Frederik Armknecht

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved algorithm to find equations for algebraic attacks for combiners with memory2024-09-18Paper
(Finite) field work: choosing the best encoding of numbers for FHE computation
Cryptology and Network Security
2023-08-02Paper
Unsupervised Machine Learning on encrypted data2019-02-20Paper
Accelerating homomorphic computations on rational numbers
Applied Cryptography and Network Security
2016-10-04Paper
Towards a Unified Security Model for Physically Unclonable Functions
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
On lightweight stream ciphers with shorter internal states
Fast Software Encryption
2015-09-18Paper
On increasing the throughput of stream ciphers
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
General impossibility of group homomorphic encryption in the quantum world
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Group homomorphic encryption: characterizations, impossibility results, and applications
Designs, Codes and Cryptography
2013-04-03Paper
Shift-type homomorphic encryption and its application to fully homomorphic encryption
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On constructing homomorphic encryption schemes from coding theory
Cryptography and Coding
2011-12-16Paper
The preimage security of double-block-length compression functions
Lecture Notes in Computer Science
2011-12-02Paper
Using the inhomogeneous simultaneous approximation problem for cryptographic design
Lecture Notes in Computer Science
2011-06-29Paper
On the Minimum Communication Effort for Secure Group Key Exchange
Selected Areas in Cryptography
2011-03-15Paper
Algebraic attacks on stream ciphers with Gröbner bases
Gröbner Bases, Coding, and Cryptography
2009-12-16Paper
Memory leakage-resilient encryption based on physically unclonable functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort
Lecture Notes in Computer Science
2008-11-20Paper
Design Principles for Combiners with Memory
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Fault Attacks on Combiners with Memory
Selected Areas in Cryptography
2007-11-15Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity
Automata, Languages and Programming
2007-09-11Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper


Research outcomes over time


This page was built for person: Frederik Armknecht