Erik Zenner

According to our database1, Erik Zenner authored at least 32 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2015
Ripple: Overview and Outlook.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

2012
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.
Int. J. Inf. Sec., 2012

Towards Symbolic Encryption Schemes.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Private-key Symbolic Encryption.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of ARMADILLO2.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of the Light-Weight Cipher A2U2.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2009
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks.
IACR Cryptol. ePrint Arch., 2009

Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper).
IACR Cryptol. ePrint Arch., 2009

Nonce Generators and the Nonce Reset Problem.
Proceedings of the Information Security, 12th International Conference, 2009

Cache Timing Analysis of LFSR-Based Stream Ciphers.
Proceedings of the Cryptography and Coding, 2009

Cache Timing Analysis of eStream Finalists.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
The Rabbit Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

A Cache Timing Analysis of HC-256.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Concrete Security for Entity Recognition: The Jane Doe Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
Why IV Setup for Stream Ciphers is Difficult.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

Protecting Online Transactions with Unique Embedded Key Generators.
Proceedings of the The Second International Conference on Availability, 2007

2006
A Description of the Rabbit Stream Cipher Algorithm.
RFC, May, 2006

Das eStream-Projekt - Oder: Die Wiederentdeckung der Stromchiffre.
Datenschutz und Datensicherheit, 2006

2005
Entity Recognition for Sensor Network Motes.
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005

Badger - A Fast and Provably Secure MAC.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
On cryptographic properties of LFSR-based pseudorandom generators.
PhD thesis, 2004

On the Role of the Inner State Size in Stream Ciphers.
IACR Cryptol. ePrint Arch., 2004

Badger - A Fast and Provably Secure MAC.
IACR Cryptol. ePrint Arch., 2004

The Rabbit Stream Cipher - Design and Security Analysis.
IACR Cryptol. ePrint Arch., 2004

2002
On the efficiency of the Clock Control Guessing Attack.
IACR Cryptol. ePrint Arch., 2002

On the Efficiency of theClock Control Guessing Attack.
Proceedings of the Information Security and Cryptology, 2002

2001
Improved Cryptanalysis of the Self-Shrinking Generator.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Sicherheit des GSM- Verschlüsselungsstandards A5.
Datenschutz und Datensicherheit, 2000


  Loading...