TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 11.

Strenzke, Falko (2016):
An Analysis of OpenSSL's Random Number Generator.
In: Advances in Cryptology – EUROCRYPT 2016. 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Vienna, Austria, In: Lecture Notes in Computer Science 9665, ISBN 978-3-662-49889-7,
DOI: 10.1007/978-3-662-49890-3 25,
[Conference or Workshop Item]

Strenzke, Falko (2013):
Efficiency and Implementation Security of Code-based Cryptosystems.
Darmstadt, TU Darmstadt, [Online-Edition: http://tuprints.ulb.tu-darmstadt.de/3690],
[Ph.D. Thesis]

Strenzke, Falko (2013):
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, In: LNCS, [Conference or Workshop Item]

Wiesmaier, Alexander and Horsch, Moritz and Braun, Johannes and Kiefer, Franziskus and Hühnlein, Detlef and Strenzke, Falko and Buchmann, Johannes
Cheung, Bruce and Hui, Lucas Chi Kwong and Sandhu, Ravi and Wong, Duncan (eds.) (2011):
An efficient mobile PACE implementation.
In: ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, ACM, Hong Kong, In: ACM Symposium on Information, Computer and Communications Security, DOI: 10.1145/1966913.1966936,
[Conference or Workshop Item]

Molter, Gregor and Stoettinger, Marc and Shoufan, Abdulhadi and Strenzke, Falko (2011):
A Simple Power Analysis Attack on a McEliece Cryptoprocessor.
In: Journal of Cryptographic Engineering, [Article]

Cayrel, Pierre-Louis and Strenzke, Falko (2010):
Side channels attacks in code-based cryptography.
In: First International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2010), [Conference or Workshop Item]

Strenzke, Falko (2010):
Manger's Attack revisited.
In: Twelfth International Conference on Information and Communications Security, Springer, [Conference or Workshop Item]

Buchmann, Johannes and Braun, Johannes and Horsch, Moritz and Hühnlein, Detlef and Kiefer, Franziskus and Strenzke, Falko and Wiesmaier, Alexander (2010):
Towards a mobile eCard Client.
In: 13. Kryptotag, Darmstadt, [Conference or Workshop Item]

Shoufan, Abdulhadi and Strenzke, Falko and Molter, Gregor and Stoettinger, Marc (2009):
A Timing Attack Against Patterson Algorithm in the McEliece PKC.
In: 12th International Conference on Information Security and Cryptology (ICISC'09), In: Lecture Notes in Computer Science, [Conference or Workshop Item]

Shoufan, Abdulhadi and Wink, Thorsten and Molter, Gregor and Huss, Sorin and Strenzke, Falko (2009):
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms.
In: 20th IEEE International Conference on Application-specific Systems, Architectures and Processors, DOI: 10.1109/ASAP.2009.29,
[Conference or Workshop Item]

Strenzke, Falko and Tews, Erik and Molter, Gregor and Overbeck, Raphael and Shoufan, Abdulhadi (2008):
Side Channels in the McEliece PKC.
In: Int. Workshop on Post-Quantum Cryptography (PQCrypto 2008), In: Lecture Notes in Computer Science, DOI: 10.1007/978-3-540-88403-3_15,
[Conference or Workshop Item]

This list was generated on Tue Jun 25 00:13:07 2019 CEST.