Skip to main content

previous disabled Page of 5
and
  1. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part II

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  2. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part III

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  3. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part V

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  4. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part IV

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  5. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VI

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  6. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part I

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  7. No Access

    Chapter and Conference Paper

    Falling into Bytes and Pieces – Cryptanalysis of an Apple Patent Application

    In this paper we take a look at a cipher that has escaped public cryptanalysis so far. It is a block cipher published by Apple in a patent application describing its functionality and, as usual for a patent, i...

    Gregor Leander, Lukas Stennes, Jan Vorloeper in Progress in Cryptology – INDOCRYPT 2023 (2024)

  8. No Access

    Book and Conference Proceedings

    Advances in Cryptology – EUROCRYPT 2024

    43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26–30, 2024, Proceedings, Part VII

    Marc Joye, Gregor Leander in Lecture Notes in Computer Science (2024)

  9. No Access

    Article

    Mathematical aspects of division property

    This work surveys mathematical aspects of division property, which is a state-of-the-art technique in cryptanalysis of symmetric-key algorithms, such as authenticated encryption, block ciphers and stream ciphers....

    Phil Hebborn, Gregor Leander, Aleksei Udovenko in Cryptography and Communications (2023)

  10. No Access

    Chapter and Conference Paper

    On Perfect Linear Approximations and Differentials over Two-Round SPNs

    Recent constructions of (tweakable) block ciphers with an embedded cryptographic backdoor relied on the existence of probability-one differentials or perfect (non-)linear approximations over a reduced-round v...

    Christof Beierle, Patrick Felke, Gregor Leander in Advances in Cryptology – CRYPTO 2023 (2023)

  11. No Access

    Chapter and Conference Paper

    Pitfalls and Shortcomings for Decompositions and Alignment

    In this paper we, for the first time, study the question under which circumstances decomposing a round function of a Substitution-Permutation Network is possible uniquely. More precisely, we provide necessary and...

    Baptiste Lambin, Gregor Leander, Patrick Neumann in Advances in Cryptology – EUROCRYPT 2023 (2023)

  12. No Access

    Chapter and Conference Paper

    Differential Meet-In-The-Middle Cryptanalysis

    In this paper we introduce the differential meet-in-the-middle framework, a new cryptanalysis technique for symmetric primitives. Our new cryptanalysis method combines techniques from both meet-in-the-middle a...

    Christina Boura, Nicolas David, Patrick Derbez in Advances in Cryptology – CRYPTO 2023 (2023)

  13. No Access

    Article

    Improved Differential-Linear Attacks with Applications to ARX Ciphers

    We present several improvements to the framework of differential-linear attacks with a special focus on ARX ciphers. As a demonstration of their impact, we apply them to Chaskey and ChaCha and we are able to s...

    Christof Beierle, Marek Broll, Federico Canale, Nicolas David in Journal of Cryptology (2022)

  14. Article

    Open Access

    Trims and extensions of quadratic APN functions

    In this work, we study functions that can be obtained by restricting a vectorial Boolean function $$F :\mathbb {F}_{2}^n \rightarrow \mathbb {...

    Christof Beierle, Gregor Leander, Léo Perrin in Designs, Codes and Cryptography (2022)

  15. No Access

    Chapter and Conference Paper

    New Attacks from Old Distinguishers Improved Attacks on Serpent

    Serpent was originally proposed in 1998 and is one of the most studied block ciphers. In this paper we improve knowledge of its security by providing the current best attack on this cipher, which is a 12-round...

    Marek Broll, Federico Canale, Nicolas David in Topics in Cryptology – CT-RSA 2022 (2022)

  16. No Access

    Chapter and Conference Paper

    Simon’s Algorithm and Symmetric Crypto: Generalizations and Automatized Applications

    In this paper we deepen our understanding of how to apply Simon’s algorithm to break symmetric cryptographic primitives.

    Federico Canale, Gregor Leander, Lukas Stennes in Advances in Cryptology – CRYPTO 2022 (2022)

  17. No Access

    Chapter and Conference Paper

    Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers

    Deliberately weakened ciphers are of great interest in political discussion on law enforcement, as in the constantly recurring crypto wars, and have been put in the spotlight of academics by recent progress. A...

    Christof Beierle, Tim Beyne, Patrick Felke in Advances in Cryptology – CRYPTO 2022 (2022)

  18. No Access

    Article

    Modeling for Three-Subset Division Property without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the propagation efficiently. In the application to stream ciphers, ...

    Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang in Journal of Cryptology (2021)

  19. Chapter and Conference Paper

    Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2

    This paper presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, we show that the initial state of GEA-1 can be recovered from a...

    Christof Beierle, Patrick Derbez, Gregor Leander in Advances in Cryptology – EUROCRYPT 2021 (2021)

  20. No Access

    Chapter and Conference Paper

    PRINCEv2

    In this work, we propose tweaks to the PRINCE block cipher that help us to increase its security without changing the number of rounds or round operations. We get substantially higher security for the same comple...

    Dušan Božilov, Maria Eichlseder, Miroslav Knežević in Selected Areas in Cryptography (2021)

previous disabled Page of 5