|
Search the dblp DataBase
Frederik Armknecht:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Frederik Armknecht, Stefan Lucks
Linearity of the AES Key Schedule. [Citation Graph (0, 0)][DBLP] AES Conference, 2004, pp:159-169 [Conf]
- Frederik Armknecht, Matthias Krause
Algebraic Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP] CRYPTO, 2003, pp:162-175 [Conf]
- Frederik Armknecht, Joao Girão, Marc Stoecklin, Dirk Westhoff
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:18-31 [Conf]
- Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:147-164 [Conf]
- Frederik Armknecht
Improving Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:65-82 [Conf]
- Frederik Armknecht, Matthias Krause
Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:180-191 [Conf]
- Frederik Armknecht, Matthias Krause, Dirk Stegemann
Design Principles for Combiners with Memory. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:104-117 [Conf]
- Frederik Armknecht, Gwénolé Ars
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:16-32 [Conf]
- Frederik Armknecht, Joseph Lano, Bart Preneel
Extending the Resynchronization Attack. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:19-38 [Conf]
- Frederik Armknecht, Willi Meier
Fault Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:36-50 [Conf]
- Frederik Armknecht, Jörg Brandeis, Egor Ilinykh
Experimental results on algebraic attacks on stream ciphers. [Citation Graph (0, 0)][DBLP] Sicherheit, 2006, pp:279-282 [Conf]
- Frederik Armknecht
Algebraic Attacks and Annihilators. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:13-21 [Conf]
- Frederik Armknecht, Joao Girão, Alfredo Matos, Rui L. Aguiar
Who Said That? Privacy at Link Layer. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:2521-2525 [Conf]
On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. [Citation Graph (, )][DBLP]
An efficient implementation of trusted channels based on openssl. [Citation Graph (, )][DBLP]
Hide and Seek in Time - Robust Covert Timing Channels. [Citation Graph (, )][DBLP]
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]
Using Merkle's Puzzle for key agreement with low-end devices. [Citation Graph (, )][DBLP]
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. [Citation Graph (, )][DBLP]
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|