Erik Zenner
According to our database1,
Erik Zenner
authored at least 32 papers
between 2000 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
2012
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis.
Int. J. Inf. Sec., 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Datenschutz und Datensicherheit, 2006
2005
Proceedings of the 35. Jahrestagung der Gesellschaft für Informatik, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Information Security and Cryptology, 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Sicherheit des GSM- Verschlüsselungsstandards A5.
Datenschutz und Datensicherheit, 2000