Publications
- Armknecht, F., Verbauwhede, I., Volkamer, M. and Yung, M. (eds.) (2020). Biggest failures in security : Report from Dagstuhl Seminar 19451. Wadern: Schloss Dagstuhl.
- Armknecht, F., Verbauwhede, I., Volkamer, M. and Yung, M. (2020). Executive summary : General introduction. In , Biggest failures in security : Report from Dagstuhl Seminar 19451 (S. 1–3). Dagstuhl Reports, Schloss Dagstuhl: Wadern.
- Armknecht, F., Walther, P., Tsudik, G., Beck, M. and Strufe, T. (2020). ProMACs: progressive and resynchronizing MACs for continuous efficient authentication of message streams. In , CCS '20 : Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (S. 211–223). , Association for Computing Machinery: New York, NY.
- Freiling, F. and Armknecht, F. (2020). Attacker models and assumption coverage. In , Biggest failures in security : Report from Dagstuhl Seminar 19451 (S. 10–11). Dagstuhl Reports, Schloss Dagstuhl: Wadern.
- Hamann, M., Krause, M. and Moch, A. (2020). Tight security bounds for generic stream cipher constructions. In , Selected areas in cryptography – SAC 2019 : 26th international conference, Waterloo, ON, Canada, August 12–16, 2019 : revised selected papers (S. 335–364). Lecture Notes in Computer Science, Springer: Berlin [u. a.].
- Tajan, L., Westhoff, D. and Armknecht, F. (2020). Solving set relations with secure bloom filters keeping cardinality private. In , SECRYPT 2020 : proceedings of the 17th International Conference on Security and Cryptography : July 8–10, 2020 (S. 443–450). , SCITEPRESS: Setúbal.