Publications
- Armknecht, F., Bohli, J.-M., Froelicher, D. and Karame, G. O. (2017). Sharing proofs of retrievability across tenants. In , Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (S. 275–287). , ACM: New York, NY.
- Armknecht, F., Bohli, J.-M., Karame, G. O. and Li, W. (2017). Sharding PoW-based blockchains via proofs of knowledge. , 2017, 1–16.
- Armknecht, F., Boyd, C., Davies, G. T., Gjøsteen, K. and Toorani, M. (2017). Side channels in deduplication: Trade-offs between leakage and efficiency. In , Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Asia CCS 2017, Abu Dhabi, United Arab Emirates, April 2–6, 2017 (S. 266–274). , ACM: New York, NY.
- Gorke, C. A. and Armknecht, F. (2017). SMAUG: Secure Mobile Authentication Using Gestures. CoRR ArXiv, 04871. Ithaca, NY: CoRR Computing Research Repository.
- Gorke, C. A., Janson, C., Armknecht, F. and Cid, C. (2017). Cloud storage file recoverability. In , Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017 (S. 19–26). , ACM: New York, NY.
- Hamann, M., Krause, M. and Meier, W. (2017). A note on stream ciphers that continuously use the IV.
Cryptology ePrint Archive, Report 2017/
1172. Santa Barbara, CA: IACR, International Association for Cryptologic Research. - Hamann, M., Krause, M. and Meier, W. (2017). LIZARD – A lightweight stream cipher for power-constrained devices. IACR Transactions on Symmetric Cryptology, 2017, 45–79.
- Hamann, M., Krause, M., Meier, W. and Zhang, B. (2017). Time-memory-data tradeoff attacks against small-state stream ciphers.
Cryptology ePrint Archive, Report 2017/
384. Santa Barbara, CA: IACR, International Association for Cryptologic Research. - Krause, M. (2017). On the hardness of trivium and grain with respect to generic time-memory-data trade off attacks.
Cryptology ePrint Archive, Report 2017/
289. Santa Barbara, CA: IACR, International Association for Cryptologic Research. - Mikhalev, V., Armknecht, F. and Müller, C. (2017). On ciphers that continuously access the non-volatile key. FSE 2017, Tokyo, Japan.
- Mikhalev, V., Gomez, L., Armknecht, F. and Márquez, J. (2017). Towards end-to-end data protection in low-power networks. In , Computer Security : ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14–15, 2017, Revised Selected Papers (S. 3–18). , Springer: Cham.
- Morgner, P., Mattejat, S., Benenson, Z., Müller, C. and Armknecht, F. (2017). Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning. In , Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks : WiSec 2017, Boston, MA, USA, July 18–20, 2017 (S. 230–240). , ACM: New York, NY.
- Morgner, P., Müller, C., Ring, M., Eskofier, B., Riess, C., Armknecht, F. and Benenson, Z. (2017). Privacy implications of room climate data. In , Computer Security – ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11–15, 2017, Proceedings, Part II (S. 324–343). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
- Wiesberg, A., Grohmann, B., Armknecht, F. and Schaad, A. (2017). Short paper: Industrial feasibility of private information retrieval. In , ICETE 2017 : proceedings of the 14th International Joint Conference on e-Business and Telecommunications : Madrid, Spain, July 24–26, 2017 (S. 395–400). , SciTePress: Setubal, Portugal.