Παρακολούθηση
Patrick Felke
Patrick Felke
Professor IT-Security, University of Applied Sciences Emden/Leer
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα hs-emden-leer.de
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
A collision-attack on AES: Combining side channel-and differential-attack
K Schramm, G Leander, P Felke, C Paar
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
2382004
Construction of bent functions via Niho power functions
H Dobbertin, G Leander, A Canteaut, C Carlet, P Felke, P Gaborit
Journal of Combinatorial Theory, Series A 113 (5), 779-798, 2006
1752006
Niho type cross-correlation functions via Dickson polynomials and Kloosterman sums
H Dobbertin, P Felke, T Helleseth, P Rosendahl
IEEE Transactions on Information Theory 52 (2), 613-627, 2006
1292006
On the security of HFE, HFEv-and Quartz
NT Courtois, M Daum, P Felke
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
972002
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity
P Ellingsen, P Felke, C Riera, P Stănică, A Tkachenko
IEEE Transactions on Information Theory 66 (9), 5781-5789, 2020
702020
An infinite class of quadratic APN functions which are not equivalent to power mappings
L Budaghyan, C Carlet, P Felke, G Leander
2006 IEEE International Symposium on Information Theory, 2637-2641, 2006
622006
On the affine transformations of HFE-cryptosystems and systems with branches
P Felke
International Workshop on Coding and Cryptography, 229-241, 2005
202005
On the Security of HFE, HFEvand Quartz, PKC 2003, LNCS 2567
N Courtois, M Daum, P Felke
Springer, 0
18
Crushing the Wave--new Z-Wave vulnerabilities exposed
N Boucif, F Golchert, A Siemer, P Felke, F Gosewehr
arXiv preprint arXiv:2001.08497, 2020
122020
Cryptanalysis of the multivariate encryption scheme EFLASH
M Øygarden, P Felke, H Raddum, C Cid
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
102020
G. Leander An infinite class of quadratic APN functions which are not equivalent to power mappings
L Budaghyan, C Carlet, P Felke
Cryptology ePrint Archive, 0
9
Computing the uniformity of power mappings: a systematic approach with the multi-variate method over finite fields of odd characteristic
P Felke
Bochum, Univ., Diss., 2005, 2005
72005
Constructing and deconstructing intentional weaknesses in symmetric ciphers
C Beierle, T Beyne, P Felke, G Leander
Annual International Cryptology Conference, 748-778, 2022
52022
On the security of biquadratic C public-key cryptosystems and its generalizations
P Felke
Cryptography and Communications 11, 427-442, 2019
42019
S0-no-more: A Z-wave nonceget denial of service attack utilizing included but offline nodeids
D Cheng, P Felke, F Gosewehr, Y Peng
arXiv preprint arXiv:2205.00781, 2022
22022
Decomposing linear layers
C Beierle, P Felke, G Leander, S Rønjom
22022
Analysis of Multivariate Encryption Schemes: Application to Dob
M Øygarden, P Felke, H Raddum
IACR International Conference on Public-Key Cryptography, 155-183, 2021
22021
To Shift or Not to Shift: Understanding GEA-1.
C Beierle, P Felke, G Leander
IACR Cryptol. ePrint Arch. 2021, 829, 2021
22021
Classification of Planar Monomials Over Finite Fields of Small Order
C Beierle, P Felke
arXiv preprint arXiv:2202.11032, 2022
12022
The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic
P Felke
Cryptography and Communications 12, 841-857, 2020
12020
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20