Publications

  • Armknecht, F., Handschuh, H., Iwata, T. and Preneel, B. (eds.) (2014). Symmetric Cryptography : Report from Dagstuhl Seminar 14021. Wadern: Schloss Dagstuhl, Leibnitz Zentrum für Informatik.
  • Armknecht, F., Bohli, J.-M., Karame, G. O., Liu, Z. and Reuter, C. A. (2014). Outsourced Proofs of Retrievability. In Ahn, G., Proceedings of the 21st ACM Conference on Computer and Communications Security : CCS'14 ; November 3-7, 2014, Scottsdale, Arizona, USA (S. 831-843). CCS, ACM: New York, NY.
  • Armknecht, F., Gagliardoni, T., Katzenbeisser, S. and Peter, A. (2014). General Impossibility of Group Homomorphic Encryption in the Quantum World. In Krawczyk, H., Public-Key Cryptography – PKC 2014 : 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings (S. 556-573). Lecture Notes in Computer Science, Springer: Berlin [u.a.].
  • Armknecht, F., Gagliardoni, T., Katzenbeisser, S. and Peter, A. (2014). General Impossibility of Group Homomorphic Encryption in the Quantum World. Cryptology ePrint Archive, 2014, Report 029.
  • Armknecht, F. and Guajardo, J. (2014). Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014). In Ahn, G., Proceedings of the 21st ACM Conference on Computer and Communications Security : CCS'14 ; November 3-7, 2014, Scottsdale, Arizona, USA (S. 1548-1549). , ACM: New York, NY.
  • Armknecht, F., Hamann, M. and Krause, M. (2014). Hardware Efficient Authentication based on Random Selection. In Katzenbeisser, S., Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit : [Beiträge der 7. Jahrestagung des Fach­bereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien (S. 169-185). GI-Edition : Lecture Notes in Informatics. Proceedings, Ges. für Informatik: Bonn.
  • Armknecht, F., Hamann, M. and Mikhalev, V. (2014). Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts. In Saxena, N., Radio Frequency Identification: Security and Privacy Issues : 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers (S. 1-18). Lecture Notes in Computer Science, Springer: Cham.
  • Armknecht, F., Hauptmann, M., Roos, S. and Strufe, T. (2014). An additional protection layer for confidential OSNs posts. In Jamalipour, A., ICC 2014 - 2014 IEEE International Conference on Communications : Sydney, Australia, 10 - 14 June 2014 (S. 3746-3752). , IEEE: Piscataway, NJ.
  • Armknecht, F. and Mikhalev, V. (2014). On Increasing the Throughput of Stream Ciphers. In Benaloh, J., Topics in Cryptology – CT-RSA 2014 : The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings (S. 132-151). Lecture Notes in Computer Science, Springer: Cham.
  • Mikhalev, V. and Armknecht, F. (2014). Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. In Obaldat, M., Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28 - 30 August, 2014 ; [part of ICETE 2014, 11th International Joint Conference on E-Business and Telecommunications] (S. 379-386). , SCITEPRESS: Setúbal, Portugal.
  • Senftleben, M., Bucicoiu, M., Tews, E., Armknecht, F., Katzenbeisser, S. and Sadeghi, A.-R. (2014). MoP-2-MoP – Mobile Private Microblogging. In Christin, N., Financial Cryptography and Data Security : 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers (S. 384-396). Lecture Notes in Computer Science, Springer: Heidelberg [u.a.].