Gregor Leander
Orcid: 0000-0002-2579-8587Affiliations:
- Ruhr University Bochum
According to our database1,
Gregor Leander
authored at least 154 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
-
on emsec.rub.de
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Dataset, February, 2023
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Dataset, January, 2022
J. Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Finite Fields Their Appl., 2022
A Cautionary Note on Protecting Xilinx' UltraScale(+) Bitstream Encryption and Authentication Engine.
Proceedings of the 30th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IEEE Trans. Inf. Theory, 2021
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
Dataset, September, 2020
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher.
IACR Trans. Symmetric Cryptol., 2020
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers.
IACR Cryptol. ePrint Arch., 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks.
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
J. Cryptol., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Symmetric Cryptol., 2018
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 29. Krypto-Tag, Renningen, Germany, September 6-7, 2018, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
J. Cryptogr. Eng., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods.
Cryptologia, 2016
2015
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes.
Proceedings of the 15th International Conference on Innovations for Community Services, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IEEE Trans. Computers, 2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.
IACR Cryptol. ePrint Arch., 2013
Des. Codes Cryptogr., 2013
A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2013
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Bounds on the degree of APN polynomials: the case of <i>x</i><sup>-1</sup> + <i>g</i>(<i>x</i>).
Des. Codes Cryptogr., 2011
Des. Codes Cryptogr., 2011
Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
IACR Cryptol. ePrint Arch., 2010
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree.
Finite Fields Their Appl., 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Cryptography and Coding, 2009
2008
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes.
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
Des. Codes Cryptogr., 2008
Des. Codes Cryptogr., 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents.
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Another class of quadratic APN binomials over F<sub>2<sup>n</sup></sub>: the case n divisible by 4.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
An infinite class of quadratic APN functions which are not equivalent to power mappings.
IACR Cryptol. ePrint Arch., 2005
2004
IACR Cryptol. ePrint Arch., 2004
On codes, matroids and secure multi-party computation from linear secret sharing schemes.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Sequences and Their Applications, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004