default search action
Gregor Leander
- > Home > Persons > Gregor Leander
Publications
- 2024
- [i73]Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich:
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis. IACR Cryptol. ePrint Arch. 2024: 833 (2024) - 2023
- [c67]Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. CRYPTO (3) 2023: 209-239 - [i70]Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. IACR Cryptol. ePrint Arch. 2023: 725 (2023) - 2022
- [j50]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and extensions of quadratic APN functions. Des. Codes Cryptogr. 90(4): 1009-1036 (2022) - [j49]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A further study of quadratic APN permutations in dimension nine. Finite Fields Their Appl. 81: 102049 (2022) - [j48]Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. J. Cryptol. 35(4): 29 (2022) - [j47]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. IEEE Trans. Inf. Theory 68(1): 670-678 (2022) - [j44]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Trans. Symmetric Cryptol. 2022(4): 243-265 (2022) - [c61]Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander:
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers. CRYPTO (3) 2022: 748-778 - [i65]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Cryptol. ePrint Arch. 2022: 1159 (2022) - 2021
- [j41]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. IEEE Trans. Inf. Theory 67(7): 4863-4875 (2021) - [c55]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. EUROCRYPT (2) 2021: 155-183 - [i61]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A Further Study of Quadratic APN Permutations in Dimension Nine. CoRR abs/2104.08008 (2021) - [i59]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and Extensions of Quadratic APN Functions. CoRR abs/2108.13280 (2021) - [i57]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. IACR Cryptol. ePrint Arch. 2021: 819 (2021) - [i55]Christof Beierle, Patrick Felke, Gregor Leander:
To Shift or Not to Shift: Understanding GEA-1. IACR Cryptol. ePrint Arch. 2021: 829 (2021) - 2020
- [j39]Christof Beierle, Gregor Leander:
4-uniform permutations with null nonlinearity. Cryptogr. Commun. 12(6): 1133-1141 (2020) - [j37]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [c52]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. CRYPTO (3) 2020: 329-358 - [d1]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Dimension Eight. Zenodo, 2020 - [i51]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. CoRR abs/2003.12006 (2020) - [i50]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. CoRR abs/2009.07204 (2020) - [i47]Christof Beierle, Gregor Leander:
4-Uniform Permutations with Null Nonlinearity. IACR Cryptol. ePrint Arch. 2020: 334 (2020) - [i45]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. IACR Cryptol. ePrint Arch. 2020: 775 (2020) - 2019
- [j34]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Trans. Symmetric Cryptol. 2019(1): 5-45 (2019) - [i39]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Cryptol. ePrint Arch. 2019: 210 (2019) - 2018
- [j30]Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - [j29]Christof Beierle, Anne Canteaut, Gregor Leander:
Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): 80-101 (2018) - 2017
- [c42]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: 647-678 - [i31]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. IACR Cryptol. ePrint Arch. 2017: 463 (2017) - 2016
- [c39]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c38]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. CRYPTO (1) 2016: 625-653 - [i29]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 119 (2016) - [i27]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - 2015
- [c36]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [i23]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 02:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint