Publications
- Armknecht, F. and Ars, G. (2009). Algebraic attacks on stream ciphers with Gröbner Bases. In , Gröbner bases, coding, and cryptography (S. 329–348). , Springer: Berlin ; Heidelberg.
- Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B. and Tuyls, P. (2009). Memory leakage-resilient encryption based on physically unclonable functions. In , Advances in cryptology – ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6–10, 2009 ; proceedings (S. 685–702). Lecture Notes in Computer Science, Springer: Berlin [u. a.].
- Armknecht, F., Maes, R., Sadeghi, A.-R., Sunar, B. and Tuyls, P. (2009). Physically unclonable pseudorandom functions. EUROCRYPT (28. : 2009), Köln, Germany.
- Armknecht, F. and Westhoff, D. (2009). Using Merkle's puzzle for key agreement with low-end devices. In , 2009 IEEE 34th Conference on Local Computer Networks : LCN 2009 , Zurich, Switzerland, 20 – 23 October 2009 , [including workshops papers] (S. 858–864). , IEEE: Piscataway, NJ.
- Krause, M. and Stegemann, D. (2009). Algebraic Attacks against Linear RFID Authentication Protocols. In , (S. No. 9). Dagstuhl Seminar Proceedings, LZI: Wadern.
- Krause, M. and Stegemann, D. (2009). More on the Security of Linear RFID Authentication Protocols. In , Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13 – 14, 2009; revised selected paper (S. 182–196). Lecture Notes in Computer Science, Springer: Berlin [u. a.].
- Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.-R., Schulz, S. and Katzenbeisser, S. (2009). Hide and seek in time – robust covert timing channels. In , Computer security – ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21–23, 2009 ; proceedings (S. 120–135). Lecture Notes in Computer Science, Springer: Berlin [u. a.].