default search action
Christof Beierle
Person information
- affiliation: Ruhr-University Bochum, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i24]Christof Beierle, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Rachelle Heim Boissier:
Symmetric Cryptography (Dagstuhl Seminar 24041). Dagstuhl Reports 14(1): 72-89 (2024) - [i23]Christof Beierle, Jakob Feldtkeller, Anna Guinet, Tim Güneysu, Gregor Leander, Jan Richter-Brockmann, Pascal Sasdrich:
INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis. IACR Cryptol. ePrint Arch. 2024: 833 (2024) - [i22]Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 1678 (2024) - [i21]Christof Beierle:
Revisiting Products of the Form X Times a Linearized Polynomial L(X). IACR Cryptol. ePrint Arch. 2024: 1688 (2024) - 2023
- [j15]Christof Beierle, Claude Carlet:
Gold functions and switched cube functions are not 0-extendable in dimension n > 5. Des. Codes Cryptogr. 91(2): 433-449 (2023) - [j14]Christof Beierle:
Generalized almost perfect nonlinear binomials and trinomials over fields of prime-square order. Finite Fields Their Appl. 88: 102185 (2023) - [c10]Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. CRYPTO (3) 2023: 209-239 - [i20]Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Lukas Stennes:
On Perfect Linear Approximations and Differentials over Two-Round SPNs. IACR Cryptol. ePrint Arch. 2023: 725 (2023) - 2022
- [j13]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and extensions of quadratic APN functions. Des. Codes Cryptogr. 90(4): 1009-1036 (2022) - [j12]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A further study of quadratic APN permutations in dimension nine. Finite Fields Their Appl. 81: 102049 (2022) - [j11]Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. J. Cryptol. 35(4): 29 (2022) - [j10]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. IEEE Trans. Inf. Theory 68(1): 670-678 (2022) - [j9]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Trans. Symmetric Cryptol. 2022(4): 243-265 (2022) - [c9]Christof Beierle, Tim Beyne, Patrick Felke, Gregor Leander:
Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers. CRYPTO (3) 2022: 748-778 - [d6]Christof Beierle, Gregor Leander, Léo Perrin:
Quadratic APN Extensions. Zenodo, 2022 - [d5]Christof Beierle, Gregor Leander, Léo Perrin:
Supplementary code to "Trims and extensions of quadratic APN functions". Zenodo, 2022 - [i19]Christof Beierle, Claude Carlet:
Gold Functions Are Not 0-Extendable in Dimension n>5. CoRR abs/2201.10510 (2022) - [i18]Christof Beierle, Patrick Felke:
Classification of Planar Monomials Over Finite Fields of Small Order. CoRR abs/2202.11032 (2022) - [i17]Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. IACR Cryptol. ePrint Arch. 2022: 1159 (2022) - 2021
- [j8]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. IEEE Trans. Inf. Theory 67(7): 4863-4875 (2021) - [c8]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. EUROCRYPT (2) 2021: 155-183 - [d4]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Small Dimension. Zenodo, 2021 - [d3]Christof Beierle, Gregor Leander, Léo Perrin:
Quadratic APN Extensions. Zenodo, 2021 - [i16]Christof Beierle, Claude Carlet, Gregor Leander, Léo Perrin:
A Further Study of Quadratic APN Permutations in Dimension Nine. CoRR abs/2104.08008 (2021) - [i15]Christof Beierle, Gregor Leander, Léo Perrin:
Trims and Extensions of Quadratic APN Functions. CoRR abs/2108.13280 (2021) - [i14]Christof Beierle, Patrick Derbez, Gregor Leander, Gaëtan Leurent, Håvard Raddum, Yann Rotella, David Rupprecht, Lukas Stennes:
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2. IACR Cryptol. ePrint Arch. 2021: 819 (2021) - [i13]Christof Beierle, Patrick Felke, Gregor Leander:
To Shift or Not to Shift: Understanding GEA-1. IACR Cryptol. ePrint Arch. 2021: 829 (2021) - 2020
- [j7]Christof Beierle, Alex Biryukov, Aleksei Udovenko:
On degree-d zero-sum sets of full rank. Cryptogr. Commun. 12(4): 685-710 (2020) - [j6]Christof Beierle, Gregor Leander:
4-uniform permutations with null nonlinearity. Cryptogr. Commun. 12(6): 1133-1141 (2020) - [j5]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [j4]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. IACR Trans. Symmetric Cryptol. 2020(S1): 208-261 (2020) - [c7]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. CRYPTO (3) 2020: 329-358 - [c6]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX). CRYPTO (3) 2020: 419-448 - [d2]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Dimension Eight. Zenodo, 2020 - [d1]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions in Small Dimension. Zenodo, 2020 - [i12]Christof Beierle, Marcus Brinkmann, Gregor Leander:
Linearly Self-Equivalent APN Permutations in Small Dimension. CoRR abs/2003.12006 (2020) - [i11]Christof Beierle, Gregor Leander:
New Instances of Quadratic APN Functions. CoRR abs/2009.07204 (2020) - [i10]Christof Beierle, Gregor Leander:
4-Uniform Permutations with Null Nonlinearity. IACR Cryptol. ePrint Arch. 2020: 334 (2020) - [i9]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. IACR Cryptol. ePrint Arch. 2020: 775 (2020)
2010 – 2019
- 2019
- [j3]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Trans. Symmetric Cryptol. 2019(1): 5-45 (2019) - [i8]Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. IACR Cryptol. ePrint Arch. 2019: 210 (2019) - [i7]Christof Beierle, Alex Biryukov, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko, Vesselin Velichkov, Qingju Wang:
Alzette: A 64-bit ARX-box. IACR Cryptol. ePrint Arch. 2019: 1378 (2019) - 2018
- [b1]Christof Beierle:
Design and analysis of lightweight block ciphers: a focus on the linear layer. Ruhr University Bochum, Germany, 2018 - [j2]Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - [j1]Christof Beierle, Anne Canteaut, Gregor Leander:
Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): 80-101 (2018) - [i6]Christof Beierle, Alex Biryukov, Aleksei Udovenko:
On Degree-d Zero-Sum Sets of Full Rank. IACR Cryptol. ePrint Arch. 2018: 1194 (2018) - 2017
- [c5]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance Against Invariant Attacks: How to Choose the Round Constants. CRYPTO (2) 2017: 647-678 - [i5]Christof Beierle, Anne Canteaut, Gregor Leander, Yann Rotella:
Proving Resistance against Invariant Attacks: How to Choose the Round Constants. IACR Cryptol. ePrint Arch. 2017: 463 (2017) - 2016
- [c4]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c3]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. CRYPTO (1) 2016: 625-653 - [c2]Christof Beierle:
Pen and Paper Arguments for SIMON and SIMON-like Designs. SCN 2016: 431-446 - [i4]Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 119 (2016) - [i3]Christof Beierle:
Pen and Paper Arguments for SIMON and SIMON-like Designs. IACR Cryptol. ePrint Arch. 2016: 651 (2016) - [i2]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - 2015
- [c1]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. CT-RSA 2015: 37-58 - [i1]Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:
Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. IACR Cryptol. ePrint Arch. 2015: 212 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint