Falko Strenzke

Orcid: 0009-0006-6574-2904

According to our database1, Falko Strenzke authored at least 19 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Legacy Encryption Downgrade Attacks against LibrePGP and CMS.
IACR Cryptol. ePrint Arch., 2024

2023
ForgedAttributes: An Existential Forgery Vulnerability of CMS and PKCS#7 Signatures.
IACR Cryptol. ePrint Arch., 2023

2016
An Analysis of OpenSSL's Random Number Generator.
IACR Cryptol. ePrint Arch., 2016

2013
Efficiency and implementation security of code-based cryptosystems.
PhD thesis, 2013

Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

2012
Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties.
J. Cryptogr. Eng., 2011

A simple power analysis attack on a McEliece cryptoprocessor.
J. Cryptogr. Eng., 2011

Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2011

Fast and Secure Root-Finding for Code-based Cryptosystems.
IACR Cryptol. ePrint Arch., 2011

An efficient mobile PACE implementation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices.
IACR Cryptol. ePrint Arch., 2010

A Smart Card Implementation of the McEliece PKC.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

A Timing Attack against the Secret Permutation in the McEliece PKC.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

Manger's Attack Revisited.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
A Timing Attack against Patterson Algorithm in the McEliece PKC.
Proceedings of the Information, Security and Cryptology, 2009

A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009

2008
Side Channels in the McEliece PKC.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008


  Loading...