Shorter Linear Straight-Line Programs for MDS Matrices T Kranz, G Leander, K Stoffelen, F Wiemer IACR Transactions on Symmetric Cryptology 2017 (4), 188-211, 2017 | 95 | 2017 |
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... IACR Transactions on Symmetric Cryptology, 295-349, 2020 | 82 | 2020 |
Out of Oddity – New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... | 75 | 2020 |
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication S Paul, P Scheible, F Wiemer Journal of Computer Security 30 (4), 623-653, 2022 | 48 | 2022 |
High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware F Wiemer, R Zimmermann ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference …, 2014 | 44 | 2014 |
Searching for Subspace Trails and Truncated Differentials G Leander, C Tezcan, F Wiemer IACR Transactions on Symmetric Cryptology 2018 (1), 74-100, 2018 | 39 | 2018 |
PRINCEv2 - More Security for (Almost) No Overhead D Božilov, M Eichlseder, M Knezevic, B Lambin, G Leander, T Moos, ... Selected Areas in Cryptography-SAC 2020, 2020 | 33 | 2020 |
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers T Kranz, G Leander, F Wiemer Transactions on Symmetric Cryptology 2017 (1), 2017 | 33 | 2017 |
Autocorrelations of vectorial Boolean functions A Canteaut, L Kölsch, C Li, C Li, K Li, L Qu, F Wiemer LatinCrypt 2021, 0 | 25* | |
Parallel Implementation of BDD Enumeration for LWE E Kirshanova, A May, F Wiemer Applied Cryptography and Network Security: 14th International Conference …, 2016 | 18 | 2016 |
Weak-Key Distinguishers for AES L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer Selected Areas in Cryptography 2020, 0 | 14* | |
On the security of the Rescue hash function. T Beyne, A Canteaut, G Leander, M Naya-Plasencia, L Perrin, F Wiemer IACR Cryptol. ePrint Arch. 2020, 820, 2020 | 10 | 2020 |
Spook: sponge-based leakage-resilient authenticated encryption with a masked tweakable block cipher (2019) D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... | 9 | 2019 |
BISON - Instantiating the Whitened Swap-Or-Not Construction A Canteaut, V Lallemand, G Leander, P Neumann, F Wiemer Advances in Cryptology–EUROCRYPT 2019, 2019 | 7 | 2019 |
Report on the Security of STARK-friendly Hash Functions (Version 2.0) A Canteaut, T Beyne, I Dinur, M Eichlseder, G Leander, G Leurent, ... | 2 | 2020 |
Security Arguments and Tool-based Design of Block Ciphers F Wiemer Ruhr-Universität Bochum, 2020 | 2 | 2020 |
Enabling Secure Communication for Automotive Endpoint-ECUs through Lightweight-Cryptography F Wiemer, A Zeh 7th ACM Computer Science in Cars Symposium December 5, 2023 Darmstadt …, 2023 | | 2023 |
Spook: Updates on the Round-2 Submission D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... | | 2020 |