          = {10.56553/POPETS-2023-0054},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ArmknechtHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/SchaferMA22,
  author       = {Jochen Sch{\"{a}}fer and
                  Christian M{\"{u}}ller and
                  Frederik Armknecht},
  title        = {If You Like Me, Please Don't "Like" Me: Inferring Vendor
                  Bitcoin Addresses From Positive Reviews},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {440--459},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0022},
  doi          = {10.2478/POPETS-2022-0022},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/SchaferMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/ChenSAH22,
  author       = {Yanling Chen and
                  Rainer Schnell and
                  Frederik Armknecht and
                  Youzhe Heng},
  editor       = {Nathalie Bier and
                  Ana L. N. Fred and
                  Hugo Gamboa},
  title        = {Salting as a Countermeasure against Attacks on Privacy Preserving
                  Record Linkage Techniques},
  booktitle    = {Proceedings of the 15th International Joint Conference on Biomedical
                  Engineering Systems and Technologies, {BIOSTEC} 2022, Volume 5: HEALTHINF,
                  Online Streaming, February 9-11, 2022},
  pages        = {353--360},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010787200003123},
  doi          = {10.5220/0010787200003123},
  timestamp    = {Tue, 06 Jun 2023 14:58:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biostec/ChenSAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-11406,
  author       = {Jasmin Zalonis and
                  Frederik Armknecht and
                  Bj{\"{o}}rn Grohmann and
                  Manuel Koch},
  title        = {Report: State of the Art Solutions for Privacy Preserving Machine
                  Learning in the Medical Context},
  journal      = {CoRR},
  volume       = {abs/2201.11406},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.11406},
  eprinttype    = {arXiv},
  eprint       = {2201.11406},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-11406.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ArmknechtBKL21,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  Ghassan Karame and
                  Wenting Li},
  title        = {Outsourcing Proofs of Retrievability},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {286--301},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2865554},
  doi          = {10.1109/TCC.2018.2865554},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ArmknechtBKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/PlotzAB21,
  author       = {Sebastian Plotz and
                  Frederik Armknecht and
                  Christian Bunse},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {How to Take Over Drones},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {526--536},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3437515},
  doi          = {10.1145/3433210.3437515},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/PlotzAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ArmknechtBKL21,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame and
                  Wenting Li},
  editor       = {Jorge Lobo and
                  Roberto Di Pietro and
                  Omar Chowdhury and
                  Hongxin Hu},
  title        = {Regulating Storage Overhead in Existing PoW-based Blockchains},
  booktitle    = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and
                  Technologies, Virtual Event, Spain, June 16-18, 2021},
  pages        = {131--142},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450569.3463564},
  doi          = {10.1145/3450569.3463564},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ArmknechtBKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/MikhalevMKA21,
  author       = {Vasily Mikhalev and
                  Miodrag J. Mihaljevic and
                  Orhun Kara and
                  Frederik Armknecht},
  editor       = {Gildas Avoine and
                  Julio Hernandez{-}Castro},
  title        = {Selected Design and Analysis Techniques for Contemporary Symmetric
                  Encryption},
  booktitle    = {Security of Ubiquitous Computing Systems},
  pages        = {49--62},
  publisher    = {Springer International Publishing},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-10591-4\_3},
  doi          = {10.1007/978-3-030-10591-4\_3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/21/MikhalevMKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtWTBS20,
  author       = {Frederik Armknecht and
                  Paul Walther and
                  Gene Tsudik and
                  Martin Beck and
                  Thorsten Strufe},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient
                  Authentication of Message Streams},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {211--223},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423349},
  doi          = {10.1145/3372297.3423349},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtWTBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/TajanWA20,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Frederik Armknecht},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Solving Set Relations with Secure Bloom Filters Keeping Cardinality
                  Private},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {443--450},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009835904430450},
  doi          = {10.5220/0009835904430450},
  timestamp    = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/TajanWA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmknechtBMMR19,
  author       = {Frederik Armknecht and
                  Zinaida Benenson and
                  Philipp Morgner and
                  Christian M{\"{u}}ller and
                  Christian Riess},
  title        = {Privacy implications of room climate data},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {1},
  pages        = {113--136},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-181133},
  doi          = {10.3233/JCS-181133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmknechtBMMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-09734,
  author       = {Christian A. Gorke and
                  Frederik Armknecht},
  title        = {Reverse Fingerprinting},
  journal      = {CoRR},
  volume       = {abs/1912.09734},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.09734},
  eprinttype    = {arXiv},
  eprint       = {1912.09734},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-09734.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtVVY19,
  author       = {Frederik Armknecht and
                  Ingrid Verbauwhede and
                  Melanie Volkamer and
                  Moti Yung},
  title        = {Biggest Failures in Security (Dagstuhl Seminar 19451)},
  journal      = {Dagstuhl Reports},
  volume       = {9},
  number       = {11},
  pages        = {1--23},
  year         = {2019},
  url          = {https://doi.org/10.4230/DagRep.9.11.1},
  doi          = {10.4230/DAGREP.9.11.1},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtVVY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TajanWA19,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Frederik Armknecht},
  title        = {Private Set Relations with Bloom Filters for Outsourced {SLA} Validation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {993},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TajanWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikMAIMBWR18,
  author       = {Subhadeep Banik and
                  Vasily Mikhalev and
                  Frederik Armknecht and
                  Takanori Isobe and
                  Willi Meier and
                  Andrey Bogdanov and
                  Yuhei Watanabe and
                  Francesco Regazzoni},
  title        = {Towards Low Energy Stream Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {2},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i2.1-19},
  doi          = {10.13154/TOSC.V2018.I2.1-19},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kryptotag/WaltherKATS18,
  author       = {Paul Walther and
                  Stefan K{\"{o}}psell and
                  Frederik Armknecht and
                  Gene Tsudik and
                  Thorsten Strufe},
  editor       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {Chains and Whips - An approach to lighweight MACs},
  booktitle    = {28. Krypto-Tag, Kirchheim bei M{\"{u}}nchen, Germany, June 7-8,
                  2018},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V. / {FG} {KRYPTO}},
  year         = {2018},
  url          = {https://doi.org/10.18420/cdm-2018-28-25},
  doi          = {10.18420/CDM-2018-28-25},
  timestamp    = {Fri, 18 Sep 2020 11:50:49 +0200},
  biburl       = {https://dblp.org/rec/conf/kryptotag/WaltherKATS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/MandalAZ18,
  author       = {Avikarsha Mandal and
                  Frederik Armknecht and
                  Erik Zenner},
  editor       = {Nils Gruschka},
  title        = {Privacy-Preserving Distributed Economic Dispatch Protocol for Smart
                  Grid},
  booktitle    = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo,
                  Norway, November 28-30, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11252},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03638-6\_1},
  doi          = {10.1007/978-3-030-03638-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/MandalAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JaschkeA18,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Unsupervised Machine Learning on Encrypted Data},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {453--478},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_21},
  doi          = {10.1007/978-3-030-10970-7\_21},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JaschkeA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeA18,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  title        = {Unsupervised Machine Learning on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/JaschkeA17,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {(Finite) Field Work: Choosing the Best Encoding of Numbers for {FHE}
                  Computation},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {482--492},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_23},
  doi          = {10.1007/978-3-030-02641-7\_23},
  timestamp    = {Wed, 25 Sep 2019 18:04:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/JaschkeA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GorkeAJC17,
  author       = {Christian A. Gorke and
                  Christian Janson and
                  Frederik Armknecht and
                  Carlos Cid},
  editor       = {Cong Wang and
                  Murat Kantarcioglu},
  title        = {Cloud Storage File Recoverability},
  booktitle    = {Proceedings of the Fifth {ACM} International Workshop on Security
                  in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {19--26},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055259.3055264},
  doi          = {10.1145/3055259.3055264},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GorkeAJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBDGT17,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Side Channels in Deduplication: Trade-offs between Leakage and Efficiency},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {266--274},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053019},
  doi          = {10.1145/3052973.3053019},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtBDGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBFK17,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  David Froelicher and
                  Ghassan Karame},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Sharing Proofs of Retrievability across Tenants},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {275--287},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052997},
  doi          = {10.1145/3052973.3052997},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtBFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MikhalevGAM17,
  author       = {Vasily Mikhalev and
                  Laurent Gomez and
                  Frederik Armknecht and
                  Jos{\'{e}} M{\'{a}}rquez},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Towards End-to-End Data Protection in Low-Power Networks},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_1},
  doi          = {10.1007/978-3-319-72817-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MikhalevGAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MorgnerMRERAB17,
  author       = {Philipp Morgner and
                  Christian M{\"{u}}ller and
                  Matthias Ring and
                  Bj{\"{o}}rn M. Eskofier and
                  Christian Riess and
                  Frederik Armknecht and
                  Zinaida Benenson},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Privacy Implications of Room Climate Data},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {324--343},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_18},
  doi          = {10.1007/978-3-319-66399-9\_18},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MorgnerMRERAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JaschkeGAS17,
  author       = {Angela J{\"{a}}schke and
                  Bj{\"{o}}rn Grohmann and
                  Frederik Armknecht and
                  Andreas Schaad},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Short Paper: Industrial Feasibility of Private Information Retrieval},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {395--400},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006382003950400},
  doi          = {10.5220/0006382003950400},
  timestamp    = {Thu, 17 Aug 2017 18:31:18 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JaschkeGAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/MorgnerMBMA17,
  author       = {Philipp Morgner and
                  Stephan Mattejat and
                  Zinaida Benenson and
                  Christian M{\"{u}}ller and
                  Frederik Armknecht},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {230--240},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098254},
  doi          = {10.1145/3098243.3098254},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/MorgnerMBMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-04871,
  author       = {Christian A. Gorke and
                  Frederik Armknecht},
  title        = {{SMAUG:} Secure Mobile Authentication Using Gestures},
  journal      = {CoRR},
  volume       = {abs/1708.04871},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.04871},
  eprinttype    = {arXiv},
  eprint       = {1708.04871},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-04871.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorkeJAC17,
  author       = {Christian A. Gorke and
                  Christian Janson and
                  Frederik Armknecht and
                  Carlos Cid},
  title        = {Cloud Storage File Recoverability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorkeJAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeA17,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  title        = {(Finite) Field Work: Choosing the Best Encoding of Numbers for {FHE}
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeGAS17,
  author       = {Angela J{\"{a}}schke and
                  Bj{\"{o}}rn Grohmann and
                  Frederik Armknecht and
                  Andreas Schaad},
  title        = {Industrial Feasibility of Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/813},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeGAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBKL17,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame and
                  Wenting Li},
  title        = {Sharding PoW-based Blockchains via Proofs of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1067},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MikhalevAM16,
  author       = {Vasily Mikhalev and
                  Frederik Armknecht and
                  Christian M{\"{u}}ller},
  title        = {On Ciphers that Continuously Access the Non-Volatile Key},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {52--79},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.52-79},
  doi          = {10.13154/TOSC.V2016.I2.52-79},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MikhalevAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/JaschkeA16,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Accelerating Homomorphic Computations on Rational Numbers},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {405--423},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_22},
  doi          = {10.1007/978-3-319-39555-5\_22},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/JaschkeA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ArmknechtMSY16,
  author       = {Frederik Armknecht and
                  Daisuke Moriyama and
                  Ahmad{-}Reza Sadeghi and
                  Moti Yung},
  editor       = {Kazue Sako},
  title        = {Towards a Unified Security Model for Physically Unclonable Functions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {271--287},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_16},
  doi          = {10.1007/978-3-319-29485-8\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ArmknechtMSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TajanWRA16,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Christian A. Reuter and
                  Frederik Armknecht},
  title        = {Private information retrieval and Searchable Encryption for privacy-preserving
                  multi-client cloud auditing},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {162--169},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856690},
  doi          = {10.1109/ICITST.2016.7856690},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TajanWRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/MullerABM16,
  author       = {Christian M{\"{u}}ller and
                  Frederik Armknecht and
                  Zinaida Benenson and
                  Philipp Morgner},
  editor       = {Michael Meier and
                  Delphine Reinhardt and
                  Steffen Wendzel},
  title        = {On the security of the ZigBee Light Link touchlink commissioning procedure},
  booktitle    = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April
                  2016, Bonn},
  series       = {{LNI}},
  volume       = {{P-256}},
  pages        = {229--240},
  publisher    = {{GI}},
  year         = {2016},
  url          = {https://dl.gi.de/handle/20.500.12116/874},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/MullerABM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ArmknechtBBK16,
  author       = {Frederik Armknecht and
                  Ludovic Barman and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Mirror: Enabling Proofs of Data Replication and Retrievability in
                  the Cloud},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1051--1068},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/armknecht},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ArmknechtBBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtINP16,
  author       = {Frederik Armknecht and
                  Tetsu Iwata and
                  Kaisa Nyberg and
                  Bart Preneel},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 16021)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {1},
  pages        = {34--54},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.1.34},
  doi          = {10.4230/DAGREP.6.1.34},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtINP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtMSY16,
  author       = {Frederik Armknecht and
                  Daisuke Moriyama and
                  Ahmad{-}Reza Sadeghi and
                  Moti Yung},
  title        = {Towards a Unified Security Model for Physically Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtMSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeA16,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  title        = {Accelerating Homomorphic Computations on Rational Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBFK16,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  David Froelicher and
                  Ghassan O. Karame},
  title        = {{SPORT:} Sharing Proofs of Retrievability across Tenants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/724},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBDGT16,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  title        = {Side channels in deduplication: trade-offs between leakage and efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/977},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ArmknechtD15,
  author       = {Frederik Armknecht and
                  Andreas Dewald},
  title        = {Privacy-preserving email forensics},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S127--S136},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.003},
  doi          = {10.1016/J.DIIN.2015.05.003},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ArmknechtD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBKY15,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame and
                  Franck Youssef},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Transparent Data Deduplication in the Cloud},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {886--900},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813630},
  doi          = {10.1145/2810103.2813630},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtBKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ArmknechtM15,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  editor       = {Gregor Leander},
  title        = {On Lightweight Stream Ciphers with Shorter Internal States},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {451--470},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_22},
  doi          = {10.1007/978-3-662-48116-5\_22},
  timestamp    = {Sat, 19 Oct 2019 20:27:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ArmknechtM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ArmknechtKMYZ15,
  author       = {Frederik Armknecht and
                  Ghassan O. Karame and
                  Avikarsha Mandal and
                  Franck Youssef and
                  Erik Zenner},
  editor       = {Mauro Conti and
                  Matthias Schunter and
                  Ioannis G. Askoxylakis},
  title        = {Ripple: Overview and Outlook},
  booktitle    = {Trust and Trustworthy Computing - 8th International Conference, {TRUST}
                  2015, Heraklion, Greece, August 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9229},
  pages        = {163--180},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22846-4\_10},
  doi          = {10.1007/978-3-319-22846-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ArmknechtKMYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtM15,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  title        = {On Lightweight Stream Ciphers with Shorter Internal States},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBCGJRS15,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Christopher Carr and
                  Kristian Gj{\o}steen and
                  Angela J{\"{a}}schke and
                  Christian A. Reuter and
                  Martin Strand},
  title        = {A Guide to Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1192},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBCGJRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBKLR14,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame and
                  Zongren Liu and
                  Christian A. Reuter},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Outsourced Proofs of Retrievability},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {831--843},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660310},
  doi          = {10.1145/2660267.2660310},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtBKLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtG14,
  author       = {Frederik Armknecht and
                  Jorge Guajardo},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Fourth International Workshop on Trustworthy Embedded Devices (TrustED
                  2014)},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1548--1549},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660384},
  doi          = {10.1145/2660267.2660384},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ArmknechtM14,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  editor       = {Josh Benaloh},
  title        = {On Increasing the Throughput of Stream Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_7},
  doi          = {10.1007/978-3-319-04852-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ArmknechtM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SenftlebenBTAKS14,
  author       = {Marius Senftleben and
                  Mihai Bucicoiu and
                  Erik Tews and
                  Frederik Armknecht and
                  Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {MoP-2-MoP - Mobile Private Microblogging},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {384--396},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_25},
  doi          = {10.1007/978-3-662-45472-5\_25},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/SenftlebenBTAKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ArmknechtHRS14,
  author       = {Frederik Armknecht and
                  Manuel Hauptmann and
                  Stefanie Roos and
                  Thorsten Strufe},
  title        = {An additional protection layer for confidential OSNs posts},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {3746--3752},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883904},
  doi          = {10.1109/ICC.2014.6883904},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ArmknechtHRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ArmknechtGKP14,
  author       = {Frederik Armknecht and
                  Tommaso Gagliardoni and
                  Stefan Katzenbeisser and
                  Andreas Peter},
  editor       = {Hugo Krawczyk},
  title        = {General Impossibility of Group Homomorphic Encryption in the Quantum
                  World},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {556--573},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_32},
  doi          = {10.1007/978-3-642-54631-0\_32},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ArmknechtGKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ArmknechtHM14,
  author       = {Frederik Armknecht and
                  Matthias Hamann and
                  Vasily Mikhalev},
  editor       = {Nitesh Saxena and
                  Ahmad{-}Reza Sadeghi},
  title        = {Lightweight Authentication Protocols on Ultra-Constrained RFIDs -
                  Myths and Facts},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 10th
                  International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8651},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13066-8\_1},
  doi          = {10.1007/978-3-319-13066-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/ArmknechtHM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ArmknechtM14,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Revisiting a Recent Resource-efficient Technique for Increasing the
                  Throughput of Stream Ciphers},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {379--386},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005059803790386},
  doi          = {10.5220/0005059803790386},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ArmknechtM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ArmknechtH014,
  author       = {Frederik Armknecht and
                  Matthias Hamann and
                  Matthias Krause},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Hardware Efficient Authentication based on Random Selection},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {169--185},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20041},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ArmknechtH014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014trusted,
  editor       = {Gail{-}Joon Ahn and
                  Frederik Armknecht and
                  Jorge Guajardo},
  title        = {Proceedings of the 4th International Workshop on Trustworthy Embedded
                  Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2666141},
  doi          = {10.1145/2666141},
  isbn         = {978-1-4503-3149-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014trusted.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArmknechtGKP14,
  author       = {Frederik Armknecht and
                  Tommaso Gagliardoni and
                  Stefan Katzenbeisser and
                  Andreas Peter},
  title        = {General Impossibility of Group Homomorphic Encryption in the Quantum
                  World},
  journal      = {CoRR},
  volume       = {abs/1401.2417},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.2417},
  eprinttype    = {arXiv},
  eprint       = {1401.2417},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ArmknechtGKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtHIP14,
  author       = {Frederik Armknecht and
                  Helena Handschuh and
                  Tetsu Iwata and
                  Bart Preneel},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 14021)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {1},
  pages        = {1--16},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.1.1},
  doi          = {10.4230/DAGREP.4.1.1},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtHIP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtGKP14,
  author       = {Frederik Armknecht and
                  Tommaso Gagliardoni and
                  Stefan Katzenbeisser and
                  Andreas Peter},
  title        = {General Impossibility of Group Homomorphic Encryption in the Quantum
                  World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtGKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArmknechtKP13,
  author       = {Frederik Armknecht and
                  Stefan Katzenbeisser and
                  Andreas Peter},
  title        = {Group homomorphic encryption: characterizations, impossibility results,
                  and applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {67},
  number       = {2},
  pages        = {209--232},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10623-011-9601-2},
  doi          = {10.1007/S10623-011-9601-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArmknechtKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtSSW13,
  author       = {Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Christian Wachsmann},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {A security framework for the analysis and design of software attestation},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516650},
  doi          = {10.1145/2508859.2516650},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtSSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtS13,
  author       = {Frederik Armknecht and
                  Jean{-}Pierre Seifert},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Third international workshop on trustworthy embedded devices (TrustED
                  2013)},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1479--1480},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2509029},
  doi          = {10.1145/2508859.2509029},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semweb/KastenSA013,
  author       = {Andreas Kasten and
                  Ansgar Scherp and
                  Frederik Armknecht and
                  Matthias Krause},
  editor       = {Stefan Decker and
                  Jim Hendler and
                  Sabrina Kirrane},
  title        = {Towards Search on Encrypted Graph Data},
  booktitle    = {Proceedings of the Workshop on Society, Privacy and the Semantic Web
                  - Policy and Technology (PrivOn2013) co-located with the 12th International
                  Semantic Web Conference {(ISWC} 2013), Sydney, Australia, October
                  22, 2013},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1121},
  publisher    = {CEUR-WS.org},
  year         = {2013},
  url          = {https://ceur-ws.org/Vol-1121/privon2013\_paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:07 +0100},
  biburl       = {https://dblp.org/rec/conf/semweb/KastenSA013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013trusted,
  editor       = {Ahmad{-}Reza Sadeghi and
                  Frederik Armknecht and
                  Jean{-}Pierre Seifert},
  title        = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
                  Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
                  Germany},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2517300},
  isbn         = {978-1-4503-2486-1},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013trusted.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ArmknechtHRS13,
  author       = {Frederik Armknecht and
                  Manuel Hauptmann and
                  Stefanie Roos and
                  Thorsten Strufe},
  title        = {Protecting Public {OSN} Posts from Unintended Access},
  journal      = {CoRR},
  volume       = {abs/1309.3647},
  year         = {2013},
  url          = {http://arxiv.org/abs/1309.3647},
  eprinttype    = {arXiv},
  eprint       = {1309.3647},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ArmknechtHRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtSSW13,
  author       = {Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Christian Wachsmann},
  title        = {Towards Provably Secure Software Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtSSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ArmknechtKP12,
  author       = {Frederik Armknecht and
                  Stefan Katzenbeisser and
                  Andreas Peter},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic
                  Encryption},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {234--251},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_15},
  doi          = {10.1007/978-3-642-31410-0\_15},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ArmknechtKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/weworc/2011,
  editor       = {Frederik Armknecht and
                  Stefan Lucks},
  title        = {Research in Cryptology - 4th Western European Workshop, WEWoRC 2011,
                  Weimar, Germany, July 20-22, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7242},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34159-5},
  doi          = {10.1007/978-3-642-34159-5},
  isbn         = {978-3-642-34158-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtLPR12,
  author       = {Frederik Armknecht and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 12031)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {1},
  pages        = {39--49},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.1.39},
  doi          = {10.4230/DAGREP.2.1.39},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtLPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ArmknechtES11,
  author       = {Frederik Armknecht and
                  Carsten Elsner and
                  Martin Schmidt},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic
                  Design},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {242--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_15},
  doi          = {10.1007/978-3-642-21969-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ArmknechtES11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ArmknechtFKLSS11,
  author       = {Frederik Armknecht and
                  Ewan Fleischmann and
                  Matthias Krause and
                  Jooyoung Lee and
                  Martijn Stam and
                  John P. Steinberger},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {The Preimage Security of Double-Block-Length Compression Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {233--251},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_13},
  doi          = {10.1007/978-3-642-25385-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ArmknechtFKLSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/ArmknechtAPS11,
  author       = {Frederik Armknecht and
                  Daniel Augot and
                  Ludovic Perret and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Liqun Chen},
  title        = {On Constructing Homomorphic Encryption Schemes from Coding Theory},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_3},
  doi          = {10.1007/978-3-642-25516-8\_3},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/ArmknechtAPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medhocnet/ArmknechtS11,
  author       = {Frederik Armknecht and
                  Thorsten Strufe},
  title        = {An efficient distributed privacy-preserving recommendation system},
  booktitle    = {The 10th {IFIP} Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net
                  2011, Favignana Island, Sicily, Italy, 12-15 June, 2011},
  pages        = {65--70},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/Med-Hoc-Net.2011.5970495},
  doi          = {10.1109/MED-HOC-NET.2011.5970495},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/medhocnet/ArmknechtS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ArmknechtMSSW11,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Christian Wachsmann},
  title        = {A Formalization of the Security Features of Physical Functions},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {397--412},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.10},
  doi          = {10.1109/SP.2011.10},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ArmknechtMSSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtAPS11,
  author       = {Frederik Armknecht and
                  Daniel Augot and
                  Ludovic Perret and
                  Ahmad{-}Reza Sadeghi},
  title        = {On Constructing Homomorphic Encryption Schemes from Coding Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtAPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcos/ArmknechtSSVW10,
  author       = {Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Alessandra Scafuro and
                  Ivan Visconti and
                  Christian Wachsmann},
  title        = {Impossibility Results for {RFID} Privacy Notions},
  journal      = {Trans. Comput. Sci.},
  volume       = {11},
  pages        = {39--63},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17697-5\_3},
  doi          = {10.1007/978-3-642-17697-5\_3},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcos/ArmknechtSSVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ArmknechtSVW10,
  author       = {Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Ivan Visconti and
                  Christian Wachsmann},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {On {RFID} Privacy with Mutual Authentication and Tag Corruption},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {493--510},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_29},
  doi          = {10.1007/978-3-642-13708-2\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ArmknechtSVW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiuGASSK10,
  author       = {Yali Liu and
                  Dipak Ghosal and
                  Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Stefan Katzenbeisser},
  editor       = {Rainer B{\"{o}}hme and
                  Philip W. L. Fong and
                  Reihaneh Safavi{-}Naini},
  title        = {Robust and Undetectable Steganographic Timing Channels for i.i.d.
                  Traffic},
  booktitle    = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
                  AB, Canada, June 28-30, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6387},
  pages        = {193--207},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16435-4\_15},
  doi          = {10.1007/978-3-642-16435-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiuGASSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ArmknechtCSW10,
  author       = {Frederik Armknecht and
                  Liqun Chen and
                  Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {Anonymous Authentication for {RFID} Systems},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {158--175},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_14},
  doi          = {10.1007/978-3-642-16822-2\_14},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/ArmknechtCSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ArmknechtF10,
  author       = {Frederik Armknecht and
                  Jun Furukawa},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {On the Minimum Communication Effort for Secure Group Key Exchange},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {320--337},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_22},
  doi          = {10.1007/978-3-642-19574-7\_22},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ArmknechtF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/ArmknechtMSST10,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Berk Sunar and
                  Pim Tuyls},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Memory Leakage-Resilient Encryption Based on Physically Unclonable
                  Functions},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {135--164},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_6},
  doi          = {10.1007/978-3-642-14452-3\_6},
  timestamp    = {Tue, 16 May 2017 14:24:21 +0200},
  biburl       = {https://dblp.org/rec/series/isc/ArmknechtMSST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtES10,
  author       = {Frederik Armknecht and
                  Carsten Elsner and
                  Martin Schmidt},
  title        = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic
                  Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtES10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtPK10,
  author       = {Frederik Armknecht and
                  Andreas Peter and
                  Stefan Katzenbeisser},
  title        = {A Cleaner View on {IND-CCA1} Secure Homomorphic Encryption using {SOAP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtPK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrauseAF10,
  author       = {Matthias Krause and
                  Frederik Armknecht and
                  Ewan Fleischmann},
  title        = {Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing
                  Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/519},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrauseAF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ArmknechtMSST09,
  author       = {Frederik Armknecht and
                  Roel Maes and
                  Ahmad{-}Reza Sadeghi and
                  Berk Sunar and
                  Pim Tuyls},
  editor       = {Mitsuru Matsui},
  title        = {Memory Leakage-Resilient Encryption Based on Physically Unclonable
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {685--702},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_40},
  doi          = {10.1007/978-3-642-10366-7\_40},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ArmknechtMSST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiuGASSK09,
  author       = {Yali Liu and
                  Dipak Ghosal and
                  Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi and
                  Steffen Schulz and
                  Stefan Katzenbeisser},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Hide and Seek in Time - Robust Covert Timing Channels},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_8},
  doi          = {10.1007/978-3-642-04444-1\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiuGASSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ArmknechtW09,
  author       = {Frederik Armknecht and
                  Dirk Westhoff},
  title        = {Using Merkle's Puzzle for key agreement with low-end devices},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {858--864},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355012},
  doi          = {10.1109/LCN.2009.5355012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ArmknechtW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/09/ArmknechtA09,
  author       = {Frederik Armknecht and
                  Gw{\'{e}}nol{\'{e}} Ars},
  editor       = {Massimiliano Sala and
                  Shojiro Sakata and
                  Teo Mora and
                  Carlo Traverso and
                  Ludovic Perret},
  title        = {Algebraic Attacks on Stream Ciphers with Gr{\"{o}}bner Bases},
  booktitle    = {Gr{\"{o}}bner Bases, Coding, and Cryptography},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-540-93806-4\_18},
  doi          = {10.1007/978-3-540-93806-4\_18},
  timestamp    = {Mon, 16 Sep 2019 14:43:20 +0200},
  biburl       = {https://dblp.org/rec/books/sp/09/ArmknechtA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ArmknechtWGH08,
  author       = {Frederik Armknecht and
                  Dirk Westhoff and
                  Joao Gir{\~{a}}o and
                  Alban Hessler},
  title        = {A lifetime-optimized end-to-end encryption scheme for sensor networks
                  allowing in-network processing},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {4},
  pages        = {734--749},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.10.019},
  doi          = {10.1016/J.COMCOM.2007.10.019},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ArmknechtWGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/MatosAGA08,
  author       = {Alfredo Matos and
                  Rui L. Aguiar and
                  Jo{\~{a}}o Gir{\~{a}}o and
                  Frederik Armknecht},
  title        = {Toward dependable networking: secure location and privacy at the link
                  layer},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {15},
  number       = {5},
  pages        = {30--36},
  year         = {2008},
  url          = {https://doi.org/10.1109/MWC.2008.4653129},
  doi          = {10.1109/MWC.2008.4653129},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/MatosAGA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtGSSURV08,
  author       = {Frederik Armknecht and
                  Yacine Gasmi and
                  Ahmad{-}Reza Sadeghi and
                  Patrick Stewin and
                  Martin Unger and
                  Gianluca Ramunno and
                  Davide Vernizzi},
  editor       = {Shouhuai Xu and
                  Cristina Nita{-}Rotaru and
                  Jean{-}Pierre Seifert},
  title        = {An efficient implementation of trusted channels based on openssl},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456455.1456462},
  doi          = {10.1145/1456455.1456462},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtGSSURV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ArmknechtELMS08,
  author       = {Frederik Armknecht and
                  Alberto N. Escalante and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Secure Multi-Coupons for Federated Environments: Privacy-Preserving
                  and Customer-Friendly},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_3},
  doi          = {10.1007/978-3-540-79104-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ArmknechtELMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iswpc/MirzadehTAPA08,
  author       = {Shahab Mirzadeh and
                  Rahim Tafazolli and
                  Frederik Armknecht and
                  Jordi Jaen Pallares and
                  Hossam Afifi},
  title        = {{CPFP:} An efficient key management scheme for large scale personal
                  networks},
  booktitle    = {Third International Symposium on Wireless Pervasive Computing, {ISWPC}
                  2008, May 7-9, 2008, Santorini, Greece, Proceedings},
  pages        = {744--748},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISWPC.2008.4556309},
  doi          = {10.1109/ISWPC.2008.4556309},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iswpc/MirzadehTAPA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FurukawaAK08,
  author       = {Jun Furukawa and
                  Frederik Armknecht and
                  Kaoru Kurosawa},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {A Universally Composable Group Key Exchange Protocol with Minimum
                  Communication Effort},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {392--408},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_26},
  doi          = {10.1007/978-3-540-85855-3\_26},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/FurukawaAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtS08,
  author       = {Frederik Armknecht and
                  Ahmad{-}Reza Sadeghi},
  title        = {A New Approach for Algebraically Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ArmknechtGMA07,
  author       = {Frederik Armknecht and
                  Joao Gir{\~{a}}o and
                  Alfredo Matos and
                  Rui L. Aguiar},
  title        = {Who Said That? Privacy at Link Layer},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {2521--2525},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.313},
  doi          = {10.1109/INFCOM.2007.313},
  timestamp    = {Thu, 19 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ArmknechtGMA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiopt/SirivianosWAG07,
  author       = {Michael Sirivianos and
                  Dirk Westhoff and
                  Frederik Armknecht and
                  Joao Gir{\~{a}}o},
  editor       = {Leandros Tassiulas and
                  Andreas Pitsillides and
                  Thanasis Korakis},
  title        = {Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor
                  Networks},
  booktitle    = {5th International Symposium on Modeling and Optimization in Mobile,
                  Ad Hoc and Wireless Networks and Workshops, {WIOPT} 2007, April 16-20,
                  2007, Limassol, Cyprus},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/WIOPT.2007.4480031},
  doi          = {10.1109/WIOPT.2007.4480031},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/wiopt/SirivianosWAG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/de/Armknecht2006,
  author       = {Frederik Armknecht},
  title        = {Algebraic attacks on certain stream ciphers},
  school       = {University of Mannheim, Germany},
  year         = {2006},
  url          = {http://bibserv7.bib.uni-mannheim.de/madoc/volltexte/2006/1352/index.html},
  urn          = {urn:nbn:de:bsz:180-madoc-13523},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/de/Armknecht2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/ArmknechtGSW06,
  author       = {Frederik Armknecht and
                  Joao Gir{\~{a}}o and
                  Marc Ph. Stoecklin and
                  Dirk Westhoff},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Re-visited: Denial of Service Resilient Access Control for Wireless
                  Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {18--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_4},
  doi          = {10.1007/11964254\_4},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ArmknechtCGKMR06,
  author       = {Frederik Armknecht and
                  Claude Carlet and
                  Philippe Gaborit and
                  Simon K{\"{u}}nzli and
                  Willi Meier and
                  Olivier Ruatta},
  editor       = {Serge Vaudenay},
  title        = {Efficient Computation of Algebraic Immunity for Algebraic and Fast
                  Algebraic Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_10},
  doi          = {10.1007/11761679\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ArmknechtCGKMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ArmknechtK06,
  author       = {Frederik Armknecht and
                  Matthias Krause},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Constructing Single- and Multi-output Boolean Functions with Maximal
                  Algebraic Immunity},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_16},
  doi          = {10.1007/11787006\_16},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/ArmknechtK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/ArmknechtBI06,
  author       = {Frederik Armknecht and
                  J{\"{o}}rg Brandeis and
                  Egor Ilinykh},
  editor       = {Jana Dittmann},
  title        = {Experimental results on algebraic attacks on stream ciphers},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {279--282},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24783},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/ArmknechtBI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ArmknechtKS05,
  author       = {Frederik Armknecht and
                  Matthias Krause and
                  Dirk Stegemann},
  editor       = {Subhamoy Maitra and
                  C. E. Veni Madhavan and
                  Ramarathnam Venkatesan},
  title        = {Design Principles for Combiners with Memory},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
                  on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3797},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596219\_9},
  doi          = {10.1007/11596219\_9},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ArmknechtKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/ArmknechtA05,
  author       = {Frederik Armknecht and
                  Gw{\'{e}}nol{\'{e}} Ars},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Introducing a New Variant of Fast Algebraic Attacks and Minimizing
                  Their Successive Data Complexity},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_3},
  doi          = {10.1007/11554868\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/ArmknechtA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ArmknechtM05,
  author       = {Frederik Armknecht and
                  Willi Meier},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {Fault Attacks on Combiners with Memory},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_3},
  doi          = {10.1007/11693383\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ArmknechtM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/Armknecht05,
  author       = {Frederik Armknecht},
  editor       = {Christopher Wolf and
                  Stefan Lucks and
                  Po{-}Wah Yau},
  title        = {Algebraic Attacks and Annihilators},
  booktitle    = {WEWoRC 2005 - Western European Workshop on Research in Cryptology,
                  July 5-7, 2005, Leuven, Belgium},
  series       = {{LNI}},
  volume       = {{P-74}},
  pages        = {13--21},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/24846},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/Armknecht05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/ArmknechtL04,
  author       = {Frederik Armknecht and
                  Stefan Lucks},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {Linearity of the {AES} Key Schedule},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {159--169},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_14},
  doi          = {10.1007/11506447\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/ArmknechtL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Armknecht04,
  author       = {Frederik Armknecht},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Improving Fast Algebraic Attacks},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_5},
  doi          = {10.1007/978-3-540-25937-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Armknecht04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ArmknechtLP04,
  author       = {Frederik Armknecht and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {Extending the Resynchronization Attack},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_2},
  doi          = {10.1007/978-3-540-30564-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ArmknechtLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Armknecht04,
  author       = {Frederik Armknecht},
  title        = {On the Existence of low-degree Equations for Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Armknecht04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtLP04,
  author       = {Frederik Armknecht and
                  Joseph Lano and
                  Bart Preneel},
  title        = {Extending the Resynchronization Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ArmknechtK03,
  author       = {Frederik Armknecht and
                  Matthias Krause},
  editor       = {Dan Boneh},
  title        = {Algebraic Attacks on Combiners with Memory},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {162--175},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_10},
  doi          = {10.1007/978-3-540-45146-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ArmknechtK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Armknecht02,
  author       = {Frederik Armknecht},
  title        = {A Linearization Attack on the Bluetooth Key Stream Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Armknecht02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics