| 2008 |
| 9 | EE | Stefan Lucks,
Erik Zenner,
André Weimerskirch,
Dirk Westhoff:
Concrete Security for Entity Recognition: The Jane Doe Protocol.
INDOCRYPT 2008: 158-171 |
| 2007 |
| 8 | EE | Martin Boesgaard,
Erik Zenner:
Protecting Online Transactions with Unique Embedded Key Generators.
ARES 2007: 663-669 |
| 7 | EE | Erik Zenner:
Why IV Setup for Stream Ciphers is Difficult.
Symmetric Cryptography 2007 |
| 2005 |
| 6 | EE | Martin Boesgaard,
Thomas Christensen,
Erik Zenner:
Badger - A Fast and Provably Secure MAC.
ACNS 2005: 176-191 |
| 5 | | Stefan Lucks,
Erik Zenner,
André Weimerskirch,
Dirk Westhoff:
Entity Recognition for Sensor Network Motes.
GI Jahrestagung (2) 2005: 145-149 |
| 2004 |
| 4 | | Erik Zenner:
On the Role of the Inner State Size in Stream Ciphers.
WOSIS 2004: 237-250 |
| 2002 |
| 3 | EE | Erik Zenner:
On the Efficiency of theClock Control Guessing Attack.
ICISC 2002: 200-212 |
| 2001 |
| 2 | EE | Erik Zenner,
Matthias Krause,
Stefan Lucks:
Improved Cryptanalysis of the Self-Shrinking Generator.
ACISP 2001: 21-35 |
| 2000 |
| 1 | | Erik Zenner,
Rüdiger Weis,
Stefan Lucks:
Sicherheit des GSM- Verschlüsselungsstandards A5.
Datenschutz und Datensicherheit 24(7): (2000) |