Patrick Felke
Patrick Felke
Professor IT-Security, University of Applied Sciences Emden/Leer
Adresse e-mail validée de
Citée par
Citée par
A collision-attack on AES: Combining side channel-and differential-attack
K Schramm, G Leander, P Felke, C Paar
Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International …, 2004
Construction of bent functions via Niho power functions
H Dobbertin, G Leander, A Canteaut, C Carlet, P Felke, P Gaborit
Journal of Combinatorial Theory, Series A 113 (5), 779-798, 2006
Niho type cross-correlation functions via Dickson polynomials and Kloosterman sums
H Dobbertin, P Felke, T Helleseth, P Rosendahl
IEEE Transactions on Information Theory 52 (2), 613-627, 2006
On the security of HFE, HFEv-and Quartz
NT Courtois, M Daum, P Felke
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity
P Ellingsen, P Felke, C Riera, P Stănică, A Tkachenko
IEEE Transactions on Information Theory 66 (9), 5781-5789, 2020
An infinite class of quadratic APN functions which are not equivalent to power mappings
L Budaghyan, C Carlet, P Felke, G Leander
2006 IEEE International Symposium on Information Theory, 2637-2641, 2006
On the affine transformations of HFE-cryptosystems and systems with branches
P Felke
International Workshop on Coding and Cryptography, 229-241, 2005
On the Security of HFE, HFEvand Quartz, PKC 2003, LNCS 2567
N Courtois, M Daum, P Felke
Springer, 0
Cryptanalysis of the multivariate encryption scheme EFLASH
M Øygarden, P Felke, H Raddum, C Cid
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
Crushing the Wave--new Z-Wave vulnerabilities exposed
N Boucif, F Golchert, A Siemer, P Felke, F Gosewehr
arXiv preprint arXiv:2001.08497, 2020
G. Leander An infinite class of quadratic APN functions which are not equivalent to power mappings
L Budaghyan, C Carlet, P Felke
Cryptology ePrint Archive, 0
Computing the uniformity of power mappings: a systematic approach with the multi-variate method over finite fields of odd characteristic
P Felke
Bochum, Univ., Diss., 2005, 2005
On the security of biquadratic C public-key cryptosystems and its generalizations
P Felke
Cryptography and Communications 11, 427-442, 2019
Constructing and deconstructing intentional weaknesses in symmetric ciphers
C Beierle, T Beyne, P Felke, G Leander
Annual International Cryptology Conference, 748-778, 2022
Decomposing Linear Layers
C Beierle, P Felke, G Leander, S Rønjom
Analysis of Multivariate Encryption Schemes: Application to Dob
M Øygarden, P Felke, H Raddum
IACR International Conference on Public-Key Cryptography, 155-183, 2021
To Shift or Not to Shift: Understanding GEA-1.
C Beierle, P Felke, G Leander
IACR Cryptol. ePrint Arch. 2021, 829, 2021
Classification of Planar Monomials Over Finite Fields of Small Order
C Beierle, P Felke
arXiv preprint arXiv:2202.11032, 2022
The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic
P Felke
Cryptography and Communications 12, 841-857, 2020
Commutative Cryptanalysis Made Practical
J Baudrin, P Felke, G Leander, P Neumann, L Perrin, L Stennes
IACR Transactions on Symmetric Cryptology, 2023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20