Patrick Felke

Orcid: 0000-0001-6644-2010

According to our database1, Patrick Felke authored at least 22 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Analysis of Multivariate Encryption Schemes: Application to Dob and C<sup>*</sup>.
J. Cryptol., September, 2024

Analysis of Multivariate Encryption Schemes: Application to Dob and C.
IACR Cryptol. ePrint Arch., 2024

Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2024

2023
Commutative Cryptanalysis Made Practical.
IACR Trans. Symmetric Cryptol., 2023

On Perfect Linear Approximations and Differentials over Two-Round SPNs.
IACR Cryptol. ePrint Arch., 2023

2022
Decomposing Linear Layers.
IACR Trans. Symmetric Cryptol., 2022

S0-No-More: A Z-Wave NonceGet Denial of Service Attack utilizing included but offline NodeIDs.
CoRR, 2022

Classification of Planar Monomials Over Finite Fields of Small Order.
CoRR, 2022

Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
To Shift or Not to Shift: Understanding GEA-1.
IACR Cryptol. ePrint Arch., 2021

2020
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity.
IEEE Trans. Inf. Theory, 2020

Analysis of Multivariate Encryption Schemes: Application to Dob.
IACR Cryptol. ePrint Arch., 2020

Crushing the Wave - new Z-Wave vulnerabilities exposed.
CoRR, 2020

The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic.
Cryptogr. Commun., 2020

2019
Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
IACR Cryptol. ePrint Arch., 2019

On the security of biquadratic C ∗ public-key cryptosystems and its generalizations.
Cryptogr. Commun., 2019

2006
Niho type cross-correlation functions via dickson polynomials and Kloosterman sums.
IEEE Trans. Inf. Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory A, 2006

2005
An infinite class of quadratic APN functions which are not equivalent to power mappings.
IACR Cryptol. ePrint Arch., 2005

2004
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.
IACR Cryptol. ePrint Arch., 2004

A Collision-Attack on AES: Combining Side Channel- and Differential-Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2002
On the Security of HFE, HFEv- and Quartz.
IACR Cryptol. ePrint Arch., 2002


  Loading...