Seguir
Patrick Felke
Patrick Felke
Professor IT-Security, University of Applied Sciences Emden/Leer
Email confirmado em hs-emden-leer.de
Título
Citado por
Citado por
Ano
A collision-attack on AES: Combining side channel-and differential-attack
K Schramm, G Leander, P Felke, C Paar
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
2492004
Construction of bent functions via Niho power functions
H Dobbertin, G Leander, A Canteaut, C Carlet, P Felke, P Gaborit
Journal of Combinatorial Theory, Series A 113 (5), 779-798, 2006
1732006
Niho type cross-correlation functions via Dickson polynomials and Kloosterman sums
H Dobbertin, P Felke, T Helleseth, P Rosendahl
IEEE Transactions on Information Theory 52 (2), 613-627, 2006
1302006
On the security of HFE, HFEv-and Quartz
NT Courtois, M Daum, P Felke
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
982002
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity
P Ellingsen, P Felke, C Riera, P Stănică, A Tkachenko
IEEE Transactions on Information Theory 66 (9), 5781-5789, 2020
762020
An infinite class of quadratic APN functions which are not equivalent to power mappings
L Budaghyan, C Carlet, P Felke, G Leander
2006 IEEE International Symposium on Information Theory, 2637-2641, 2006
632006
On the affine transformations of HFE-cryptosystems and systems with branches
P Felke
International Workshop on Coding and Cryptography, 229-241, 2005
192005
On the Security of HFE, HFEvand Quartz, PKC 2003, LNCS 2567
N Courtois, M Daum, P Felke
Springer, 0
18
Crushing the Wave--new Z-Wave vulnerabilities exposed
N Boucif, F Golchert, A Siemer, P Felke, F Gosewehr
arXiv preprint arXiv:2001.08497, 2020
132020
Cryptanalysis of the multivariate encryption scheme EFLASH
M Øygarden, P Felke, H Raddum, C Cid
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
102020
G. Leander An infinite class of quadratic APN functions which are not equivalent to power mappings
L Budaghyan, C Carlet, P Felke
Cryptology ePrint Archive, 0
9
Computing the uniformity of power mappings: a systematic approach with the multi-variate method over finite fields of odd characteristic
P Felke
Bochum, Univ., Diss., 2005, 2005
72005
Constructing and deconstructing intentional weaknesses in symmetric ciphers
C Beierle, T Beyne, P Felke, G Leander
Annual International Cryptology Conference, 748-778, 2022
42022
Decomposing linear layers
C Beierle, P Felke, G Leander, S Rønjom
42022
On the security of biquadratic C public-key cryptosystems and its generalizations
P Felke
Cryptography and Communications 11, 427-442, 2019
42019
S0-no-more: A Z-wave nonceget denial of service attack utilizing included but offline nodeids
D Cheng, P Felke, F Gosewehr, Y Peng
arXiv preprint arXiv:2205.00781, 2022
32022
Analysis of Multivariate Encryption Schemes: Application to Dob and
M Øygarden, P Felke, H Raddum
Journal of Cryptology 37 (3), 20, 2024
22024
To Shift or Not to Shift: Understanding GEA-1.
C Beierle, P Felke, G Leander
IACR Cryptol. ePrint Arch. 2021, 829, 2021
22021
Classification of Planar Monomials Over Finite Fields of Small Order
C Beierle, P Felke
arXiv preprint arXiv:2202.11032, 2022
12022
The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic
P Felke
Cryptography and Communications 12, 841-857, 2020
12020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20