Name
Affiliation
Papers
GREGOR LEANDER
Tech Univ Denmark, Dept Math, Lyngby, Denmark
98
Collaborators
Citations 
PageRank 
192
1287
77.03
Referers 
Referees 
References 
1780
967
847
Search Limit
1001000
Title
Citations
PageRank
Year
Improved Differential-Linear Attacks with Applications to ARX Ciphers00.342022
Trims and extensions of quadratic APN functions00.342022
Mathematical Aspects of Division Property.00.342022
A Cautionary Note on Protecting Xilinx’ UltraScale(+) Bitstream Encryption and Authentication Engine00.342022
Weak Tweak-Keys for the CRAFT Block Cipher00.342022
Decomposing Linear Layers.00.342022
A further study of quadratic APN permutations in dimension nine00.342022
Simon's Algorithm and Symmetric Crypto: Generalizations and Automatized Applications.00.342022
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization.00.342022
Strong and Tight Security Guarantees Against Integral Distinguishers.00.342021
Linearly Self-Equivalent APN Permutations in Small Dimension30.412021
Strong and Tight Security Guarantees against Integral Distinguishers.00.342021
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures.20.442021
Modeling For Three-Subset Division Property Without Unknown Subset00.342021
4-Uniform Permutations With Null Nonlinearity00.342020
Skinny-Aead And Skinny-Hash00.342020
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption With A Masked Tweakable Block Cipher00.342020
Dasta - Alternative Linear Layer For Rasta00.342020
Weak-Key Distinguishers for AES00.342020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.00.342020
Craft: Lightweight Tweakable Block Cipher With Efficient Protection Against Dfa Attacks00.342019
Weak-Key Subspace Trails and Applications to AES.00.342019
Zero-Correlation Attacks On Tweakable Block Ciphers With Linear Tweakey Expansion00.342019
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions.00.342019
Nonlinear Approximations In Cryptanalysis Revisited00.342018
Shiftrows Alternatives For Aes-Like Ciphers And Optimal Cell Permutations For Midori And Skinny00.342018
BISON - Instantiating the Whitened Swap-Or-Not Construction.00.342018
Rasta: A cipher with low ANDdepth and few ANDs per bit.30.422018
Nonlinear diffusion layers.00.342018
Searching For Subspace Trails And Truncated Differentials00.342018
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers.00.342017
Shorter Linear Straight-Line Programs for MDS Matrices.20.372017
Proving Resistance against Invariant Attacks: How to Choose the Round Constants.20.432017
Strong 8-bit Sboxes with efficient masking in hardware extended version.10.372017
Grover Meets Simon - Quantumly Attacking the FX-construction.50.422017
Reflection ciphers.00.342017
Analyzing the Spanish strip cipher by combining combinatorial and statistical methods10.362016
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices.30.412016
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.401.342016
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64.10.362016
Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes20.392015
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.130.822015
Observations on the SIMON block cipher family.311.182015
Decomposing the ASASA Block Cipher Construction.70.452015
Intrinsic Code Attestation by Instruction Chaining for Embedded Devices.30.392015
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.30.392015
Differential-Linear Cryptanalysis Revisited.50.552014
Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version.10.382014
Block Ciphers - Focus on the Linear Layer (feat. PRIDE).431.532014
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.10.352013
  • 1
  • 2