Frederik Armknecht

Orcid: 0009-0003-9935-8095

Affiliations:
  • University of Mannheim, Germany


According to our database1, Frederik Armknecht authored at least 107 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Practical Light Clients for Committee-Based Blockchains.
CoRR, 2024

Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

0 Sterne für die Sicherheit: Wie Kundenbewertungen die Bitcoin-Adressen von Darknet-Händlern verraten.
Proceedings of the Sicherheit, 2024

Cryptanalysis of the Record Linkage Protocol used by German Cancer Registries.
Proceedings of the Sicherheit, 2024

Towards a Cryptographic Model for Wireless Communication.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Buy Crypto, Sell Privacy: Investigating the Cryptocurrency Exchange Evonax.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

2023
Strengthening Privacy-Preserving Record Linkage using Diffusion.
Proc. Priv. Enhancing Technol., April, 2023

2022
If You Like Me, Please Don't "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews.
Proc. Priv. Enhancing Technol., 2022

Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context.
CoRR, 2022

Salting as a Countermeasure against Attacks on Privacy Preserving Record Linkage Techniques.
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022

2021
Outsourcing Proofs of Retrievability.
IEEE Trans. Cloud Comput., 2021

Regulating Storage Overhead in Existing PoW-based Blockchains.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

How to Take Over Drones.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Selected Design and Analysis Techniques for Contemporary Symmetric Encryption.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Privacy implications of room climate data.
J. Comput. Secur., 2019

Private Set Relations with Bloom Filters for Outsourced SLA Validation.
IACR Cryptol. ePrint Arch., 2019

Biggest Failures in Security (Dagstuhl Seminar 19451).
Dagstuhl Reports, 2019

Reverse Fingerprinting.
CoRR, 2019

2018
Towards Low Energy Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2018

Unsupervised Machine Learning on Encrypted Data.
IACR Cryptol. ePrint Arch., 2018

Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Chains and Whips - An approach to lighweight MACs.
Proceedings of the 28. Krypto-Tag, 2018

2017
Industrial Feasibility of Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2017

(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation.
IACR Cryptol. ePrint Arch., 2017

Cloud Storage File Recoverability.
IACR Cryptol. ePrint Arch., 2017

Sharding PoW-based Blockchains via Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 2017

SMAUG: Secure Mobile Authentication Using Gestures.
CoRR, 2017

Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Short Paper: Industrial Feasibility of Private Information Retrieval.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Privacy Implications of Room Climate Data.
Proceedings of the Computer Security - ESORICS 2017, 2017

Towards End-to-End Data Protection in Low-Power Networks.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Sharing Proofs of Retrievability across Tenants.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On Ciphers that Continuously Access the Non-Volatile Key.
IACR Trans. Symmetric Cryptol., 2016

Accelerating Homomorphic Computations on Rational Numbers.
IACR Cryptol. ePrint Arch., 2016

Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2016

SPORT: Sharing Proofs of Retrievability across Tenants.
IACR Cryptol. ePrint Arch., 2016

Side channels in deduplication: trade-offs between leakage and efficiency.
IACR Cryptol. ePrint Arch., 2016

Symmetric Cryptography (Dagstuhl Seminar 16021).
Dagstuhl Reports, 2016

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud.
Proceedings of the 25th USENIX Security Symposium, 2016

On the security of the ZigBee Light Link touchlink commissioning procedure.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
On Lightweight Stream Ciphers with Shorter Internal States.
IACR Cryptol. ePrint Arch., 2015

A Guide to Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2015

Privacy-preserving email forensics.
Digit. Investig., 2015

Ripple: Overview and Outlook.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Transparent Data Deduplication in the Cloud.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
General Impossibility of Group Homomorphic Encryption in the Quantum World.
IACR Cryptol. ePrint Arch., 2014

Symmetric Cryptography (Dagstuhl Seminar 14021).
Dagstuhl Reports, 2014

Hardware Efficient Authentication based on Random Selection.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers.
Proceedings of the SECRYPT 2014, 2014

Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

An additional protection layer for confidential OSNs posts.
Proceedings of the IEEE International Conference on Communications, 2014

MoP-2-MoP - Mobile Private Microblogging.
Proceedings of the Financial Cryptography and Data Security, 2014

On Increasing the Throughput of Stream Ciphers.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014).
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Outsourced Proofs of Retrievability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Towards Provably Secure Software Attestation.
IACR Cryptol. ePrint Arch., 2013

Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013

Protecting Public OSN Posts from Unintended Access.
CoRR, 2013

Towards Search on Encrypted Graph Data.
Proceedings of the Workshop on Society, 2013

A security framework for the analysis and design of software attestation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Third international workshop on trustworthy embedded devices (TrustED 2013).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Symmetric Cryptography (Dagstuhl Seminar 12031).
Dagstuhl Reports, 2012

Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
On Constructing Homomorphic Encryption Schemes from Coding Theory.
IACR Cryptol. ePrint Arch., 2011

A Formalization of the Security Features of Physical Functions.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

An efficient distributed privacy-preserving recommendation system.
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011

The Preimage Security of Double-Block-Length Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

Impossibility Results for RFID Privacy Notions.
Trans. Comput. Sci., 2010

Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited.
IACR Cryptol. ePrint Arch., 2010

A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP.
IACR Cryptol. ePrint Arch., 2010

Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design.
IACR Cryptol. ePrint Arch., 2010

On the Minimum Communication Effort for Secure Group Key Exchange.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Anonymous Authentication for RFID Systems.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

On RFID Privacy with Mutual Authentication and Tag Corruption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Using Merkle's Puzzle for key agreement with low-end devices.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.
Proceedings of the Advances in Cryptology, 2009

Algebraic Attacks on Stream Ciphers with Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
Toward dependable networking: secure location and privacy at the link layer.
IEEE Wirel. Commun., 2008

A New Approach for Algebraically Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2008

A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing.
Comput. Commun., 2008

A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

CPFP: An efficient key management scheme for large scale personal networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008

An efficient implementation of trusted channels based on openssl.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Who Said That? Privacy at Link Layer.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Algebraic attacks on certain stream ciphers.
PhD thesis, 2006

Experimental results on algebraic attacks on stream ciphers.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Algebraic Attacks and Annihilators.
Proceedings of the WEWoRC 2005, 2005

Fault Attacks on Combiners with Memory.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.
Proceedings of the Progress in Cryptology, 2005

Design Principles for Combiners with Memory.
Proceedings of the Progress in Cryptology, 2005

2004
Extending the Resynchronization Attack.
IACR Cryptol. ePrint Arch., 2004

On the Existence of low-degree Equations for Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2004

Improving Fast Algebraic Attacks.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Linearity of the AES Key Schedule.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Algebraic Attacks on Combiners with Memory.
Proceedings of the Advances in Cryptology, 2003

2002
A Linearization Attack on the Bluetooth Key Stream Generator.
IACR Cryptol. ePrint Arch., 2002


  Loading...