Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Frederik Armknecht
@article{DBLP:journals/popets/ArmknechtHS23, author = {Frederik Armknecht and Youzhe Heng and Rainer Schnell}, title = {Strengthening Privacy-Preserving Record Linkage using Diffusion}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {2}, pages = {298--311}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0054}, doi = {10.56553/POPETS-2023-0054}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ArmknechtHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/SchaferMA22, author = {Jochen Sch{\"{a}}fer and Christian M{\"{u}}ller and Frederik Armknecht}, title = {If You Like Me, Please Don't "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {440--459}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0022}, doi = {10.2478/POPETS-2022-0022}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/SchaferMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/ChenSAH22, author = {Yanling Chen and Rainer Schnell and Frederik Armknecht and Youzhe Heng}, editor = {Nathalie Bier and Ana L. N. Fred and Hugo Gamboa}, title = {Salting as a Countermeasure against Attacks on Privacy Preserving Record Linkage Techniques}, booktitle = {Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, {BIOSTEC} 2022, Volume 5: HEALTHINF, Online Streaming, February 9-11, 2022}, pages = {353--360}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010787200003123}, doi = {10.5220/0010787200003123}, timestamp = {Tue, 06 Jun 2023 14:58:00 +0200}, biburl = {https://dblp.org/rec/conf/biostec/ChenSAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11406, author = {Jasmin Zalonis and Frederik Armknecht and Bj{\"{o}}rn Grohmann and Manuel Koch}, title = {Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context}, journal = {CoRR}, volume = {abs/2201.11406}, year = {2022}, url = {https://arxiv.org/abs/2201.11406}, eprinttype = {arXiv}, eprint = {2201.11406}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11406.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ArmknechtBKL21, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan Karame and Wenting Li}, title = {Outsourcing Proofs of Retrievability}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {286--301}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2865554}, doi = {10.1109/TCC.2018.2865554}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ArmknechtBKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/PlotzAB21, author = {Sebastian Plotz and Frederik Armknecht and Christian Bunse}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {How to Take Over Drones}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {526--536}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3437515}, doi = {10.1145/3433210.3437515}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/PlotzAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmknechtBKL21, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Wenting Li}, editor = {Jorge Lobo and Roberto Di Pietro and Omar Chowdhury and Hongxin Hu}, title = {Regulating Storage Overhead in Existing PoW-based Blockchains}, booktitle = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021}, pages = {131--142}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450569.3463564}, doi = {10.1145/3450569.3463564}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ArmknechtBKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/MikhalevMKA21, author = {Vasily Mikhalev and Miodrag J. Mihaljevic and Orhun Kara and Frederik Armknecht}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {Selected Design and Analysis Techniques for Contemporary Symmetric Encryption}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {49--62}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_3}, doi = {10.1007/978-3-030-10591-4\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/21/MikhalevMKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtWTBS20, author = {Frederik Armknecht and Paul Walther and Gene Tsudik and Martin Beck and Thorsten Strufe}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {211--223}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423349}, doi = {10.1145/3372297.3423349}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtWTBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/TajanWA20, author = {Louis Tajan and Dirk Westhoff and Frederik Armknecht}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {443--450}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009835904430450}, doi = {10.5220/0009835904430450}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/TajanWA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmknechtBMMR19, author = {Frederik Armknecht and Zinaida Benenson and Philipp Morgner and Christian M{\"{u}}ller and Christian Riess}, title = {Privacy implications of room climate data}, journal = {J. Comput. Secur.}, volume = {27}, number = {1}, pages = {113--136}, year = {2019}, url = {https://doi.org/10.3233/JCS-181133}, doi = {10.3233/JCS-181133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmknechtBMMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-09734, author = {Christian A. Gorke and Frederik Armknecht}, title = {Reverse Fingerprinting}, journal = {CoRR}, volume = {abs/1912.09734}, year = {2019}, url = {http://arxiv.org/abs/1912.09734}, eprinttype = {arXiv}, eprint = {1912.09734}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-09734.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtVVY19, author = {Frederik Armknecht and Ingrid Verbauwhede and Melanie Volkamer and Moti Yung}, title = {Biggest Failures in Security (Dagstuhl Seminar 19451)}, journal = {Dagstuhl Reports}, volume = {9}, number = {11}, pages = {1--23}, year = {2019}, url = {https://doi.org/10.4230/DagRep.9.11.1}, doi = {10.4230/DAGREP.9.11.1}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtVVY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TajanWA19, author = {Louis Tajan and Dirk Westhoff and Frederik Armknecht}, title = {Private Set Relations with Bloom Filters for Outsourced {SLA} Validation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2019}, url = {https://eprint.iacr.org/2019/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TajanWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikMAIMBWR18, author = {Subhadeep Banik and Vasily Mikhalev and Frederik Armknecht and Takanori Isobe and Willi Meier and Andrey Bogdanov and Yuhei Watanabe and Francesco Regazzoni}, title = {Towards Low Energy Stream Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {2}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i2.1-19}, doi = {10.13154/TOSC.V2018.I2.1-19}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BanikMAIMBWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kryptotag/WaltherKATS18, author = {Paul Walther and Stefan K{\"{o}}psell and Frederik Armknecht and Gene Tsudik and Thorsten Strufe}, editor = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {Chains and Whips - An approach to lighweight MACs}, booktitle = {28. Krypto-Tag, Kirchheim bei M{\"{u}}nchen, Germany, June 7-8, 2018}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V. / {FG} {KRYPTO}}, year = {2018}, url = {https://doi.org/10.18420/cdm-2018-28-25}, doi = {10.18420/CDM-2018-28-25}, timestamp = {Fri, 18 Sep 2020 11:50:49 +0200}, biburl = {https://dblp.org/rec/conf/kryptotag/WaltherKATS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/MandalAZ18, author = {Avikarsha Mandal and Frederik Armknecht and Erik Zenner}, editor = {Nils Gruschka}, title = {Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid}, booktitle = {Secure {IT} Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11252}, pages = {3--18}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03638-6\_1}, doi = {10.1007/978-3-030-03638-6\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/MandalAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JaschkeA18, author = {Angela J{\"{a}}schke and Frederik Armknecht}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Unsupervised Machine Learning on Encrypted Data}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {453--478}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_21}, doi = {10.1007/978-3-030-10970-7\_21}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JaschkeA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeA18, author = {Angela J{\"{a}}schke and Frederik Armknecht}, title = {Unsupervised Machine Learning on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2018}, url = {https://eprint.iacr.org/2018/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/JaschkeA17, author = {Angela J{\"{a}}schke and Frederik Armknecht}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {(Finite) Field Work: Choosing the Best Encoding of Numbers for {FHE} Computation}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {482--492}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_23}, doi = {10.1007/978-3-030-02641-7\_23}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/JaschkeA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GorkeAJC17, author = {Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid}, editor = {Cong Wang and Murat Kantarcioglu}, title = {Cloud Storage File Recoverability}, booktitle = {Proceedings of the Fifth {ACM} International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {19--26}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055259.3055264}, doi = {10.1145/3055259.3055264}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GorkeAJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBDGT17, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Side Channels in Deduplication: Trade-offs between Leakage and Efficiency}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {266--274}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053019}, doi = {10.1145/3052973.3053019}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBDGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBFK17, author = {Frederik Armknecht and Jens{-}Matthias Bohli and David Froelicher and Ghassan Karame}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Sharing Proofs of Retrievability across Tenants}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {275--287}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052997}, doi = {10.1145/3052973.3052997}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MikhalevGAM17, author = {Vasily Mikhalev and Laurent Gomez and Frederik Armknecht and Jos{\'{e}} M{\'{a}}rquez}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Towards End-to-End Data Protection in Low-Power Networks}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_1}, doi = {10.1007/978-3-319-72817-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MikhalevGAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MorgnerMRERAB17, author = {Philipp Morgner and Christian M{\"{u}}ller and Matthias Ring and Bj{\"{o}}rn M. Eskofier and Christian Riess and Frederik Armknecht and Zinaida Benenson}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Privacy Implications of Room Climate Data}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {324--343}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_18}, doi = {10.1007/978-3-319-66399-9\_18}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MorgnerMRERAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JaschkeGAS17, author = {Angela J{\"{a}}schke and Bj{\"{o}}rn Grohmann and Frederik Armknecht and Andreas Schaad}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Short Paper: Industrial Feasibility of Private Information Retrieval}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {395--400}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006382003950400}, doi = {10.5220/0006382003950400}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JaschkeGAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/MorgnerMBMA17, author = {Philipp Morgner and Stephan Mattejat and Zinaida Benenson and Christian M{\"{u}}ller and Frederik Armknecht}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {230--240}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098254}, doi = {10.1145/3098243.3098254}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/MorgnerMBMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-04871, author = {Christian A. Gorke and Frederik Armknecht}, title = {{SMAUG:} Secure Mobile Authentication Using Gestures}, journal = {CoRR}, volume = {abs/1708.04871}, year = {2017}, url = {http://arxiv.org/abs/1708.04871}, eprinttype = {arXiv}, eprint = {1708.04871}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-04871.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorkeJAC17, author = {Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid}, title = {Cloud Storage File Recoverability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2017}, url = {http://eprint.iacr.org/2017/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorkeJAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeA17, author = {Angela J{\"{a}}schke and Frederik Armknecht}, title = {(Finite) Field Work: Choosing the Best Encoding of Numbers for {FHE} Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2017}, url = {http://eprint.iacr.org/2017/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeGAS17, author = {Angela J{\"{a}}schke and Bj{\"{o}}rn Grohmann and Frederik Armknecht and Andreas Schaad}, title = {Industrial Feasibility of Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2017}, url = {http://eprint.iacr.org/2017/813}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeGAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBKL17, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Wenting Li}, title = {Sharding PoW-based Blockchains via Proofs of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1067}, year = {2017}, url = {http://eprint.iacr.org/2017/1067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MikhalevAM16, author = {Vasily Mikhalev and Frederik Armknecht and Christian M{\"{u}}ller}, title = {On Ciphers that Continuously Access the Non-Volatile Key}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {52--79}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.52-79}, doi = {10.13154/TOSC.V2016.I2.52-79}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MikhalevAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/JaschkeA16, author = {Angela J{\"{a}}schke and Frederik Armknecht}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Accelerating Homomorphic Computations on Rational Numbers}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {405--423}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_22}, doi = {10.1007/978-3-319-39555-5\_22}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/JaschkeA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ArmknechtMSY16, author = {Frederik Armknecht and Daisuke Moriyama and Ahmad{-}Reza Sadeghi and Moti Yung}, editor = {Kazue Sako}, title = {Towards a Unified Security Model for Physically Unclonable Functions}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {271--287}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_16}, doi = {10.1007/978-3-319-29485-8\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ArmknechtMSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TajanWRA16, author = {Louis Tajan and Dirk Westhoff and Christian A. Reuter and Frederik Armknecht}, title = {Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {162--169}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856690}, doi = {10.1109/ICITST.2016.7856690}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TajanWRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/MullerABM16, author = {Christian M{\"{u}}ller and Frederik Armknecht and Zinaida Benenson and Philipp Morgner}, editor = {Michael Meier and Delphine Reinhardt and Steffen Wendzel}, title = {On the security of the ZigBee Light Link touchlink commissioning procedure}, booktitle = {Sicherheit 2016: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 8. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 5.-7. April 2016, Bonn}, series = {{LNI}}, volume = {{P-256}}, pages = {229--240}, publisher = {{GI}}, year = {2016}, url = {https://dl.gi.de/handle/20.500.12116/874}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/MullerABM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ArmknechtBBK16, author = {Frederik Armknecht and Ludovic Barman and Jens{-}Matthias Bohli and Ghassan O. Karame}, editor = {Thorsten Holz and Stefan Savage}, title = {Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1051--1068}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/armknecht}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/ArmknechtBBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtINP16, author = {Frederik Armknecht and Tetsu Iwata and Kaisa Nyberg and Bart Preneel}, title = {Symmetric Cryptography (Dagstuhl Seminar 16021)}, journal = {Dagstuhl Reports}, volume = {6}, number = {1}, pages = {34--54}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.1.34}, doi = {10.4230/DAGREP.6.1.34}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtINP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtMSY16, author = {Frederik Armknecht and Daisuke Moriyama and Ahmad{-}Reza Sadeghi and Moti Yung}, title = {Towards a Unified Security Model for Physically Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2016}, url = {http://eprint.iacr.org/2016/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtMSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeA16, author = {Angela J{\"{a}}schke and Frederik Armknecht}, title = {Accelerating Homomorphic Computations on Rational Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2016}, url = {http://eprint.iacr.org/2016/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBFK16, author = {Frederik Armknecht and Jens{-}Matthias Bohli and David Froelicher and Ghassan O. Karame}, title = {{SPORT:} Sharing Proofs of Retrievability across Tenants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2016}, url = {http://eprint.iacr.org/2016/724}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBDGT16, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, title = {Side channels in deduplication: trade-offs between leakage and efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2016}, url = {http://eprint.iacr.org/2016/977}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ArmknechtD15, author = {Frederik Armknecht and Andreas Dewald}, title = {Privacy-preserving email forensics}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S127--S136}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.003}, doi = {10.1016/J.DIIN.2015.05.003}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ArmknechtD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBKY15, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Franck Youssef}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Transparent Data Deduplication in the Cloud}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {886--900}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813630}, doi = {10.1145/2810103.2813630}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ArmknechtM15, author = {Frederik Armknecht and Vasily Mikhalev}, editor = {Gregor Leander}, title = {On Lightweight Stream Ciphers with Shorter Internal States}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {451--470}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_22}, doi = {10.1007/978-3-662-48116-5\_22}, timestamp = {Sat, 19 Oct 2019 20:27:47 +0200}, biburl = {https://dblp.org/rec/conf/fse/ArmknechtM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/ArmknechtKMYZ15, author = {Frederik Armknecht and Ghassan O. Karame and Avikarsha Mandal and Franck Youssef and Erik Zenner}, editor = {Mauro Conti and Matthias Schunter and Ioannis G. Askoxylakis}, title = {Ripple: Overview and Outlook}, booktitle = {Trust and Trustworthy Computing - 8th International Conference, {TRUST} 2015, Heraklion, Greece, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9229}, pages = {163--180}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22846-4\_10}, doi = {10.1007/978-3-319-22846-4\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/ArmknechtKMYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtM15, author = {Frederik Armknecht and Vasily Mikhalev}, title = {On Lightweight Stream Ciphers with Shorter Internal States}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2015}, url = {http://eprint.iacr.org/2015/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBCGJRS15, author = {Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gj{\o}steen and Angela J{\"{a}}schke and Christian A. Reuter and Martin Strand}, title = {A Guide to Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1192}, year = {2015}, url = {http://eprint.iacr.org/2015/1192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBCGJRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBKLR14, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Zongren Liu and Christian A. Reuter}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Outsourced Proofs of Retrievability}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {831--843}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660310}, doi = {10.1145/2660267.2660310}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBKLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtG14, author = {Frederik Armknecht and Jorge Guajardo}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1548--1549}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660384}, doi = {10.1145/2660267.2660384}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ArmknechtM14, author = {Frederik Armknecht and Vasily Mikhalev}, editor = {Josh Benaloh}, title = {On Increasing the Throughput of Stream Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {132--151}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_7}, doi = {10.1007/978-3-319-04852-9\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ArmknechtM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SenftlebenBTAKS14, author = {Marius Senftleben and Mihai Bucicoiu and Erik Tews and Frederik Armknecht and Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {MoP-2-MoP - Mobile Private Microblogging}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {384--396}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_25}, doi = {10.1007/978-3-662-45472-5\_25}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/SenftlebenBTAKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ArmknechtHRS14, author = {Frederik Armknecht and Manuel Hauptmann and Stefanie Roos and Thorsten Strufe}, title = {An additional protection layer for confidential OSNs posts}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {3746--3752}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883904}, doi = {10.1109/ICC.2014.6883904}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ArmknechtHRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ArmknechtGKP14, author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter}, editor = {Hugo Krawczyk}, title = {General Impossibility of Group Homomorphic Encryption in the Quantum World}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {556--573}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_32}, doi = {10.1007/978-3-642-54631-0\_32}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ArmknechtGKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/ArmknechtHM14, author = {Frederik Armknecht and Matthias Hamann and Vasily Mikhalev}, editor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi}, title = {Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8651}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13066-8\_1}, doi = {10.1007/978-3-319-13066-8\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/ArmknechtHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ArmknechtM14, author = {Frederik Armknecht and Vasily Mikhalev}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {379--386}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005059803790386}, doi = {10.5220/0005059803790386}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ArmknechtM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ArmknechtH014, author = {Frederik Armknecht and Matthias Hamann and Matthias Krause}, editor = {Stefan Katzenbeisser and Volkmar Lotz and Edgar R. Weippl}, title = {Hardware Efficient Authentication based on Random Selection}, booktitle = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz 2014, Wien, {\"{O}}sterreich}, series = {{LNI}}, volume = {{P-228}}, pages = {169--185}, publisher = {{GI}}, year = {2014}, url = {https://dl.gi.de/handle/20.500.12116/20041}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ArmknechtH014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014trusted, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141}, doi = {10.1145/2666141}, isbn = {978-1-4503-3149-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ArmknechtGKP14, author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter}, title = {General Impossibility of Group Homomorphic Encryption in the Quantum World}, journal = {CoRR}, volume = {abs/1401.2417}, year = {2014}, url = {http://arxiv.org/abs/1401.2417}, eprinttype = {arXiv}, eprint = {1401.2417}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ArmknechtGKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtHIP14, author = {Frederik Armknecht and Helena Handschuh and Tetsu Iwata and Bart Preneel}, title = {Symmetric Cryptography (Dagstuhl Seminar 14021)}, journal = {Dagstuhl Reports}, volume = {4}, number = {1}, pages = {1--16}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.1.1}, doi = {10.4230/DAGREP.4.1.1}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtHIP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtGKP14, author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter}, title = {General Impossibility of Group Homomorphic Encryption in the Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2014}, url = {http://eprint.iacr.org/2014/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtGKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArmknechtKP13, author = {Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter}, title = {Group homomorphic encryption: characterizations, impossibility results, and applications}, journal = {Des. Codes Cryptogr.}, volume = {67}, number = {2}, pages = {209--232}, year = {2013}, url = {https://doi.org/10.1007/s10623-011-9601-2}, doi = {10.1007/S10623-011-9601-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArmknechtKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtSSW13, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A security framework for the analysis and design of software attestation}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516650}, doi = {10.1145/2508859.2516650}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtS13, author = {Frederik Armknecht and Jean{-}Pierre Seifert}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Third international workshop on trustworthy embedded devices (TrustED 2013)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1479--1480}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509029}, doi = {10.1145/2508859.2509029}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/KastenSA013, author = {Andreas Kasten and Ansgar Scherp and Frederik Armknecht and Matthias Krause}, editor = {Stefan Decker and Jim Hendler and Sabrina Kirrane}, title = {Towards Search on Encrypted Graph Data}, booktitle = {Proceedings of the Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2013) co-located with the 12th International Semantic Web Conference {(ISWC} 2013), Sydney, Australia, October 22, 2013}, series = {{CEUR} Workshop Proceedings}, volume = {1121}, publisher = {CEUR-WS.org}, year = {2013}, url = {https://ceur-ws.org/Vol-1121/privon2013\_paper5.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:07 +0100}, biburl = {https://dblp.org/rec/conf/semweb/KastenSA013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013trusted, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2517300}, isbn = {978-1-4503-2486-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ArmknechtHRS13, author = {Frederik Armknecht and Manuel Hauptmann and Stefanie Roos and Thorsten Strufe}, title = {Protecting Public {OSN} Posts from Unintended Access}, journal = {CoRR}, volume = {abs/1309.3647}, year = {2013}, url = {http://arxiv.org/abs/1309.3647}, eprinttype = {arXiv}, eprint = {1309.3647}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ArmknechtHRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtSSW13, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, title = {Towards Provably Secure Software Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2013}, url = {http://eprint.iacr.org/2013/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ArmknechtKP12, author = {Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {234--251}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_15}, doi = {10.1007/978-3-642-31410-0\_15}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ArmknechtKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/weworc/2011, editor = {Frederik Armknecht and Stefan Lucks}, title = {Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7242}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34159-5}, doi = {10.1007/978-3-642-34159-5}, isbn = {978-3-642-34158-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtLPR12, author = {Frederik Armknecht and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Symmetric Cryptography (Dagstuhl Seminar 12031)}, journal = {Dagstuhl Reports}, volume = {2}, number = {1}, pages = {39--49}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.1.39}, doi = {10.4230/DAGREP.2.1.39}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtLPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ArmknechtES11, author = {Frederik Armknecht and Carsten Elsner and Martin Schmidt}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {242--259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_15}, doi = {10.1007/978-3-642-21969-6\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ArmknechtES11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ArmknechtFKLSS11, author = {Frederik Armknecht and Ewan Fleischmann and Matthias Krause and Jooyoung Lee and Martijn Stam and John P. Steinberger}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {The Preimage Security of Double-Block-Length Compression Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {233--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_13}, doi = {10.1007/978-3-642-25385-0\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ArmknechtFKLSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/ArmknechtAPS11, author = {Frederik Armknecht and Daniel Augot and Ludovic Perret and Ahmad{-}Reza Sadeghi}, editor = {Liqun Chen}, title = {On Constructing Homomorphic Encryption Schemes from Coding Theory}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {23--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_3}, doi = {10.1007/978-3-642-25516-8\_3}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/ArmknechtAPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medhocnet/ArmknechtS11, author = {Frederik Armknecht and Thorsten Strufe}, title = {An efficient distributed privacy-preserving recommendation system}, booktitle = {The 10th {IFIP} Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2011, Favignana Island, Sicily, Italy, 12-15 June, 2011}, pages = {65--70}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/Med-Hoc-Net.2011.5970495}, doi = {10.1109/MED-HOC-NET.2011.5970495}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/medhocnet/ArmknechtS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ArmknechtMSSW11, author = {Frederik Armknecht and Roel Maes and Ahmad{-}Reza Sadeghi and Fran{\c{c}}ois{-}Xavier Standaert and Christian Wachsmann}, title = {A Formalization of the Security Features of Physical Functions}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {397--412}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.10}, doi = {10.1109/SP.2011.10}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ArmknechtMSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtAPS11, author = {Frederik Armknecht and Daniel Augot and Ludovic Perret and Ahmad{-}Reza Sadeghi}, title = {On Constructing Homomorphic Encryption Schemes from Coding Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2011}, url = {http://eprint.iacr.org/2011/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtAPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcos/ArmknechtSSVW10, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Alessandra Scafuro and Ivan Visconti and Christian Wachsmann}, title = {Impossibility Results for {RFID} Privacy Notions}, journal = {Trans. Comput. Sci.}, volume = {11}, pages = {39--63}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17697-5\_3}, doi = {10.1007/978-3-642-17697-5\_3}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcos/ArmknechtSSVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ArmknechtSVW10, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi and Ivan Visconti and Christian Wachsmann}, editor = {Jianying Zhou and Moti Yung}, title = {On {RFID} Privacy with Mutual Authentication and Tag Corruption}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {493--510}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_29}, doi = {10.1007/978-3-642-13708-2\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ArmknechtSVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiuGASSK10, author = {Yali Liu and Dipak Ghosal and Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Stefan Katzenbeisser}, editor = {Rainer B{\"{o}}hme and Philip W. L. Fong and Reihaneh Safavi{-}Naini}, title = {Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic}, booktitle = {Information Hiding - 12th International Conference, {IH} 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6387}, pages = {193--207}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16435-4\_15}, doi = {10.1007/978-3-642-16435-4\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiuGASSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/ArmknechtCSW10, author = {Frederik Armknecht and Liqun Chen and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {Anonymous Authentication for {RFID} Systems}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {158--175}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_14}, doi = {10.1007/978-3-642-16822-2\_14}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/ArmknechtCSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ArmknechtF10, author = {Frederik Armknecht and Jun Furukawa}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {On the Minimum Communication Effort for Secure Group Key Exchange}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {320--337}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_22}, doi = {10.1007/978-3-642-19574-7\_22}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/ArmknechtF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/ArmknechtMSST10, author = {Frederik Armknecht and Roel Maes and Ahmad{-}Reza Sadeghi and Berk Sunar and Pim Tuyls}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {135--164}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_6}, doi = {10.1007/978-3-642-14452-3\_6}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/isc/ArmknechtMSST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtES10, author = {Frederik Armknecht and Carsten Elsner and Martin Schmidt}, title = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2010}, url = {http://eprint.iacr.org/2010/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtES10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtPK10, author = {Frederik Armknecht and Andreas Peter and Stefan Katzenbeisser}, title = {A Cleaner View on {IND-CCA1} Secure Homomorphic Encryption using {SOAP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2010}, url = {http://eprint.iacr.org/2010/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtPK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrauseAF10, author = {Matthias Krause and Frederik Armknecht and Ewan Fleischmann}, title = {Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2010}, url = {http://eprint.iacr.org/2010/519}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrauseAF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ArmknechtMSST09, author = {Frederik Armknecht and Roel Maes and Ahmad{-}Reza Sadeghi and Berk Sunar and Pim Tuyls}, editor = {Mitsuru Matsui}, title = {Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {685--702}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_40}, doi = {10.1007/978-3-642-10366-7\_40}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ArmknechtMSST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuGASSK09, author = {Yali Liu and Dipak Ghosal and Frederik Armknecht and Ahmad{-}Reza Sadeghi and Steffen Schulz and Stefan Katzenbeisser}, editor = {Michael Backes and Peng Ning}, title = {Hide and Seek in Time - Robust Covert Timing Channels}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {120--135}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_8}, doi = {10.1007/978-3-642-04444-1\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuGASSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ArmknechtW09, author = {Frederik Armknecht and Dirk Westhoff}, title = {Using Merkle's Puzzle for key agreement with low-end devices}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {858--864}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355012}, doi = {10.1109/LCN.2009.5355012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ArmknechtW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/09/ArmknechtA09, author = {Frederik Armknecht and Gw{\'{e}}nol{\'{e}} Ars}, editor = {Massimiliano Sala and Shojiro Sakata and Teo Mora and Carlo Traverso and Ludovic Perret}, title = {Algebraic Attacks on Stream Ciphers with Gr{\"{o}}bner Bases}, booktitle = {Gr{\"{o}}bner Bases, Coding, and Cryptography}, pages = {329--348}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-540-93806-4\_18}, doi = {10.1007/978-3-540-93806-4\_18}, timestamp = {Mon, 16 Sep 2019 14:43:20 +0200}, biburl = {https://dblp.org/rec/books/sp/09/ArmknechtA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ArmknechtWGH08, author = {Frederik Armknecht and Dirk Westhoff and Joao Gir{\~{a}}o and Alban Hessler}, title = {A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing}, journal = {Comput. Commun.}, volume = {31}, number = {4}, pages = {734--749}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.10.019}, doi = {10.1016/J.COMCOM.2007.10.019}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ArmknechtWGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/MatosAGA08, author = {Alfredo Matos and Rui L. Aguiar and Jo{\~{a}}o Gir{\~{a}}o and Frederik Armknecht}, title = {Toward dependable networking: secure location and privacy at the link layer}, journal = {{IEEE} Wirel. Commun.}, volume = {15}, number = {5}, pages = {30--36}, year = {2008}, url = {https://doi.org/10.1109/MWC.2008.4653129}, doi = {10.1109/MWC.2008.4653129}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/MatosAGA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtGSSURV08, author = {Frederik Armknecht and Yacine Gasmi and Ahmad{-}Reza Sadeghi and Patrick Stewin and Martin Unger and Gianluca Ramunno and Davide Vernizzi}, editor = {Shouhuai Xu and Cristina Nita{-}Rotaru and Jean{-}Pierre Seifert}, title = {An efficient implementation of trusted channels based on openssl}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Scalable Trusted Computing, {STC} 2008, Alexandria, VA, USA, October 31, 2008}, pages = {41--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456455.1456462}, doi = {10.1145/1456455.1456462}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtGSSURV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ArmknechtELMS08, author = {Frederik Armknecht and Alberto N. Escalante and Hans L{\"{o}}hr and Mark Manulis and Ahmad{-}Reza Sadeghi}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {29--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_3}, doi = {10.1007/978-3-540-79104-1\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ArmknechtELMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iswpc/MirzadehTAPA08, author = {Shahab Mirzadeh and Rahim Tafazolli and Frederik Armknecht and Jordi Jaen Pallares and Hossam Afifi}, title = {{CPFP:} An efficient key management scheme for large scale personal networks}, booktitle = {Third International Symposium on Wireless Pervasive Computing, {ISWPC} 2008, May 7-9, 2008, Santorini, Greece, Proceedings}, pages = {744--748}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISWPC.2008.4556309}, doi = {10.1109/ISWPC.2008.4556309}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iswpc/MirzadehTAPA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FurukawaAK08, author = {Jun Furukawa and Frederik Armknecht and Kaoru Kurosawa}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {392--408}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_26}, doi = {10.1007/978-3-540-85855-3\_26}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/FurukawaAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtS08, author = {Frederik Armknecht and Ahmad{-}Reza Sadeghi}, title = {A New Approach for Algebraically Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2008}, url = {http://eprint.iacr.org/2008/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ArmknechtGMA07, author = {Frederik Armknecht and Joao Gir{\~{a}}o and Alfredo Matos and Rui L. Aguiar}, title = {Who Said That? Privacy at Link Layer}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {2521--2525}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.313}, doi = {10.1109/INFCOM.2007.313}, timestamp = {Thu, 19 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ArmknechtGMA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiopt/SirivianosWAG07, author = {Michael Sirivianos and Dirk Westhoff and Frederik Armknecht and Joao Gir{\~{a}}o}, editor = {Leandros Tassiulas and Andreas Pitsillides and Thanasis Korakis}, title = {Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks}, booktitle = {5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, {WIOPT} 2007, April 16-20, 2007, Limassol, Cyprus}, pages = {1--10}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/WIOPT.2007.4480031}, doi = {10.1109/WIOPT.2007.4480031}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/wiopt/SirivianosWAG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/de/Armknecht2006, author = {Frederik Armknecht}, title = {Algebraic attacks on certain stream ciphers}, school = {University of Mannheim, Germany}, year = {2006}, url = {http://bibserv7.bib.uni-mannheim.de/madoc/volltexte/2006/1352/index.html}, urn = {urn:nbn:de:bsz:180-madoc-13523}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/de/Armknecht2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/ArmknechtGSW06, author = {Frederik Armknecht and Joao Gir{\~{a}}o and Marc Ph. Stoecklin and Dirk Westhoff}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {18--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_4}, doi = {10.1007/11964254\_4}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/ArmknechtGSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ArmknechtCGKMR06, author = {Frederik Armknecht and Claude Carlet and Philippe Gaborit and Simon K{\"{u}}nzli and Willi Meier and Olivier Ruatta}, editor = {Serge Vaudenay}, title = {Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {147--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_10}, doi = {10.1007/11761679\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ArmknechtCGKMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ArmknechtK06, author = {Frederik Armknecht and Matthias Krause}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {180--191}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_16}, doi = {10.1007/11787006\_16}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/ArmknechtK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/ArmknechtBI06, author = {Frederik Armknecht and J{\"{o}}rg Brandeis and Egor Ilinykh}, editor = {Jana Dittmann}, title = {Experimental results on algebraic attacks on stream ciphers}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {279--282}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24783}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/ArmknechtBI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ArmknechtKS05, author = {Frederik Armknecht and Matthias Krause and Dirk Stegemann}, editor = {Subhamoy Maitra and C. E. Veni Madhavan and Ramarathnam Venkatesan}, title = {Design Principles for Combiners with Memory}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3797}, pages = {104--117}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596219\_9}, doi = {10.1007/11596219\_9}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ArmknechtKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/ArmknechtA05, author = {Frederik Armknecht and Gw{\'{e}}nol{\'{e}} Ars}, editor = {Ed Dawson and Serge Vaudenay}, title = {Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {16--32}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_3}, doi = {10.1007/11554868\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/ArmknechtA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ArmknechtM05, author = {Frederik Armknecht and Willi Meier}, editor = {Bart Preneel and Stafford E. Tavares}, title = {Fault Attacks on Combiners with Memory}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {36--50}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_3}, doi = {10.1007/11693383\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ArmknechtM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/Armknecht05, author = {Frederik Armknecht}, editor = {Christopher Wolf and Stefan Lucks and Po{-}Wah Yau}, title = {Algebraic Attacks and Annihilators}, booktitle = {WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium}, series = {{LNI}}, volume = {{P-74}}, pages = {13--21}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/24846}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/Armknecht05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/ArmknechtL04, author = {Frederik Armknecht and Stefan Lucks}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {Linearity of the {AES} Key Schedule}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {159--169}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_14}, doi = {10.1007/11506447\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/aes/ArmknechtL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Armknecht04, author = {Frederik Armknecht}, editor = {Bimal K. Roy and Willi Meier}, title = {Improving Fast Algebraic Attacks}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {65--82}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_5}, doi = {10.1007/978-3-540-25937-4\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Armknecht04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ArmknechtLP04, author = {Frederik Armknecht and Joseph Lano and Bart Preneel}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {Extending the Resynchronization Attack}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {19--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_2}, doi = {10.1007/978-3-540-30564-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ArmknechtLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Armknecht04, author = {Frederik Armknecht}, title = {On the Existence of low-degree Equations for Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2004}, url = {http://eprint.iacr.org/2004/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Armknecht04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtLP04, author = {Frederik Armknecht and Joseph Lano and Bart Preneel}, title = {Extending the Resynchronization Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2004}, url = {http://eprint.iacr.org/2004/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ArmknechtK03, author = {Frederik Armknecht and Matthias Krause}, editor = {Dan Boneh}, title = {Algebraic Attacks on Combiners with Memory}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {162--175}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_10}, doi = {10.1007/978-3-540-45146-4\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ArmknechtK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Armknecht02, author = {Frederik Armknecht}, title = {A Linearization Attack on the Bluetooth Key Stream Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2002}, url = {http://eprint.iacr.org/2002/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Armknecht02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.