Competences

cryptosource GmbH is run by Dr. Falko Strenzke. Mr. Strenzke possesses 10 years of professional experience in the field of IT-security, which, among others, encompasses the areas of cryptography, embedded security, and public key infrastructures.



Scientific Publications

Journal Papers

  • F. Strenzke. Message-aimed Side Channel and Fault Attacks against Public Key Cryptosystems with homomorphic Properties. Journal of Cryptographic Engineering , 2011. DOI: 10.1007/s13389-011-0020-0; a preliminary version appeared at COSADE 2011. [  slides ]
  • H. Gregor Molter, Marc Stoettinger, Abdulhadi Shoufan, and Falko Strenzke. A Simple Power Analysis Attack on a McEliece Cryptoprocessor. Journal of Cryptographic Engineering, 2011.

Conference Papers

  • Falko Strenzke, Erik Tews, H. Molter, Raphael Overbeck, and Abdulhadi Shoufan. Side Channels in the McEliece PKC. In Johannes Buchmann and Jintai Ding, editors, Post-Quantum Cryptography, volume 5299 of Lecture Notes in Computer Science, pages 216-229. Springer Berlin / Heidelberg, 2008. [  slides ]
  • Abdulhadi Shoufan, Thorsten Wink, Gregor Molter, Sorin Huss, and Falko Strenzke. A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. In ASAP '09: Proceedings of the 2009 20th IEEE International Conference on Application-specific Systems, Architectures and Processors, pages 98-105, Washington, DC, USA, 2009. IEEE Computer Society.
  • Falko Strenzke. Manger's Attack revisited. In 12th International Conference on Information and Security on Information and Communications Security (ICICS 2010), volume 6476. LNCS, 2010. [  slides ]
  • Falko Strenzke. A Timing Attack against the secret Permutation in the McEliece PKC. In The third international Workshop on Post-Quantum Cryptography PQCRYPTO 2010, Lecture Notes in Computer Science.
  • Abdulhadi Shoufan, Falko Strenzke, H. Molter, and Marc Stoettinger. A Timing Attack against Patterson Algorithm in the McEliece PKC. In Donghoon Lee and Seokhie Hong, editors, Information, Security and Cryptology - ICISC 2009, volume 5984 of Lecture Notes in Computer Science, pages 161-175. Springer Berlin / Heidelberg, 2009.
  • Falko Strenzke. A Smart Card Implementation of the McEliece PKC. In Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, volume 6033 of Lecture Notes in Computer Science, pages 47-59. Springer Berlin / Heidelberg, 2010. [  springerlink ]
  • Alexander Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Huehnlein, Falko Strenzke, and Johannes Buchmann. An efficient pace implementation for mobile devices. In ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, ACM Symposium on Information, Computer and Communications Security, pages 176-185, New York, 2011. ACM.
  • Falko Strenzke. Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-constrained Platforms. Proceedings of the 15th international conference on Information Security - ISC 2012, pages 120-135, Springer Berlin / Heidelberg 2012 A preliminary version of the paper can be found at eprint.iacr.org/2010/465. [ springerlink  | slides ]
  • Falko Strenzke. Fast and Secure Root-Finding for Code-based Cryptosystems. Proceedings of the 15th international conference on Information Security - CANS 2012, pages 232-246, Springer Berlin / Heidelberg 2012 A preliminary version of the paper can be found at eprint.iacr.org/2011/672.
    springerlinkslides ]
  • Nadia Mourier, Reinhardt Stampp and Falko Strenzke. An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks. Proceedings of the Second International Workshop on Lightweight Cryptography for Securtiy & Privacy - LightSec 2013 [  slides ]
  • Falko Strenzke. Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems. Proceedings of the fifth International Conference on Post Quantum Cryptography - PQCrypto 2013 [  springerlink  | slides ] .
  • Falko Strenzke. An Analysis of OpenSSL's Random Number Generator. To appear at Eurocrypt 2016 [  pdf ] .

Thesis

  • PhD Thesis of Falko Strenzke. Efficiency and Implementation Security of Code-based Cryptosystems At Institute Cryptography and Computer Algebra, TU Darmstadt, 2013 [ pdf |  slides ]

A Selection of our Customers and Partners

BSI

bsi-logo
 

MTG AG

mtg-logo
 

Steen Harbach AG



harbach-logo

 

PointBlank Security

pointblank-logo
 

Morpho

morpho-cards-logo
 

KOBIL Systems GmbH

 
kobli-logo
 

FlexSecure GmbH

 
flexsecure-logo
 

Segrids

 
segrids-logo

Announcements


cryptosource GmbH has an exhibition at the "Internet of Things" conference on October 19th, 2017 in Munich.


News

cryptosource GmbH has an exhibition at the embedded world 2017 in Nurnberg, Germany March 21st 2017

At Eurocrypt 2016 cryptosource presents a work about vulnerabilities of the random number generator of OpenSSL May 12th 2016