This page contains a complete list of my publications. It also contains PDF versions of the papers, as far as copyright conditions allow me to share them openly. Note that all papers provided here are full versions, which means that they may contain more information than the conference versions.
2018
-
Avikarsha Mandal, Frederik Armknecht, Erik Zenner
Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid
in: Proc. Nordsec 2018, Springer LNCS 11252, 2018
-
Erik Zenner
Autonomieeffekte von Kryptowährungen und Smart Contracts
in: Thomas Breyer-Mayländer (ed.) - Das Streben nach Autonomie, Nomos-Verlag, 2018
2017
-
Avikarsha Mandal, Erik Zenner
Privacy in Distributed Economic Dispatch in Smart Grid
in: Euro S&P 2017, Abstract and Poster Presentation ()
2015
-
Frederik Armknecht, Ghassan Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner
Ripple: Overview and Outlook
in: Proc. TRUST 2015, Springer LNCS 7904, 2015
2012
-
Nasour Bagheri, Praveen Gauravaram, Lars R. Knudsen, Erik Zenner
The Suffix-Free-Prefix-Free Hash Function Construction and its Indifferentiability Security Analysis
in: International Journal of Information Security 11(6): 419-434 (2012)
-
Naveed Ahmed, Christian D. Jensen, Erik Zenner
Towards Symbolic Encryption Schemes
in: Proc. ESORICS 2012, Springer LNCS 7459, 2012
2011
-
Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
()
in: Proc. FSE 2011, Springer LNCS 6733, 2011
-
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
()
in: Proc. Crypto 2011, Springer LNCS 6841, 2011
-
Mohamed Ahmed Abdelraheem, Celine Blondeau, Maria Naya-Plasencia, Marion Videau, Erik Zenner
Cryptanalysis of Armadillo2
in: Proc. Asiacrypt 2011, Springer LNCS 7073, 2011
Preliminary version on IACR eprint.
-
Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner, Mathieu David
Cryptanalysis of the Light-Weight Cipher A2U2
in: Proc. Cryptography and Coding 2011, Springer LNCS 7089, 2011
Preliminary version on IACR eprint.
2009
-
Erik Zenner
Nonce Generators and the Nonce Reset Problem
()
in: Proc. ISC 2009, Springer LNCS 5735, 2009
-
Erik Zenner
Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
()
in: Technical Report DTU Mathematics 2009-01, Technical University of Denmark, 2009
-
Gregor Leander, Erik Zenner, Philip Hawkes
Cache Timing Analysis of LFSR-based Stream Ciphers
()
in: Proc. Crypto & Coding 2009, Springer LNCS 5921, 2009
2008
-
Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff
Concrete Security for Entity Recognition: The Jane Doe Protocol
()
in: Proc. Indocrypt 2008, Springer LNCS 5365, 2008
-
Erik Zenner
A Cache Timing Analysis of HC-256
()
in: Proc. SAC 2008, Springer LNCS (to appear)
Preliminary version in:
Workshop record SASC 2008
()
- Martin Boesgaard, Mette Vesterager, Erik Zenner
The Rabbit Stream Cipher
()
in: New Stream Cipher Designs, Springer LNCS 4986, 2008
2007
- Erik Zenner
Why IV Setup for Stream Ciphers is Difficult
()
in: Proc. Dagstuhl Seminar "Symmetric Cryptography"
January 2007
- Martin Boesgaard, Erik Zenner
Protecting Online Transactions with Unique Embedded Key Generators
in: Proc. ARES 2007, IEEE Press, 2007
2006
- Andre Weimerskirch, Dirk Westhoff,
Stefan Lucks, Erik Zenner
Efficient Pairwise Authentication Protocols for
Sensor and Ad Hoc Networks
Book Chapter in: IEEE-Wiley Press: Sensor Network Operations, pp. 535-557,
Editors: Shashi Phoha, Thomas F. La Porta, Christopher Griffin,
May 2006.
- Erik Zenner
Das eStream Projekt,
oder die Wiederentdeckung der Flusschiffre
in: Datenschutz und Datensicherheit
(DuD) 06/2006
- Erik Zenner
Stream Cipher Criteria
()
eStream paper no. 2006/032
2005
-
Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
Entity Recognition for Sensor Network Motes
()
in: Proc. 2nd Workshop on Sensor Networks, September 2005,
published in Springer LNI P-68
-
Martin Boesgaard, Ove Scavenius, Thomas Pedersen,
Thomas Christensen, Erik Zenner
Badger - A Fast and Provably Secure MAC
()
in: Proc. ACNS 2005, published in Springer LNCS 3531
-
Erik Zenner, Martin Boesgaard
How Secure is Secure? On Message and IV Lengths
for Synchronous Stream Ciphers
()
in: Proc. SKEW, May 2005
-
Martin Boesgaard, Mette Vesterager, Thomas Christensen,
Erik Zenner
The Rabbit Stream Cipher
()
in: Proc. SKEW, May 2005
-
Christopher Wolf, Erik Zenner:
Zur Sicherheit von SHA-1 - Ein Überblick
über den Stand der Diskussion
in: Datenschutz und Datensicherheit
(DuD) 05/2005
2004
-
Martin Boesgaard, Thomas Pedersen,
Mette Vesterager, Erik Zenner
The Rabbit Stream Cipher -
Design and Security Analysis
()
in: Proc. SASC workshop, 2004
-
Erik Zenner
On Cryptographic Properties of LFSR-based
Pseudorandom Generators
()
PhD thesis, May 2004
-
Erik Zenner
Cryptanalysis of LFSR-based Pseudorandom Generators -
a Survey
()
in: Technical Report Informatik 04-004, University of Mannheim
-
Erik Zenner
On the Role of the Inner State Size in
Stream Ciphers
()
in: Proc. WOSIS 2004, published by INSTICC Press, 2004
Full version in:
Technical Report Informatik 04-001, University of Mannheim
()
1999-2003
-
Stefan Lucks, Erik Zenner:
Kryptographie - Eine Geheimwissenschaft wird
öffentlich
in: ForUM 2003 (Forschung Universität Mannheim)
-
Erik Zenner
On the Efficiency of the Clock Control Guessing
Attack
()
in: Proc. ICISC 2002, published in Springer LNCS 2587
-
Erik Zenner, Matthias Krause, Stefan Lucks:
Improved Cryptanalysis of the Self-Shrinking
Generator
()
in: Proc. ACISP 2001, published in Springer LNCS 2119
-
Erik Zenner, Rüdiger Weis, Stefan Lucks:
Sicherheit des GSM-Verschlüsselungsstandards
A5
()
in: Datenschutz und Datensicherheit (DuD) 7/2000
-
Erik Zenner
Kryptographische Protokolle im GSM-Standard:
Beschreibung und Kryptanalyse
()
Diploma thesis, 1999