Frederik Armknecht
Orcid: 0009-0003-9935-8095Affiliations:
- University of Mannheim, Germany
According to our database1,
Frederik Armknecht
authored at least 107 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
0 Sterne für die Sicherheit: Wie Kundenbewertungen die Bitcoin-Adressen von Darknet-Händlern verraten.
Proceedings of the Sicherheit, 2024
Proceedings of the Sicherheit, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
2022
If You Like Me, Please Don't "Like" Me: Inferring Vendor Bitcoin Addresses From Positive Reviews.
Proc. Priv. Enhancing Technol., 2022
Report: State of the Art Solutions for Privacy Preserving Machine Learning in the Medical Context.
CoRR, 2022
Salting as a Countermeasure against Attacks on Privacy Preserving Record Linkage Techniques.
Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies, 2022
2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the 28. Krypto-Tag, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IACR Trans. Symmetric Cryptol., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Sicherheit 2014: Sicherheit, 2014
Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Group homomorphic encryption: characterizations, impossibility results, and applications.
Des. Codes Cryptogr., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Computer Security, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
2008
IEEE Wirel. Commun., 2008
IACR Cryptol. ePrint Arch., 2008
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing.
Comput. Commun., 2008
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
2007
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
Proceedings of the Advances in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002