Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B. and Tuyls, P. (2009). Memory leakage-resilient encryption based on physically unclonable functions.
In , Advances in cryptology – ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6–10, 2009 ; proceedings (S. 685–702). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
Armknecht, F. and Westhoff, D. (2009). Using Merkle's puzzle for key agreement with low-end devices.
In , 2009 IEEE 34th Conference on Local Computer Networks : LCN 2009 , Zurich, Switzerland, 20 – 23 October 2009 , [including workshops papers] (S. 858–864). ,
IEEE: Piscataway, NJ.
Krause, M. and Stegemann, D. (2009). More on the Security of Linear RFID Authentication Protocols.
In , Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13 – 14, 2009; revised selected paper (S. 182–196). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.-R., Schulz, S. and Katzenbeisser, S. (2009). Hide and seek in time – robust covert timing channels.
In , Computer security – ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21–23, 2009 ; proceedings (S. 120–135). Lecture Notes in Computer Science,
Springer: Berlin [u.a.].
In order to improve performance and enhance the user experience for the visitors to our website, we use cookies and store anonymous usage data. For more information please read our privacy policy.