Wissenschaftliche Publikationen und Vorträge

  • Journal Papers
    • F. Strenzke. Message-aimed Side Channel and Fault Attacks against Public Key Cryptosystems with homomorphic Properties. Journal of Cryptographic Engineering , 2011. DOI: 10.1007/s13389-011-0020-0; a preliminary version appeared at COSADE 2011. [  slides ]
    • H. Gregor Molter, Marc Stoettinger, Abdulhadi Shoufan, and Falko Strenzke. A Simple Power Analysis Attack on a McEliece Cryptoprocessor. Journal of Cryptographic Engineering, 2011.
  • Conference Papers
    • Falko Strenzke, Erik Tews, H. Molter, Raphael Overbeck, and Abdulhadi Shoufan. Side Channels in the McEliece PKC. In Johannes Buchmann and Jintai Ding, editors, Post-Quantum Cryptography, volume 5299 of Lecture Notes in Computer Science, pages 216-229. Springer Berlin / Heidelberg, 2008. [  slides ]
    • Abdulhadi Shoufan, Thorsten Wink, Gregor Molter, Sorin Huss, and Falko Strenzke. A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms. In ASAP '09: Proceedings of the 2009 20th IEEE International Conference on Application-specific Systems, Architectures and Processors, pages 98-105, Washington, DC, USA, 2009. IEEE Computer Society.
    • Falko Strenzke. Manger's Attack revisited. In 12th International Conference on Information and Security on Information and Communications Security (ICICS 2010), volume 6476. LNCS, 2010. [  slides ]
    • Falko Strenzke. A Timing Attack against the secret Permutation in the McEliece PKC. In The third international Workshop on Post-Quantum Cryptography PQCRYPTO 2010, Lecture Notes in Computer Science.
    • Abdulhadi Shoufan, Falko Strenzke, H. Molter, and Marc Stoettinger. A Timing Attack against Patterson Algorithm in the McEliece PKC. In Donghoon Lee and Seokhie Hong, editors, Information, Security and Cryptology - ICISC 2009, volume 5984 of Lecture Notes in Computer Science, pages 161-175. Springer Berlin / Heidelberg, 2009.
    • Falko Strenzke. A Smart Card Implementation of the McEliece PKC. In Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, volume 6033 of Lecture Notes in Computer Science, pages 47-59. Springer Berlin / Heidelberg, 2010. [  springerlink ]
    • Alexander Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Huehnlein, Falko Strenzke, and Johannes Buchmann. An efficient pace implementation for mobile devices. In ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, ACM Symposium on Information, Computer and Communications Security, pages 176-185, New York, 2011. ACM.
    • Falko Strenzke. Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-constrained Platforms. Proceedings of the 15th international conference on Information Security - ISC 2012, pages 120-135, Springer Berlin / Heidelberg 2012 A preliminary version of the paper can be found at eprint.iacr.org/2010/465. [ springerlink  | pdf  | slides ]
    • Falko Strenzke. Fast and Secure Root-Finding for Code-based Cryptosystems. Proceedings of the 15th international conference on Information Security - CANS 2012, pages 232-246, Springer Berlin / Heidelberg 2012 A preliminary version of the paper can be found at eprint.iacr.org/2011/672.
      springerlinkslides ]
    • Nadia Mourier, Reinhardt Stampp and Falko Strenzke. An Implementation of the Hash-Chain Signature Scheme for Wireless Sensor Networks. Proceedings of the Second International Workshop on Lightweight Cryptography for Securtiy & Privacy - LightSec 2013 [  slides ]
    • Falko Strenzke. Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems. Proceedings of the fifth International Conference on Post Quantum Cryptography - PQCrypto 2013 [  springerlink  | slides ] .
    • Falko Strenzke. An Analysis of OpenSSL's Random Number Generator. Proceedings of the 35th Annual International Conference on Advances in Cryptology - EUROCRYPT 2016 [  pdf ]
  • Thesis
    • PhD Thesis of Falko Strenzke. Efficiency and Implementation Security of Code-based Cryptosystems At Institute Cryptography and Computer Algebra, TU Darmstadt, 2013 [ pdf |  slides ]
  • Vorträge
    • TeleTrusT-EBCA-PKI-Workshop Berlin, 29.09.2022, Vortrag ”Konzepte zur technischen Migration zu PQC-Verfahren”
    • building IoT on-line event, 24.03.2021, Vortrag “Hochsicheres IoT am Beispiel des Smart Metering”
    • 17. Deutscher IT-Sicherheitskongress Bonn (on-line event), 02.02.2021, Vortrag “Certication Path Validation Test Tool (CPT) – Ein Tool zur Überprüfung der X.509-Zertifizierungspfadvalidierung.”
    • ESE Kongress Sindelfingen, 7.12.2018, ganztägiges Kompaktseminar: “Cryptography Engineering für eingebettete Systeme”
    • Forum Safety und Security Sindelfingen, 12.9.2018, Vortrag “Verwendung von TLS auf eingebetteten Systemen”
    • building IoT Köln, 5.6.2018, Vortrag “Sichere und leichtgewichtige TLS Kommunikation für eingebettete Systeme”
    • RuhrSec Bochum, 18.5.2018, Vortrag “Revisiting the X.509 Certification Path Validation”
    • embedded world Conference Nürnberg, 27.2.2018, halbtägiger Workshop “Cryptography Engineering for Embedded Devices”
    • “Internet of Things – vom Sensor bis zur Cloud” München, 19.10.2017, Vortrag “Sichere und leichtgewichtige TLS Kommunikation für eingebettete Systeme”
    • CAST Workshop “Mobile und Embedded Security” Darmstadt, 1.6.2017, Vortrag “Sichere und leichtgewichtige TLS Kommunikation für eingebettete Systeme”
    • Eberbacher Gespräch Kloster Eberbach, 24.5.2017, Teilnehmer beim “Eberbacher Gespräch on ’Next Generation Crypto’
    • Ruhr Universität Bochum, HGI-Kolloquium Bochum, 14.4.2016, Vortrag “An Analysis of OpenSSL’s Random Number Generator”
    • Testing Day Franken Erlangen, 16.09.2015, Vortrag “Test Meets Security”