Matthias Hamann

Orcid: 0000-0001-7984-1424

According to our database1, Matthias Hamann authored at least 30 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Minor exclusion in quasi-transitive graphs.
Discret. Math., January, 2024

2023
The planar Cayley graphs are effectively enumerable II.
Eur. J. Comb., May, 2023

Multilevel Security Model for Secure Information Flow Inside Software Components Employing Automated Code Generation.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Mitigating Masking in Automotive Communication Systems: Modeling and Hardware Generation.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023

2022
The DRACO Stream Cipher A Power-efficient Small-state Stream Cipher with Full Provable Security against TMDTO Attacks.
IACR Trans. Symmetric Cryptol., 2022

A Stallings type theorem for quasi-transitive graphs.
J. Comb. Theory, Ser. B, 2022

Canonical trees of tree-decompositions.
J. Comb. Theory, Ser. B, 2022

2019
Tight Security Bounds for Generic Stream Cipher Constructions.
IACR Cryptol. ePrint Arch., 2019

Self-embeddings of trees.
Discret. Math., 2019

The Planar Cayley Graphs are Effectively Enumerable I: Consistently Planar Graphs.
Comb., 2019

Tight Security Bounds for Generic Stream Cipher Constructions.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Lightweight Cryptography on Ultra-Constrained RFID Devices.
PhD thesis, 2018

Planar Transitive Graphs.
Electron. J. Comb., 2018

Accessibility in Transitive Graphs.
Comb., 2018

Design and analysis of small-state grain-like stream ciphers.
Cryptogr. Commun., 2018

On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks.
Cryptogr. Commun., 2018

2017
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers.
IACR Cryptol. ePrint Arch., 2017

A Note on Stream Ciphers that Continuously Use the IV.
IACR Cryptol. ePrint Arch., 2017

The classification of finite and locally finite connected-homogeneous digraphs.
Comb., 2017

2016
Bounding Connected Tree-Width.
SIAM J. Discret. Math., 2016

LIZARD - A Lightweight Stream Cipher for Power-constrained Devices.
IACR Cryptol. ePrint Arch., 2016

Extending Cycles Locally to Hamilton Cycles.
Electron. J. Comb., 2016

Spanning trees in hyperbolic graphs.
Comb., 2016

2015
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks.
IACR Cryptol. ePrint Arch., 2015

Generating the Cycle Space of Planar Graphs.
Electron. J. Comb., 2015

2014
Homogeneous 2-partite digraphs.
Discret. Math., 2014

Hardware Efficient Authentication based on Random Selection.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

2012
Transitivity conditions in infinite graphs.
Comb., 2012

2011
The Cryptographic Power of Random Selection.
IACR Cryptol. ePrint Arch., 2011


  Loading...