default search action
Gregor Leander
Person information
- affiliation: Ruhr University Bochum
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c68]Gregor Leander, Christof Paar, Julian Speith, Lukas Stennes:
HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits. CRYPTO (4) 2024: 340-376 - [e9]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14651, Springer 2024, ISBN 978-3-031-58715-3 [contents] - [e8]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14652, Springer 2024, ISBN 978-3-031-58722-1 [contents] - [e7]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14653, Springer 2024, ISBN 978-3-031-58733-7 [contents] - [e6]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14654, Springer 2024, ISBN 978-3-031-58736-8 [contents] - [e5]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V. Lecture Notes in Computer Science 14655, Springer 2024, ISBN 978-3-031-58739-9 [contents] - [e4]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VI. Lecture Notes in Computer Science 14656, Springer 2024, ISBN 978-3-031-58750-4 [contents] - [e3]Marc Joye, Gregor Leander:
Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part VII. Lecture Notes in Computer Science 14657, Springer 2024, ISBN 978-3-031-58753-5 [contents] - [i75]Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich:
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis. IACR Cryptol. ePrint Arch. 2024: 833 (2024) - [i74]Gregor Leander, Christof Paar, Julian Speith, Lukas Stennes:
HAWKEYE - Recovering Symmetric Cryptography From Hardware Circuits. IACR Cryptol. ePrint Arch. 2024: 860 (2024) - [i73]Sabyasachi Dey, Gregor Leander, Nitin Kumar Sharma:
Improved Key Recovery Attacks on Reduced-Round Salsa20. IACR Cryptol. ePrint Arch. 2024: 1363 (2024) - [i72]Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 1678 (2024) - 2023
- [j53]Phil Hebborn, Gregor Leander, Aleksei Udovenko:
Mathematical aspects of division property. Cryptogr. Commun. 15(4): 731-774 (2023) - [j52]Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes:
Cryptanalysis of HALFLOOP Block Ciphers Destroying HALFLOOP-24. IACR Trans. Symmetric Cryptol. 2023(4): 58-82 (2023) - [j51]Jules Baudrin, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis Made Practical. IACR Trans. Symmetric Cryptol. 2023(4): 299-329 (2023) - [c67]Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. CRYPTO (3) 2023: 209-239 - [c66]Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. CRYPTO (3) 2023: 240-272 - [c65]Baptiste Lambin, Gregor Leander, Patrick Neumann:
Pitfalls and Shortcomings for Decompositions and Alignment. EUROCRYPT (4) 2023: 318-347 - [c64]Gregor Leander, Lukas Stennes, Jan Vorloeper:
Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application. INDOCRYPT (1) 2023: 269-286 - [c63]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. USENIX Security Symposium 2023: 1937-1954 - [c62]Jan Philipp Thoma, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. USENIX Security Symposium 2023: 1991-2008 - [d8]Baptiste Lambin, Gregor Leander, Patrick Neumann:
Supplementary code to "Pitfalls and Shortcomings for Decompositions and Alignment". Zenodo, 2023 - [i71]Baptiste Lambin, Gregor Leander, Patrick Neumann:
Pitfalls and Shortcomings for Decompositions and Alignment (Full Version). IACR Cryptol. ePrint Arch. 2023: 240 (2023) - [i70]Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. IACR Cryptol. ePrint Arch. 2023: 725 (2023) - [i69]Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes:
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24. IACR Cryptol. ePrint Arch. 2023: 1314 (2023) - 2022
- [j50]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and extensions of quadratic APN functions. Des. Codes Cryptogr. 90(4): 1009-1036 (2022) - [j49]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A further study of quadratic APN permutations in dimension nine. Finite Fields Their Appl. 81: 102049 (2022) - [j48]Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. J. Cryptol. 35(4): 29 (2022) - [j47]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. IEEE Trans. Inf. Theory 68(1): 670-678 (2022) - [j46]Gregor Leander, Shahram Rasoolzadeh:
Weak Tweak-Keys for the CRAFT Block Cipher. IACR Trans. Symmetric Cryptol. 2022(1): 38-63 (2022) - [j45]Marcus Dansarie, Patrick Derbez, Gregor Leander, Lukas Stennes:
Breaking HALFLOOP-24. IACR Trans. Symmetric Cryptol. 2022(3): 217-238 (2022) - [j44]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Trans. Symmetric Cryptol. 2022(4): 243-265 (2022) - [c61]Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander:
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers. CRYPTO (3) 2022: 748-778 - [c60]Federico Canale, Gregor Leander, Lukas Stennes:
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications. CRYPTO (3) 2022: 779-808 - [c59]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. CT-RSA 2022: 484-510 - [c58]Maik Ender, Gregor Leander, Amir Moradi, Christof Paar:
A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption and Authentication Engine. FCCM 2022: 1-9 - [d7]Christof Beierle, Gregor Leander, Léo Perrin:
Quadratic APN Extensions. Zenodo, 2022 - [d6]Christof Beierle, Gregor Leander, Léo Perrin:
Supplementary code to "Trims and extensions of quadratic APN functions". Zenodo, 2022 - [d5]Marcus Dansarie, Patrick Derbez, Gregor Leander, Lukas Stennes:
Implementation of attacks on HALFLOOP-24. Zenodo, 2022 - [i68]Nils Gregor Leander, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Eran Lambooij:
Symmetric Cryptography (Dagstuhl Seminar 22141). Dagstuhl Reports 12(4): 1-12 (2022) - [i67]Phil Hebborn, Gregor Leander, Aleksei Udovenko:
Mathematical Aspects of Division Property. IACR Cryptol. ePrint Arch. 2022: 736 (2022) - [i66]Federico Canale, Gregor Leander, Lukas Stennes:
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications. IACR Cryptol. ePrint Arch. 2022: 782 (2022) - [i65]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Cryptol. ePrint Arch. 2022: 1159 (2022) - [i64]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. IACR Cryptol. ePrint Arch. 2022: 1228 (2022) - [i63]Aron Gohr, Gregor Leander, Patrick Neumann:
An Assessment of Differential-Neural Distinguishers. IACR Cryptol. ePrint Arch. 2022: 1521 (2022) - [i62]Christina Boura, Nicolas David, Patrick Derbez, Gregor Leander, María Naya-Plasencia:
Differential Meet-In-The-Middle Cryptanalysis. IACR Cryptol. ePrint Arch. 2022: 1640 (2022) - 2021
- [j43]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [j42]Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh:
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 510-545 (2021) - [j41]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. IEEE Trans. Inf. Theory 67(7): 4863-4875 (2021) - [j40]Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander, Léo Perrin, François-Xavier Standaert:
MOE: Multiplication Operated Encryption with Trojan Resilience. IACR Trans. Symmetric Cryptol. 2021(1): 78-129 (2021) - [c57]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees Against Integral Distinguishers. ASIACRYPT (1) 2021: 362-391 - [c56]Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia:
Generic Framework for Key-Guessing Improvements. ASIACRYPT (1) 2021: 453-483 - [c55]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. EUROCRYPT (2) 2021: 155-183 - [d4]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Small Dimension. Zenodo, 2021 - [d3]Christof Beierle, Gregor Leander, Léo Perrin:
Quadratic APN Extensions. Zenodo, 2021 - [i61]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A Further Study of Quadratic APN Permutations in Dimension Nine. CoRR abs/2104.08008 (2021) - [i60]Jan Philipp Thoma, Christian Niesler, Dominic A. Funke, Gregor Leander, Pierre Mayr, Nils Pohl, Lucas Davi, Tim Güneysu:
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions. CoRR abs/2104.11469 (2021) - [i59]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and Extensions of Quadratic APN Functions. CoRR abs/2108.13280 (2021) - [i58]Gregor Leander, Shahram Rasoolzadeh:
Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT. IACR Cryptol. ePrint Arch. 2021: 238 (2021) - [i57]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. IACR Cryptol. ePrint Arch. 2021: 819 (2021) - [i56]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. IACR Cryptol. ePrint Arch. 2021: 820 (2021) - [i55]Christof Beierle, Patrick Felke, Gregor Leander:
To Shift or Not to Shift: Understanding GEA-1. IACR Cryptol. ePrint Arch. 2021: 829 (2021) - [i54]Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh:
The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. IACR Cryptol. ePrint Arch. 2021: 960 (2021) - [i53]Marek Broll, Federico Canale, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia:
Generic Framework for Key-Guessing Improvements. IACR Cryptol. ePrint Arch. 2021: 1238 (2021) - [i52]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees against Integral Distinguishers. IACR Cryptol. ePrint Arch. 2021: 1502 (2021) - 2020
- [j39]Christof Beierle, Gregor Leander:
4-uniform permutations with null nonlinearity. Cryptogr. Commun. 12(6): 1133-1141 (2020) - [j38]Phil Hebborn, Gregor Leander:
Dasta - Alternative Linear Layer for Rasta. IACR Trans. Symmetric Cryptol. 2020(3): 46-86 (2020) - [j37]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [j36]Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. IACR Trans. Symmetric Cryptol. 2020(S1): 295-349 (2020) - [c54]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. ASIACRYPT (1) 2020: 537-566 - [c53]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c52]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. CRYPTO (3) 2020: 329-358 - [c51]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [c50]Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. INDOCRYPT 2020: 345-369 - [c49]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Distinguishers for AES. SAC 2020: 141-170 - [c48]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. SAC 2020: 483-511 - [d2]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Dimension Eight. Zenodo, 2020 - [d1]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Small Dimension. Zenodo, 2020 - [i51]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. CoRR abs/2003.12006 (2020) - [i50]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. CoRR abs/2009.07204 (2020) - [i49]Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, Kan Yasuda:
Symmetric Cryptography (Dagstuhl Seminar 20041). Dagstuhl Reports 10(1): 130-143 (2020) - [i48]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i47]Christof Beierle, Gregor Leander:
4-Uniform Permutations with Null Nonlinearity. IACR Cryptol. ePrint Arch. 2020: 334 (2020) - [i46]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i45]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. IACR Cryptol. ePrint Arch. 2020: 775 (2020) - [i44]Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer:
On the security of the Rescue hash function. IACR Cryptol. ePrint Arch. 2020: 820 (2020) - [i43]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1051 (2020) - [i42]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. IACR Cryptol. ePrint Arch. 2020: 1269 (2020) - [i41]Maria Eichlseder, Gregor Leander, Shahram Rasoolzadeh:
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1356 (2020)
2010 – 2019
- 2019
- [j35]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4): 1383-1422 (2019) - [j34]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Trans. Symmetric Cryptol. 2019(1): 5-45 (2019) - [j33]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019) - [c47]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. CT-RSA 2019: 293-312 - [c46]Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
bison Instantiating the Whitened Swap-Or-Not Construction. EUROCRYPT (3) 2019: 585-616 - [i40]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Cryptol. ePrint Arch. 2019: 185 (2019) - [i39]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Cryptol. ePrint Arch. 2019: 210 (2019) - [i38]Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer:
Weak-Key Subspace Trails and Applications to AES. IACR Cryptol. ePrint Arch. 2019: 852 (2019) - 2018
- [j32]Yunwen Liu, Vincent Rijmen, Gregor Leander:
Nonlinear diffusion layers. Des. Codes Cryptogr. 86(11): 2469-2484 (2018) - [j31]Gregor Leander, Cihangir Tezcan, Friedrich Wiemer:
Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): 74-100 (2018) - [j30]Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - [j29]Christof Beierle, Anne Canteaut, Gregor Leander:
Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): 80-101 (2018) - [c45]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit. CRYPTO (1) 2018: 662-692 - [c44]Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
BISON - Instantiating the Whitened Swap-Or-Not Construction. Krypto-Tag 2018 - [i37]Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg:
Symmetric Cryptography (Dagstuhl Seminar 18021). Dagstuhl Reports 8(1): 1-32 (2018) - [i36]Christoph Dobraunig, Maria Eichlseder, Lorenzo Grassi, Virginie Lallemand, Gregor Leander, Eik List, Florian Mendel, Christian Rechberger:
Rasta: A cipher with low ANDdepth and few ANDs per bit. IACR Cryptol. ePrint Arch. 2018: 181 (2018) - [i35]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptol. ePrint Arch. 2018: 793 (2018) - [i34]Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
BISON - Instantiating the Whitened Swap-Or-Not Construction. IACR Cryptol. ePrint Arch. 2018: 1011 (2018) - 2017
- [j28]Christina Boura, Anne Canteaut, Lars R. Knudsen, Gregor Leander:
Reflection ciphers. Des. Codes Cryptogr. 82(1-2): 3-25 (2017) - [j27]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptogr. Eng. 7(2): 149-165 (2017) - [j26]Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. J. Cryptol. 30(3): 859-888 (2017) - [j25]Thorsten Kranz, Gregor Leander, Friedrich Wiemer:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): 474-505 (2017) - [j24]Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(4): 188-211 (2017) - [c43]Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. ASIACRYPT (2) 2017: 161-178 - [c42]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: 647-678 - [i33]Thorsten Kranz, Friedrich Wiemer, Gregor Leander:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 154 (2017) - [i32]Gregor Leander, Alexander May:
Grover Meets Simon - Quantumly Attacking the FX-construction. IACR Cryptol. ePrint Arch. 2017: 427 (2017) - [i31]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. IACR Cryptol. ePrint Arch. 2017: 463 (2017) - [i30]Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Cryptol. ePrint Arch. 2017: 1151 (2017) - 2016
- [j23]Luis Alberto Benthin Sanguino, Gregor Leander, Christof Paar, Bernhard Esslinger, Ingo Niebel:
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. Cryptologia 40(3): 261-284 (2016) - [c41]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c40]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. CHES 2016: 171-193 - [c39]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c38]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. CRYPTO (1) 2016: 625-653 - [e2]Tim Güneysu, Gregor Leander, Amir Moradi:
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5 [contents] - [i29]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 119 (2016) - [i28]Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptol. ePrint Arch. 2016: 647 (2016) - [i27]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - [i26]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptol. ePrint Arch. 2016: 732 (2016) - 2015
- [c37]Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON Block Cipher Family. CRYPTO (1) 2015: 161-185 - [c36]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [c35]Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. EUROCRYPT (1) 2015: 254-283 - [c34]Oliver Stecklina, Stephan Kornemann, Felix Grehl, Ramona Jung, Thorsten Kranz, Gregor Leander, Dennis Schweer, Katharina Mollus, Dirk Westhoff:
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes. I4CS 2015: 1-8 - [c33]Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander:
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. SecureComm 2015: 97-115 - [e1]Gregor Leander:
Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9054, Springer 2015, ISBN 978-3-662-48115-8 [contents] - [i25]Gregor Leander, Brice Minaud, Sondre Rønjom:
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. IACR Cryptol. ePrint Arch. 2015: 68 (2015) - [i24]Stefan Kölbl, Gregor Leander, Tyge Tiessen:
Observations on the SIMON block cipher family. IACR Cryptol. ePrint Arch. 2015: 145 (2015) - [i23]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015) - [i22]Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. IACR Cryptol. ePrint Arch. 2015: 507 (2015) - 2014
- [c32]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus on the Linear Layer (feat. PRIDE). CRYPTO (1) 2014: 57-76 - [c31]Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. FSE 2014: 411-430 - [i21]Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçin:
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version. IACR Cryptol. ePrint Arch. 2014: 453 (2014) - 2013
- [j22]Sugata Gangopadhyay, Anand B. Joshi, Gregor Leander, Rajendra Kumar Sharma:
A new construction of bent functions based on $${\mathbb{Z}}$$ -bent functions. Des. Codes Cryptogr. 66(1-3): 243-256 (2013) - [j21]Pawel Swierczynski, Gregor Leander, Christof Paar:
Keccak und der SHA-2. Datenschutz und Datensicherheit 37(11): 712-719 (2013) - [j20]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Slender-Set Differential Cryptanalysis. J. Cryptol. 26(1): 11-38 (2013) - [j19]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IEEE Trans. Computers 62(10): 2041-2053 (2013) - [c30]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David F. Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. CRYPTO (1) 2013: 147-164 - [c29]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. CRYPTO (1) 2013: 204-221 - [c28]Elif Bilge Kavun, Gregor Leander, Tolga Yalçin:
A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices. ReConFig 2013: 1-8 - [i20]Céline Blondeau, Andrey Bogdanov, Gregor Leander:
Bounds in Shallows and in Miseries. IACR Cryptol. ePrint Arch. 2013: 482 (2013) - [i19]Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David F. Oswald, Falk Schellenberg, Christof Paar:
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version. IACR Cryptol. ePrint Arch. 2013: 598 (2013) - 2012
- [j18]Peter Beelen, Gregor Leander:
A new construction of highly nonlinear S-boxes. Cryptogr. Commun. 4(1): 65-77 (2012) - [c27]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract. ASIACRYPT 2012: 208-225 - [c26]Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang:
Integral and Multidimensional Linear Distinguishers with Correlation Zero. ASIACRYPT 2012: 244-261 - [c25]Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander:
On the Distribution of Linear Biases: Three Instructive Examples. CRYPTO 2012: 50-67 - [c24]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract). EUROCRYPT 2012: 45-62 - [c23]Martin R. Albrecht, Gregor Leander:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Selected Areas in Cryptography 2012: 1-15 - [i18]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, François-Xavier Standaert, John P. Steinberger, Elmar Tischhauser:
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. IACR Cryptol. ePrint Arch. 2012: 35 (2012) - [i17]Mohamed Ahmed Abdelraheem, Martin Ågren, Peter Beelen, Gregor Leander:
On The Distribution of Linear Biases: Three Instructive Examples. IACR Cryptol. ePrint Arch. 2012: 303 (2012) - [i16]Martin R. Albrecht, Gregor Leander:
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. IACR Cryptol. ePrint Arch. 2012: 401 (2012) - [i15]Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçin:
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version). IACR Cryptol. ePrint Arch. 2012: 529 (2012) - 2011
- [j17]Philippe Langevin, Gregor Leander:
Counting all bent functions in dimension eight 99270589265934370305785861242880. Des. Codes Cryptogr. 59(1-3): 193-205 (2011) - [j16]Gregor Leander, François Rodier:
Bounds on the degree of APN polynomials: the case of x-1 + g(x). Des. Codes Cryptogr. 59(1-3): 207-222 (2011) - [j15]André Kündgen, Gregor Leander, Carsten Thomassen:
Switchings, extensions, and reductions in central digraphs. J. Comb. Theory A 118(7): 2025-2034 (2011) - [c22]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
spongent: A Lightweight Hash Function. CHES 2011: 312-325 - [c21]Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Alkhzaimi, Erik Zenner:
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. CRYPTO 2011: 206-221 - [c20]Gregor Leander:
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. EUROCRYPT 2011: 303-322 - [c19]Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner:
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. FSE 2011: 1-17 - [c18]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. FSE 2011: 270-289 - [r2]Lars R. Knudsen, Gregor Leander:
C2 - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 179-180 - [r1]Lars R. Knudsen, Gregor Leander:
PRESENT - Block Cipher. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 953-955 - [i14]Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. IACR Cryptol. ePrint Arch. 2011: 697 (2011) - 2010
- [j14]Carl Bracken, Gregor Leander:
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Their Appl. 16(4): 231-242 (2010) - [c17]Lars R. Knudsen, Gregor Leander, Axel Poschmann, Matthew J. B. Robshaw:
PRINTcipher: A Block Cipher for IC-Printing. CHES 2010: 16-32 - [i13]Gregor Leander:
Small Scale Variants Of The Block Cipher PRESENT. IACR Cryptol. ePrint Arch. 2010: 143 (2010) - [i12]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen:
Cryptanalysis of PRESENT-like ciphers with secret S-boxes. IACR Cryptol. ePrint Arch. 2010: 574 (2010)
2000 – 2009
- 2009
- [j13]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. Finite Fields Their Appl. 15(2): 150-159 (2009) - [j12]Gregor Leander, Gary McGuire:
Construction of bent functions from near-bent functions. J. Comb. Theory A 116(4): 960-970 (2009) - [c16]Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz:
Cryptanalysis of C2. CRYPTO 2009: 250-266 - [c15]Gregor Leander, Erik Zenner, Philip Hawkes:
Cache Timing Analysis of LFSR-Based Stream Ciphers. IMACC 2009: 433-445 - [c14]Mathias Herrmann, Gregor Leander:
A Practical Key Recovery Attack on Basic TCHo. Public Key Cryptography 2009: 411-424 - [p1]Peter Beelen, Gregor Leander:
Reconstruction of Highly Non Linear Sboxes from Linear Codes. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 153-159 - [i11]Carl Bracken, Gregor Leander:
A Highly Nonlinear Differentially 4 Uniform Power Mapping That Permutes Fields of Even Degree. CoRR abs/0901.1824 (2009) - [i10]Gregor Leander, François Rodier:
Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$. CoRR abs/0901.4322 (2009) - [i9]Valérie Gauthier-Umaña, Gregor Leander:
Practical Key Recovery Attacks On Two McEliece Variants. IACR Cryptol. ePrint Arch. 2009: 509 (2009) - 2008
- [j11]Hans Dobbertin, Gregor Leander:
Bent functions embedded into the recursive framework of ℤ-bent functions. Des. Codes Cryptogr. 49(1-3): 3-22 (2008) - [j10]Marcus Brinkmann, Gregor Leander:
On the classification of APN functions up to dimension five. Des. Codes Cryptogr. 49(1-3): 273-288 (2008) - [j9]Philippe Langevin, Gregor Leander:
Monomial bent functions and Stickelberger's theorem. Finite Fields Their Appl. 14(3): 727-742 (2008) - [j8]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes. IEEE Trans. Inf. Theory 54(6): 2644-2657 (2008) - [j7]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions. IEEE Trans. Inf. Theory 54(9): 4218-4229 (2008) - [c13]Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W. Dent, Ahmad-Reza Sadeghi:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. ASIACRYPT 2008: 489-505 - [c12]Carsten Rolfes, Axel Poschmann, Gregor Leander, Christof Paar:
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. CARDIS 2008: 89-103 - [c11]Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin:
Hash Functions and RFID Tags: Mind the Gap. CHES 2008: 283-299 - 2007
- [j6]Philippe Langevin, Gregor Leander, Gary McGuire:
A Counterexample to a Conjecture of Niho. IEEE Trans. Inf. Theory 53(12): 4785-4786 (2007) - [c10]Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe:
PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007: 450-466 - [c9]Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm:
New Lightweight DES Variants. FSE 2007: 196-210 - [c8]Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar:
New Light-Weight Crypto Algorithms for RFID. ISCAS 2007: 1843-1846 - [c7]Gregor Leander, Axel Poschmann:
On the Classification of 4 Bit S-Boxes. WAIFI 2007: 159-176 - [i8]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Constructing new APN functions from known ones. IACR Cryptol. ePrint Arch. 2007: 63 (2007) - [i7]Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent:
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. IACR Cryptol. ePrint Arch. 2007: 360 (2007) - 2006
- [j5]Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor Leander:
Finding nonnormal bent functions. Discret. Appl. Math. 154(2): 202-218 (2006) - [j4]Hans Dobbertin, Gregor Leander, Anne Canteaut, Claude Carlet, Patrick Felke, Philippe Gaborit:
Construction of bent functions via Niho power functions. J. Comb. Theory A 113(5): 779-798 (2006) - [j3]Nils Gregor Leander:
Monomial bent functions. IEEE Trans. Inf. Theory 52(2): 738-743 (2006) - [j2]Gregor Leander, Alexander Kholosha:
Bent Functions With 2r Niho Exponents. IEEE Trans. Inf. Theory 52(12): 5529-5532 (2006) - [c6]Gregor Leander, Andy Rupp:
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. ASIACRYPT 2006: 241-251 - [c5]Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. ISIT 2006: 2637-2641 - [i6]Lilya Budaghyan, Claude Carlet, Gregor Leander:
Another class of quadratic APN binomials over F2n: the case n divisible by 4. IACR Cryptol. ePrint Arch. 2006: 428 (2006) - [i5]Lilya Budaghyan, Claude Carlet, Gregor Leander:
A class of quadratic APN binomials inequivalent to power functions. IACR Cryptol. ePrint Arch. 2006: 445 (2006) - 2005
- [c4]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. CRYPTO 2005: 327-343 - [c3]Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. TCC 2005: 283-302 - [i4]Hans Dobbertin, Gregor Leander:
Cryptographer's Toolkit for Construction of 8-Bit Bent Functions. IACR Cryptol. ePrint Arch. 2005: 89 (2005) - [i3]Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander:
An infinite class of quadratic APN functions which are not equivalent to power mappings. IACR Cryptol. ePrint Arch. 2005: 359 (2005) - 2004
- [j1]Claude Carlet, Hans Dobbertin, Gregor Leander:
Normal Extensions of Bent Functions. IEEE Trans. Inf. Theory 50(11): 2880-2885 (2004) - [c2]Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar:
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. CHES 2004: 163-175 - [c1]Hans Dobbertin, Gregor Leander:
A Survey of Some Recent Results on Bent Functions. SETA 2004: 1-29 - [i2]Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró:
On codes, matroids and secure multi-party computation from linear secret sharing schemes. IACR Cryptol. ePrint Arch. 2004: 245 (2004) - [i1]Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. IACR Cryptol. ePrint Arch. 2004: 359 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint