Frederik Armknecht

According to our database1, Frederik Armknecht authored at least 99 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Privacy implications of room climate data.
Journal of Computer Security, 2019

Private Set Relations with Bloom Filters for Outsourced SLA Validation.
IACR Cryptology ePrint Archive, 2019

2018
Towards Low Energy Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2018

Unsupervised Machine Learning on Encrypted Data.
IACR Cryptology ePrint Archive, 2018

Unsupervised Machine Learning on Encrypted Data.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

2017
Industrial Feasibility of Private Information Retrieval.
IACR Cryptology ePrint Archive, 2017

(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation.
IACR Cryptology ePrint Archive, 2017

Cloud Storage File Recoverability.
IACR Cryptology ePrint Archive, 2017

Sharding PoW-based Blockchains via Proofs of Knowledge.
IACR Cryptology ePrint Archive, 2017

SMAUG: Secure Mobile Authentication Using Gestures.
CoRR, 2017

Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Short Paper: Industrial Feasibility of Private Information Retrieval.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Privacy Implications of Room Climate Data.
Proceedings of the Computer Security - ESORICS 2017, 2017

Towards End-to-End Data Protection in Low-Power Networks.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Cloud Storage File Recoverability.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Sharing Proofs of Retrievability across Tenants.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
On Ciphers that Continuously Access the Non-Volatile Key.
IACR Trans. Symmetric Cryptol., 2016

Accelerating Homomorphic Computations on Rational Numbers.
IACR Cryptology ePrint Archive, 2016

Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptology ePrint Archive, 2016

SPORT: Sharing Proofs of Retrievability across Tenants.
IACR Cryptology ePrint Archive, 2016

Side channels in deduplication: trade-offs between leakage and efficiency.
IACR Cryptology ePrint Archive, 2016

Symmetric Cryptography (Dagstuhl Seminar 16021).
Dagstuhl Reports, 2016

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud.
Proceedings of the 25th USENIX Security Symposium, 2016

On the security of the ZigBee Light Link touchlink commissioning procedure.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Towards a Unified Security Model for Physically Unclonable Functions.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Accelerating Homomorphic Computations on Rational Numbers.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
On Lightweight Stream Ciphers with Shorter Internal States.
IACR Cryptology ePrint Archive, 2015

A Guide to Fully Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2015

Privacy-preserving email forensics.
Digital Investigation, 2015

Ripple: Overview and Outlook.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

On Lightweight Stream Ciphers with Shorter Internal States.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Transparent Data Deduplication in the Cloud.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
General Impossibility of Group Homomorphic Encryption in the Quantum World.
IACR Cryptology ePrint Archive, 2014

Symmetric Cryptography (Dagstuhl Seminar 14021).
Dagstuhl Reports, 2014

General Impossibility of Group Homomorphic Encryption in the Quantum World.
CoRR, 2014

Hardware Efficient Authentication based on Random Selection.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers.
Proceedings of the SECRYPT 2014, 2014

Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

General Impossibility of Group Homomorphic Encryption in the Quantum World.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

An additional protection layer for confidential OSNs posts.
Proceedings of the IEEE International Conference on Communications, 2014

MoP-2-MoP - Mobile Private Microblogging.
Proceedings of the Financial Cryptography and Data Security, 2014

On Increasing the Throughput of Stream Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014).
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Outsourced Proofs of Retrievability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Towards Provably Secure Software Attestation.
IACR Cryptology ePrint Archive, 2013

Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013

Protecting Public OSN Posts from Unintended Access.
CoRR, 2013

Towards Search on Encrypted Graph Data.
Proceedings of the Workshop on Society, 2013

A security framework for the analysis and design of software attestation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Third international workshop on trustworthy embedded devices (TrustED 2013).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Symmetric Cryptography (Dagstuhl Seminar 12031).
Dagstuhl Reports, 2012

Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
On Constructing Homomorphic Encryption Schemes from Coding Theory.
IACR Cryptology ePrint Archive, 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

An efficient distributed privacy-preserving recommendation system.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

On Constructing Homomorphic Encryption Schemes from Coding Theory.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

The Preimage Security of Double-Block-Length Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Impossibility Results for RFID Privacy Notions.
Trans. Computational Science, 2010

Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited.
IACR Cryptology ePrint Archive, 2010

A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP.
IACR Cryptology ePrint Archive, 2010

Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design.
IACR Cryptology ePrint Archive, 2010

On the Minimum Communication Effort for Secure Group Key Exchange.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Anonymous Authentication for RFID Systems.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

On RFID Privacy with Mutual Authentication and Tag Corruption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Using Merkle's Puzzle for key agreement with low-end devices.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Advances in Cryptology, 2009

Algebraic Attacks on Stream Ciphers with Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Toward dependable networking: secure location and privacy at the link layer.
IEEE Wireless Commun., 2008

A New Approach for Algebraically Homomorphic Encryption.
IACR Cryptology ePrint Archive, 2008

A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing.
Computer Communications, 2008

A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

CPFP: An efficient key management scheme for large scale personal networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

An efficient implementation of trusted channels based on openssl.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Who Said That? Privacy at Link Layer.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Algebraic attacks on certain stream ciphers.
PhD thesis, 2006

Experimental results on algebraic attacks on stream ciphers.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Algebraic Attacks and Annihilators.
Proceedings of the WEWoRC 2005, 2005

Fault Attacks on Combiners with Memory.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.
Proceedings of the Progress in Cryptology, 2005

Design Principles for Combiners with Memory.
Proceedings of the Progress in Cryptology, 2005

2004
Extending the Resynchronization Attack.
IACR Cryptology ePrint Archive, 2004

On the Existence of low-degree Equations for Algebraic Attacks.
IACR Cryptology ePrint Archive, 2004

Extending the Resynchronization Attack.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Improving Fast Algebraic Attacks.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Linearity of the AES Key Schedule.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Algebraic Attacks on Combiners with Memory.
Proceedings of the Advances in Cryptology, 2003

2002
A Linearization Attack on the Bluetooth Key Stream Generator.
IACR Cryptology ePrint Archive, 2002


  Loading...