A collision-attack on AES: Combining side channel-and differential-attack K Schramm, G Leander, P Felke, C Paar
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
249 2004 Construction of bent functions via Niho power functions H Dobbertin, G Leander, A Canteaut, C Carlet, P Felke, P Gaborit
Journal of Combinatorial Theory, Series A 113 (5), 779-798, 2006
173 2006 Niho type cross-correlation functions via Dickson polynomials and Kloosterman sums H Dobbertin, P Felke, T Helleseth, P Rosendahl
IEEE Transactions on Information Theory 52 (2), 613-627, 2006
130 2006 On the security of HFE, HFEv-and Quartz NT Courtois, M Daum, P Felke
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
98 2002 C -Differentials, Multiplicative Uniformity, and (Almost) Perfect c -NonlinearityP Ellingsen, P Felke, C Riera, P Stănică, A Tkachenko
IEEE Transactions on Information Theory 66 (9), 5781-5789, 2020
76 2020 An infinite class of quadratic APN functions which are not equivalent to power mappings L Budaghyan, C Carlet, P Felke, G Leander
2006 IEEE International Symposium on Information Theory, 2637-2641, 2006
63 2006 On the affine transformations of HFE-cryptosystems and systems with branches P Felke
International Workshop on Coding and Cryptography, 229-241, 2005
19 2005 On the Security of HFE, HFEvand Quartz, PKC 2003, LNCS 2567 N Courtois, M Daum, P Felke
Springer, 0
18 Crushing the Wave--new Z-Wave vulnerabilities exposed N Boucif, F Golchert, A Siemer, P Felke, F Gosewehr
arXiv preprint arXiv:2001.08497, 2020
13 2020 Cryptanalysis of the multivariate encryption scheme EFLASH M Øygarden, P Felke, H Raddum, C Cid
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
10 2020 G. Leander An infinite class of quadratic APN functions which are not equivalent to power mappings L Budaghyan, C Carlet, P Felke
Cryptology ePrint Archive, 0
9 Computing the uniformity of power mappings: a systematic approach with the multi-variate method over finite fields of odd characteristic P Felke
Bochum, Univ., Diss., 2005, 2005
7 2005 Constructing and deconstructing intentional weaknesses in symmetric ciphers C Beierle, T Beyne, P Felke, G Leander
Annual International Cryptology Conference, 748-778, 2022
4 2022 Decomposing linear layers C Beierle, P Felke, G Leander, S Rønjom
4 2022 On the security of biquadratic C ∗ public-key cryptosystems and its generalizations P Felke
Cryptography and Communications 11, 427-442, 2019
4 2019 S0-no-more: A Z-wave nonceget denial of service attack utilizing included but offline nodeids D Cheng, P Felke, F Gosewehr, Y Peng
arXiv preprint arXiv:2205.00781, 2022
3 2022 Analysis of Multivariate Encryption Schemes: Application to Dob and M Øygarden, P Felke, H Raddum
Journal of Cryptology 37 (3), 20, 2024
2 2024 To Shift or Not to Shift: Understanding GEA-1. C Beierle, P Felke, G Leander
IACR Cryptol. ePrint Arch. 2021, 829, 2021
2 2021 Classification of Planar Monomials Over Finite Fields of Small Order C Beierle, P Felke
arXiv preprint arXiv:2202.11032, 2022
1 2022 The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic P Felke
Cryptography and Communications 12, 841-857, 2020
1 2020