Type All Bibtex Book Chapters Conferences Journals Technical Reports Theses
2016
  • Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen. On the Hardness of Learning with Rounding over Small Modulus. IACR Cryptology ePrint Archive 2015: 769 (2015), IACR TCC 2016-A.
    PDF [pdf] Springer Link [published version]

  • Christof Beierle. Pen and Paper Arguments for SIMON and SIMON-like Designs. IACR Cryptology ePrint Archive 2016: 651 (2016), SCN 2016: 431-446.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim. The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptology ePrint Archive 2016: 660 (2016), CRYPTO (2) 2016: 123-153.
    PDF [pdf] Springer Link [published version] URL [url] Bibtex [bibtex]

  • Christof Beierle, Thorsten Kranz, Gregor Leander. Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR CRYPTO 2016, CRYPTO (1) 2016: 625-653.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • David Cash, Eike Kiltz, and Stefano Tessaro. Two-Round Man-in-the-Middle Security from LPN. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptology ePrint Archive 2016: 191 (2016), CRYPTO (2) 2016: 33-61.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider. Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptology ePrint Archive 2016: 647 (2016), CHES 2016: 171-193.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Felix Heuer, Bertram Poettering. Selective Opening Security from Simulatable Data Encapsulation. Proceedings of IACR ASIACRYPT 2016, Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Georg Fuchsbauer, Felix Heuer, Eike Kiltz and Krzysztof Pietrzak. Standard Security Does Imply Security Against Selective Opening for Markov Distributions. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Julian Loss, Ueli Maurer, Daniel Tschudi. Hierarchy of three-party consistency specifications. ISIT 2016: 3048-3052.
    PDF [pdf] Bibtex [bibtex]

  • Luis Alberto Benthin Sanguino, Gregor Leander, Christof Paar, Bernhard Esslinger, Ingo Niebel. Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. Cryptologia 40(3): 261-284 (2016).
    Springer Link [published version] Bibtex [bibtex]

  • Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Tightly Secure CCA-Secure Encryption without Pairings . IACR Cryptology ePrint Archive 2016: 94 (2016).
    PDF [pdf] Bibtex [bibtex]

  • Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Tightly CCA-Secure Encryption Without Pairings. EUROCRYPT (1) 2016: 1-27.
    Springer Link [published version] Bibtex [bibtex]

  • Romain Poussier, François-Xavier Standaert, Vincent Grosso. Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. IACR Cryptology ePrint Archive 2016: 571 (2016), CHES 2016: 61-81.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Sebastian Faust, Daniel Masny, Daniele Venturi. Chosen-Ciphertext Security from Subset Sum. IACR Cryptology ePrint Archive 2015: 1223 (2015), Public Key Cryptography (1) 2016: 35-46.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Silvio Biagioni, Daniel Masny, Daniele Venturi. Naor-Yung Paradigm with Shared Randomness and Applications.. SCN 2016: 62-80.
    Springer Link [published version] Bibtex [bibtex]

  • Tim Güneysu, Gregor Leander, Amir Moradi. Lightweight Cryptography for Security and Privacy. 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers, Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5.
    Springer Link [published version] Bibtex [bibtex]

  • Weiqiang Wen, Libin Wang, Jiaxin Pan. Unified security model of authenticated key exchange with specific adversarial capabilities. IET Information Security 10(1): 8-17 (2016).
    URL [url] Bibtex [bibtex]

2015
  • Alexandre Duc, Sebastian Faust, François-Xavier Standaert. Making Masking Security Proofs Concrete (Or How to Evaluate the Security of any Leaking Device). Eurocrypt 2015.


  • Bertram Poettering, Dale Sibborn. Cold boot attacks in the discrete logarithm setting. CT-RSA 2015 .


  • Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. IACR Cryptology ePrint Archive 2014: 920 (2014), FSE 2015: 117-129.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christina Boura, Anne Canteaut, Lars R Knudsen, Gregor Leander. Reflection Ciphers. WCC 2015, Paris, France April 15, 2015.
    PDF [pdf]

  • Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptology ePrint Archive 2015: 212 (2015), CT-RSA 2015.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li. Tightly-Secure Authenticated Key Exchange. IACR TCC 2015.
    PDF [pdf]

  • David Cash, Rafael Dowsley, Eike Kiltz. Digital Signatures from Strong RSA without Prime Generation. IACR PKC 2015.


  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Schnorr Signatures in the Multi-User Setting. IACR Cryptology ePrint Archive 2015: 1122 (2015).
    URL [url] Bibtex [bibtex]

  • Eike Kiltz, Hoeteck Wee. Quasi-Adaptive NIZK for Linear Subspaces Revisited. IACR EUROCRYPT 2015.
    PDF [pdf]

  • Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptology ePrint Archive 2015: 604 (2015), CRYPTO (2) 2015: 275-295.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Gregor Leander. Fast Software Encryption. 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers, Lecture Notes in Computer Science, Volume 9054 2015.
    Springer Link [published version]

  • Gregor Leander. Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Springer-Verlag.
    URL [url]

  • Gregor Leander, Brice Minaud, Sondre Rønjom. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. IACR EUROCRYPT 2015.
    Springer Link [published version]

  • Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander. Decomposing the ASASA Block Cipher Construction. Cryptology ePrint Archive, Report 2015/507, 2015.
    PDF [pdf]

  • Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi. The Chaining Lemma and its application. ICITS 2015.


  • Jean Paul Degabriele, Pooya Farshim, Bertram Poettering. A More Cautious Approach to Security Against Mass Surveillance. FSE 2015.


  • Josep Balasch, Sebastian Faust, Benedikt Gierlichs. Inner Product masking revisited. Eurocrypt 2015.


  • Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti. Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. IACR Cryptology ePrint Archive 2015: 317 (2015), Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers.
    PDF [pdf] Springer Link [published version]

  • Marcin Andrychowicz, Ivan Damgaard, Stefan Dziembowski, Sebastian Faust, Antigoni Polychroniadou. Efficient Leakage Resilient Circuit Compilers. CT-RSA 2015.


  • Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander. Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. SecureComm 2015.
    Springer Link [published version] Bibtex [bibtex]

  • Oliver Stecklina, Stephan Kornemann, Felix Grehl, Ramona Jung, Thorsten Kranz, Gregor Leander, Dennis Schweer, Katharina Mollus, Dirk Westhoff. Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes. I4CS 2015: 1-8.
    URL [url] Bibtex [bibtex]

  • Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan. Tightly-Secure Signatures from Chameleon Hash Functions. IACR PKC 2015.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Romain Poussier, Vincent Grosso, François-Xavier Standaert. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations. CARDIS 2015: 125-142.
    Springer Link [published version] Bibtex [bibtex]

  • Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi. A Tamper and Leakage Resilient von Neumann Architecture. PKC 2015.


  • Sonia Belaïd, Vincent Grosso, François-Xavier Standaert. Masking and leakage-resilient primitives: One, the other(s) or both?. IACR Cryptology ePrint Archive 2015: 492 (2015), Cryptography and Communications 7(1): 163-184 (2015).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, Krzysztof Pietrzak. Proofs of Space. IACR CRYPTO 2015.


  • Stefan Dziembowski, Sebastian Faust, Maciej Skórski. Noisy leakages revisited. Eurocrypt 2015.


  • Stefan Kölbl, Gregor Leander, Tyge Tiessen. Observations on the SIMON block cipher family. IACR Cryptology ePrint Archive 2015: 145 (2015).
    PDF [pdf] Bibtex [bibtex]

  • Vincent Grosso, François-Xavier Standaert. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?. IACR Cryptology ePrint Archive 2015: 535 (2015), ASIACRYPT (2) 2015: 291-312.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

2014
  • Alexandre Duc, Stefan Dziembowski, Sebastian Faust. Unifying leakage models: from probing attacks to noisy leakage. Eurocrypt 2014 (Best Paper Award).


  • Alexandre Pinto, Bertram Poettering, Jacob C.N. Schuldt. Multi-Recipient Encryption, Revisited. ASIACCS 2014.
    URL [url]

  • Bertram Poettering, Douglas Stebila. Double-Authentication-Preventing Signatures. ESORICS 2014, IACR ePrint 2013/333.
    PDF [pdf] Springer Link [published version]

  • Céline Blondeau, Gregor Leander, Kaisa Nyberg. Differential-Linear Cryptanalysis Revisited. Fast Software Encryption, pp. 411--430. © Springer-Verlag.
    Springer Link [published version]

  • Eike Kiltz, Daniel Masny, Krzysztof Pietrzak. Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014: 1-18, IACR Cryptology ePrint Archive 2015: 401 (2015).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Elif Bilge Kavun, Martin M Lauridsen, Gregor Leander, Christian Rechberger, Peter Schwabe, Tolga Yalçin, DTU Compute. Prøst v1. Submission to CAESAR.
    PDF [pdf]

  • Felix Günther, Bertram Poettering. Linkable Message Tagging: Solving the key distribution problem of signature schemes. IACR ePrint 2014/014.
    PDF [pdf]

  • Friedrich Wiemer, Ralf Zimmermann. High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware. 2014 International Conference on ReConFigurable Computing and FPGAs (ReConFig14).
    PDF [pdf] Springer Link [published version] Slides [slides] Bibtex [bibtex]

  • Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering. Cryptographic Enforcement of Information Flow Policies without Public Information. arXiv:1410.5567.
    URL [url]

  • Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert. On the Cost of Lazy Engineering for Masked Software Implementations. IACR Cryptology ePrint Archive 2014: 413 (2014), CARDIS 2014: 64-81.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT 2014.
    Springer Link [published version]

  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Plaintext Recovery Attacks Against WPA/TKIP. Fast Software Encryption 2014 (to appear).
    PDF [pdf]

  • Markus Dürmuth, Thorsten Kranz. On Password Guessing with GPUs and FPGAs. PASSWORDS 2014 Conference.
    PDF [pdf] Springer Link [published version]

  • Martin R Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar. Block Ciphers - Focus On The Linear Layer (feat. PRIDE) Full Version. .
    URL [url]

  • Martin R Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçoin. Block Ciphers - Focus On The Linear Layer (feat. PRIDE). Advances in Cryptology - CRYPTO 2014, Volume 8616 of the series Lecture Notes in Computer Science pp. 57-76. © Springer-Verlag.
    Springer Link [published version]

  • Olivier Blazy, Eike Kiltz, Jiaxin Pan. (Hierarchical) Identity-Based Encryption from Affine Message Authentication. Proceedings of IACR CRYPTO 2014, (1) 408--425. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Sebastian Faust, Pratyay Mukherjee, Daniele Venturi and Daniel Wichs. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits. Eurocrypt 2014.


  • Sebastian Faust, Pratyay Mukherjee, Jesper Buus Nielsen, Daniele Venturi. Continuous Non-malleable Codes. TCC 2014.


  • Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer and Vinod Vaikuntanathan. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases. Full version of Eurocrypt 2010 paper appearing at SIAM Journal on Computing (SICOMP).


  • Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert. Efficient Masked S-Boxes Processing - A Step Forward -. AFRICACRYPT 2014: 251-266.
    Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. FSE 2014: 18-37.
    Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar. Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices. CARDIS 2014: 122-136.
    Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar. Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices). IACR Cryptology ePrint Archive 2014: 411 (2014).
    PDF [pdf] Bibtex [bibtex]

2013
  • Alex Escala, Gottfried Herold, Eike Kiltz, Carla Rafols, Jorge Villar. An Algebraic Framework for Diffie-Hellman Assumptions. IACR Cryptology ePrint Archive 2013: 377 (2013), CRYPTO (2) 2013: 129-147.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Alexei Bogdanov, Marko Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede. Spongent: The design space of lightweight cryptographic hashing. Computers, IEEE Transactions on 62 (10), 2041--2053.
    URL [url]

  • Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert. Block Ciphers That Are Easier to Mask: How Far Can We Go?. IACR Cryptology ePrint Archive 2013: 369 (2013), CHES 2013: 383-399.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Céline Blondeau, Andrey Bogdanov, Gregor Leander. Bounds in Shallows and in Miseries. Advances in Cryptology - CRYPTO 2013, Volume 8042 of the series Lecture Notes in Computer Science pp 204-221. © Springer-Verlag.
    Springer Link [published version]

  • Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013, IACR ePrint 2013/398.
    PDF [pdf] Springer Link [published version]

  • Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar. Fuming acid and cryptanalysis: Handy tools for overcoming a digital locking and access control system. Advances in Cryptology - CRYPTO 2013, Volume 8042 of the series Lecture Notes in Computer Science pp 147-164. © Springer-Verlag.
    Springer Link [published version]

  • David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev. More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Journal of Cryptology, Volume 26, Number 1 (2013), Pages 39--74. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Springer Link [published version]

  • Dennis Hofheinz, Eike Kiltz, Victor Shoup. Practical Chosen Ciphertext Secure Encryption from Factoring. Journal of Cryptology, Volume 26, Number 1 (2013), Pages 102--118.


  • Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson. Non-Interactive Key Exchange. Proceedings of IACR PKC 2013, 254-271 LNCS 7778 (2013). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013, IACR ePrint 2012/645.
    PDF [pdf] Springer Link [published version]

  • Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy. Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. Proceedings of IACR CRYPTO 2013. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Elif Bilge Kavun, Gregor Leander, Tolga Yalcind. A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices. Reconfigurable Computing and FPGAs (ReConFig), 2013 International Conference, pp. 1--8. IEEE.
    URL [url]

  • Emiliano De Cristofaro, Mark Manulis, Bertram Poettering. Private discovery of common social contacts. International Journal of Information Security (IJIS, 2013), IACR ePrint 2011/026.
    PDF [pdf] Springer Link [published version]

  • Gregor Leander, Pawel Swierczynski, Christof Paar. Keccak und der SHA-2. Datenschutz und Datensicherheit - DuD, November 2013, Volume 37, Issue 11, pp. 712-719. © Springer-Verlag.
    Springer Link [published version]

  • Ivan Damgaard, Sebastian Faust, Pratyay Mukherjee, Daniele Venturi. Bounded Tamper Resilience: How to go beyond the Algebraic Barrier. Asiacrypt 2013.


  • Juan Gonz ález Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. Publicly verifiable ciphertexts. Journal of Computer Security (JCS, 2013), IACR ePrint 2012/357.
    PDF [pdf] Springer Link [published version]

  • Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen. Slender-set differential cryptanalysis. Journal of Cryptology, January 2013, Volume 26, Issue 1, pp. 11-38.
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering, Douglas Stebila. Plaintext awareness in identity-based key encapsulation. International Journal of Information Security (IJIS, 2013), IACR ePrint 2012/559.
    PDF [pdf] Springer Link [published version]

  • Martin R Albrecht, Gregor Leander. An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Selected Areas in Cryptography, Volume 7707 of the series Lecture Notes in Computer Science pp. 1-15.
    Springer Link [published version]

  • Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS. USENIX Security 2013.
    URL [url]

  • Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS and WPA. .
    URL [url]

  • Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Pseudorandom signatures. ASIACCS 2013, IACR ePrint 2011/673.
    PDF [pdf] URL [url]

  • Olivier Blazy, Céline Chevalier, Léo Ducas, Jiaxin Pan. Errorless Smooth Projective Hash Function based on LWE. IACR Cryptology ePrint Archive 2013: 821 (2013).
    URL [url] Bibtex [bibtex]

  • Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng, Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen, Hossein Ghodosi, Eiichiro Fujisaki, Tatsuaki Okamoto, Dennis Hofheinz, Eike Kiltz, Victor Shoup, Antoine Joux, Vanessa Vitse, Andrej Bogdanov, Takanori Isobe. Our Content. Journal of Failure Analysis and Prevention, December 2012, Volume 12, Issue 6, pp. 640--642. © Springer-Verlag.
    Springer Link [published version]

  • Sebastian Faust, Camrit Hazay and Daniele Venturi. Outsourced Pattern Matching. ICALP 2013.


  • Sebastian Faust, Vincent Grosso, François-Xavier Standaert. Masking vs. Multiparty Computation: How Large Is the Gap for AES?. CHES 2013 (Invited to Journal of Cryptographic Engineering).
    Springer Link [published version] Bibtex [bibtex]

  • Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma. A new construction of bent functions based on {\ mathbb {Z}}-bent functions. Designs, Codes and Cryptography, January 2013, Volume 66, Issue 1, pp. 243-256. © Springer-Verlag.
    Springer Link [published version]

  • Vadim Lyubashevsky, Daniel Masny. Man-in-the-Middle Secure Authentication Schemes from {LPN} and Weak PRFs. Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, François-Xavier Standaert, Emmanuel Prouff. Low Entropy Masking Schemes, Revisited. CARDIS 2013: 33-43.
    Springer Link [published version] Bibtex [bibtex]

2012
  • Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang. Integral and Multidimensional Linear Distinguishers with Correlation Zero. Advances in Cryptology - ASIACRYPT 2012, Volume 7658 of the series Lecture Notes in Computer Science pp. 244-261.
    Springer Link [published version]

  • Andrey Bogdanov, Lars R Knudsen, Gregor Leander, François-Xavier Standaert, John Steinberger, Elmar Tischhauser. Key-alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. Advances in Cryptology - EUROCRYPT 2012, Volume 7237 of the series Lecture Notes in Computer Science pp. 45-62.
    Springer Link [published version]

  • Bertram Poettering. Privacy Protection for Authentication Protocols. Ph.D. thesis (Technical University Darmstadt, Jan 2012).
    URL [url]

  • David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert. Bonsai Trees, or How to Delegate a Lattice Basis. Journal of Cryptology, Volume 25, Number 4 (2012), Pages 601--639. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Springer Link [published version]

  • Dennis Hofheinz, Eike Kiltz. Programmable Hash Functions and Their Applications. Journal of Cryptology, Volume 25, Number 3 (2012), Pages 484--527. Full version available on Cryptology ePrint Archive Slides from Leiden workshop.
    PDF [pdf] Springer Link [published version] Slides [slides]

  • Ivan Damgaard, Sebastian Faust, Carmit Hazay. Secure Two-Party Computation with Low Communication Complexity. TCC 2012.


  • J Borghoff, A Canteaut, T Guneysu, EB Kavun, M Knezevic, LR Knudsen, G Leander, V Nikov, C Paar, C Rechberger, P Rombouts, SS Thomsen, T Eisenbarth, Z Gong, S Heyse, S Indesteege, S Kerckhof, F Koeune, T Nad, T Plos, F Regazzoni, FX Standaert. Ana metin. .
    PDF [pdf]

  • Josep Balasch, Sebastian Faust, Benedikt Gierlichs and Ingrid Verbauwhede. Theory and Practice of a Leakage Resilient Masking Scheme. Asiacrypt 2012 (Invited to Journal of Cryptology).


  • Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Lars R Knudsen, Gregor Leander, Christof Paar, Christian Rechberger, Peter Rombouts. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications Full version. .


  • Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S Thomsen, Tolga Yalçin. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications. Advances in Cryptology - ASIACRYPT 2012, Volume 7658 of the series Lecture Notes in Computer Science pp. 208-225.
    Springer Link [published version]

  • Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Bertram Poettering. Group Signatures: Authentication with Privacy. In cooperation with BSI (German Federal Office for Information Security), 2012 See also the project website (in German)..
    URL [url]

  • Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters. Identity-Based (Lossy) Trapdoor Functions and Applications. Proceedings of IACR EUROCRYPT 2012. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Mohamed Ahmed Abdelraheem, Martin Âgren, Peter Beelen, Gregor Leander. On the Distribution of Linear Biases: Three Instructive Examples. Advances in Cryptology - CRYPTO 2012, Volume 7417 of the series Lecture Notes in Computer Science pp. 50-67. © Springer-Verlag.
    Springer Link [published version]

  • Peter Beelen, Gregor Leander. A new construction of highly nonlinear S-boxes. Cryptography and Communications, March 2012, Volume 4, Issue 1, pp. 65-77.
    Springer Link [published version]

  • Saqib A. Kakvi, Eike Kiltz. Optimal Security Proofs for Full Domain Hash, Revisited. Proceedings of IACR EUROCRYPT 2012.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt and Angela Zottarel. Signature Schemes Secure against Hard-to-Invert Leakage. Asiacrypt 2012.


  • Sebastian Faust, Krzysztof Pietrzak, Joachim Schipper. Practical Leakage-Resilient Symmetric Cryptography. CHES 2012.


  • Stefan Dziembowski, Sebastian Faust. Leakage-Resilient Circuits without Computational Assumptions. TCC 2012.


  • Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Krzysztof Pietrzak, Christof Paar. An Efficient Authentication Protocol Based on Ring-LPN. Proceedings of IACR FSE 2012.


  • Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs. Message Authentication, Revisited. Proceedings of IACR EUROCRYPT 2012.


2011
  • André Kündgen, Gregor Leander, Carsten Thomassen. Switchings, extensions, and reductions in central digraphs. Journal of Combinatorial Theory, Series A, Volume 118, Issue 7, October 2011, Pages 2025-2034.
    URL [url]

  • Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede. SPONGENT: A Lightweight Hash Function. Cryptographic Hardware and Embedded Systems - CHES 2011, Volume 6917 of the series Lecture Notes in Computer Science pp. 312-325.
    Springer Link [published version]

  • Dennis Hofheinz, Tibor Jager, Eike Kiltz. Short Signatures from Weaker Assumptions. Proceedings of IACR ASIACRYPT 2011, 647--666 LNCS 7073 (2011). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi. Efficient Authentication from Hard Learning Problems. Proceedings of IACR EUROCRYPT 2011, 7-26 LNCS 6632 (2011). Best paper award..


  • Gregor Leander. On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. Advances in Cryptology - EUROCRYPT 2011, Volume 6632 of the series Lecture Notes in Computer Science pp. 303-322.
    Springer Link [published version]

  • Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm. Share this. .
    URL [url]

  • Gregor Leander, Francois Rodier. Bounds on the degree of APN polynomials: the case of x^(-1) + g(x). Designs, Codes and Cryptography, April 2011, Volume 59, Issue 1, pp 207-222.
    Springer Link [published version]

  • Jiaxin Pan, Libin Wang. TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. ProvSec 2011: 380-388.
    Springer Link [published version] Bibtex [bibtex]

  • Jiaxin Pan, Libin Wang, Changshe Ma. Analysis and Improvement of an Authenticated Key Exchange Protocol. ISPEC 2011: 417-431.
    Springer Link [published version] Bibtex [bibtex]

  • Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen. Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. Fast Software Encryption, Volume 6733 of the series Lecture Notes in Computer Science pp. 270-289.
    Springer Link [published version]

  • Lars R Knudsen, Gregor Leander. C2 - Block Cipher. Encyclopedia of Cryptography and Security, pp. 179-180.
    Springer Link [published version]

  • Lars R Knudsen, Gregor Leander. PRESENT - Block Cipher. Encyclopedia of Cryptography and Security, pp. 953-955.
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011 (Best student paper).
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering. Practical affiliation-hiding authentication from improved polynomial interpolation. ASIACCS 2011, IACR ePrint 2010/659.
    PDF [pdf] URL [url]

  • Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. Fast Software Encryption, Volume 6733 of the series Lecture Notes in Computer Science pp. 1-17.
    Springer Link [published version]

  • Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Gregor Leander, Erik Zenner. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. Lecture Notes in Computer Science Volume 6841 2011.
    Springer Link [published version]

  • Philippe Langevin, Gregor Leander. Counting all bent functions in dimension eight 99270589265934370305785861242880. Designs, Codes and Cryptography, April 2011, Volume 59, Issue 1, pp. 193-205.
    Springer Link [published version]

  • Philippe Langevin, Gregor Leander, Gary Mcguire, Eugen Zalinescu. Analysis of Kasami-Welch Functions in Odd Dimension using Stickelberger's Theorem. Journal of Combinatorics and Number Theory, pp. 55-72.
    PDF [pdf]

  • Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi. Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience. ICALP 2011.


  • Stefan Dziembowski, Sebastian Faust. Leakage-Resilient Cryptography From the Inner-Product Extractor. Asiacrypt 2011.


2010
  • Carl Bracken, Gregor Leander. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields and Their Applications, Volume 16, Issue 4, July 2010, Pages 231-242.
    URL [url]

  • Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010.
    Springer Link [published version]

  • Eike Kiltz, Adam O'Neill, and Adam Smith. Instantiability of RSA-OAEP under Chosen-Plaintext Attack. Proceedings of IACR CRYPTO 2010, 295-313 LNCS 6223 (2010). Full version in preparation..


  • Eike Kiltz, Krzysztof Pietrzak. Leakage Resilient ElGamal Encryption. Proceedings of IACR ASIACRYPT 2010.
    PDF [pdf]

  • Eike Kiltz, Payman Mohassel, Adam O'Neill. Adaptive Trapdoor Functions and Chosen-Ciphertext Security. Proceedings of IACR EUROCRYPT 2010, 673-692 LNCS 6110 (2010).
    PDF [pdf]

  • Gregor Leander. Small Scale Variants Of The Block Cipher PRESENT.. IACR Cryptology 2010.
    PDF [pdf]

  • Gregor Leander, V Gauthier Umana. Practical key recovery attacks on two McEliece variants. Proceedings of the Second International Conference on Symbolic Computation and Cryptography.
    PDF [pdf]

  • Jiaxin Pan, Libin Wang, Changshe Ma. Security Enhancement and Modular Treatment towards Authenticated Key Exchange. ICICS 2010: 203-217.
    Springer Link [published version] Bibtex [bibtex]

  • Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. Proceedings of IACR PKC 2010, 279-295 LNCS 6056 (2010).
    PDF [pdf]

  • Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew JB Robshaw. PRINTcipher: A Block Cipher for IC-Printing. Cryptographic Hardware and Embedded Systems, CHES 2010, Volume 6225 of the series Lecture Notes in Computer Science pp. 16-32.
    Springer Link [published version]

  • Mark Manulis, Benny Pinkas, Bertram Poettering. Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010.
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering, Gene Tsudik. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010.
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering, Gene Tsudik. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. PETS 2010.
    Springer Link [published version]

  • Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz. Efficient Hybrid Encryption from ID-Based Encryption. Designs, Codes and Cryptography 54(3): 205-240 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Ronald Cramer, Dennis Hofheinz, Eike Kiltz. A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. Proceedings of IACR TCC 2010, 146--164 LNCS 5978 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Saqib A. Kakvi. Eficienct Fully Anonymous Group Signatures based on the Groth Group Signature Scheme. Written under the Supervision of Jens Groth at the University College London as part of M.Sc Information Science.
    PDF [pdf]

  • Sebastian Faust. Provable Security at Implementation-level. KU Leuven, Leuven, Belgium.


  • Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum. Leakage-Resilient Signatures. Proceedings of IACR TCC 2010, 343--360 LNCS 5978 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer and Vinod Vaikuntanathan. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases?. Eurocrypt 2010.


  • Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Encryption schemes secure against chosen-ciphertext selective opening attacks. Proceedings of IACR EUROCRYPT 2010, 381-402 LNCS 6110 (2010).
    PDF [pdf]

2009
  • Bertram Poettering. Incidence Geometry and its Applications in Cryptography. Master thesis in Mathematics (University of Hamburg, Mar 2009).


  • David Cash, Eike Kiltz, Victor Shoup. The Twin Diffie-Hellman Problem and Applications. Journal of Cryptology, Volume 22, Issue 4 (2009), Page 470.
    Springer Link [published version]

  • David Galindo, Eike Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Theoretical Computer Science. 410(47-49): 5093-5111 (2009).
    PDF [pdf]

  • Dennis Hofheinz, Eike Kiltz. The Group of Signed Quadratic Residues and Applications. Proceedings of IACR CRYPTO 2009, 637--653 LNCS 5677 (2009).
    PDF [pdf]

  • Eike Kiltz, Krzysztof Pietrzak. On the Security of Padding-Based Encryption Schemes (Or: Why we cannot prove OAEP secure in the Standard Model). Proceedings of IACR EUROCRYPT 2009, pp. 389--406 LNCS 5479 (2009).
    PDF [pdf]

  • Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung. A New Randomness Extraction Paradigm for Hybrid Encryption. Proceedings of IACR EUROCRYPT 2009, pp. 590--609 LNCS 5479 (2009).
    PDF [pdf]

  • Gregor Leander, Erik Zenner, Philip Hawkes. Cache timing analysis of LFSR-based stream ciphers. Cryptography and Coding, Volume 5921 of the series Lecture Notes in Computer Science pp. 433-445.
    Springer Link [published version]

  • Gregor Leander, Gary McGuire. Construction of bent functions from near-bent functions. Journal of Combinatorial Theory, Series A, Volume 116, Issue 4, May 2009, Pages 960-970.
    URL [url]

  • Julia Borghoff, Lars R Knudsen, Gregor Leander, Krystian Matusiewicz. Cryptanalysis of C2. Advances in Cryptology - CRYPTO 2009, Volume 5677 of the series Lecture Notes in Computer Science pp. 250-266.
    Springer Link [published version]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. Constructing new APN functions from known ones. Finite Fields and Their Applications, Volume 15, Issue 2, April 2009, Pages 150-159.
    URL [url]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. On a construction of quadratic APN functions. Information Theory Workshop, 2009. ITW 2009. IEEE, pp. 374-378.
    URL [url]

  • Mathias Herrmann, Gregor Leander. A Practical Key Recovery Attack on Basic TCHo. Public Key Cryptography - PKC 2009, Volume 5443 of the series Lecture Notes in Computer Science pp. 411-424.
    Springer Link [published version]

  • Peter Beelen, Gregor Leander. Reconstruction of highly non linear Sboxes from linear codes. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes.
    URL [url]

  • Saqib A. Kakvi. Reinforcement Learning for Blackjack. Written under the Supervision of Marco Gillies at the Goldsmiths, University of London as part of B.Sc Computing and Information Systems. Appeared at International Conference on Entertainment Computing 2009.
    PDF [pdf]

  • Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee and Moti Yung. The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure. Information Processing Letters, Volume 109, Issue 16, 31 July 2009, Pages 897-901.


2008
  • Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matt JB Robshaw, Yannick Seurin. Hash functions and RFID tags: Mind the gap. Cryptographic Hardware and Embedded Systems - CHES 2008, Volume 5154 of the series Lecture Notes in Computer Science pp. 283-299.


  • Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W Dent, Ahmad-Reza Sadeghi. Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. Advances in Cryptology - ASIACRYPT 2008, Volume 5350 of the series Lecture Notes in Computer Science pp. 489-505.
    Springer Link [published version]

  • Bertram Poettering. Very Long Baseline Interferometry (VLBI) on Longwave by Synchronization by Aid of Time Signals. Master thesis in Computer Science (University of Hamburg, Feb 2008).


  • Eike Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. pp. 1-26, preprint. An extended version of this paper appeared in CT-RSA 2008 (with Y. Vahlis). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Gregory Neven. Identity-Based Signatures. IOS Press Cryptology and Information Security Series on Identity-Based Cryptography, Dec 2008.
    PDF [pdf] URL [url]

  • Eike Kiltz, Yevgeniy Vahlis. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Proceedings of CT-RSA 2008. pp. 221--238 LNCS 4964 (2008). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Gregor Leander, Carsten Rolfes, Axel Poschmann, Christof Paar. Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. Smart Card Research and Advanced Applications, Volume 5189 of the series Lecture Notes in Computer Science pp. 89-103.
    Springer Link [published version]

  • Hans Dobbertin, Gregor Leander. Bent functions embedded into the recursive framework of {\ mathbb {Z}}-bent functions. Designs, Codes and Cryptography, December 2008, Volume 49, Issue 1, pp. 3-22.
    Springer Link [published version]

  • Ivan Damgaard, Dennis Hofheinz, Eike Kiltz, Rune Thorbek. Public-Key Encryption with Non-Interactive Opening. Proceedings of CT-RSA 2008. pp. 239--255 LNCS 4964 (2008).
    PDF [pdf]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. Two classes of quadratic APN binomials inequivalent to power functions. Information Theory, IEEE Transactions on 54 (9), pp. 4218-4229.
    URL [url]

  • Marcus Brinkmann, Gregor Leander. On the classification of APN functions up to dimension five. Designs, Codes and Cryptography, December 2008, Volume 49, Issue 1, pp. 273-288.
    Springer Link [published version]

  • Michel Abdalla, Eike Kiltz, Gregory Neven. Generalized Key Delegation for Hierarchical Identity-Based Encryption. IET Information Security, Volume 2, Issue 3, pp. 67--78, September 2008.


  • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier and Haixia Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Journal of Cryptology, Volume 21, Isuue 3, July 2008, pp. 350--391.
    Springer Link [published version]

  • Philippe Langevin, Gregor Leander. Classification of boolean quartic forms in eight variables. Boolean Functions in Cryptology and Information Security.
    URL [url]

  • Philippe Langevin, Gregor Leander. Monomial bent functions and Stickelberger's theorem. Finite Fields and Their Applications, Volume 14, Issue 3, July 2008, Pages 727-742.
    URL [url]

  • Philippe Langevin, Gregor Leander, Gary McGuire. Kasami Bent Functions are Not Equivalent to Their Duals. Contemporary Mathematics 461, pp. 187-198.
    URL [url]

  • R Avanzi, S Ballet, P Beelem, K Brander, C Carlet, E Cesena, J Chaumine, R Cohen, JM Couveignes, E Férard, S Flon, D Freeman, G Frey, T Høholdt, E Hallouin, GH Hitching, T Johnsen, M Kiviharju, D Kohel, G Lachaud, P Langevin, K Lauter, HF Law, G Leander, R Oyono, M Perret, C Ritzenthaler, F Rodier, R Rolland, JP Serre, I Shparlinski, F Voloch, N Wildberger, P Wong, Y Zelenyuk. Aubry Y., 284. Freeman 500, pp. 29.
    PDF [pdf]

  • Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró. On codes, matroids, and secure multiparty computation from linear secret-sharing schemes. Information Theory, IEEE Transactions on 54 (6), pp. 2644-2657.
    URL [url]

  • Sebastian Faust, Emilia Käsper, Stefan Lucks. Efficient Simultaneous Broadcast. PKC 2008.


2007
  • A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin, C Vikkelsoe. Small-Footprint Block Cipher Design-How far can you go?. 3rd Conference on RFID Security.
    PDF [pdf]

  • Andrey Bogdanov, Lars R Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, Charlotte Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. Cryptographic Hardware and Embedded Systems - CHES 2007, Volume 4727 of the series Lecture Notes in Computer Science pp. 450-466.
    Springer Link [published version]

  • Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent. Sufficient Conditions for the Computational Intractability of Generic Group Problems. IACR Cryptology ePrint Archive 2007: 360 (2007).
    PDF [pdf] Bibtex [bibtex]

  • Dennis Hofheinz, Eike Kiltz. Secure Hybrid Encryption from Weakened Key Encapsulation. Proceedings of IACR CRYPTO 2007, pp. 553--571 LNCS 4622 (2007). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. Chosen-Ciphertext Secure Key Encapsulation based on Hashed Gap Decisional Diffie-Hellman. Proceedings of IACR PKC 2007, pp. 282--297 LNCS 4450 (2007). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme. Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Payman Mohassel, Enav Weinreb, Matt Franklin. Secure Linear Algebra Using Linearly Recurrent Sequences. Proceedings of IACR TCC 2007, pp. 291--310 LNCS 4392 (2007).
    PDF [pdf]

  • George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso and Bart Preneel. Efficient Negative Databases from Cryptographic Hash Functions. ISC 2007.


  • Gregor Leander, Axel Poschmann. On the Classification of 4 Bit S-boxes. Arithmetic of Finite Fields, Volume 4547 of the series Lecture Notes in Computer Science pp. 159-176.
    Springer Link [published version]

  • Gregor Leander, Axel Poschmann, Kai Schramm, Christof Paar. New LightWweight Crypto Algorithms for RFID. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium, pp. 1843-1846.
    URL [url]

  • Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm. New Lightweight DES Variants. Fast Software Encryption, Volume 4593 of the series Lecture Notes in Computer Science pp. 196-210.
    Springer Link [published version]

  • Mihir Bellare, Dennis Hofheinz, Eike Kiltz. On the No-Challenge-Decryption Condition in IND-CCA. Manuscript (2007).


  • Nils Gregor Leander. Another class of non-normal bent functions. Jean-Francis MICHON Pierre VALARCHER, pp. 87-110.
    URL [url]

  • Philippe Langevin, Gregor Leander. On exponents with highly divisible Fourier Coefficients and Conjectures of Niho and Dobbertin. Algebraic Geometry and its applications (France, 2007), pp. 410-418.
    PDF [pdf]

  • Philippe Langevin, Gregor Leander, Gary McGuire. A Counterexample to a Conjecture of Niho. IEEE transactions on information theory 53 (12), pp. 4785-4786.
    URL [url]

  • Philippe Langevin, Gregor Leander, P Rabizzoni, P Véron, JP Zanotti. The number of bent functions with 8 variables. BFCA 6, pp. 125-135.
    URL [url]

  • Ronald Cramer, Eike Kiltz, C. Padró. A Note on Secure Computation of the Moore-Penrose Pseudo-Inverse and its Application to Secure Linear Algebra. Proceedings of IACR CRYPTO 2007, pp. 613--630 LNCS 4622 (2007).


  • Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan. Bounded CCA2-Secure Encryption. Proceedings of IACR ASIACRYPT 2007. (An earlier version appeared as eprint 2006/391).


  • Ronald Cramer, Vanesa Daza, Ignacio Gracia, Gregor Leander, Jorge Jiménez Urroz. On codes, matroids and secure multi-party computation from linear secret.... .
    URL [url]

  • Sebastian Faust, Markulf Kohlweiss, Lothar Fritsch, Bartek Gedrojc and Bart Preneel. Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker. Privacy Enhancing Technologies 2007.


2006
  • Aleksander Kholosha, Gregor Leander. Bent Functions With 2^(r) Niho Exponents. IEEE Transactions on Information Theory 52 (12), pp. 5529-5532.


  • Alexander Kholosha, Gregor Leander. Bent functions with 2r Niho exponents. IEEE transactions on information theory 52 (12), pp. 5529-5532.
    URL [url]

  • Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor Leander. Finding nonnormal bent functions. Discrete Applied Mathematics, Volume 154, Issue 2, 1 February 2006, Pages 202-218.
    URL [url]

  • David Galindo and Javier Herranz and Eike Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. Proceedings of IACR ASIACRYPT 2006, pp. 178 -- 193 LNCS 4284 (2006). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • David Galindo, Eike Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Proceedings of ACISP 2006, pp. 336--347 LNCS 4058 (2006). Full version available on Cryptology ePrint Archive. See also the journal version..
    PDF [pdf]

  • David Galindo, Eike Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Proceedings of SCN 2006, pp. 173--185 LNCS 4116 (2006). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. Chosen-Ciphertext Security from Tag-Based Encryption. Proceedings of IACR TCC 2006, pp. 581--600 LNCS 3876 (2006).
    PDF [pdf]

  • Eike Kiltz. On the Limitations of the Spread of an IBE-to-PKE Transformation. Proceedings of IACR PKC 2006, pp. 274--289 LNCS 3958 (2006).
    PDF [pdf]

  • Eike Kiltz, Arne Winterhof. Polynomial Interpolation of Cryptographic Functions Related to the Diffie-Hellman and Discrete Logarithm Problem. Journal of Discrete Applied Mathematics, Special Issue on Coding and Cryptography, Volume 154, Issue 2 , 1 February 2006, pp. 326-336. (Journal version of a WCC 2003 paper.).


  • Gregor Leander, Andy Rupp. On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. Advances in Cryptology - ASIACRYPT 2006, Volume 4284 of the series Lecture Notes in Computer Science pp. 241-251.
    Springer Link [published version]

  • Gregor Leander, Axel Poschmann, Kai Schramm, Christof Paar. A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications. Workshop on RFID Security-RFIDSec.
    PDF [pdf]

  • Hans Dobbertin, Anne Canteaut, Claude Carlet, Patrick Felke, Philippe Gaborit, Gregor Leander. Construction of bent functions via Niho power functions. Journal of Combinatorial Theory, Series A, Volume 113, Issue 5, July 2006, Pages 779-798.
    URL [url]

  • Ivan Damgaard, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft. Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. Proceedings of IACR TCC 2006, pp. 285--304 LNCS 3876 (2006).
    PDF [pdf]

  • Javier Herranz, Dennis Hofheinz, Eike Kiltz. Some (In)Sufficient Conditions for Secure Hybrid Encryption. Information and Computation. Journal version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. A class of quadratic APN binomials inequivalent to power functions. IACR Cryptology 2006, pp. 445.
    PDF [pdf]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. Another class of quadratic APN binomials over F2n: the case n divisible by 4. IACR Cryptology ePrint Archive 2006, pp. 428.
    PDF [pdf]

  • Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander. An infinite class of quadratic APN functions which are not equivalent to power mappings. Information Theory, 2006 IEEE International Symposium on, pp. 2637-2641.
    URL [url]

  • Nils Gregor Leander. Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions. Contemporary Mathematics 418, pp. 141.


  • Nils Gregor Leander. Monomial bent functions. Information Theory, IEEE Transactions on 52 (2), pp. 738-743.
    URL [url]

  • Ronald Cramer, Dennis Hofheinz, Eike Kiltz. A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security. manuscript. Cryptology ePrint Archive.
    PDF [pdf]

2005
  • Eike Kiltz. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. pp. 1-22, manuscript. Cryptology ePrint Archive. This paper has been merged and was published at TCC 2006..
    PDF [pdf]

  • Eike Kiltz, Hans Ulrich Simon. Threshold Circuit Lower Bounds on Cryptographic Functions. Journal of Computer and Systems Sciences, JCSS Volume 71, Issue 2, August 2005, pp. 185-212. Full version available on Cryptology ePrint Archive.


  • Eike Kiltz, Anton Mityagin, Saurabh Panjwani Barath Raghavan. Append-Only Signatures. Proceedings of ICALP 2005, pp. 435--445 LNCS 3580 (2005). © Springer-Verlag. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Gregor Leander, John Malone-Lee. Secure Computation of the Mean and Related Statistics. Proceedings of IACR TCC 2005, pp. 283--302 LNCS 3378 (2005). © IACR. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Hans Dobbertin, Gregor Leander. A survey of some recent results on bent functions. Sequences and Their Applications-SETA 2004, pp. 1-29.
    PDF [pdf]

  • Hans Dobbertin, Gregor Leander. Cryptographer's Toolkit for Construction of 8-Bit Bent Functions.. IACR Cryptology ePrint Archive 2005, pp. 89.
    PDF [pdf]

  • Hans Dobbertin, Magnus Daum, Patrick Felke, Gregor Leander. Mystery-Twister - www.mystery-twister.com. 2. Krypto-Tag-Workshop über Kryptographie Universität Ulm, pp. 6.
    PDF [pdf]

  • Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró. On codes, matroids and secure multi-party computation from linear secret sharing schemes. Advances in Cryptology - CRYPTO 2005, Volume 3621 of the series Lecture Notes in Computer Science pp. 327-343.
    Springer Link [published version]

2004
  • Claude Carlet, Hans Dobbertin, Gregor Leander. Normal extensions of bent functions. Information Theory, IEEE Transactions on 50 (11), pp. 2880-2885.
    URL [url]

  • Eike Kiltz, Arne Winterhof. Lower Bounds on Weight and Degree of Bivariate Polynomials Related to the Diffie-Hellman Mapping. Bulletin of the AMS, vol. 69 (2004), pp. 305-315.


  • Gregor Leander, Kai Schramm, Patrick Felke, Christof Paar. A collision-attack on AES. Cryptographic Hardware and Embedded Systems - CHES 2004, Volume 3156 of the series Lecture Notes in Computer Science pp. 163-175.
    Springer Link [published version]

  • Nils Gregor Leander. Normality of bent functions, monomial and binomial bent functions. Ruhr Universität Bochum.
    PDF [pdf]

2003
  • Eike Kiltz. Complexity Theoretic Lower Bounds on Cryptographic Functions. Ruhr-Universität Bochum, Nov 2003.
    URL [url]

  • Eike Kiltz. On the Representation of Boolean Predicates of the Diffie-Hellman Function. Proceedings of the 20th International Symposium on Theoretical Aspects of Computer Science, STACS 2003. LNCS 2607.
    PDF [pdf] URL [url]

  • Eike Kiltz, Hand Ulrich Simon. Complexity Theoretic Aspects of some Cryptographic Functions. Proceedings of the Ninth International Computing and Combinatorics Conference, COCOON 2003. pp. 294--303. LNCS 2697. © Springer-Verlag.
    URL [url]

  • Eike Kiltz, John Malone-Lee. A General Construction of IND-CCA2 Secure Public Key Encryption. Proceedings of the Ninth IMA Conference on Cryptography and Coding, pp. 152--166. LNCS 2898 (2003). .
    URL [url]

  • Magnus Daum, Hans Dobbertin, Gregor Leander. An algorithm for checking normality of Boolean functions. Proceedings of the Workshop on Coding and Cryptography (WCC 2003), Versailles, France, pp. 133-142.


2002
  • Gregor Leander. Improving the Success Probability for Shor's Factoring Algorithm. arXiv preprint quant-ph/0208183.
    URL [url]

2001
  • Eike Kiltz. A Primitive for Proving the Security of Every Bit and About Universal Hash Functions & Hard Core Bits. Proceedings of the 13th International Symposium on Fundamentals of Computation Theory, FCT 2001, LNCS 2138. © Springer-Verlag.
    PDF [pdf] URL [url]

  • Eike Kiltz. A Tool Box of Cryptographic Functions related to the Diffie-Hellman Function. Proceedings of the second International Conference on Cryptology in India, INDOCRYPT 2001. LNCS 2247. © Springer-Verlag.
    PDF [pdf] URL [url]

2000
  • Eike Kiltz. Verfahren zur Überprüfung von Bitsicherheit in Kryptosystemen. Diplomarbeit Mathematik (in German), Ruhr-Universität Bochum, May 2000.