Gregor Leander

From MaRDI portal
Person:510443

Available identifiers

zbMath Open leander.gregorDBLP90/4585WikidataQ58334832 ScholiaQ58334832MaRDI QIDQ510443

List of research outcomes





PublicationDate of PublicationType
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits2024-12-13Paper
Falling into bytes and pieces -- cryptanalysis of an Apple patent application2024-10-23Paper
Another class of non-normal bent functions2024-09-18Paper
New families of functions with differential uniformity of 42024-09-18Paper
On perfect linear approximations and differentials over two-round SPNs2024-02-02Paper
Differential meet-in-the-middle cryptanalysis2024-02-02Paper
Pitfalls and shortcomings for decompositions and alignment2023-12-08Paper
Constructing and deconstructing intentional weaknesses in symmetric ciphers2023-06-30Paper
Simon's algorithm and symmetric crypto: generalizations and automatized applications2023-06-30Paper
Strong and tight security guarantees against integral distinguishers2023-05-12Paper
Generic framework for key-guessing improvements2023-05-12Paper
Lower bounds on the degree of block ciphers2023-03-21Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers2022-12-07Paper
Improved differential-linear attacks with applications to ARX ciphers2022-11-14Paper
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers2022-07-06Paper
New attacks from old distinguishers improved attacks on serpent2022-07-06Paper
A further study of quadratic APN permutations in dimension nine2022-05-09Paper
Trims and extensions of quadratic APN functions2022-03-31Paper
Weak-key distinguishers for AES2022-03-25Paper
PRINCEv2. More security for (almost) no overhead2022-03-25Paper
New Instances of Quadratic APN Functions2022-02-17Paper
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-22021-12-08Paper
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD2021-12-01Paper
Modeling for three-subset division property without unknown subset2021-08-10Paper
Linearly Self-Equivalent APN Permutations in Small Dimension2021-07-23Paper
4-uniform permutations with null nonlinearity2021-07-13Paper
BISON instantiating the whitened swap-or-not construction2020-02-04Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions2020-01-28Paper
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori642019-11-27Paper
Nonlinear diffusion layers2018-10-10Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Grover meets Simon -- quantumly attacking the FX-construction2018-03-08Paper
Strong 8-bit sboxes with efficient masking in hardware2018-02-14Paper
Proving resistance against invariant attacks: how to choose the round constants2017-11-15Paper
Differential-linear cryptanalysis revisited2017-10-12Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing2017-07-12Paper
Reflection ciphers2017-02-10Paper
Nonlinear Invariant Attack2017-01-06Paper
Lightweight Multiplication in $$GF(2^n)$$ with Applications to MDS Matrices2016-11-30Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS2016-10-27Paper
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows2016-03-02Paper
Observations on the SIMON Block Cipher Family2015-12-10Paper
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers2015-12-04Paper
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro2015-09-30Paper
Differential-Linear Cryptanalysis Revisited2015-09-18Paper
Normality of bent functions monomial and binomial bent functions2014-08-15Paper
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)2014-08-07Paper
Bounds in Shallows and in Miseries2013-09-02Paper
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System2013-09-02Paper
Slender-set differential cryptanalysis2013-04-15Paper
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications2013-03-19Paper
Integral and Multidimensional Linear Distinguishers with Correlation Zero2013-03-19Paper
On the Distribution of Linear Biases: Three Instructive Examples2012-09-25Paper
Analysis of Kasami-Welch functions in odd dimension using Stickelberger's theorem2012-08-26Paper
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations2012-06-29Paper
A new construction of highly nonlinear S-boxes2012-02-21Paper
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack2011-08-12Paper
Switchings, extensions, and reductions in central digraphs2011-07-07Paper
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations2011-07-07Paper
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes2011-07-07Paper
On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN2011-05-27Paper
Counting all bent functions in dimension eight 992705892659343703057858612428802011-04-08Paper
Bounds on the degree of APN polynomials: the case of \(x^{-1} + g(x)\)2011-04-08Paper
PRINTcipher: A Block Cipher for IC-Printing2010-08-17Paper
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree2010-07-07Paper
Cache timing analysis of LFSR-based stream ciphers2010-01-07Paper
Cryptanalysis of C22009-10-20Paper
Kasami bent functions are not equivalent to their duals2009-07-06Paper
Construction of bent functions from near-bent functions2009-06-17Paper
Constructing new APN functions from known ones2009-04-08Paper
On the classification of APN functions up to dimension five2009-03-31Paper
Bent functions embedded into the recursive framework of \(\mathbb{Z}\)-bent functions2009-03-31Paper
A Practical Key Recovery Attack on Basic TCHo2009-03-24Paper
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions2009-02-24Paper
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes2009-02-24Paper
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35975202009-02-09Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
Monomial bent functions2008-12-21Paper
Bent Functions With $2^r$ Niho Exponents2008-12-21Paper
Normal Extensions of Bent Functions2008-12-21Paper
A Counterexample to a Conjecture of Niho2008-12-21Paper
On exponents with highly divisible Fourier coefficients and conjectures of Niho and Dobbertin2008-12-10Paper
Algebraic problems in symmetric cryptography: two recent results on highly nonlinear functions2008-12-10Paper
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents2008-11-06Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
New Lightweight DES Variants2008-09-16Paper
Monomial bent functions and Stickelberger's theorem2008-08-27Paper
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms2008-04-24Paper
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes2008-03-17Paper
A Survey of Some Recent Results on Bent Functions2008-03-14Paper
On the Classification of 4 Bit S-Boxes2007-11-15Paper
Construction of bent functions via Niho power functions2006-08-04Paper
Finding nonnormal bent functions2006-04-28Paper
Theory of Cryptography2005-12-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper

Research outcomes over time

This page was built for person: Gregor Leander