Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ... Annual International Conference on the Theory and Applications of …, 2021 | 32 | 2021 |
Simon’s algorithm and symmetric crypto: Generalizations and automatized applications F Canale, G Leander, L Stennes Annual International Cryptology Conference, 779-808, 2022 | 7 | 2022 |
Breaking HALFLOOP-24 M Dansarie, P Derbez, G Leander, L Stennes IACR Transactions on Symmetric Cryptology 2022 (3), 217-238, 2022 | 6 | 2022 |
Cryptanalysis of HALFLOOP block ciphers: Destroying HALFLOOP-24 G Leander, S Rasoolzadeh, L Stennes Cryptology ePrint Archive, 2023 | 2 | 2023 |
HAWKEYE – Recovering Symmetric Cryptography From Hardware Circuits G Leander, C Paar, J Speith, L Stennes Annual International Cryptology Conference, 340-376, 2024 | | 2024 |
Falling into Bytes and Pieces–Cryptanalysis of an Apple Patent Application G Leander, L Stennes, J Vorloeper International Conference on Cryptology in India, 269-286, 2023 | | 2023 |
Commutative Cryptanalysis Made Practical J Baudrin, P Felke, G Leander, P Neumann, L Perrin, L Stennes IACR Transactions on Symmetric Cryptology 2023 (4), 299-329, 2023 | | 2023 |
On perfect linear approximations and differentials over two-round SPNs C Beierle, P Felke, G Leander, P Neumann, L Stennes Annual International Cryptology Conference, 209-239, 2023 | | 2023 |