This page contains a complete list of my publications. It also contains PDF versions of the papers, as far as copyright conditions allow me to share them openly. Note that all papers provided here are full versions, which means that they may contain more information than the conference versions. 
2018
- 	
Avikarsha Mandal, Frederik Armknecht, Erik Zenner
 Privacy-preserving Distributed Economic Dispatch Protocol for Smart Grid
 in: Proc. Nordsec 2018, Springer LNCS 11252, 2018
- 	
Erik Zenner
 Autonomieeffekte von Kryptowährungen und Smart Contracts
 in: Thomas Breyer-Mayländer (ed.) - Das Streben nach Autonomie, Nomos-Verlag, 2018
2017
- 	
Avikarsha Mandal, Erik Zenner
 Privacy in Distributed Economic Dispatch in Smart Grid
 in: Euro S&P 2017, Abstract and Poster Presentation ( ) )
2015
- 	
Frederik Armknecht, Ghassan Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner
 Ripple: Overview and Outlook
 in: Proc. TRUST 2015, Springer LNCS 7904, 2015
2012
- 
Nasour Bagheri, Praveen Gauravaram, Lars R. Knudsen, Erik Zenner
 The Suffix-Free-Prefix-Free Hash Function Construction and its Indifferentiability Security Analysis
 in: International Journal of Information Security 11(6): 419-434 (2012)
- 
Naveed Ahmed, Christian D. Jensen, Erik Zenner
 Towards Symbolic Encryption Schemes
 in: Proc. ESORICS 2012, Springer LNCS 7459, 2012
2011
- 
Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner
 Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
    ( ) )
 in: Proc. FSE 2011, Springer LNCS 6733, 2011
- 
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner
 A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
    ( ) )
 in: Proc. Crypto 2011, Springer LNCS 6841, 2011
- 
Mohamed Ahmed Abdelraheem, Celine Blondeau, Maria Naya-Plasencia, Marion Videau, Erik Zenner
 Cryptanalysis of Armadillo2
 in: Proc. Asiacrypt 2011, Springer LNCS 7073, 2011
 Preliminary version on IACR eprint.
- 
Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner, Mathieu David
 Cryptanalysis of the Light-Weight Cipher A2U2
 in: Proc. Cryptography and Coding 2011, Springer LNCS 7089, 2011
 Preliminary version on IACR eprint.
2009
- 
Erik Zenner
 Nonce Generators and the Nonce Reset Problem
    ( ) )
 in: Proc. ISC 2009, Springer LNCS 5735, 2009
- 
Erik Zenner
 Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
    ( ) )
 in: Technical Report DTU Mathematics 2009-01, Technical University of Denmark, 2009
- 
Gregor Leander, Erik Zenner, Philip Hawkes
 Cache Timing Analysis of LFSR-based Stream Ciphers
    ( ) )
 in: Proc. Crypto & Coding 2009, Springer LNCS 5921, 2009
2008
- 
Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff
 Concrete Security for Entity Recognition: The Jane Doe Protocol
    ( ) )
 in: Proc. Indocrypt 2008, Springer LNCS 5365, 2008
- 
Erik Zenner
 A Cache Timing Analysis of HC-256
    ( ) )
 in: Proc. SAC 2008, Springer LNCS (to appear)
 Preliminary version in: 
  Workshop record SASC 2008
    ( ) )
- Martin Boesgaard, Mette Vesterager, Erik Zenner
 The Rabbit Stream Cipher
    ( ) )
 in: New Stream Cipher Designs, Springer LNCS 4986, 2008
2007
- Erik Zenner
 Why IV Setup for Stream Ciphers is Difficult
    ( ) )
 in: Proc. Dagstuhl Seminar "Symmetric Cryptography"
 January 2007
- Martin Boesgaard, Erik Zenner
 Protecting Online Transactions with Unique Embedded Key Generators
 in: Proc. ARES 2007, IEEE Press, 2007
2006
- Andre Weimerskirch, Dirk Westhoff, 
      Stefan Lucks, Erik Zenner
 Efficient Pairwise Authentication Protocols for
      Sensor and Ad Hoc Networks
 Book Chapter in: IEEE-Wiley Press: Sensor Network Operations, pp. 535-557, 
      Editors: Shashi Phoha, Thomas F. La Porta, Christopher Griffin, 
      May 2006.
- Erik Zenner
 Das eStream Projekt, 
      oder die Wiederentdeckung der Flusschiffre
 in: Datenschutz und Datensicherheit 
     (DuD) 06/2006
- Erik Zenner
 Stream Cipher Criteria
    ( ) )
 eStream paper no. 2006/032
2005
- 
Stefan Lucks, Erik Zenner, Andre Weimerskirch, Dirk Westhoff
 Entity Recognition for Sensor Network Motes
    ( ) )
 in: Proc. 2nd Workshop on Sensor Networks, September 2005, 
published in Springer LNI P-68
- 
Martin Boesgaard, Ove Scavenius, Thomas Pedersen, 
  Thomas Christensen, Erik Zenner
 Badger - A Fast and Provably Secure MAC
    ( ) )
 in: Proc. ACNS 2005, published in Springer LNCS 3531
- 
Erik Zenner, Martin Boesgaard
 How Secure is Secure? On Message and IV Lengths 
  for Synchronous Stream Ciphers
    ( ) )
 in: Proc. SKEW, May 2005
- 
Martin Boesgaard, Mette Vesterager, Thomas Christensen,
  Erik Zenner
 The Rabbit Stream Cipher
    ( ) )
 in: Proc. SKEW, May 2005
- 
Christopher Wolf, Erik Zenner:
 Zur Sicherheit von SHA-1 - Ein Überblick 
  über den Stand der Diskussion
 in: Datenschutz und Datensicherheit 
  (DuD) 05/2005
2004
- 
Martin Boesgaard, Thomas Pedersen, 
  Mette Vesterager, Erik Zenner
 The Rabbit Stream Cipher - 
  Design and Security Analysis
    ( ) )
 in: Proc. SASC workshop, 2004
- 
Erik Zenner
 On Cryptographic Properties of LFSR-based 
  Pseudorandom Generators
    ( ) )
 PhD thesis, May 2004
- 
Erik Zenner
 Cryptanalysis of LFSR-based Pseudorandom Generators - 
  a Survey
    ( ) )
 in: Technical Report Informatik 04-004, University of Mannheim
- 
Erik Zenner
 On the Role of the Inner State Size in 
  Stream Ciphers
    ( ) )
 in: Proc. WOSIS 2004, published by INSTICC Press, 2004
 Full version in: 
  Technical Report Informatik 04-001, University of Mannheim
    ( ) )
1999-2003
- 
Stefan Lucks, Erik Zenner:
 Kryptographie - Eine Geheimwissenschaft wird 
  öffentlich
 in: ForUM 2003 (Forschung Universität Mannheim)
- 
Erik Zenner
 On the Efficiency of the Clock Control Guessing 
  Attack
    ( ) )
 in: Proc. ICISC 2002, published in Springer LNCS 2587
- 
Erik Zenner, Matthias Krause, Stefan Lucks:
 Improved Cryptanalysis of the Self-Shrinking 
  Generator
    ( ) )
 in: Proc. ACISP 2001, published in Springer LNCS 2119
- 
Erik Zenner, Rüdiger Weis, Stefan Lucks:
 Sicherheit des GSM-Verschlüsselungsstandards 
  A5
    ( ) )
 in: Datenschutz und Datensicherheit  (DuD) 7/2000
- 
Erik Zenner
 Kryptographische Protokolle im GSM-Standard:
  Beschreibung und Kryptanalyse
    ( ) )
 Diploma thesis, 1999