Gregor Leander

From MaRDI portal
(Redirected from Person:510443)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Integral resistance of block ciphers with key whitening by modular addition2026-02-06Paper
INDIANA -- verifying (random) probing security through indistinguishability analysis2025-12-02Paper
\textsc{ChiLow} and \textsc{ChiChi}: new constructions for code encryption2025-11-20Paper
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits2024-12-13Paper
Falling into bytes and pieces -- cryptanalysis of an Apple patent application2024-10-23Paper
Another class of non-normal bent functions2024-09-18Paper
New families of functions with differential uniformity of 42024-09-18Paper
On perfect linear approximations and differentials over two-round SPNs
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Differential meet-in-the-middle cryptanalysis
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Pitfalls and shortcomings for decompositions and alignment
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Constructing and deconstructing intentional weaknesses in symmetric ciphers
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Simon's algorithm and symmetric crypto: generalizations and automatized applications
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Strong and tight security guarantees against integral distinguishers
Lecture Notes in Computer Science
2023-05-12Paper
Generic framework for key-guessing improvements
Lecture Notes in Computer Science
2023-05-12Paper
Lower bounds on the degree of block ciphers2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers
Advances in Cryptology – CRYPTO 2020
2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers
Journal of Cryptology
2022-11-14Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers2022-07-06Paper
New attacks from old distinguishers improved attacks on serpent2022-07-06Paper
A further study of quadratic APN permutations in dimension nine
Finite Fields and their Applications
2022-05-09Paper
Trims and extensions of quadratic APN functions
Designs, Codes and Cryptography
2022-03-31Paper
Weak-key distinguishers for AES2022-03-25Paper
PRINCEv2. More security for (almost) no overhead2022-03-25Paper
New Instances of Quadratic APN Functions
IEEE Transactions on Information Theory
2022-02-17Paper
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-22021-12-08Paper
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD2021-12-01Paper
Modeling for three-subset division property without unknown subset
Journal of Cryptology
2021-08-10Paper
Linearly Self-Equivalent APN Permutations in Small Dimension
IEEE Transactions on Information Theory
2021-07-23Paper
4-uniform permutations with null nonlinearity
Cryptography and Communications
2021-07-13Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions2020-01-28Paper
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
Journal of Cryptology
2019-11-27Paper
Nonlinear diffusion layers
Designs, Codes and Cryptography
2018-10-10Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Grover meets Simon -- quantumly attacking the FX-construction2018-03-08Paper
Strong 8-bit sboxes with efficient masking in hardware2018-02-14Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Differential-linear cryptanalysis revisited
Journal of Cryptology
2017-10-12Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
IEEE Transactions on Computers
2017-07-12Paper
Reflection ciphers
Designs, Codes and Cryptography
2017-02-10Paper
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Analyzing permutations for AES-like ciphers: understanding shiftrows
Lecture Notes in Computer Science
2016-03-02Paper
Observations on the \textsf{SIMON} block cipher family
Lecture Notes in Computer Science
2015-12-10Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers
Selected Areas in Cryptography
2015-12-04Paper
A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Differential-Linear Cryptanalysis Revisited
Fast Software Encryption
2015-09-18Paper
Normality of bent functions monomial and binomial bent functions2014-08-15Paper
Block ciphers -- focus on the linear layer (feat. PRIDE)
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Bounds in shallows and in miseries
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Slender-set differential cryptanalysis
Journal of Cryptology
2013-04-15Paper
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Integral and multidimensional linear distinguishers with correlation zero
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
On the Distribution of Linear Biases: Three Instructive Examples
Lecture Notes in Computer Science
2012-09-25Paper
Analysis of Kasami-Welch functions in odd dimension using Stickelberger's theorem
Journal of Combinatorics and Number Theory
2012-08-26Paper
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract)
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A new construction of highly nonlinear S-boxes
Cryptography and Communications
2012-02-21Paper
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Switchings, extensions, and reductions in central digraphs
Journal of Combinatorial Theory. Series A
2011-07-07Paper
Differential cryptanalysis of round-reduced printcipher: computing roots of permutations
Fast Software Encryption
2011-07-07Paper
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
Fast Software Encryption
2011-07-07Paper
On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Counting all bent functions in dimension eight 99270589265934370305785861242880
Designs, Codes and Cryptography
2011-04-08Paper
Bounds on the degree of APN polynomials: the case of \(x^{-1} + g(x)\)
Designs, Codes and Cryptography
2011-04-08Paper
PRINTcipher: A Block Cipher for IC-Printing
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree
Finite Fields and their Applications
2010-07-07Paper
Cache timing analysis of LFSR-based stream ciphers
Cryptography and Coding
2010-01-07Paper
Cryptanalysis of C2
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Kasami bent functions are not equivalent to their duals2009-07-06Paper
Construction of bent functions from near-bent functions
Journal of Combinatorial Theory. Series A
2009-06-17Paper
Constructing new APN functions from known ones
Finite Fields and their Applications
2009-04-08Paper
On the classification of APN functions up to dimension five
Designs, Codes and Cryptography
2009-03-31Paper
Bent functions embedded into the recursive framework of \(\mathbb{Z}\)-bent functions
Designs, Codes and Cryptography
2009-03-31Paper
A Practical Key Recovery Attack on Basic TCHo
Public Key Cryptography – PKC 2009
2009-03-24Paper
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions
IEEE Transactions on Information Theory
2009-02-24Paper
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes
IEEE Transactions on Information Theory
2009-02-24Paper
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
scientific article; zbMATH DE number 5504476 (Why is no real title available?)2009-02-09Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
Monomial bent functions
IEEE Transactions on Information Theory
2008-12-21Paper
Bent Functions With $2^r$ Niho Exponents
IEEE Transactions on Information Theory
2008-12-21Paper
Normal Extensions of Bent Functions
IEEE Transactions on Information Theory
2008-12-21Paper
A Counterexample to a Conjecture of Niho
IEEE Transactions on Information Theory
2008-12-21Paper
On exponents with highly divisible Fourier coefficients and conjectures of Niho and Dobbertin2008-12-10Paper
Algebraic problems in symmetric cryptography: two recent results on highly nonlinear functions2008-12-10Paper
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
Smart Card Research and Advanced Applications
2008-11-06Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
New Lightweight DES Variants
Fast Software Encryption
2008-09-16Paper
Monomial bent functions and Stickelberger's theorem
Finite Fields and their Applications
2008-08-27Paper
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
A Survey of Some Recent Results on Bent Functions
Sequences and Their Applications - SETA 2004
2008-03-14Paper
On the Classification of 4 Bit S-Boxes
Arithmetic of Finite Fields
2007-11-15Paper
Construction of bent functions via Niho power functions
Journal of Combinatorial Theory. Series A
2006-08-04Paper
Finding nonnormal bent functions
Discrete Applied Mathematics
2006-04-28Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Gregor Leander