The SCEAS System
Navigation Menu

Search the dblp DataBase


Frederik Armknecht: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Frederik Armknecht, Stefan Lucks
    Linearity of the AES Key Schedule. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:159-169 [Conf]
  2. Frederik Armknecht, Matthias Krause
    Algebraic Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:162-175 [Conf]
  3. Frederik Armknecht, Joao Girão, Marc Stoecklin, Dirk Westhoff
    Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:18-31 [Conf]
  4. Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta
    Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:147-164 [Conf]
  5. Frederik Armknecht
    Improving Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:65-82 [Conf]
  6. Frederik Armknecht, Matthias Krause
    Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:180-191 [Conf]
  7. Frederik Armknecht, Matthias Krause, Dirk Stegemann
    Design Principles for Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:104-117 [Conf]
  8. Frederik Armknecht, Gwénolé Ars
    Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:16-32 [Conf]
  9. Frederik Armknecht, Joseph Lano, Bart Preneel
    Extending the Resynchronization Attack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:19-38 [Conf]
  10. Frederik Armknecht, Willi Meier
    Fault Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:36-50 [Conf]
  11. Frederik Armknecht, Jörg Brandeis, Egor Ilinykh
    Experimental results on algebraic attacks on stream ciphers. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:279-282 [Conf]
  12. Frederik Armknecht
    Algebraic Attacks and Annihilators. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:13-21 [Conf]
  13. Frederik Armknecht, Joao Girão, Alfredo Matos, Rui L. Aguiar
    Who Said That? Privacy at Link Layer. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2521-2525 [Conf]

  14. On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]

  15. Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]

  16. An efficient implementation of trusted channels based on openssl. [Citation Graph (, )][DBLP]

  17. Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]

  18. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]

  19. Using Merkle's Puzzle for key agreement with low-end devices. [Citation Graph (, )][DBLP]

  20. A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. [Citation Graph (, )][DBLP]

  21. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002