Gregor Leander

According to our database1, Gregor Leander authored at least 124 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.
IACR Trans. Symmetric Cryptol., 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Trans. Symmetric Cryptol., 2019

Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
J. Cryptology, 2019

Weak-Key Subspace Trails and Applications to AES.
IACR Cryptology ePrint Archive, 2019

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.
IACR Cryptology ePrint Archive, 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptology ePrint Archive, 2019

bison Instantiating the Whitened Swap-Or-Not Construction.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Searching for Subspace Trails and Truncated Differentials.
IACR Trans. Symmetric Cryptol., 2018

Nonlinear Approximations in Cryptanalysis Revisited.
IACR Trans. Symmetric Cryptol., 2018

ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.
IACR Trans. Symmetric Cryptol., 2018

Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions.
IACR Cryptology ePrint Archive, 2018

Rasta: A cipher with low ANDdepth and few ANDs per bit.
IACR Cryptology ePrint Archive, 2018

BISON - Instantiating the Whitened Swap-Or-Not Construction.
IACR Cryptology ePrint Archive, 2018

Nonlinear diffusion layers.
Des. Codes Cryptogr., 2018

Symmetric Cryptography (Dagstuhl Seminar 18021).
Dagstuhl Reports, 2018

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Shorter Linear Straight-Line Programs for MDS Matrices.
IACR Trans. Symmetric Cryptol., 2017

Differential-Linear Cryptanalysis Revisited.
J. Cryptology, 2017

Strong 8-bit Sboxes with efficient masking in hardware extended version.
J. Cryptographic Engineering, 2017

Grover Meets Simon - Quantumly Attacking the FX-construction.
IACR Cryptology ePrint Archive, 2017

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers.
IACR Cryptology ePrint Archive, 2017

Shorter Linear Straight-Line Programs for MDS Matrices.
IACR Cryptology ePrint Archive, 2017

Proving Resistance against Invariant Attacks: How to Choose the Round Constants.
IACR Cryptology ePrint Archive, 2017

Reflection ciphers.
Des. Codes Cryptogr., 2017

Proving Resistance Against Invariant Attacks: How to Choose the Round Constants.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Grover Meets Simon - Quantumly Attacking the FX-construction.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64.
IACR Cryptology ePrint Archive, 2016

Strong 8-bit Sboxes with Efficient Masking in Hardware.
IACR Cryptology ePrint Archive, 2016

Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices.
IACR Cryptology ePrint Archive, 2016

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
IACR Cryptology ePrint Archive, 2016

Analyzing the Spanish strip cipher by combining combinatorial and statistical methods.
Cryptologia, 2016

Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Strong 8-bit Sboxes with Efficient Masking in Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
IACR Cryptology ePrint Archive, 2015

Observations on the SIMON block cipher family.
IACR Cryptology ePrint Archive, 2015

Decomposing the ASASA Block Cipher Construction.
IACR Cryptology ePrint Archive, 2015

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.
IACR Cryptology ePrint Archive, 2015

Intrinsic Code Attestation by Instruction Chaining for Embedded Devices.
Proceedings of the Security and Privacy in Communication Networks, 2015

Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes.
Proceedings of the 15th International Conference on Innovations for Community Services, 2015

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.
Proceedings of the Topics in Cryptology, 2015

Observations on the SIMON Block Cipher Family.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version.
IACR Cryptology ePrint Archive, 2014

Differential-Linear Cryptanalysis Revisited.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Block Ciphers - Focus on the Linear Layer (feat. PRIDE).
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
SPONGENT: The Design Space of Lightweight Cryptographic Hashing.
IEEE Trans. Computers, 2013

Slender-Set Differential Cryptanalysis.
J. Cryptology, 2013

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.
IACR Cryptology ePrint Archive, 2013

Bounds in Shallows and in Miseries.
IACR Cryptology ePrint Archive, 2013

Keccak und der SHA-2.
Datenschutz und Datensicherheit, 2013

A new construction of bent functions based on $${\mathbb{Z}}$$ -bent functions.
Des. Codes Cryptogr., 2013

A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2013

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Bounds in Shallows and in Miseries.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptology ePrint Archive, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptology ePrint Archive, 2012

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.
IACR Cryptology ePrint Archive, 2012

On The Distribution of Linear Biases: Three Instructive Examples.
IACR Cryptology ePrint Archive, 2012

A new construction of highly nonlinear S-boxes.
Cryptography and Communications, 2012

An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

On the Distribution of Linear Biases: Three Instructive Examples.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Integral and Multidimensional Linear Distinguishers with Correlation Zero.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
PRESENT - Block Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

C2 - Block Cipher.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Switchings, extensions, and reductions in central digraphs.
J. Comb. Theory, Ser. A, 2011

SPONGENT: The Design Space of Lightweight Cryptographic Hashing.
IACR Cryptology ePrint Archive, 2011

Bounds on the degree of APN polynomials: the case of x-1 + g(x).
Des. Codes Cryptogr., 2011

Counting all bent functions in dimension eight 99270589265934370305785861242880.
Des. Codes Cryptogr., 2011

Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

spongent: A Lightweight Hash Function.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
Small Scale Variants Of The Block Cipher PRESENT.
IACR Cryptology ePrint Archive, 2010

Cryptanalysis of PRESENT-like ciphers with secret S-boxes.
IACR Cryptology ePrint Archive, 2010

A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree.
Finite Fields and Their Applications, 2010

PRINTcipher: A Block Cipher for IC-Printing.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Reconstruction of Highly Non Linear Sboxes from Linear Codes.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Construction of bent functions from near-bent functions.
J. Comb. Theory, Ser. A, 2009

Practical Key Recovery Attacks On Two McEliece Variants.
IACR Cryptology ePrint Archive, 2009

Constructing new APN functions from known ones.
Finite Fields and Their Applications, 2009

Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$
CoRR, 2009

A Highly Nonlinear Differentially 4 Uniform Power Mapping That Permutes Fields of Even Degree
CoRR, 2009

A Practical Key Recovery Attack on Basic TCHo.
Proceedings of the Public Key Cryptography, 2009

Cache Timing Analysis of LFSR-Based Stream Ciphers.
Proceedings of the Cryptography and Coding, 2009

Cryptanalysis of C2.
Proceedings of the Advances in Cryptology, 2009

2008
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes.
IEEE Trans. Information Theory, 2008

Two Classes of Quadratic APN Binomials Inequivalent to Power Functions.
IEEE Trans. Information Theory, 2008

Monomial bent functions and Stickelberger's theorem.
Finite Fields and Their Applications, 2008

Bent functions embedded into the recursive framework of ℤ-bent functions.
Des. Codes Cryptogr., 2008

On the classification of APN functions up to dimension five.
Des. Codes Cryptogr., 2008

Hash Functions and RFID Tags: Mind the Gap.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents.
Proceedings of the Smart Card Research and Advanced Applications, 2008

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
Proceedings of the Advances in Cryptology, 2008

2007
A Counterexample to a Conjecture of Niho.
IEEE Trans. Information Theory, 2007

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
IACR Cryptology ePrint Archive, 2007

Constructing new APN functions from known ones.
IACR Cryptology ePrint Archive, 2007

On the Classification of 4 Bit S-Boxes.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

New Light-Weight Crypto Algorithms for RFID.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

New Lightweight DES Variants.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

PRESENT: An Ultra-Lightweight Block Cipher.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Bent Functions With 2r Niho Exponents.
IEEE Trans. Information Theory, 2006

Monomial bent functions.
IEEE Trans. Information Theory, 2006

Construction of bent functions via Niho power functions.
J. Comb. Theory, Ser. A, 2006

A class of quadratic APN binomials inequivalent to power functions.
IACR Cryptology ePrint Archive, 2006

Another class of quadratic APN binomials over F2n: the case n divisible by 4.
IACR Cryptology ePrint Archive, 2006

Finding nonnormal bent functions.
Discrete Applied Mathematics, 2006

An infinite class of quadratic APN functions which are not equivalent to power mappings.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms.
Proceedings of the Advances in Cryptology, 2006

2005
Cryptographer's Toolkit for Construction of 8-Bit Bent Functions.
IACR Cryptology ePrint Archive, 2005

An infinite class of quadratic APN functions which are not equivalent to power mappings.
IACR Cryptology ePrint Archive, 2005

Secure Computation of the Mean and Related Statistics.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2005

2004
Normal Extensions of Bent Functions.
IEEE Trans. Information Theory, 2004

Secure Computation of the Mean and Related Statistics.
IACR Cryptology ePrint Archive, 2004

On codes, matroids and secure multi-party computation from linear secret sharing schemes.
IACR Cryptology ePrint Archive, 2004

A Survey of Some Recent Results on Bent Functions.
Proceedings of the Sequences and Their Applications, 2004

A Collision-Attack on AES: Combining Side Channel- and Differential-Attack.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004


  Loading...