Gregor Leander

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits
 
2024-12-13Paper
Falling into bytes and pieces -- cryptanalysis of an Apple patent application
 
2024-10-23Paper
Another class of non-normal bent functions
 
2024-09-18Paper
New families of functions with differential uniformity of 4
 
2024-09-18Paper
On perfect linear approximations and differentials over two-round SPNs
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Differential meet-in-the-middle cryptanalysis
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Pitfalls and shortcomings for decompositions and alignment
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Constructing and deconstructing intentional weaknesses in symmetric ciphers
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Simon's algorithm and symmetric crypto: generalizations and automatized applications
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Strong and tight security guarantees against integral distinguishers
Lecture Notes in Computer Science
2023-05-12Paper
Generic framework for key-guessing improvements
Lecture Notes in Computer Science
2023-05-12Paper
Lower bounds on the degree of block ciphers
 
2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
 
2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers
Advances in Cryptology – CRYPTO 2020
2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers
Journal of Cryptology
2022-11-14Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers
 
2022-07-06Paper
New attacks from old distinguishers improved attacks on serpent
 
2022-07-06Paper
A further study of quadratic APN permutations in dimension nine
Finite Fields and their Applications
2022-05-09Paper
Trims and extensions of quadratic APN functions
Designs, Codes and Cryptography
2022-03-31Paper
Weak-key distinguishers for AES
 
2022-03-25Paper
PRINCEv2. More security for (almost) no overhead
 
2022-03-25Paper
New Instances of Quadratic APN Functions
IEEE Transactions on Information Theory
2022-02-17Paper
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2
 
2021-12-08Paper
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD
 
2021-12-01Paper
Modeling for three-subset division property without unknown subset
Journal of Cryptology
2021-08-10Paper
Linearly Self-Equivalent APN Permutations in Small Dimension
IEEE Transactions on Information Theory
2021-07-23Paper
4-uniform permutations with null nonlinearity
Cryptography and Communications
2021-07-13Paper
BISON instantiating the whitened swap-or-not construction
 
2020-02-04Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions
 
2020-01-28Paper
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
Journal of Cryptology
2019-11-27Paper
Nonlinear diffusion layers
Designs, Codes and Cryptography
2018-10-10Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit
 
2018-09-12Paper
Grover meets Simon -- quantumly attacking the FX-construction
 
2018-03-08Paper
Strong 8-bit sboxes with efficient masking in hardware
 
2018-02-14Paper
Proving resistance against invariant attacks: how to choose the round constants
 
2017-11-15Paper
Differential-linear cryptanalysis revisited
Journal of Cryptology
2017-10-12Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
IEEE Transactions on Computers
2017-07-12Paper
Reflection ciphers
Designs, Codes and Cryptography
2017-02-10Paper
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Analyzing permutations for AES-like ciphers: understanding shiftrows
Lecture Notes in Computer Science
2016-03-02Paper
Observations on the \textsf{SIMON} block cipher family
Lecture Notes in Computer Science
2015-12-10Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Selected Areas in Cryptography
2015-12-04Paper
A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Differential-Linear Cryptanalysis Revisited
Fast Software Encryption
2015-09-18Paper
Normality of bent functions monomial and binomial bent functions
 
2014-08-15Paper
Block ciphers -- focus on the linear layer (feat. PRIDE)
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Bounds in shallows and in miseries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Slender-set differential cryptanalysis
Journal of Cryptology
2013-04-15Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Integral and multidimensional linear distinguishers with correlation zero
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
On the Distribution of Linear Biases: Three Instructive Examples
Lecture Notes in Computer Science
2012-09-25Paper
Analysis of Kasami-Welch functions in odd dimension using Stickelberger's theorem
Journal of Combinatorics and Number Theory
2012-08-26Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A new construction of highly nonlinear S-boxes
Cryptography and Communications
2012-02-21Paper
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Switchings, extensions, and reductions in central digraphs
Journal of Combinatorial Theory. Series A
2011-07-07Paper
Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
Fast Software Encryption
2011-07-07Paper
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Fast Software Encryption
2011-07-07Paper
On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Counting all bent functions in dimension eight 99270589265934370305785861242880
Designs, Codes and Cryptography
2011-04-08Paper
Bounds on the degree of APN polynomials: the case of \(x^{-1} + g(x)\)
Designs, Codes and Cryptography
2011-04-08Paper
PRINTcipher: A Block Cipher for IC-Printing
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
Finite Fields and their Applications
2010-07-07Paper
Cache timing analysis of LFSR-based stream ciphers
Cryptography and Coding
2010-01-07Paper
Cryptanalysis of C2
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Kasami bent functions are not equivalent to their duals
 
2009-07-06Paper
Construction of bent functions from near-bent functions
Journal of Combinatorial Theory. Series A
2009-06-17Paper
Constructing new APN functions from known ones
Finite Fields and their Applications
2009-04-08Paper
On the classification of APN functions up to dimension five
Designs, Codes and Cryptography
2009-03-31Paper
Bent functions embedded into the recursive framework of \(\mathbb{Z}\)-bent functions
Designs, Codes and Cryptography
2009-03-31Paper
A Practical Key Recovery Attack on Basic TCHo
Public Key Cryptography – PKC 2009
2009-03-24Paper
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions
IEEE Transactions on Information Theory
2009-02-24Paper
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
IEEE Transactions on Information Theory
2009-02-24Paper
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
scientific article; zbMATH DE number 5504476 (Why is no real title available?)
 
2009-02-09Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
Monomial bent functions
IEEE Transactions on Information Theory
2008-12-21Paper
Bent Functions With $2^r$ Niho Exponents
IEEE Transactions on Information Theory
2008-12-21Paper
Normal Extensions of Bent Functions
IEEE Transactions on Information Theory
2008-12-21Paper
A Counterexample to a Conjecture of Niho
IEEE Transactions on Information Theory
2008-12-21Paper
On exponents with highly divisible Fourier coefficients and conjectures of Niho and Dobbertin
 
2008-12-10Paper
Algebraic problems in symmetric cryptography: two recent results on highly nonlinear functions
 
2008-12-10Paper
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
Smart Card Research and Advanced Applications
2008-11-06Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
New Lightweight DES Variants
Fast Software Encryption
2008-09-16Paper
Monomial bent functions and Stickelberger's theorem
Finite Fields and their Applications
2008-08-27Paper
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
A Survey of Some Recent Results on Bent Functions
Sequences and Their Applications - SETA 2004
2008-03-14Paper
On the Classification of 4 Bit S-Boxes
Arithmetic of Finite Fields
2007-11-15Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Finding nonnormal bent functions
Discrete Applied Mathematics
2006-04-28Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Gregor Leander