Publications

  • Armknecht, F., Handschuh, H., Iwata, T. and Preneel, B. (eds.) (2014). Symmetric Cryptography : Report from Dagstuhl Seminar 14021. Wadern: Schloss Dagstuhl.
  • Armknecht, F., Bohli, J.-M., Karame, G. O., Liu, Z. and Reuter, C. A. (2014). Outsourced Proofs of Retrievability. In , Proceedings of the 21st ACM Conference on Computer and Communications Security : CCS'14 ; November 3–7, 2014, Scottsdale, Arizona, USA (S. 831–843). CCS, ACM: New York, NY.
  • Armknecht, F., Gagliardoni, T., Katzenbeisser, S. and Peter, A. (2014). General Impossibility of Group Homomorphic Encryption in the Quantum World. In , Public-Key Cryptography – PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings (S. 556–573). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
  • Armknecht, F., Gagliardoni, T., Katzenbeisser, S. and Peter, A. (2014). General Impossibility of Group Homomorphic Encryption in the Quantum World. Cryptology ePrint Archive, Report 2014/029. Santa Barbara, CA: IACR, International Association for Cryptologic Research.
  • Armknecht, F., Hamann, M. and Krause, M. (2014). Hardware Efficient Authentication based on Random Selection. In , Sicherheit 2014 – Sicherheit, Schutz und Zuverlässigkeit : [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. – 21. März 2014 in Wien (S. 169–185). GI-Edition : Lecture Notes in Informatics. Proceedings, Ges. für Informatik: Bonn.
  • Armknecht, F., Hamann, M. and Mikhalev, V. (2014). Lightweight Authentication Protocols on Ultra-Constrained RFIDs – Myths and Facts. In , Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21–23, 2014, Revised Selected Papers (S. 1–18). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
  • Armknecht, F., Hauptmann, M., Roos, S. and Strufe, T. (2014). An additional protection layer for confidential OSNs posts. In , ICC 2014 – 2014 IEEE International Conference on Communications : Sydney, Australia, 10 – 14 June 2014 (S. 3746-3752). ICC, IEEE: Piscataway, NJ.
  • Armknecht, F. and Mikhalev, V. (2014). On Increasing the Throughput of Stream Ciphers. In , Topics in Cryptology – CT-RSA 2014 : The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings (S. 132–151). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
  • Mikhalev, V. and Armknecht, F. (2014). Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. In , Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28 – 30 August, 2014 ; [part of ICETE 2014, 11th International Joint Conference on E-Business and Telecommunications] (S. 379–386). Lectute Notes in Computer Science, SCITEPRESS: Setúbal, Portugal.
  • Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S. and Sadeghi, A.-R. (2014). MoP-2-MoP – Mobile Private Microblogging. In , Financial Cryptography and Data Security : 18th International Conference, FC 2014, Christ Church, Barbados, March 3–7, 2014, Revised Selected Papers (S. 384–396). Lecture Notes in Computer Science, Springer: Berlin [u.a.].