A collision-attack on AES: Combining side channel-and differential-attack K Schramm, G Leander, P Felke, C Paar Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004 | 233 | 2004 |
Construction of bent functions via Niho power functions H Dobbertin, G Leander, A Canteaut, C Carlet, P Felke, P Gaborit Journal of Combinatorial Theory, Series A 113 (5), 779-798, 2006 | 174 | 2006 |
Niho type cross-correlation functions via Dickson polynomials and Kloosterman sums H Dobbertin, P Felke, T Helleseth, P Rosendahl IEEE Transactions on Information Theory 52 (2), 613-627, 2006 | 127 | 2006 |
On the security of HFE, HFEv-and Quartz NT Courtois, M Daum, P Felke Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 99 | 2002 |
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity P Ellingsen, P Felke, C Riera, P Stănică, A Tkachenko IEEE Transactions on Information Theory 66 (9), 5781-5789, 2020 | 61 | 2020 |
An infinite class of quadratic APN functions which are not equivalent to power mappings L Budaghyan, C Carlet, P Felke, G Leander 2006 IEEE International Symposium on Information Theory, 2637-2641, 2006 | 60 | 2006 |
On the affine transformations of HFE-cryptosystems and systems with branches P Felke International Workshop on Coding and Cryptography, 229-241, 2005 | 21 | 2005 |
On the Security of HFE, HFEvand Quartz, PKC 2003, LNCS 2567 N Courtois, M Daum, P Felke Springer, 0 | 18 | |
Cryptanalysis of the multivariate encryption scheme EFLASH M Øygarden, P Felke, H Raddum, C Cid Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 10 | 2020 |
Crushing the Wave--new Z-Wave vulnerabilities exposed N Boucif, F Golchert, A Siemer, P Felke, F Gosewehr arXiv preprint arXiv:2001.08497, 2020 | 9 | 2020 |
G. Leander An infinite class of quadratic APN functions which are not equivalent to power mappings L Budaghyan, C Carlet, P Felke Cryptology ePrint Archive, 0 | 8 | |
Computing the uniformity of power mappings: a systematic approach with the multi-variate method over finite fields of odd characteristic P Felke Bochum, Univ., Diss., 2005, 2005 | 6 | 2005 |
On the security of biquadratic C∗ public-key cryptosystems and its generalizations P Felke Cryptography and Communications 11, 427-442, 2019 | 4 | 2019 |
Constructing and deconstructing intentional weaknesses in symmetric ciphers C Beierle, T Beyne, P Felke, G Leander Annual International Cryptology Conference, 748-778, 2022 | 2 | 2022 |
Decomposing Linear Layers C Beierle, P Felke, G Leander, S Rønjom | 2 | 2022 |
Analysis of Multivariate Encryption Schemes: Application to Dob M Øygarden, P Felke, H Raddum IACR International Conference on Public-Key Cryptography, 155-183, 2021 | 2 | 2021 |
To Shift or Not to Shift: Understanding GEA-1. C Beierle, P Felke, G Leander IACR Cryptol. ePrint Arch. 2021, 829, 2021 | 2 | 2021 |
Classification of Planar Monomials Over Finite Fields of Small Order C Beierle, P Felke arXiv preprint arXiv:2202.11032, 2022 | 1 | 2022 |
The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic P Felke Cryptography and Communications 12, 841-857, 2020 | 1 | 2020 |
Commutative Cryptanalysis Made Practical J Baudrin, P Felke, G Leander, P Neumann, L Perrin, L Stennes IACR Transactions on Symmetric Cryptology, 2023 | | 2023 |