Cryptographers' World
 

Gregor Leander


Author's Web Page Link

12 papers in database with 343 citations Star

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Marcus Brinkmann,  Gregor Leander,  On the classification of APN functions up to dimension five, Designs, Codes and Cryptography, Volume 49(1), pp. 273 - 288, Springer, 2008.

[Electronic Edition][Cited 8 times ]

2. Hans Dobbertin,  Gregor Leander,  Bent functions embedded into the recursive framework of \mathbb, Designs, Codes and Cryptography, Volume 49(1), pp. 3 - 22, Springer, 2008.

[Electronic Edition][No citation]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Julia Borghoff,  Lars R. Knudsen,  Gregor Leander,  Krystian Matusiewicz,  Cryptanalysis of C2, pp. 250 - 266, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

2. Mathias Herrmann,  Gregor Leander,  A Practical Key Recovery Attack on Basic TCHo, pp. 411 - 424, PKC 2009.

[Electronic Edition][Cited 1 times ]

3. Andy Rupp,  Gregor Leander,  Endre Bangerter,  Alexander W. Dent,  Ahmad-Reza Sadeghi,  Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems , pp. 489 - 505, ASIACRYPT 2008.

[Electronic Edition][Cited 4 times ]

4. Andrey Bogdanov,  Gregor Leander,  Christof Paar,  Axel Poschmann,  Matthew J. B. Robshaw,  Yannick Seurin,  Hash Functions and RFID Tags: Mind the Gap, pp. 283 - 299, CHES 2008.

[Electronic Edition][Cited 27 times ]

5. Gregor Leander,  Christof Paar,  Axel Poschmann,  Kai Schramm,  New Lightweight DES Variants, pp. 196 - 210, FSE 2007.

[Electronic Edition][Cited 36 times ]

6. Andrey Bogdanov,  Lars R. Knudsen,  Gregor Leander,  Christof Paar,  Axel Poschmann,  Matthew J. B. Robshaw,  Yannick Seurin,  C. Vikkelsoe,  PRESENT: An Ultra-Lightweight Block Cipher, pp. 450 - 466, CHES 2007.

[Electronic Edition][Cited 138 times Red StarRed Star]

7. Gregor Leander,  Andy Rupp,  On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms, pp. 241 - 251, ASIACRYPT 2006.

[Electronic Edition][Cited 15 times ]

8. Ronald Cramer,  Vanesa Daza,  Ignacio Gracia,  Jorge Jiménez Urroz,  Gregor Leander,  Jaume Martí-Farré,  Carles Padró,  On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes, pp. 327 - 343, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

9. Eike Kiltz,  Gregor Leander,  John Malone-Lee,  Secure Computation of the Mean and Related Statistics, pp. 283 - 302, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 34 times ]

10. Kai Schramm,  Gregor Leander,  Patrick Felke,  Christof Paar,  A Collision-Attack on AES: Combining Side Channel- and Differential-Attack, pp. 163 - 175, CHES 2004.

[Electronic Edition][Cited 52 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...