Monomial bent functions

N.G. Leander
IEEE Transactions on Information Theory 52 ( 2) 738 -743

124
2006
Normality of Bent Functions Monomial and Binomial Bent Functions

Nils-Gregor Leander
Verlag nicht ermittelbar

14
2004
Another class of non-normal bent functions

Nils Gregor Leander¹
Fonctions booléennes/Boolean Functions: Cryptographie, applications/Cryptography, Applications vol. 2 387 87 -87

2
2005
A Collision-Attack on AES Combining Side Channel- and Differential-Attack

Patrick Felke , Christof Paar , Gregor Leander , Kai Schramm
cryptographic hardware and embedded systems 163 -175

95
2004
Practical Key Recovery Attacks On Two McEliece Variants.

Gregor Leander , Valérie Gauthier-Umaña
IACR Cryptology ePrint Archive 2009 509

54
2009
Analysis of Kasami-Welch Functions in Odd Dimension using Stickelberger's Theorem

Gregor Leander , Philippe Langevin , Gary Mcguire , Eugen Zalinescu
Journal of Combinatorics and Number Theory 2 ( 1)

5
2011
Cryptographer's Toolkit for Construction of 8-Bit Bent Functions.

Hans Dobbertin , Gregor Leander
IACR Cryptology ePrint Archive 2005 89

10
2005
Decomposing the ASASA Block Cipher Construction.

Gregor Leander , Itai Dinur , Orr Dunkelman , Thorsten Kranz
IACR Cryptology ePrint Archive 2015 507

21
2015
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).

Christian Rechberger , Anne Canteaut , Christof Paar , Julia Borghoff
IACR Cryptology ePrint Archive 2012 529

20
2012
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version.

Christof Paar , David F. Oswald , Gregor Leander , Daehyun Strobel
IACR Cryptology ePrint Archive 2013 598

1
2013
Small Scale Variants Of The Block Cipher PRESENT.

Gregor Leander
IACR Cryptology ePrint Archive 2010 143

54
2010
Reconstruction of Highly Non Linear Sboxes from Linear Codes.

Peter Beelen , Gregor Leander
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 153 -159

1
2009
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny

Gregor Leander , Takanori Isobe , Christof Beierle , Stefan Kölbl
IACR Transactions on Symmetric Cryptology 2018 20 -47

2
2018
Nonlinear Approximations in Cryptanalysis Revisited

Anne Canteaut , Gregor Leander , Christof Beierle
IACR Transactions on Symmetric Cryptology 2018 ( 4) 80 -101

2
2018
A class of quadratic APN binomials inequivalent to power functions.

Claude Carlet , Lilya Budaghyan , Gregor Leander
IACR Cryptology ePrint Archive 2006 445

14
2006
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.

Christian Rechberger , Gregor Leander , Philipp Jovanovic , Christof Beierle
IACR Cryptology ePrint Archive 2015 212

2015
Attaques par invariant : comment s'en protéger?

Anne Canteaut , Gregor Leander , Christof Beierle , Yann Rotella
Journées codage et cryptographie 2017 1

2017
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64.

Gregor Leander , Yosuke Todo , Yu Sasaki
IACR Cryptology ePrint Archive 2016 732

2016
Proving resistance of a block cipher against invariant attacks

Anne Canteaut , Gregor Leander , Christof Beierle , Yann Rotella
BFA 2017 - Boolean Functions and their Applications

2017