2014
Armknecht, Frederik ; Hamann, Matthias ; Mikhalev, Vasily
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.
Saxena, Nitesh
Lecture Notes in Computer Science
8651
1-18
In: Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers
(2014)
Cham
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Hamann, Matthias ; Krause, Matthias
Hardware Efficient Authentication based on Random Selection.
Katzenbeisser, Stefan
GI-Edition : Lecture Notes in Informatics. Proceedings
228
169-185
In: Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit : [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien
(2014)
Bonn
[Conference or workshop publication]
|
|
2013
Kasten, Andreas ; Scherp, Ansgar ; Armknecht, Frederik ; Krause, Matthias
Towards Search on Encrypted Graph Data.
Decker, Stefan
CEUR Workshop Proceedings
1121
Paper 5
In: PrivOn 2013 : Proceedings of the Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2013) co-located with the 12th International Semantic Web Conference (ISWC 2013) Sydney, Australia, October 22, 2013
(2013)
Aachen
[Conference or workshop publication]
|
|
2012
Tatli, Emin Islam
Google Reveals Cryptographic Secrets.
Katzenbeisser, Stefan
Reihe Informatik / Technical report
33-36
In: Book of Abstracts Krypto-Tage 2004 - 2012
(2012)
Darmstadt
Kryptowochenende 2006 - Workshop ̈über Kryptographie
(Bronnbach)
[Conference or workshop publication]
|
|
Krause, Matthias ; Hamann, Matthias
The Cryptographic Power of Random Selection.
Miri, Ali
Lecture Notes in Computer Science
7118
134-150
In: Selected Areas in Cryptography
(2012)
Berlin [u.a.]
(Toronto, Canada)
[Conference or workshop publication]
|
|
2011
Armknecht, Frederik ; Fleischmann, Ewan ; Krause, Matthias ; Lee, Jooyoung ; Stam, Martijn ; Steinberger, John
The Preimage Security of Double-Block-Length Compression Functions.
Lee, Dong Hoon
Lecture Notes in Computer Science
7073
233-251
In: Advances in cryptology : proceedings / ASIACRYPT 2011, 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4 - 8, 2011
(2011)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Augot, Daniel ; Perret, Ludovic ; Sadeghi, Ahmad-Reza
On Constructing Homomorphic Encryption Schemes from Coding Theory.
Chen, Liqun
Lecture Notes in Computer Science
7089
23-40
In: Cryptography and coding : 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011; proceedings
(2011)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Elsner, Carsten ; Schmidt, Martin Ulrich
Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design.
Nitaj, Abderrahmane
Lecture Notes in Computer Science
6737
242-259
In: Progress in cryptology -- AFRICACRYPT 2011 : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5 - 7, 2011; proceedings
(2011)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Maes, Roel ; Sadeghi, Ahmad-Reza ; Standaert, Francois-Xavier ; Wachsmann, Christian
A Formalization of the Security Features of Physical Functions.
397-412
In: Proceedings of the 2011 IEEE Symposium on Security and Privacy
(2011)
Washington, DC
(Berkeley, Calif.)
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Furukawa, Jun
On the minimum communication effort for secure group key exchange.
Biryukov, Alex
Lecture Notes in Computer Science
6544
320-337
In: Selected areas in cryptography : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12 - 13, 2010; revised selected papers
(2011)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2010
Armknecht, Frederik ; Chen, Liqun ; Sadeghi, Ahmad-Reza ; Wachsmann, Christian
Anonymous Authentication for RFID Systems.
Ors Yalcin, Siddika Berna
Lecture Notes in Computer Science
3670
158-175
In: Radio frequency identification: security and privacy issues : 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8 - 9, 2010; revised selected papers
(2010)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Liu, Yali ; Ghosal, Dipak ; Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Schulz, Steffen ; Katzenbeisser, Stefan
Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Böhme, Rainer
Lecture Notes in Computer Science
6387
193-207
In: Information hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28 - 30, 2010; revised selected papers
(2010)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Sadeghi, Ahmad-Reza ; Visconti, Ivan ; Wachsmann, Christian
On RFID Privacy with Mutual Authentication and Tag Corruption.
Zhou, Jianying
Lecture Notes in Computer Science
6123
493-510
In: Applied cryptography and network security : 8th International Conference, ACNS 2010, Beijing, China, June 22 - 25, 2010; proceedings
(2010)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2009
Krause, Matthias ; Stegemann, Dirk
More on the Security of Linear RFID Authentication Protocols.
Jacobson, Michael J.
Lecture Notes in Computer Science
5867
182-196
In: Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13 - 14, 2009; revised selected paper
(2009)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2007
Stegemann, Dirk
Extended BDD-based Cryptanalysis of Keystream Generators.
Adams, Carlisle
Lecture Notes in Computer Science
4876
17-35
In: Selected areas in cryptography : 14th International Workshop, SAC 2007, Ottawa, Canada, August 16 - 17, 2007; revised selected papers
(2007)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2006
Polzin, Tobias ; Vahdati Daneshmand, Siavash
Practical partitioning-based methods for the Steiner problem.
Àlvarez, Carme
Lecture Notes in Computer Science
4007
241-252
In: Experimental algorithms : 5th International Workshop, WEA 2006, Cala Galdana, Menorca, Spain, May 24 - 27, 2006; proceedings
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Carlet, Claude ; Gaborit, Philippe ; Künzli, Simon ; Meier, Willi ; Ruatta, Olivier
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks.
Vaudenay, Serge
Lecture Notes in Computer Science
4004
147-164
In: Advances in cryptology - EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006; proceedings
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Brandeis, Jörg ; Ilinykh, Egor
Experimental Results on Algebraic Attacks on Stream Ciphers.
Dittmann, Jana
GI-Edition : Lecture Notes in Informatics. Proceedings
77
279-282
In: Sicherheit 2006 : Haupttagung "Sicherheit - Schutz und Zuverlässigkeit"; Workshop "Qualifizierte elektronische Signaturen in Theorie und Praxis" (QSIG 2006); Otto-von-Guericke-Universität Magdeburg, 20. - 22. Februar 2006
(2006)
Bonn
[Conference or workshop publication]
|
|
Kelsey, John ; Lucks, Stefan
Collisions and Near-Collisions for Reduced-Round TIGER.
Robshaw, Matthew
Lecture Notes in Computer Science
4047
111-125
In: Fast software encryption : 13th International Workshop, FSE 2006; Graz, Austria, March 15 - 17, 2006; revised selected papers
(2006)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2005
Lucks, Stefan
A Failure-Friendly Design Principle for Hash Functions.
Roy, Bimal
Lecture Notes in Computer Science
3788
474-494
In: Advances in cryptology - ASIACRYPT 2005 : 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India; proceedings
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik
Algebraic Attacks and Annihilators.
Wolf, Christopher
GI-Edition : Lecture Notes in Informatics. Proceedings
74
13-21
In: WEWoRC 2005 : Western European Workshop on Research in Cryptology; in Leuven, Belgium
(2005)
Bonn
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Krause, Matthias ; Stegemann, Dirk
Design Principles for Combiners with Memory.
Maitra, Subhamoy
Lecture Notes in Computer Science
3797
104-117
In: Progress in cryptology - INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India; proceedings
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Lucks, Stefan ; Zenner, Erik ; Weimerskirch, Andre
Entity Recognition for Sensor Network Motes.
Cremers, Armin B.
2
145-149
In: Informatik 2005 : 35th Annual Conference of the Gesellschaft für Informatik e.V., Bonn, 19.-22.9. 2005
(2005)
Bonn
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Meier, Willi
Fault Attacks on Combiners with Memory.
Lecture Notes in Computer Science
3897
36-50
In: Selected Areas in Cryptography : 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11 - 12, 2005 ; revised selected papers
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Weis, Rüdiger ; Lucks, Stefan
(2005)
Hashfunktionen gebrochen.
Datenschutz und Datensicherheit : DuD
Wiesbaden
29
4
1-4
[Article]
|
|
Lucks, Stefan ; Schmoigl, Nico ; Tatli, Emin Islam
Issues on Designing a Cryptographic Compiler.
Wolf, Christopher
GI-Edition : Lecture Notes in Informatics. Proceedings
74
109-122
In: WEWoRC 2005 : Western European Workshop on Research in Cryptology; July 5 - 7, 2005, in Leuven, Belgium
(2005)
Bonn
[Conference or workshop publication]
|
|
Kühn, Ulrich ; Kursawe, Klaus ; Lucks, Stefan ; Saghedi, Ahmed-Reza ; Stüble, Christian
Secure Data Management in Trusted Computing.
Rao, Josyula R.
Lecture Notes in Computer Science
3659
324-338
In: Cryptographic Hardware and Embedded Systems - CHES 2005 : 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005; proceedings
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Tatli, Emin Islam ; Stegemann, Dirk ; Lucks, Stefan
Security Challenges of Location-Aware Mobile Business.
Werner, Bob
84-93
In: Proceedings / 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS '05), July 19, 2005, Munich, Germany
(2005)
Los Alamitos, Calif.
[Conference or workshop publication]
|
|
Lucks, Stefan
Two-Pass Authenticated Encryption Faster Than Generic Composition.
Gilbert, Henri
Lecture Notes in Computer Science
3557
284-298
In: Fast Software Encryption : 12th International Workshop, FSE 2005, Paris, France, February 21 - 23, 2005; revised selected papers
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Lucks, Stefan
Linearity of the AES Key Schedule.
Dobbertin, Hans
Lecture Notes in Computer Science
3373
159-169
In: Advanced encryption standard - AES : 4th International Conference, AES 2004, Bonn, Germany, May 10 - 12, 2004; revised selected and invited papers
(2005)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2004
Armknecht, Frederik
Algebraic Attacks on Stream Ciphers.
Neittaanmäki, Pekka
In: Proceedings / ECCOMAS 2004, 4th European Congress on Computational Methods in Applied Sciences and Engineering : Jyväskylä, Finland, 24 - 28 July 2004
(2004)
Jyväskylä
[Conference or workshop publication]
|
|
Lucks, Stefan
Ciphers Secure against Related Key Attacks.
Roy, Bimal
Lecture Notes in Computer Science
3017
359-370
In: Fast Software Encryption : 11th International Workshop, FSE 2004, Delhi, India, February 5 - 7, 2004; revised papers
(2004)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik ; Lano, Joseph ; Preneel, Bart
Extending the Resynchronization Attack.
Matsui, Mitsuru
Lecture Notes in Computer Science
3006
19-38
In: Selected Areas in Cryptography : 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003; revised papers
(2004)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Armknecht, Frederik
Improving Fast Algebraic Attacks.
Roy, Bimal
Lecture Notes in Computer Science
3017
65-82
In: Fast Software Encryption : 11th International Workshop, FSE 2004, Delhi, India, February 5 - 7, 2004; revised papers
(2004)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2003
Armknecht, Frederik ; Krause, Matthias
Algebraic attacks on combiners with memory.
Boneh, Dan
Lecture Notes in Computer Science
2729
162-176
In: Advances in cryptology - CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17 - 21, 2003; proceedings
(2003)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Ferguson, Niels ; Whiting, Doug ; Schneier, Bruce ; Kelsey, John ; Lucks, Stefan ; Kohno, Tadayoshi
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive.
Johansson, Thomas
Lecture Notes in Computer Science
2887
330-346
In: Fast software encryption : 10th International Workshop, FSE 2003, Lund, Sweden, February 24 - 26, 2003; revised papers
(2003)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Daneshmand, Siavash Vahdati ; Althaus, Ernst ; Polzin, Tobias
Improving Linear Programming Approaches for the Steiner Tree Problem.
Jansen, Klaus
Lecture Notes in Computer Science
2647
1-14
In: Experimental and efficient algorithms : second international workshop ; proceedings / WEA 2003, Ascona, Switzerland, May 26 - 28, 2003
(2003)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2002
Lucks, Stefan
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order.
Zheng, Yuliang
Lecture Notes in Computer Science
2501
27-45
In: Advances in cryptology - ASIACRYPT 2002 : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1 - 5, 2002; proceedings
(2002)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Krause, Matthias
BDD-based Cryptanalysis of Keystream Generators.
Knudsen, Lars
Lecture Notes in Computer Science
2332
222-237
In: Advances in cryptology - EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002; proceedings
(2002)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Polzin, Tobias ; Vahdati Daneshmand, Siavash
Extending Reduction Techniques for the Steiner Tree Problem.
Möhring, Rolf
Lecture Notes in Computer Science
2461
795-807
In: Algorithms - ESA 2002 : 10th Annual European Symposium, Rome, Italy, September 17-21, 2002; proceedings
(2002)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Krause, Matthias
On the Computational Power of Boolean Decision Lists.
Alt, Helmut
372-383
In: STACS 2002 : 19th Annual Symposium on Theoretical Aspects of Computer Science, Antibes- Juan les Pins, France, March 14 - 16, 2002; proceedings
(2002)
Berlin
[Conference or workshop publication]
|
|
Zenner, Erik
On the Efficiency of the Clock Control Guessing Attack.
Lee, Pil Joong
Lecture Notes in Computer Science
2587
200-212
In: Information security and cryptology - ICISC 2002 : 5th International Conference, Seoul, Korea, November 28 - 29, 2002; revised papers
(2002)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2001
Crowley, Paul ; Lucks, Stefan
Bias in the Leviathan Stream cipher.
Matsui, Mitsuru
Lecture Notes in Computer Science
2355
211-218
In: Fast software encryption : 8th International Workshop, FSE 2001, Yokohama, Japan, April 2 - 4, 2001; revised papers
(2001)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Ferguson, Niels ; Kelsey, John ; Lucks, Stefan ; Schneier, Bruce ; Stay, Mike ; Wagner, David ; Whiting, Doug
Improved Cryptanalysis of Rijndael.
Schneier, Bruce
Lecture Notes in Computer Science
1978
213-230
In: Fast software encryption : 7th International Workshop, FSE 2000, New York, NY, USA, April 10 -12, 2000; proceedings
(2001)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Zenner, Erik ; Krause, Matthias ; Lucks, Stefan
Improved Cryptanalysis of the Self-Shrinking Generator.
Varadharajan, Vijay
Lecture Notes in Computer Science
2119
21-35
In: Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11 - 13, 2001; proceedings
(2001)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Krause, Matthias ; Lucks, Stefan
On the Minimal Hardware Complexity of Pseudorandom Function Generators.
Ferreira, Afonso
Lecture Notes in Computer Science
2010
419-430
In: Proceedings STACS 2001 : 18th Annual Symposium on Theoretical Aspects of Computer Science, Dresden, Germany, February 15 - 17, 2001
(2001)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Lucks, Stefan
The Saturation Attack - a Bait for Twofish.
Matsui, Mitsuru
Lecture Notes in Computer Science
2355
1-15
In: Fast software encryption : 8th International Workshop, FSE 2001, Yokohama, Japan, April 2 - 4, 2001; revised papers
(2001)
Berlin [u.a.]
[Conference or workshop publication]
|
|
2000
Lucks, Stefan ; Weis, Rüdiger
How to make DES-based smartcards fit for the 21-st century.
Domingo-Ferrer, Josep
IFIP International Federation for Information Processing
52
93-114
In: Smart card research and advanced applications : IFIP TC8/WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications, September 20-22, 2000, Bristol, United Kingdom
(2000)
Boston, Mass. [u.a.]
[Conference or workshop publication]
|
|
Weis, Rüdiger ; Lucks, Stefan
The Performance of Modern Block Ciphers in JAVA.
Quisquater, Jean-Jacqques
Lecture Notes in Computer Science
1820
125-133
In: Smart card research and applications : Third International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14 - 16, 1998; proceedings
(2000)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Lucks, Stefan
The Sum of PRPs is a Secure PRF.
Preneel, Bart
Lecture Notes in Computer Science
1807
470-484
In: Advances in cryptology : proceedings / EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14 - 18, 2000
(2000)
Berlin [u.a.]
[Conference or workshop publication]
|
|
1999
Lucks, Stefan
Accelerated Remotely Key Encryption.
Knudsen, Lars
Lecture Notes in Computer Science
1636
112-123
In: Fast Software Encyption : 6th International Workshop, FSE '99, Rome, Italy, March 24 - 26, 1999; proceedings
(1999)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Krause, Matthias ; Savicky, Petr ; Wegener, Ingo
Approximations by OBDDs and the variable ordering problem.
Wiedermann, Jiri
Lecture Notes in Computer Science
1644
Nr.164
493-502
In: Automata, languages and programming : 26th International Colloquium, ICALP '99, Prague, Czech Republik, July 11 - 15, 1999; proceedings
(1999)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Lucks, Stefan
On the Security of the 128-Bit Block Cipher DEAL.
Knudsen, Lars
Lecture Notes in Computer Science
1636
60-70
In: Fast software encryption : 6th International Workshop, FSE '99, Rome, Italy, March 24 - 26, 1999; proceedings
(1999)
Berlin [u.a.]
[Conference or workshop publication]
|
|
1998
Lucks, Stefan
Attacking Triple Encryption.
Vaudenay, Serge
Lecture Notes in Computer Science
1372
239-253
In: Fast software encryption : 5th international workshop, FSE'98, Paris, France, March 23 - 25, 1998; proceedings
(1998)
Berlin [u.a.]
[Conference or workshop publication]
|
|
Weis, Rüdiger ; Lucks, Stefan
(1998)
KEA.
Datenschutz und Datensicherheit : DuD
Wiesbaden
22
10
[Article]
|
|
1997
Krause, Matthias ; Simon, Hans Ulrich ; Hofmeister, Thomas
Contrast-optimal k out of n secret sharing schemes in visual cryptography.
Jiang, Tao
Lecture Notes in Computer Science
1276
176-185
In: Computing and combinatorics : third Annual International Conference COCOON '97, Shanghai, China, August 20-22, 1997; proceedings
(1997)
Berlin [u.a.]
[Conference or workshop publication]
|
|
This list was created automatically on Tue Mar 2 06:25:09 2021 CET
|