Gregor Leander

From MaRDI portal
Person:510443

Available identifiers

zbMath Open leander.gregorWikidataQ58334832 ScholiaQ58334832MaRDI QIDQ510443

List of research outcomes

PublicationDate of PublicationType
On perfect linear approximations and differentials over two-round SPNs2024-02-02Paper
Differential meet-in-the-middle cryptanalysis2024-02-02Paper
Pitfalls and shortcomings for decompositions and alignment2023-12-08Paper
Constructing and deconstructing intentional weaknesses in symmetric ciphers2023-06-30Paper
Simon's algorithm and symmetric crypto: generalizations and automatized applications2023-06-30Paper
Strong and tight security guarantees against integral distinguishers2023-05-12Paper
Generic framework for key-guessing improvements2023-05-12Paper
Lower bounds on the degree of block ciphers2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers2022-11-14Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers2022-07-06Paper
New attacks from old distinguishers improved attacks on serpent2022-07-06Paper
A further study of quadratic APN permutations in dimension nine2022-05-09Paper
Trims and extensions of quadratic APN functions2022-03-31Paper
Weak-key distinguishers for AES2022-03-25Paper
PRINCEv2. More security for (almost) no overhead2022-03-25Paper
New Instances of Quadratic APN Functions2022-02-17Paper
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-22021-12-08Paper
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD2021-12-01Paper
Modeling for three-subset division property without unknown subset2021-08-10Paper
Linearly Self-Equivalent APN Permutations in Small Dimension2021-07-23Paper
4-uniform permutations with null nonlinearity2021-07-13Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions2020-01-28Paper
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori642019-11-27Paper
Nonlinear diffusion layers2018-10-10Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Grover meets Simon -- quantumly attacking the FX-construction2018-03-08Paper
Strong 8-bit sboxes with efficient masking in hardware2018-02-14Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Differential-linear cryptanalysis revisited2017-10-12Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing2017-07-12Paper
Reflection ciphers2017-02-10Paper
Nonlinear Invariant Attack2017-01-06Paper
Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices2016-11-30Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS2016-10-27Paper
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows2016-03-02Paper
Observations on the SIMON Block Cipher Family2015-12-10Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers2015-12-04Paper
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro2015-09-30Paper
Differential-Linear Cryptanalysis Revisited2015-09-18Paper
https://portal.mardi4nfdi.de/entity/Q28760942014-08-15Paper
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)2014-08-07Paper
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System2013-09-02Paper
Bounds in Shallows and in Miseries2013-09-02Paper
Slender-set differential cryptanalysis2013-04-15Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Integral and Multidimensional Linear Distinguishers with Correlation Zero2013-03-19Paper
On the Distribution of Linear Biases: Three Instructive Examples2012-09-25Paper
https://portal.mardi4nfdi.de/entity/Q29052122012-08-26Paper
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations2012-06-29Paper
A new construction of highly nonlinear S-boxes2012-02-21Paper
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack2011-08-12Paper
Switchings, extensions, and reductions in central digraphs2011-07-07Paper
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations2011-07-07Paper
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes2011-07-07Paper
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN2011-05-27Paper
Counting all bent functions in dimension eight 992705892659343703057858612428802011-04-08Paper
Bounds on the degree of APN polynomials: the case of \(x^{-1} + g(x)\)2011-04-08Paper
PRINTcipher: A Block Cipher for IC-Printing2010-08-17Paper
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree2010-07-07Paper
Cache Timing Analysis of LFSR-Based Stream Ciphers2010-01-07Paper
Cryptanalysis of C22009-10-20Paper
https://portal.mardi4nfdi.de/entity/Q36355472009-07-06Paper
Construction of bent functions from near-bent functions2009-06-17Paper
Constructing new APN functions from known ones2009-04-08Paper
Bent functions embedded into the recursive framework of \(\mathbb{Z}\)-bent functions2009-03-31Paper
On the classification of APN functions up to dimension five2009-03-31Paper
A Practical Key Recovery Attack on Basic TCHo2009-03-24Paper
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes2009-02-24Paper
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions2009-02-24Paper
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35975202009-02-09Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
Normal Extensions of Bent Functions2008-12-21Paper
Monomial bent functions2008-12-21Paper
Bent Functions With $2^r$ Niho Exponents2008-12-21Paper
A Counterexample to a Conjecture of Niho2008-12-21Paper
https://portal.mardi4nfdi.de/entity/Q35453262008-12-10Paper
https://portal.mardi4nfdi.de/entity/Q35453662008-12-10Paper
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents2008-11-06Paper
New Lightweight DES Variants2008-09-16Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
Monomial bent functions and Stickelberger's theorem2008-08-27Paper
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms2008-04-24Paper
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes2008-03-17Paper
A Survey of Some Recent Results on Bent Functions2008-03-14Paper
On the Classification of 4 Bit S-Boxes2007-11-15Paper
Construction of bent functions via Niho power functions2006-08-04Paper
Finding nonnormal bent functions2006-04-28Paper
Theory of Cryptography2005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Gregor Leander