


Остановите войну!
for scientists:


default search action
Gregor Leander
Nils Gregor Leander
Person information

- affiliation: Ruhr University Bochum
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j51]Phil Hebborn, Gregor Leander, Aleksei Udovenko:
Mathematical aspects of division property. Cryptogr. Commun. 15(4): 731-774 (2023) - [c66]Christof Beierle, Patrick Felke, Gregor Leander, Patrick P. Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. CRYPTO (3) 2023: 209-239 - [c65]Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. CRYPTO (3) 2023: 240-272 - [c64]Baptiste Lambin
, Gregor Leander
, Patrick Neumann
:
Pitfalls and Shortcomings for Decompositions and Alignment. EUROCRYPT (4) 2023: 318-347 - [c63]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. USENIX Security Symposium 2023 - [c62]Jan Philipp Thoma
, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. USENIX Security Symposium 2023 - [i70]Baptiste Lambin, Gregor Leander, Patrick Neumann:
Pitfalls and Shortcomings for Decompositions and Alignment (Full Version). IACR Cryptol. ePrint Arch. 2023: 240 (2023) - [i69]Christof Beierle, Patrick Felke, Gregor Leander, Patrick P. Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. IACR Cryptol. ePrint Arch. 2023: 725 (2023) - 2022
- [j50]Christof Beierle
, Gregor Leander
, Léo Perrin
:
Trims and extensions of quadratic APN functions. Des. Codes Cryptogr. 90(4): 1009-1036 (2022) - [j49]Christof Beierle
, Claude Carlet, Gregor Leander
, Léo Perrin:
A further study of quadratic APN permutations in dimension nine. Finite Fields Their Appl. 81: 102049 (2022) - [j48]Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. J. Cryptol. 35(4): 29 (2022) - [j47]Christof Beierle
, Gregor Leander
:
New Instances of Quadratic APN Functions. IEEE Trans. Inf. Theory 68(1): 670-678 (2022) - [j46]Gregor Leander
, Shahram Rasoolzadeh:
Weak Tweak-Keys for the CRAFT Block Cipher. IACR Trans. Symmetric Cryptol. 2022(1): 38-63 (2022) - [j45]Marcus Dansarie
, Patrick Derbez, Gregor Leander, Lukas Stennes:
Breaking HALFLOOP-24. IACR Trans. Symmetric Cryptol. 2022(3): 217-238 (2022) - [j44]Christof Beierle, Patrick Felke, Gregor Leander
, Sondre Rønjom:
Decomposing Linear Layers. IACR Trans. Symmetric Cryptol. 2022(4): 243-265 (2022) - [c61]Christof Beierle, Tim Beyne
, Patrick Felke, Gregor Leander:
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers. CRYPTO (3) 2022: 748-778 - [c60]Federico Canale, Gregor Leander, Lukas Stennes:
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications. CRYPTO (3) 2022: 779-808 - [c59]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. CT-RSA 2022: 484-510 - [c58]Maik Ender
, Gregor Leander
, Amir Moradi
, Christof Paar:
A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption and Authentication Engine. FCCM 2022: 1-9 - [i68]Nils Gregor Leander, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Eran Lambooij:
Symmetric Cryptography (Dagstuhl Seminar 22141). Dagstuhl Reports 12(4): 1-12 (2022) - [i67]Phil Hebborn, Gregor Leander, Aleksei Udovenko:
Mathematical Aspects of Division Property. IACR Cryptol. ePrint Arch. 2022: 736 (2022) - [i66]Federico Canale, Gregor Leander, Lukas Stennes:
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications. IACR Cryptol. ePrint Arch. 2022: 782 (2022) - [i65]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Cryptol. ePrint Arch. 2022: 1159 (2022) - [i64]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. IACR Cryptol. ePrint Arch. 2022: 1228 (2022) - [i63]Aron Gohr, Gregor Leander, Patrick Neumann:
An Assessment of Differential-Neural Distinguishers. IACR Cryptol. ePrint Arch. 2022: 1521 (2022) - [i62]Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 1640 (2022) - 2021
- [j43]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo
, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [j42]Gregor Leander
, Thorben Moos
, Amir Moradi
, Shahram Rasoolzadeh:
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 510-545 (2021) - [j41]Christof Beierle
, Marcus Brinkmann
, Gregor Leander
:
Linearly Self-Equivalent APN Permutations in Small Dimension. IEEE Trans. Inf. Theory 67(7): 4863-4875 (2021) - [j40]Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander
, Léo Perrin, François-Xavier Standaert
:
MOE: Multiplication Operated Encryption with Trojan Resilience. IACR Trans. Symmetric Cryptol. 2021(1): 78-129 (2021) - [c57]Phil Hebborn, Baptiste Lambin, Gregor Leander
, Yosuke Todo:
Strong and Tight Security Guarantees Against Integral Distinguishers. ASIACRYPT (1) 2021: 362-391 - [c56]Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia:
Generic Framework for Key-Guessing Improvements. ASIACRYPT (1) 2021: 453-483 - [c55]Christof Beierle
, Patrick Derbez, Gregor Leander
, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. EUROCRYPT (2) 2021: 155-183 - [i61]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A Further Study of Quadratic APN Permutations in Dimension Nine. CoRR abs/2104.08008 (2021) - [i60]Jan Philipp Thoma
, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. CoRR abs/2104.11469 (2021) - [i59]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and Extensions of Quadratic APN Functions. CoRR abs/2108.13280 (2021) - [i58]Gregor Leander, Shahram Rasoolzadeh:
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT. IACR Cryptol. ePrint Arch. 2021: 238 (2021) - [i57]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. IACR Cryptol. ePrint Arch. 2021: 819 (2021) - [i56]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. IACR Cryptol. ePrint Arch. 2021: 820 (2021) - [i55]Christof Beierle, Patrick Felke, Gregor Leander:
To Shift or Not to Shift: Understanding GEA-1. IACR Cryptol. ePrint Arch. 2021: 829 (2021) - [i54]Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh:
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. IACR Cryptol. ePrint Arch. 2021: 960 (2021) - [i53]Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia:
Generic Framework for Key-Guessing Improvements. IACR Cryptol. ePrint Arch. 2021: 1238 (2021) - [i52]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees against Integral Distinguishers. IACR Cryptol. ePrint Arch. 2021: 1502 (2021) - 2020
- [j39]Christof Beierle
, Gregor Leander
:
4-uniform permutations with null nonlinearity. Cryptogr. Commun. 12(6): 1133-1141 (2020) - [j38]Phil Hebborn, Gregor Leander:
Dasta - Alternative Linear Layer for Rasta. IACR Trans. Symmetric Cryptol. 2020(3): 46-86 (2020) - [j37]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [j36]Davide Bellizia
, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval
, Chun Guo, Gregor Leander
, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
, Balazs Udvarhelyi, Friedrich Wiemer
:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. IACR Trans. Symmetric Cryptol. 2020(S1): 295-349 (2020) - [c54]Phil Hebborn, Baptiste Lambin, Gregor Leander
, Yosuke Todo
:
Lower Bounds on the Degree of Block Ciphers. ASIACRYPT (1) 2020: 537-566 - [c53]Tim Beyne
, Anne Canteaut, Itai Dinur, Maria Eichlseder
, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo
, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c52]Christof Beierle
, Gregor Leander, Yosuke Todo
:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. CRYPTO (3) 2020: 329-358 - [c51]Yonglin Hao, Gregor Leander
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [c50]Maria Eichlseder
, Gregor Leander
, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. INDOCRYPT 2020: 345-369 - [c49]Lorenzo Grassi
, Gregor Leander
, Christian Rechberger, Cihangir Tezcan
, Friedrich Wiemer
:
Weak-Key Distinguishers for AES. SAC 2020: 141-170 - [c48]Dusan Bozilov, Maria Eichlseder
, Miroslav Knezevic, Baptiste Lambin, Gregor Leander
, Thorben Moos
, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo
, Friedrich Wiemer
:
PRINCEv2 - More Security for (Almost) No Overhead. SAC 2020: 483-511 - [i51]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. CoRR abs/2003.12006 (2020) - [i50]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. CoRR abs/2009.07204 (2020) - [i49]Nils Gregor Leander, Bart Mennink, Kaisa Nyberg
, Kan Yasuda:
Symmetric Cryptography (Dagstuhl Seminar 20041). Dagstuhl Reports 10(1): 130-143 (2020) - [i48]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i47]Christof Beierle, Gregor Leander:
4-Uniform Permutations with Null Nonlinearity. IACR Cryptol. ePrint Arch. 2020: 334 (2020) - [i46]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i45]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. IACR Cryptol. ePrint Arch. 2020: 775 (2020) - [i44]Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer:
On the security of the Rescue hash function. IACR Cryptol. ePrint Arch. 2020: 820 (2020) - [i43]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1051 (2020) - [i42]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. IACR Cryptol. ePrint Arch. 2020: 1269 (2020) - [i41]Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1356 (2020)
2010 – 2019
- 2019
- [j35]Yosuke Todo
, Gregor Leander
, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4): 1383-1422 (2019) - [j34]Christof Beierle
, Gregor Leander
, Amir Moradi
, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Trans. Symmetric Cryptol. 2019(1): 5-45 (2019) - [j33]Ralph Ankele
, Christoph Dobraunig
, Jian Guo, Eran Lambooij, Gregor Leander
, Yosuke Todo
:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019) - [c47]Tetsu Iwata, Virginie Lallemand, Gregor Leander
, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. CT-RSA 2019: 293-312 - [c46]Anne Canteaut, Virginie Lallemand, Gregor Leander
, Patrick Neumann
, Friedrich Wiemer
:
bison Instantiating the Whitened Swap-Or-Not Construction. EUROCRYPT (3) 2019: 585-616 - [i40]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Cryptol. ePrint Arch. 2019: 185 (2019) - [i39]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Cryptol. ePrint Arch. 2019: 210 (2019) - [i38]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
:
Weak-Key Subspace Trails and Applications to AES. IACR Cryptol. ePrint Arch. 2019: 852 (2019) - 2018
- [j32]Yunwen Liu
, Vincent Rijmen
, Gregor Leander
:
Nonlinear diffusion layers. Des. Codes Cryptogr. 86(11): 2469-2484 (2018) - [j31]Gregor Leander
, Cihangir Tezcan
, Friedrich Wiemer
:
Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): 74-100 (2018) - [j30]Gianira N. Alfarano
, Christof Beierle
, Takanori Isobe, Stefan Kölbl, Gregor Leander
:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - [j29]Christof Beierle
, Anne Canteaut, Gregor Leander
:
Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): 80-101 (2018) - [c45]Christoph Dobraunig
, Maria Eichlseder
, Lorenzo Grassi
, Virginie Lallemand, Gregor Leander
, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c44]Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
BISON - Instantiating the Whitened Swap-Or-Not Construction. Krypto-Tag 2018 - [i37]Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg
:
Symmetric Cryptography (Dagstuhl Seminar 18021). Dagstuhl Reports 8(1): 1-32 (2018) - [i36]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i35]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptol. ePrint Arch. 2018: 793 (2018) - [i34]Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
:
BISON - Instantiating the Whitened Swap-Or-Not Construction. IACR Cryptol. ePrint Arch. 2018: 1011 (2018) - 2017
- [j28]Christina Boura, Anne Canteaut, Lars R. Knudsen
, Gregor Leander
:
Reflection ciphers. Des. Codes Cryptogr. 82(1-2): 3-25 (2017) - [j27]Erik Boss, Vincent Grosso
, Tim Güneysu
, Gregor Leander
, Amir Moradi
, Tobias Schneider
:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptogr. Eng. 7(2): 149-165 (2017) - [j26]Céline Blondeau, Gregor Leander
, Kaisa Nyberg
:
Differential-Linear Cryptanalysis Revisited. J. Cryptol. 30(3): 859-888 (2017) - [j25]Thorsten Kranz, Gregor Leander
, Friedrich Wiemer
:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): 474-505 (2017) - [j24]Thorsten Kranz, Gregor Leander
, Ko Stoffelen, Friedrich Wiemer
:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(4): 188-211 (2017) - [c43]Gregor Leander
, Alexander May
:
Grover Meets Simon - Quantumly Attacking the FX-construction. ASIACRYPT (2) 2017: 161-178 - [c42]Christof Beierle
, Anne Canteaut, Gregor Leander
, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: 647-678 - [i33]Thorsten Kranz, Friedrich Wiemer, Gregor Leander:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 154 (2017) - [i32]Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. IACR Cryptol. ePrint Arch. 2017: 427 (2017) - [i31]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. IACR Cryptol. ePrint Arch. 2017: 463 (2017) - [i30]Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Cryptol. ePrint Arch. 2017: 1151 (2017) - 2016
- [j23]Luis Alberto Benthin Sanguino, Gregor Leander
, Christof Paar, Bernhard Esslinger, Ingo Niebel:
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. Cryptologia 40(3): 261-284 (2016) - [c41]Yosuke Todo
, Gregor Leander
, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c40]Erik Boss, Vincent Grosso, Tim Güneysu
, Gregor Leander
, Amir Moradi
, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c39]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c38]Christof Beierle
, Thorsten Kranz, Gregor Leander
:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. CRYPTO (1) 2016: 625-653 - [e2]Tim Güneysu, Gregor Leander, Amir Moradi:
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5 [contents] - [i29]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 119 (2016) - [i28]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptol. ePrint Arch. 2016: 647 (2016) - [i27]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - [i26]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptol. ePrint Arch. 2016: 732 (2016) - 2015
- [c37]Stefan Kölbl, Gregor Leander
, Tyge Tiessen:
Observations on the SIMON Block Cipher Family. CRYPTO (1) 2015: 161-185 - [c36]Christof Beierle
, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander
, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [c35]Gregor Leander
, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. EUROCRYPT (1) 2015: 254-283 - [c34]Oliver Stecklina, Stephan Kornemann, Felix Grehl, Ramona Jung, Thorsten Kranz, Gregor Leander
, Dennis Schweer, Katharina Mollus, Dirk Westhoff:
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes. I4CS 2015: 1-8 - [c33]Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander
:
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. SecureComm 2015: 97-115 - [e1]Gregor Leander
:
Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9054, Springer 2015, ISBN 978-3-662-48115-8 [contents] - [i25]Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. IACR Cryptol. ePrint Arch. 2015: 68 (2015) - [i24]Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. IACR Cryptol. ePrint Arch. 2015: 145 (2015) - [i23]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015) - [i22]Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. IACR Cryptol. ePrint Arch. 2015: 507 (2015) - 2014
- [c32]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander
, Christof Paar, Tolga Yalçin
:
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). CRYPTO (1) 2014: 57-76 - [c31]