Patrick Felke

Orcid: 0000-0001-6644-2010

According to our database1, Patrick Felke authored at least 27 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Observations on TETRA Encryption Algorithm TEA-3.
IACR Trans. Symmetric Cryptol., 2025

Not Easy to Prepare a Pesto: Cryptanalysis of a Multivariate Public-Key Scheme from CCZ Equivalence.
IACR Cryptol. ePrint Arch., 2025

On matrix algebras isomorphic to finite fields and planar Dembowski-Ostrom monomials.
Finite Fields Their Appl., 2025

An Architecture of a NOA-Based Secure Internet of Things Edge Gateway.
Proceedings of the 8th IEEE International Conference on Industrial Cyber-Physical Systems, 2025

2024
Analysis of Multivariate Encryption Schemes: Application to Dob and C<sup>*</sup>.
J. Cryptol., September, 2024

Analysis of Multivariate Encryption Schemes: Application to Dob and C.
IACR Cryptol. ePrint Arch., 2024

Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2024

Cryptanalysis of TETRA Encryption Algorithms - Episode 1: TEA-3.
IACR Cryptol. ePrint Arch., 2024

2023
Commutative Cryptanalysis Made Practical.
IACR Trans. Symmetric Cryptol., 2023

On Perfect Linear Approximations and Differentials over Two-Round SPNs.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Decomposing Linear Layers.
IACR Cryptol. ePrint Arch., 2022

S0-No-More: A Z-Wave NonceGet Denial of Service Attack utilizing included but offline NodeIDs.
CoRR, 2022

Classification of Planar Monomials Over Finite Fields of Small Order.
CoRR, 2022

Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
To Shift or Not to Shift: Understanding GEA-1.
IACR Cryptol. ePrint Arch., 2021

Analysis of Multivariate Encryption Schemes: Application to Dob.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2020
C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity.
IEEE Trans. Inf. Theory, 2020

Crushing the Wave - new Z-Wave vulnerabilities exposed.
CoRR, 2020

The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic.
Cryptogr. Commun., 2020

Cryptanalysis of the Multivariate Encryption Scheme EFLASH.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
On the security of biquadratic C ∗ public-key cryptosystems and its generalizations.
Cryptogr. Commun., 2019

2006
Niho type cross-correlation functions via dickson polynomials and Kloosterman sums.
IEEE Trans. Inf. Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory A, 2006

An infinite class of quadratic APN functions which are not equivalent to power mappings.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.
Proceedings of the Coding and Cryptography, International Workshop, 2005

2004
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

2003
On the Security of HFE, HFEv- and Quartz.
Proceedings of the Public Key Cryptography, 2003


  Loading...