2018
  • Gregor Leander, Cihangir Teczan, and Friedrich Wiemer. Searching for Subspace Trails and Truncated Differentials. IACR Transactions on Symmetric Cryptology Volume 2018 Issue 1.
    Bibtex [bibtex]

2017
  • Thorsten Kranz, Gregor Leander, and Friedrich Wiemer. Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Transactions on Symmetric Cryptology Volume 2017 Issue 1.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Thorsten Kranz, Gregor Leander, Ko Stoffelen, and Friedrich Wiemer. Shorter Linear Straight-Line Programs for MDS Matrices. IACR Transactions on Symmetric Cryptology Volume 2017 Issue 4.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider. Strong 8-bit Sboxes with efficient masking in hardware extended version. J. Cryptographic Engineering 7(2): 149-165.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Gregor Leander, Alexander May. Grover Meets Simon - Quantumly Attacking the FX-construction. ASIACRYPT (2) 2017: 161-178.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella. Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: 647-678.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

2016
  • Christof Beierle, Thorsten Kranz, Gregor Leander. Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR CRYPTO 2016, CRYPTO (1) 2016: 625-653.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim. The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptology ePrint Archive 2016: 660 (2016), CRYPTO (2) 2016: 123-153.
    PDF [pdf] Springer Link [published version] URL [url] Bibtex [bibtex]

  • Tim Güneysu, Gregor Leander, Amir Moradi. Lightweight Cryptography for Security and Privacy. 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers, Lecture Notes in Computer Science 9542, Springer 2016, ISBN 978-3-319-29077-5.
    Springer Link [published version] Bibtex [bibtex]

  • Luis Alberto Benthin Sanguino, Gregor Leander, Christof Paar, Bernhard Esslinger, Ingo Niebel. Analyzing the Spanish strip cipher by combining combinatorial and statistical methods. Cryptologia 40(3): 261-284 (2016).
    Springer Link [published version] Bibtex [bibtex]

  • Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider. Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptology ePrint Archive 2016: 647 (2016), CHES 2016: 171-193.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

2015
  • Gregor Leander, Brice Minaud, Sondre Rønjom. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. IACR EUROCRYPT 2015.
    Springer Link [published version]

  • Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptology ePrint Archive 2015: 212 (2015), CT-RSA 2015.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander. Decomposing the ASASA Block Cipher Construction. Cryptology ePrint Archive, Report 2015/507, 2015.
    PDF [pdf]

  • Gregor Leander. Fast Software Encryption. 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers, Lecture Notes in Computer Science, Volume 9054 2015.
    Springer Link [published version]

  • Gregor Leander. Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers. Springer-Verlag.
    URL [url]

  • Stefan Kölbl, Gregor Leander, Tyge Tiessen. Observations on the SIMON block cipher family. IACR Cryptology ePrint Archive 2015: 145 (2015).
    PDF [pdf] Bibtex [bibtex]

  • Christina Boura, Anne Canteaut, Lars R Knudsen, Gregor Leander. Reflection Ciphers. WCC 2015, Paris, France April 15, 2015.
    PDF [pdf]

  • Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander. Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. SecureComm 2015.
    Springer Link [published version] Bibtex [bibtex]

  • Oliver Stecklina, Stephan Kornemann, Felix Grehl, Ramona Jung, Thorsten Kranz, Gregor Leander, Dennis Schweer, Katharina Mollus, Dirk Westhoff. Custom-fit security for efficient and pollution-resistant multicast OTA-programming with fountain codes. I4CS 2015: 1-8.
    URL [url] Bibtex [bibtex]

2014
  • Martin R Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçoin. Block Ciphers - Focus On The Linear Layer (feat. PRIDE). Advances in Cryptology - CRYPTO 2014, Volume 8616 of the series Lecture Notes in Computer Science pp. 57-76. © Springer-Verlag.
    Springer Link [published version]

  • Martin R Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar. Block Ciphers - Focus On The Linear Layer (feat. PRIDE) Full Version. .
    URL [url]

  • Céline Blondeau, Gregor Leander, Kaisa Nyberg. Differential-Linear Cryptanalysis Revisited. Fast Software Encryption, pp. 411--430. © Springer-Verlag.
    Springer Link [published version] Bibtex [bibtex]

  • Elif Bilge Kavun, Martin M Lauridsen, Gregor Leander, Christian Rechberger, Peter Schwabe, Tolga Yalçin, DTU Compute. Prøst v1. Submission to CAESAR.
    PDF [pdf]

2013
  • Sugata Gangopadhyay, Anand Joshi, Gregor Leander, Rajendra Kumar Sharma. A new construction of bent functions based on {\ mathbb {Z}}-bent functions. Designs, Codes and Cryptography, January 2013, Volume 66, Issue 1, pp. 243-256. © Springer-Verlag.
    Springer Link [published version]

  • Elif Bilge Kavun, Gregor Leander, Tolga Yalcind. A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices. Reconfigurable Computing and FPGAs (ReConFig), 2013 International Conference, pp. 1--8. IEEE.
    URL [url] Bibtex [bibtex]

  • Martin R Albrecht, Gregor Leander. An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. Selected Areas in Cryptography, Volume 7707 of the series Lecture Notes in Computer Science pp. 1-15.
    Springer Link [published version] Bibtex [bibtex]

  • Céline Blondeau, Andrey Bogdanov, Gregor Leander. Bounds in Shallows and in Miseries. Advances in Cryptology - CRYPTO 2013, Volume 8042 of the series Lecture Notes in Computer Science pp 204-221. © Springer-Verlag.
    Springer Link [published version] Bibtex [bibtex]

  • Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg, Christof Paar. Fuming acid and cryptanalysis: Handy tools for overcoming a digital locking and access control system. Advances in Cryptology - CRYPTO 2013, Volume 8042 of the series Lecture Notes in Computer Science pp 147-164. © Springer-Verlag.
    Springer Link [published version]

  • Gregor Leander, Pawel Swierczynski, Christof Paar. Keccak und der SHA-2. Datenschutz und Datensicherheit - DuD, November 2013, Volume 37, Issue 11, pp. 712-719. © Springer-Verlag.
    Springer Link [published version] Bibtex [bibtex]

  • Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng, Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen, Hossein Ghodosi, Eiichiro Fujisaki, Tatsuaki Okamoto, Dennis Hofheinz, Eike Kiltz, Victor Shoup, Antoine Joux, Vanessa Vitse, Andrej Bogdanov, Takanori Isobe. Our Content. Journal of Failure Analysis and Prevention, December 2012, Volume 12, Issue 6, pp. 640--642. © Springer-Verlag.
    Springer Link [published version]

  • Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen. Slender-set differential cryptanalysis. Journal of Cryptology, January 2013, Volume 26, Issue 1, pp. 11-38.
    Springer Link [published version]

  • Alexei Bogdanov, Marko Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede. Spongent: The design space of lightweight cryptographic hashing. Computers, IEEE Transactions on 62 (10), 2041--2053.
    URL [url]

2012
  • Peter Beelen, Gregor Leander. A new construction of highly nonlinear S-boxes. Cryptography and Communications, March 2012, Volume 4, Issue 1, pp. 65-77.
    Springer Link [published version] Bibtex [bibtex]

  • Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang. Integral and Multidimensional Linear Distinguishers with Correlation Zero. Advances in Cryptology - ASIACRYPT 2012, Volume 7658 of the series Lecture Notes in Computer Science pp. 244-261.
    Springer Link [published version] Bibtex [bibtex]

  • Andrey Bogdanov, Lars R Knudsen, Gregor Leander, François-Xavier Standaert, John Steinberger, Elmar Tischhauser. Key-alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations. Advances in Cryptology - EUROCRYPT 2012, Volume 7237 of the series Lecture Notes in Computer Science pp. 45-62.
    Springer Link [published version]

  • Mohamed Ahmed Abdelraheem, Martin Âgren, Peter Beelen, Gregor Leander. On the Distribution of Linear Biases: Three Instructive Examples. Advances in Cryptology - CRYPTO 2012, Volume 7417 of the series Lecture Notes in Computer Science pp. 50-67. © Springer-Verlag.
    Springer Link [published version]

  • Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S Thomsen, Tolga Yalçin. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications. Advances in Cryptology - ASIACRYPT 2012, Volume 7658 of the series Lecture Notes in Computer Science pp. 208-225.
    Springer Link [published version]

  • Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Lars R Knudsen, Gregor Leander, Christof Paar, Christian Rechberger, Peter Rombouts. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications Full version. .


2011
  • Mohamed Ahmed Abdelraheem, Hoda AlKhzaimi, Gregor Leander, Erik Zenner. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack. Lecture Notes in Computer Science Volume 6841 2011.
    Springer Link [published version]

  • Philippe Langevin, Gregor Leander, Gary Mcguire, Eugen Zalinescu. Analysis of Kasami-Welch Functions in Odd Dimension using Stickelberger's Theorem. Journal of Combinatorics and Number Theory, pp. 55-72.
    PDF [pdf]

  • Gregor Leander, Francois Rodier. Bounds on the degree of APN polynomials: the case of x^(-1) + g(x). Designs, Codes and Cryptography, April 2011, Volume 59, Issue 1, pp 207-222.
    Springer Link [published version]

  • Lars R Knudsen, Gregor Leander. C2 - Block Cipher. Encyclopedia of Cryptography and Security, pp. 179-180.
    Springer Link [published version] Bibtex [bibtex]

  • Philippe Langevin, Gregor Leander. Counting all bent functions in dimension eight 99270589265934370305785861242880. Designs, Codes and Cryptography, April 2011, Volume 59, Issue 1, pp. 193-205.
    Springer Link [published version] Bibtex [bibtex]

  • Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen. Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. Fast Software Encryption, Volume 6733 of the series Lecture Notes in Computer Science pp. 270-289.
    Springer Link [published version] Bibtex [bibtex]

  • Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. Fast Software Encryption, Volume 6733 of the series Lecture Notes in Computer Science pp. 1-17.
    Springer Link [published version]

  • Gregor Leander. On Linear Hulls, Statistical Saturation Attacks, PRESENT and a Cryptanalysis of PUFFIN. Advances in Cryptology - EUROCRYPT 2011, Volume 6632 of the series Lecture Notes in Computer Science pp. 303-322.
    Springer Link [published version]

  • Lars R Knudsen, Gregor Leander. PRESENT - Block Cipher. Encyclopedia of Cryptography and Security, pp. 953-955.
    Springer Link [published version] Bibtex [bibtex]

  • Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm. Share this. .
    URL [url]

  • Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede. SPONGENT: A Lightweight Hash Function. Cryptographic Hardware and Embedded Systems - CHES 2011, Volume 6917 of the series Lecture Notes in Computer Science pp. 312-325.
    Springer Link [published version]

  • André Kündgen, Gregor Leander, Carsten Thomassen. Switchings, extensions, and reductions in central digraphs. Journal of Combinatorial Theory, Series A, Volume 118, Issue 7, October 2011, Pages 2025-2034.
    URL [url] Bibtex [bibtex]

2010
  • Carl Bracken, Gregor Leander. A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields and Their Applications, Volume 16, Issue 4, July 2010, Pages 231-242.
    URL [url] Bibtex [bibtex]

  • Gregor Leander, V Gauthier Umana. Practical key recovery attacks on two McEliece variants. Proceedings of the Second International Conference on Symbolic Computation and Cryptography.
    PDF [pdf]

  • Lars Knudsen, Gregor Leander, Axel Poschmann, Matthew JB Robshaw. PRINTcipher: A Block Cipher for IC-Printing. Cryptographic Hardware and Embedded Systems, CHES 2010, Volume 6225 of the series Lecture Notes in Computer Science pp. 16-32.
    Springer Link [published version]

  • Gregor Leander. Small Scale Variants Of The Block Cipher PRESENT.. IACR Cryptology 2010.
    PDF [pdf]

2009
  • Mathias Herrmann, Gregor Leander. A Practical Key Recovery Attack on Basic TCHo. Public Key Cryptography - PKC 2009, Volume 5443 of the series Lecture Notes in Computer Science pp. 411-424.
    Springer Link [published version] Bibtex [bibtex]

  • Gregor Leander, Erik Zenner, Philip Hawkes. Cache timing analysis of LFSR-based stream ciphers. Cryptography and Coding, Volume 5921 of the series Lecture Notes in Computer Science pp. 433-445.
    Springer Link [published version]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. Constructing new APN functions from known ones. Finite Fields and Their Applications, Volume 15, Issue 2, April 2009, Pages 150-159.
    URL [url] Bibtex [bibtex]

  • Gregor Leander, Gary McGuire. Construction of bent functions from near-bent functions. Journal of Combinatorial Theory, Series A, Volume 116, Issue 4, May 2009, Pages 960-970.
    URL [url] Bibtex [bibtex]

  • Julia Borghoff, Lars R Knudsen, Gregor Leander, Krystian Matusiewicz. Cryptanalysis of C2. Advances in Cryptology - CRYPTO 2009, Volume 5677 of the series Lecture Notes in Computer Science pp. 250-266.
    Springer Link [published version] Bibtex [bibtex]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. On a construction of quadratic APN functions. Information Theory Workshop, 2009. ITW 2009. IEEE, pp. 374-378.
    URL [url]

  • Peter Beelen, Gregor Leander. Reconstruction of highly non linear Sboxes from linear codes. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes.
    URL [url]

2008
  • Hans Dobbertin, Gregor Leander. Bent functions embedded into the recursive framework of {\ mathbb {Z}}-bent functions. Designs, Codes and Cryptography, December 2008, Volume 49, Issue 1, pp. 3-22.
    Springer Link [published version]

  • Philippe Langevin, Gregor Leander. Classification of boolean quartic forms in eight variables. Boolean Functions in Cryptology and Information Security.
    URL [url]

  • Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matt JB Robshaw, Yannick Seurin. Hash functions and RFID tags: Mind the gap. Cryptographic Hardware and Embedded Systems - CHES 2008, Volume 5154 of the series Lecture Notes in Computer Science pp. 283-299.


  • Philippe Langevin, Gregor Leander, Gary McGuire. Kasami Bent Functions are Not Equivalent to Their Duals. Contemporary Mathematics 461, pp. 187-198.
    URL [url]

  • Philippe Langevin, Gregor Leander. Monomial bent functions and Stickelberger's theorem. Finite Fields and Their Applications, Volume 14, Issue 3, July 2008, Pages 727-742.
    URL [url]

  • Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró. On codes, matroids, and secure multiparty computation from linear secret-sharing schemes. Information Theory, IEEE Transactions on 54 (6), pp. 2644-2657.
    URL [url]

  • Marcus Brinkmann, Gregor Leander. On the classification of APN functions up to dimension five. Designs, Codes and Cryptography, December 2008, Volume 49, Issue 1, pp. 273-288.
    Springer Link [published version] Bibtex [bibtex]

  • Andy Rupp, Gregor Leander, Endre Bangerter, Alexander W Dent, Ahmad-Reza Sadeghi. Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. Advances in Cryptology - ASIACRYPT 2008, Volume 5350 of the series Lecture Notes in Computer Science pp. 489-505.
    Springer Link [published version]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. Two classes of quadratic APN binomials inequivalent to power functions. Information Theory, IEEE Transactions on 54 (9), pp. 4218-4229.
    URL [url]

  • Gregor Leander, Carsten Rolfes, Axel Poschmann, Christof Paar. Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. Smart Card Research and Advanced Applications, Volume 5189 of the series Lecture Notes in Computer Science pp. 89-103.
    Springer Link [published version] Bibtex [bibtex]

2007
  • Philippe Langevin, Gregor Leander, Gary McGuire. A Counterexample to a Conjecture of Niho. IEEE transactions on information theory 53 (12), pp. 4785-4786.
    URL [url] Bibtex [bibtex]

  • Nils Gregor Leander. Another class of non-normal bent functions. Jean-Francis MICHON Pierre VALARCHER, pp. 87-110.
    URL [url]

  • Gregor Leander, Axel Poschmann, Kai Schramm, Christof Paar. New LightWweight Crypto Algorithms for RFID. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium, pp. 1843-1846.
    URL [url]

  • Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm. New Lightweight DES Variants. Fast Software Encryption, Volume 4593 of the series Lecture Notes in Computer Science pp. 196-210.
    Springer Link [published version] Bibtex [bibtex]

  • Ronald Cramer, Vanesa Daza, Ignacio Gracia, Gregor Leander, Jorge Jiménez Urroz. On codes, matroids and secure multi-party computation from linear secret.... .
    URL [url]

  • Philippe Langevin, Gregor Leander. On exponents with highly divisible Fourier Coefficients and Conjectures of Niho and Dobbertin. Algebraic Geometry and its applications (France, 2007), pp. 410-418.
    PDF [pdf]

  • Gregor Leander, Axel Poschmann. On the Classification of 4 Bit S-boxes. Arithmetic of Finite Fields, Volume 4547 of the series Lecture Notes in Computer Science pp. 159-176.
    Springer Link [published version]

  • Andrey Bogdanov, Lars R Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, Charlotte Vikkelsoe. PRESENT: An Ultra-Lightweight Block Cipher. Cryptographic Hardware and Embedded Systems - CHES 2007, Volume 4727 of the series Lecture Notes in Computer Science pp. 450-466.
    Springer Link [published version]

  • Andy Rupp, Gregor Leander, Endre Bangerter, Ahmad-Reza Sadeghi, Alexander W. Dent. Sufficient Conditions for the Computational Intractability of Generic Group Problems. IACR Cryptology ePrint Archive 2007: 360 (2007).
    PDF [pdf] Bibtex [bibtex]

  • Philippe Langevin, Gregor Leander, P Rabizzoni, P Véron, JP Zanotti. The number of bent functions with 8 variables. BFCA 6, pp. 125-135.
    URL [url]

2006
  • Lilya Budaghyan, Claude Carlet, Gregor Leander. A class of quadratic APN binomials inequivalent to power functions. IACR Cryptology 2006, pp. 445.
    PDF [pdf]

  • Gregor Leander, Axel Poschmann, Kai Schramm, Christof Paar. A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications. Workshop on RFID Security-RFIDSec.
    PDF [pdf]

  • Nils Gregor Leander. Algebraic Problems in Symmetric Cryptography: Two Recent Results on Highly Nonlinear Functions. Contemporary Mathematics 418, pp. 141.


  • Lilya Budaghyan, Claude Carlet, Patrick Felke, Gregor Leander. An infinite class of quadratic APN functions which are not equivalent to power mappings. Information Theory, 2006 IEEE International Symposium on, pp. 2637-2641.
    URL [url]

  • Lilya Budaghyan, Claude Carlet, Gregor Leander. Another class of quadratic APN binomials over F2n: the case n divisible by 4. IACR Cryptology ePrint Archive 2006, pp. 428.
    PDF [pdf]

  • Alexander Kholosha, Gregor Leander. Bent functions with 2r Niho exponents. IEEE transactions on information theory 52 (12), pp. 5529-5532.
    URL [url]

  • Aleksander Kholosha, Gregor Leander. Bent Functions With 2^(r) Niho Exponents. IEEE Transactions on Information Theory 52 (12), pp. 5529-5532.


  • Hans Dobbertin, Anne Canteaut, Claude Carlet, Patrick Felke, Philippe Gaborit, Gregor Leander. Construction of bent functions via Niho power functions. Journal of Combinatorial Theory, Series A, Volume 113, Issue 5, July 2006, Pages 779-798.
    URL [url] Bibtex [bibtex]

  • Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor Leander. Finding nonnormal bent functions. Discrete Applied Mathematics, Volume 154, Issue 2, 1 February 2006, Pages 202-218.
    URL [url] Bibtex [bibtex]

  • Nils Gregor Leander. Monomial bent functions. Information Theory, IEEE Transactions on 52 (2), pp. 738-743.
    URL [url]

  • Gregor Leander, Andy Rupp. On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms. Advances in Cryptology - ASIACRYPT 2006, Volume 4284 of the series Lecture Notes in Computer Science pp. 241-251.
    Springer Link [published version] Bibtex [bibtex]

2005
  • Hans Dobbertin, Gregor Leander. A survey of some recent results on bent functions. Sequences and Their Applications-SETA 2004, pp. 1-29.
    PDF [pdf]

  • Hans Dobbertin, Gregor Leander. Cryptographer's Toolkit for Construction of 8-Bit Bent Functions.. IACR Cryptology ePrint Archive 2005, pp. 89.
    PDF [pdf]

  • Hans Dobbertin, Magnus Daum, Patrick Felke, Gregor Leander. Mystery-Twister - www.mystery-twister.com. 2. Krypto-Tag-Workshop über Kryptographie Universität Ulm, pp. 6.
    PDF [pdf]

  • Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró. On codes, matroids and secure multi-party computation from linear secret sharing schemes. Advances in Cryptology - CRYPTO 2005, Volume 3621 of the series Lecture Notes in Computer Science pp. 327-343.
    Springer Link [published version]

  • Eike Kiltz, Gregor Leander, John Malone-Lee. Secure Computation of the Mean and Related Statistics. Proceedings of IACR TCC 2005, pp. 283--302 LNCS 3378 (2005). © IACR. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Bibtex [bibtex]

2004
  • Gregor Leander, Kai Schramm, Patrick Felke, Christof Paar. A collision-attack on AES. Cryptographic Hardware and Embedded Systems - CHES 2004, Volume 3156 of the series Lecture Notes in Computer Science pp. 163-175.
    Springer Link [published version]

  • Claude Carlet, Hans Dobbertin, Gregor Leander. Normal extensions of bent functions. Information Theory, IEEE Transactions on 50 (11), pp. 2880-2885.
    URL [url]

  • Nils Gregor Leander. Normality of bent functions, monomial and binomial bent functions. Ruhr Universität Bochum.
    PDF [pdf]

2003
  • Magnus Daum, Hans Dobbertin, Gregor Leander. An algorithm for checking normality of Boolean functions. Proceedings of the Workshop on Coding and Cryptography (WCC 2003), Versailles, France, pp. 133-142.


2002
  • Gregor Leander. Improving the Success Probability for Shor's Factoring Algorithm. arXiv preprint quant-ph/0208183.
    URL [url]