Gregor Leander
Nils Gregor Leander
Person information
- affiliation: Ruhr University Bochum
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j32]Yunwen Liu, Vincent Rijmen, Gregor Leander:
Nonlinear diffusion layers. Des. Codes Cryptography 86(11): 2469-2484 (2018) - [j31]Gregor Leander, Cihangir Tezcan, Friedrich Wiemer:
Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): 74-100 (2018) - [j30]Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - [j29]Christof Beierle, Anne Canteaut, Gregor Leander:
Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): 80-101 (2018) - [c44]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [i37]Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg:
Symmetric Cryptography (Dagstuhl Seminar 18021). Dagstuhl Reports 8(1): 1-32 (2018) - [i36]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptology ePrint Archive 2018: 181 (2018) - [i35]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptology ePrint Archive 2018: 793 (2018) - [i34]Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
BISON - Instantiating the Whitened Swap-Or-Not Construction. IACR Cryptology ePrint Archive 2018: 1011 (2018) - 2017
- [j28]Christina Boura, Anne Canteaut, Lars R. Knudsen, Gregor Leander:
Reflection ciphers. Des. Codes Cryptography 82(1-2): 3-25 (2017) - [j27]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptographic Engineering 7(2): 149-165 (2017) - [j26]Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. J. Cryptology 30(3): 859-888 (2017) - [j25]Thorsten Kranz, Gregor Leander, Friedrich Wiemer:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): 474-505 (2017) - [j24]Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(4): 188-211 (2017) - [c43]Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. ASIACRYPT (2) 2017: 161-178 - [c42]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: 647-678 - [i33]Thorsten Kranz, Friedrich Wiemer, Gregor Leander:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Cryptology ePrint Archive 2017: 154 (2017) - [i32]Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. IACR Cryptology ePrint Archive 2017: 427 (2017) - [i31]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. IACR Cryptology ePrint Archive 2017: 463 (2017) - [i30]Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Cryptology ePrint Archive 2017: 1151 (2017) - 2016
- [j23]Luis Alberto Benthin Sanguino, Gregor Leander, Christof Paar, Bernhard Esslinger, Ingo Niebel:
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. Cryptologia 40(3): 261-284 (2016) - [c41]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c40]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c39]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c38]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. CRYPTO (1) 2016: 625-653 - [e2]Tim Güneysu, Gregor Leander, Amir Moradi:
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5 [contents] - [i29]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR Cryptology ePrint Archive 2016: 119 (2016) - [i28]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptology ePrint Archive 2016: 647 (2016) - [i27]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptology ePrint Archive 2016: 660 (2016) - [i26]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptology ePrint Archive 2016: 732 (2016) - 2015
- [c37]Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON Block Cipher Family. CRYPTO (1) 2015: 161-185 - [c36]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [c35]Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. EUROCRYPT (1) 2015: 254-283 - [c34]Oliver Stecklina, Stephan Kornemann, Felix Grehl, Ramona Jung, Thorsten Kranz, Gregor Leander, Dennis Schweer, Katharina Mollus, Dirk Westhoff:
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes. I4CS 2015: 1-8 - [c33]Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander:
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. SecureComm 2015: 97-115 - [e1]Gregor Leander:
Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9054, Springer 2015, ISBN 978-3-662-48115-8 [contents] - [i25]Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. IACR Cryptology ePrint Archive 2015: 68 (2015) - [i24]Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. IACR Cryptology ePrint Archive 2015: 145 (2015) - [i23]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptology ePrint Archive 2015: 212 (2015) - [i22]Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. IACR Cryptology ePrint Archive 2015: 507 (2015) - 2014
- [c32]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). CRYPTO (1) 2014: 57-76 - [c31]Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. FSE 2014: 411-430 - [i21]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. IACR Cryptology ePrint Archive 2014: 453 (2014) - 2013
- [j22]Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma:
A new construction of bent functions based on $${\mathbb{Z}}$$ -bent functions. Des. Codes Cryptography 66(1-3): 243-256 (2013) - [j21]Pawel Swierczynski, Gregor Leander, Christof Paar:
Keccak und der SHA-2. Datenschutz und Datensicherheit 37(11): 712-719 (2013) - [j20]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Slender-Set Differential Cryptanalysis. J. Cryptology 26(1): 11-38 (2013) - [j19]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IEEE Trans. Computers 62(10): 2041-2053 (2013) - [c30]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. CRYPTO (1) 2013: 147-164 - [c29]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. CRYPTO (1) 2013: 204-221 - [c28]Elif Bilge Kavun, Gregor Leander, Tolga Yalçin:
A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices. ReConFig 2013: 1-8 - [i20]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. IACR Cryptology ePrint Archive 2013: 482 (2013) - [i19]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. IACR Cryptology ePrint Archive 2013: 598 (2013) - 2012
- [j18]Peter Beelen, Gregor Leander:
A new construction of highly nonlinear S-boxes. Cryptography and Communications 4(1): 65-77 (2012) - [c27]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c26]Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT 2012: 244-261 - [c25]Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander:
On the Distribution of Linear Biases: Three Instructive Examples. CRYPTO 2012: 50-67 - [c24]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). EUROCRYPT 2012: 45-62 - [c23]Martin R. Albrecht, Gregor Leander:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Selected Areas in Cryptography 2012: 1-15 - [i18]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. IACR Cryptology ePrint Archive 2012: 35 (2012) - [i17]Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander:
On The Distribution of Linear Biases: Three Instructive Examples. IACR Cryptology ePrint Archive 2012: 303 (2012) - [i16]Martin R. Albrecht, Gregor Leander:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. IACR Cryptology ePrint Archive 2012: 401 (2012) - [i15]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptology ePrint Archive 2012: 529 (2012) - 2011
- [j17]Philippe Langevin, Gregor Leander:
Counting all bent functions in dimension eight 99270589265934370305785861242880. Des. Codes Cryptography 59(1-3): 193-205 (2011) - [j16]Gregor Leander, François Rodier:
Bounds on the degree of APN polynomials: the case of x-1 + g(x). Des. Codes Cryptography 59(1-3): 207-222 (2011) - [j15]André Kündgen, Gregor Leander, Carsten Thomassen:
Switchings, extensions, and reductions in central digraphs. J. Comb. Theory, Ser. A 118(7): 2025-2034 (2011) - [c22]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
spongent: A Lightweight Hash Function. CHES 2011: 312-325 - [c21]Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Erik Zenner:
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. CRYPTO 2011: 206-221 - [c20]Gregor Leander:
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. EUROCRYPT 2011: 303-322 - [c19]Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner:
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. FSE 2011: 1-17 - [c18]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. FSE 2011: 270-289 - [r2]Lars R. Knudsen, Gregor Leander:
C2 - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 179-180 - [r1]Lars R. Knudsen, Gregor Leander:
PRESENT - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 953-955 - [i14]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IACR Cryptology ePrint Archive 2011: 697 (2011) - 2010
- [j14]Carl Bracken, Gregor Leander:
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields and Their Applications 16(4): 231-242 (2010) - [c17]Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. CHES 2010: 16-32 - [i13]Gregor Leander:
Small Scale Variants Of The Block Cipher PRESENT. IACR Cryptology ePrint Archive 2010: 143 (2010) - [i12]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-like ciphers with secret S-boxes. IACR Cryptology ePrint Archive 2010: 574 (2010)
2000 – 2009
- 2009
- [j13]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. Finite Fields and Their Applications 15(2): 150-159 (2009) - [j12]Gregor Leander, Gary McGuire:
Construction of bent functions from near-bent functions. J. Comb. Theory, Ser. A 116(4): 960-970 (2009) - [c16]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz:
Cryptanalysis of C2. CRYPTO 2009: 250-266 - [c15]Gregor Leander, Erik Zenner, Philip Hawkes:
Cache Timing Analysis of LFSR-Based Stream Ciphers. IMA Int. Conf. 2009: 433-445 - [c14]Mathias Herrmann, Gregor Leander:
A Practical Key Recovery Attack on Basic TCHo. Public Key Cryptography 2009: 411-424 - [p1]Peter Beelen, Gregor Leander:
Reconstruction of Highly Non Linear Sboxes from Linear Codes. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 153-159 - [i11]Carl Bracken, Gregor Leander:
A Highly Nonlinear Differentially 4 Uniform Power Mapping That Permutes Fields of Even Degree. CoRR abs/0901.1824 (2009) - [i10]Gregor Leander, François Rodier:
Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$. CoRR abs/0901.4322 (2009) - [i9]Valérie Gauthier-Umaña, Gregor Leander:
Practical Key Recovery Attacks On Two McEliece Variants. IACR Cryptology ePrint Archive 2009: 509 (2009) - 2008
- [j11]Hans Dobbertin, Gregor Leander:
Bent functions embedded into the recursive framework of ℤ-bent functions. Des. Codes Cryptography 49(1-3): 3-22 (2008) - [j10]Marcus Brinkmann, Gregor Leander:
On the classification of APN functions up to dimension five. Des. Codes Cryptography 49(1-3): 273-288 (2008) - [j9]Philippe Langevin, Gregor Leander:
Monomial bent functions and Stickelberger's theorem. Finite Fields and Their Applications 14(3): 727-742 (2008) - [j8]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes. IEEE Trans. Information Theory 54(6): 2644-2657 (2008) - [j7]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions. IEEE Trans. Information Theory 54(9): 4218-4229 (2008) - [c13]Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. ASIACRYPT 2008: 489-505 - [c12]Carsten Rolfes, Axel Poschmann, Gregor Leander, Christof Paar:
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. CARDIS 2008: 89-103 - [c11]Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin:
Hash Functions and RFID Tags: Mind the Gap. CHES 2008: 283-299 - 2007
- [j6]Philippe Langevin, Gregor Leander, Gary McGuire:
A Counterexample to a Conjecture of Niho. IEEE Trans. Information Theory 53(12): 4785-4786 (2007) - [c10]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c9]Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm:
New Lightweight DES Variants. FSE 2007: 196-210 - [c8]Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar:
New Light-Weight Crypto Algorithms for RFID. ISCAS 2007: 1843-1846 - [c7]
- [i8]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. IACR Cryptology ePrint Archive 2007: 63 (2007) - [i7]Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. IACR Cryptology ePrint Archive 2007: 360 (2007) - 2006
- [j5]Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor Leander:
Finding nonnormal bent functions. Discrete Applied Mathematics 154(2): 202-218 (2006) - [j4]Hans Dobbertin, Gregor Leander, Anne Canteaut, Claude Carlet, Patrick Felke, Philippe Gaborit:
Construction of bent functions via Niho power functions. J. Comb. Theory, Ser. A 113(5): 779-798 (2006) - [j3]
- [j2]Gregor Leander, Alexander Kholosha:
Bent Functions With 2r Niho Exponents. IEEE Trans. Information Theory 52(12): 5529-5532 (2006) - [c6]Gregor Leander, Andy Rupp:
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. ASIACRYPT 2006: 241-251 - [c5]Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. ISIT 2006: 2637-2641 - [i6]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Another class of quadratic APN binomials over F2n: the case n divisible by 4. IACR Cryptology ePrint Archive 2006: 428 (2006) - [i5]Lilya Budaghyan, Claude Carlet, Gregor Leander:
A class of quadratic APN binomials inequivalent to power functions. IACR Cryptology ePrint Archive 2006: 445 (2006) - 2005
- [c4]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. CRYPTO 2005: 327-343 - [c3]Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. TCC 2005: 283-302 - [i4]Hans Dobbertin, Gregor Leander:
Cryptographer's Toolkit for Construction of 8-Bit Bent Functions. IACR Cryptology ePrint Archive 2005: 89 (2005) - [i3]Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. IACR Cryptology ePrint Archive 2005: 359 (2005) - 2004
- [j1]Claude Carlet, Hans Dobbertin, Gregor Leander:
Normal Extensions of Bent Functions. IEEE Trans. Information Theory 50(11): 2880-2885 (2004) - [c2]Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar:
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. CHES 2004: 163-175 - [c1]
- [i2]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On codes, matroids and secure multi-party computation from linear secret sharing schemes. IACR Cryptology ePrint Archive 2004: 245 (2004) - [i1]Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. IACR Cryptology ePrint Archive 2004: 359 (2004)