Showing 1 - 18 results of 18 for search 'Gregor Leander', query time: 0.07s
Refine Results
-
1
GPU Assisted Brute Force Cryptanalysis of GPRS, GSM, RFID, and TETRA by Cihangir Tezcan, Gregor Leander
Published 2025-03-01
Article -
2
Dasta – Alternative Linear Layer for Rasta by Phil Hebborn, Gregor Leander
Published 2020-09-01
Article -
3
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers by Thorsten Kranz, Gregor Leander, Friedrich Wiemer
Published 2017-03-01
Article -
4
Cryptanalysis of HALFLOOP Block Ciphers by Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes
Published 2023-12-01
Article -
5
Searching for Subspace Trails and Truncated Differentials by Gregor Leander, Cihangir Tezcan, Friedrich Wiemer
Published 2018-03-01
Article -
6
Nonlinear Approximations in Cryptanalysis Revisited by Christof Beierle, Anne Canteaut, Gregor Leander
Published 2018-12-01
Article -
7
The SPEEDY Family of Block Ciphers by Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
Published 2021-08-01
Article -
8
Breaking HALFLOOP-24 by Marcus Dansarie, Patrick Derbez, Gregor Leander, Lukas Stennes
Published 2022-09-01
Article -
9
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks by Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
Published 2019-03-01
Article -
10
Decomposing Linear Layers by Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom
Published 2022-12-01
Article -
11
Quantum attacks on two-round even-mansour by BinBin Cai, BinBin Cai, Fei Gao, Gregor Leander
Published 2022-10-01
Article -
12
-
13
Commutative Cryptanalysis Made Practical by Jules Baudrin, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes
Published 2023-12-01
Article -
14
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion by Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
Published 2019-03-01
Article -
15
MOE: Multiplication Operated Encryption with Trojan Resilience by Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander, Léo Perrin, François-Xavier Standaert
Published 2021-03-01
Article -
16
Observations on TETRA Encryption Algorithm TEA-3 by Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes
Published 2025-03-01
Article -
17
SKINNY-AEAD and SKINNY-Hash by Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Published 2020-06-01
Article -
18
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher by Davide Bellizia, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval, Chun Guo, Gregor Leander, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert, Balazs Udvarhelyi, Friedrich Wiemer
Published 2020-06-01
Article