Publications
- Armknecht, F. (2016). On ciphers that continuously access the non-volatile key. In , Symmetric Cryptography : report from Dagstuhl Seminar 16021 (S. 39). Dagstuhl Reports, Schloss Dagstuhl: Wadern.
- Armknecht, F., Barman, L., Bohli, J.-M. and Karame, G. O. (2016). Mirror: enabling proofs of data replication and retrievability in the cloud. In , Proceedings of the 25th USENIX Security Symposium : August 10–12, 2016, Austin, TX (S. 1051-1068). , USENIX Association: Berkeley, CA.
- Armknecht, F., Benenson, Z., Morgner, P. and Müller, C. (2016). On the security of the ZigBee Light Link touchlink commissioning procedure. In , Sicherheit 2016 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 8. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI) : 5. – 7. April 2016 in Bonn (S. 229–240). GI-Edition : Lecture Notes in Informatics. Proceedings, Ges. für Informatik: Bonn.
- Armknecht, F., Bohli, J.-M., Froelicher, D. and Karame, G. O. (2016). SPORT: Sharing proofs of retrievability across tenants. , 2016, 1–16.
- Armknecht, F., Boyd, C., Davies, G. T., Gjøsteen, K. and Toorani, M. (2016). Side channels in deduplication: trade-offs between leakage and efficiency. , 2016, 1–14.
- Armknecht, F., Iwata, T., Nyberg, K. and Preneel, B. (2016). Executive summary. In , Symmetric Cryptography : report from Dagstuhl Seminar 16021 (S. 34–36). Dagstuhl Reports, Schloss Dagstuhl: Wadern.
- Armknecht, F., Moriyama, D., Sadeghi, A.-R. and Yung, M. (2016). Towards a unified security model for Physically Unclonable Functions. In , Topics in cryptology – CT-RSA 2016 : the Cryptographers' Track at the RSA conference 2016, San Francisco, CA, USA, February 29-March 4, 2016 : proceedings (S. 271–287). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
- Armknecht, F., Moriyama, D., Sadeghi, A.-R. and Yung, M. (2016). Towards a unified security model for Physically Unclonable Functions. , 2016, 1–26.
- Hamann, M., Krause, M. and Meier, W. (2016). LIZARD – A lightweight stream cipher for power-constrained devices.
Cryptology ePrint Archive, Report 2016/
926. Santa Barbara, CA: IACR, International Association for Cryptologic Research. - Jäschke, A. and Armknecht, F. (2016). Accelerating homomorphic computations on rational numbers. In , Applied cryptography and network security : 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016 : proceedings (S. 405–423). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
- Jäschke, A. and Armknecht, F. (2016). Accelerating homomorphic computations on rational numbers. , 2016, 1–30.
- Mikhalev, V., Armknecht, F. and Müller, C. (2016). On ciphers that continuously access the non-volatile key. IACR Transactions on Symmetric Cryptology, 2016, 52–79.
- Tajan, L., Westhoff, D., Reuter, C. A. and Armknecht, F. (2016). Private information retrieval and searchable encryption for privacy-preserving multi-client cloud auditing. In , 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) (S. 162–169). , IEEE: Piscataway, NJ.