BibTeX records: Willi Meier

download as .bib file

@article{DBLP:journals/ccds/HamannKMZ18,
  author    = {Matthias Hamann and
               Matthias Krause and
               Willi Meier and
               Bin Zhang},
  title     = {Design and analysis of small-state grain-like stream ciphers},
  journal   = {Cryptography and Communications},
  volume    = {10},
  number    = {5},
  pages     = {803--834},
  year      = {2018},
  url       = {https://doi.org/10.1007/s12095-017-0261-6},
  doi       = {10.1007/s12095-017-0261-6},
  timestamp = {Fri, 01 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ccds/HamannKMZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TodoIHM18,
  author    = {Yosuke Todo and
               Takanori Isobe and
               Yonglin Hao and
               Willi Meier},
  title     = {Cube Attacks on Non-Blackbox Polynomials Based on Division Property},
  journal   = {{IEEE} Trans. Computers},
  volume    = {67},
  number    = {12},
  pages     = {1720--1736},
  year      = {2018},
  url       = {https://doi.org/10.1109/TC.2018.2835480},
  doi       = {10.1109/TC.2018.2835480},
  timestamp = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tc/TodoIHM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikMAIMBWR18,
  author    = {Subhadeep Banik and
               Vasily Mikhalev and
               Frederik Armknecht and
               Takanori Isobe and
               Willi Meier and
               Andrey Bogdanov and
               Yuhei Watanabe and
               Francesco Regazzoni},
  title     = {Towards Low Energy Stream Ciphers},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2018},
  number    = {2},
  pages     = {1--19},
  year      = {2018},
  url       = {https://doi.org/10.13154/tosc.v2018.i2.1-19},
  doi       = {10.13154/tosc.v2018.i2.1-19},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/BanikMAIMBWR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TodoIMAZ18,
  author    = {Yosuke Todo and
               Takanori Isobe and
               Willi Meier and
               Kazumaro Aoki and
               Bin Zhang},
  title     = {Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a,
               Grain-128, and Grain-v1},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  pages     = {129--159},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-96881-0\_5},
  doi       = {10.1007/978-3-319-96881-0\_5},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/TodoIMAZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuWDM18,
  author    = {Ximing Fu and
               Xiaoyun Wang and
               Xiaoyang Dong and
               Willi Meier},
  title     = {A Key-Recovery Attack on 855-round Trivium},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  pages     = {160--184},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-96881-0\_6},
  doi       = {10.1007/978-3-319-96881-0\_6},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/FuWDM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangHTLIM18,
  author    = {Qingju Wang and
               Yonglin Hao and
               Yosuke Todo and
               Chaoyun Li and
               Takanori Isobe and
               Willi Meier},
  title     = {Improved Division Property Based Cube Attacks Exploiting Algebraic
               Properties of Superpoly},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {I}},
  pages     = {275--305},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-1},
  url       = {https://doi.org/10.1007/978-3-319-96884-1\_10},
  doi       = {10.1007/978-3-319-96884-1\_10},
  timestamp = {Mon, 13 Aug 2018 13:56:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/WangHTLIM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ZhangXM18,
  author    = {Bin Zhang and
               Chao Xu and
               Willi Meier},
  title     = {Fast Near Collision Attack on the Grain v1 Stream Cipher},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  pages     = {771--802},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-78375-8\_25},
  doi       = {10.1007/978-3-319-78375-8\_25},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/ZhangXM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXM18,
  author    = {Bin Zhang and
               Chao Xu and
               Willi Meier},
  title     = {Fast Near Collision Attack on the Grain v1 Stream Cipher},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {145},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/145},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhangXM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWDM18,
  author    = {Ximing Fu and
               Xiaoyun Wang and
               Xiaoyang Dong and
               Willi Meier},
  title     = {A Key-recovery Attack on 855-round Trivium},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {198},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/198},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FuWDM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TodoIMAZ18,
  author    = {Yosuke Todo and
               Takanori Isobe and
               Willi Meier and
               Kazumaro Aoki and
               Bin Zhang},
  title     = {Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a,
               Grain-128, and Grain-v1},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {522},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/522},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TodoIMAZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoJLMTW18,
  author    = {Yonglin Hao and
               Lin Jiao and
               Chaoyun Li and
               Willi Meier and
               Yosuke Todo and
               Qingju Wang},
  title     = {Observations on the Dynamic Cube Attack of 855-Round {TRIVIUM} from
               Crypto'18},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {972},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/972},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HaoJLMTW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWDMHZ18,
  author    = {Ximing Fu and
               Xiaoyun Wang and
               Xiaoyang Dong and
               Willi Meier and
               Yonglin Hao and
               Boxin Zhao},
  title     = {A Refinement of "A Key-recovery Attack on 855-round Trivium"
               From {CRYPTO} 2018},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {999},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/999},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FuWDMHZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HaoM17,
  author    = {Yonglin Hao and
               Willi Meier},
  title     = {Truncated differential based known-key attacks on round-reduced {SIMON}},
  journal   = {Des. Codes Cryptography},
  volume    = {83},
  number    = {2},
  pages     = {467--492},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10623-016-0242-3},
  doi       = {10.1007/s10623-016-0242-3},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dcc/HaoM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HamannKM17,
  author    = {Matthias Hamann and
               Matthias Krause and
               Willi Meier},
  title     = {{LIZARD} - {A} Lightweight Stream Cipher for Power-constrained Devices},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {1},
  pages     = {45--79},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i1.45-79},
  doi       = {10.13154/tosc.v2017.i1.45-79},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/HamannKM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangGM17,
  author    = {Bin Zhang and
               Xinxin Gong and
               Willi Meier},
  title     = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {4},
  pages     = {58--81},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i4.58-81},
  doi       = {10.13154/tosc.v2017.i4.58-81},
  timestamp = {Tue, 20 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/ZhangGM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TodoIHM17,
  author    = {Yosuke Todo and
               Takanori Isobe and
               Yonglin Hao and
               Willi Meier},
  title     = {Cube Attacks on Non-Blackbox Polynomials Based on Division Property},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  pages     = {250--279},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-63697-9\_9},
  doi       = {10.1007/978-3-319-63697-9\_9},
  timestamp = {Mon, 14 Aug 2017 14:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/TodoIHM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TodoIHM17,
  author    = {Yosuke Todo and
               Takanori Isobe and
               Yonglin Hao and
               Willi Meier},
  title     = {Cube Attacks on Non-Blackbox Polynomials Based on Division Property},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {306},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/306},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/TodoIHM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0MZ17,
  author    = {Matthias Hamann and
               Matthias Krause and
               Willi Meier and
               Bin Zhang},
  title     = {Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {384},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/384},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Hamann0MZ17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangHTLIM17,
  author    = {Qingju Wang and
               Yonglin Hao and
               Yosuke Todo and
               Chaoyun Li and
               Takanori Isobe and
               Willi Meier},
  title     = {Improved Division Property Based Cube Attacks Exploiting Algebraic
               Properties of Superpoly},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1063},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1063},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/WangHTLIM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0M17,
  author    = {Matthias Hamann and
               Matthias Krause and
               Willi Meier},
  title     = {A Note on Stream Ciphers that Continuously Use the {IV}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {1172},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1172},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Hamann0M17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoM16,
  author    = {Yonglin Hao and
               Willi Meier},
  title     = {Truncated Differential Based Known-Key Attacks on Round-Reduced Simon},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {20},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/020},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/HaoM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXM16,
  author    = {Bin Zhang and
               Chao Xu and
               Willi Meier},
  title     = {Fast Correlation Attacks over Extension Fields, Large-unit Linear
               Approximation and Cryptanalysis of {SNOW} 2.0},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {311},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/311},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/ZhangXM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0M16,
  author    = {Matthias Hamann and
               Matthias Krause and
               Willi Meier},
  title     = {{LIZARD} - {A} Lightweight Stream Cipher for Power-constrained Devices},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {926},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/926},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Hamann0M16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurLMW15,
  author    = {Itai Dinur and
               Yunwen Liu and
               Willi Meier and
               Qingju Wang},
  title     = {Optimized Interpolation Attacks on LowMC},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {535--560},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_22},
  doi       = {10.1007/978-3-662-48800-3\_22},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DinurLMW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ZhangXM15,
  author    = {Bin Zhang and
               Chao Xu and
               Willi Meier},
  title     = {Fast Correlation Attacks over Extension Fields, Large-Unit Linear
               Approximation and Cryptanalysis of {SNOW} 2.0},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {643--662},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6\_31},
  doi       = {10.1007/978-3-662-47989-6\_31},
  timestamp = {Tue, 20 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/ZhangXM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasMM15,
  author    = {Sourav Das and
               Subhamoy Maitra and
               Willi Meier},
  title     = {Higher Order Differential Analysis of {NORX}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {186},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/186},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DasMM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraPM15,
  author    = {Subhamoy Maitra and
               Goutam Paul and
               Willi Meier},
  title     = {Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {217},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/217},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MaitraPM15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurLMW15,
  author    = {Itai Dinur and
               Yunwen Liu and
               Willi Meier and
               Qingju Wang},
  title     = {Optimized Interpolation Attacks on LowMC},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {418},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/418},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DinurLMW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/AumassonMPH14,
  author    = {Jean{-}Philippe Aumasson and
               Willi Meier and
               Raphael C.{-}W. Phan and
               Luca Henzen},
  title     = {The Hash Function {BLAKE}},
  series    = {Information Security and Cryptography},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44757-4},
  doi       = {10.1007/978-3-662-44757-4},
  isbn      = {978-3-662-44756-7},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/series/isc/AumassonMPH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/DasM14,
  author    = {Sourav Das and
               Willi Meier},
  title     = {Differential Biases in Reduced-Round Keccak},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  pages     = {69--87},
  year      = {2014},
  crossref  = {DBLP:conf/africacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6\_5},
  doi       = {10.1007/978-3-319-06734-6\_5},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/DasM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GuptaMMPS14,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Willi Meier and
               Goutam Paul and
               Santanu Sarkar},
  title     = {Dependence in IV-Related Bytes of {RC4} Key Enhances Vulnerabilities
               in {WPA}},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {350--369},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0\_18},
  doi       = {10.1007/978-3-662-46706-0\_18},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/GuptaMMPS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2014,
  editor    = {Willi Meier and
               Debdeep Mukhopadhyay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8885},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13039-2},
  doi       = {10.1007/978-3-319-13039-2},
  isbn      = {978-3-319-13038-5},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KnechtMN14,
  author    = {Markus Knecht and
               Willi Meier and
               Carlo U. Nicola},
  title     = {A space- and time-efficient Implementation of the Merkle Tree Traversal
               Algorithm},
  journal   = {CoRR},
  volume    = {abs/1409.4081},
  year      = {2014},
  url       = {http://arxiv.org/abs/1409.4081},
  archivePrefix = {arXiv},
  eprint    = {1409.4081},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/KnechtMN14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AumassonHMN13,
  author    = {Jean{-}Philippe Aumasson and
               Luca Henzen and
               Willi Meier and
               Mar{\'{\i}}a Naya{-}Plasencia},
  title     = {Quark: {A} Lightweight Hash},
  journal   = {J. Cryptology},
  volume    = {26},
  number    = {2},
  pages     = {313--339},
  year      = {2013},
  url       = {https://doi.org/10.1007/s00145-012-9125-6},
  doi       = {10.1007/s00145-012-9125-6},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/AumassonHMN13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaitraPSLM13,
  author    = {Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar and
               Michael Lehmann and
               Willi Meier},
  title     = {New Results on Generalization of Roos-Type Biases and Related Keystreams
               of {RC4}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  pages     = {222--239},
  year      = {2013},
  crossref  = {DBLP:conf/africacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7\_13},
  doi       = {10.1007/978-3-642-38553-7\_13},
  timestamp = {Sat, 06 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/MaitraPSLM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaMM13,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Willi Meier},
  title     = {Distinguishing {WPA}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {476},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/476},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GuptaMM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KnellwolfM12,
  author    = {Simon Knellwolf and
               Willi Meier},
  title     = {High order differential attacks on stream ciphers},
  journal   = {Cryptography and Communications},
  volume    = {4},
  number    = {3-4},
  pages     = {203--215},
  year      = {2012},
  url       = {https://doi.org/10.1007/s12095-012-0071-9},
  doi       = {10.1007/s12095-012-0071-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ccds/KnellwolfM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/0002VM12,
  author    = {Yi Lu and
               Serge Vaudenay and
               Willi Meier},
  title     = {Synthetic linear analysis with applications to CubeHash and Rabbit},
  journal   = {Cryptography and Communications},
  volume    = {4},
  number    = {3-4},
  pages     = {259--276},
  year      = {2012},
  url       = {https://doi.org/10.1007/s12095-012-0064-8},
  doi       = {10.1007/s12095-012-0064-8},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ccds/0002VM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Meier12,
  author    = {Willi Meier},
  title     = {Stream Ciphers, a Perspective},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  pages     = {412},
  year      = {2012},
  crossref  = {DBLP:conf/africacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0\_25},
  doi       = {10.1007/978-3-642-31410-0\_25},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/Meier12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LehmannM12,
  author    = {Michael Lehmann and
               Willi Meier},
  title     = {Conditional Differential Cryptanalysis of Grain-128a},
  booktitle = {Cryptology and Network Security, 11th International Conference, {CANS}
               2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  pages     = {1--11},
  year      = {2012},
  crossref  = {DBLP:conf/cans/2012},
  url       = {https://doi.org/10.1007/978-3-642-35404-5\_1},
  doi       = {10.1007/978-3-642-35404-5\_1},
  timestamp = {Wed, 24 May 2017 08:27:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/LehmannM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/AgrenHJM11,
  author    = {Martin {\AA}gren and
               Martin Hell and
               Thomas Johansson and
               Willi Meier},
  title     = {Grain-128a: a new version of Grain-128 with optional authentication},
  journal   = {{IJWMC}},
  volume    = {5},
  number    = {1},
  pages     = {48--59},
  year      = {2011},
  url       = {https://doi.org/10.1504/IJWMC.2011.044106},
  doi       = {10.1504/IJWMC.2011.044106},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijwmc/AgrenHJM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/HenzenAMP11,
  author    = {Luca Henzen and
               Jean{-}Philippe Aumasson and
               Willi Meier and
               Raphael Chung{-}Wei Phan},
  title     = {{VLSI} Characterization of the Cryptographic Hash Function {BLAKE}},
  journal   = {{IEEE} Trans. {VLSI} Syst.},
  volume    = {19},
  number    = {10},
  pages     = {1746--1754},
  year      = {2011},
  url       = {https://doi.org/10.1109/TVLSI.2010.2060373},
  doi       = {10.1109/TVLSI.2010.2060373},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tvlsi/HenzenAMP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Meier11,
  author    = {Willi Meier},
  title     = {Fast Correlation Attacks: Methods and Countermeasures},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {55--67},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9\_4},
  doi       = {10.1007/978-3-642-21702-9\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/Meier11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnellwolfM11,
  author    = {Simon Knellwolf and
               Willi Meier},
  title     = {Cryptanalysis of the Knapsack Generator},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {188--198},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9\_11},
  doi       = {10.1007/978-3-642-21702-9\_11},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/KnellwolfM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LuVMDJ11,
  author    = {Yi Lu and
               Serge Vaudenay and
               Willi Meier and
               Liping Ding and
               Jianchun Jiang},
  title     = {Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit},
  booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  pages     = {248--260},
  year      = {2011},
  crossref  = {DBLP:conf/icisc/2011},
  url       = {https://doi.org/10.1007/978-3-642-31912-9\_17},
  doi       = {10.1007/978-3-642-31912-9\_17},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/LuVMDJ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Naya-PlasenciaRM11,
  author    = {Mar{\'{\i}}a Naya{-}Plasencia and
               Andrea R{\"{o}}ck and
               Willi Meier},
  title     = {Practical Analysis of Reduced-Round Keccak},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
               on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  pages     = {236--254},
  year      = {2011},
  crossref  = {DBLP:conf/indocrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25578-6\_18},
  doi       = {10.1007/978-3-642-25578-6\_18},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/Naya-PlasenciaRM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KnellwolfMN11,
  author    = {Simon Knellwolf and
               Willi Meier and
               Mar{\'{\i}}a Naya{-}Plasencia},
  title     = {Conditional Differential Cryptanalysis of Trivium and {KATAN}},
  booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  pages     = {200--212},
  year      = {2011},
  crossref  = {DBLP:conf/sacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-28496-0\_12},
  doi       = {10.1007/978-3-642-28496-0\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/KnellwolfMN11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KhazaeiKMS10,
  author    = {Shahram Khazaei and
               Simon Knellwolf and
               Willi Meier and
               Deian Stefan},
  title     = {Improved Linear Differential Attacks on CubeHash},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  pages     = {407--418},
  year      = {2010},
  crossref  = {DBLP:conf/africacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9\_24},
  doi       = {10.1007/978-3-642-12678-9\_24},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/KhazaeiKMS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnellwolfMN10,
  author    = {Simon Knellwolf and
               Willi Meier and
               Mar{\'{\i}}a Naya{-}Plasencia},
  title     = {Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {130--145},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8\_8},
  doi       = {10.1007/978-3-642-17373-8\_8},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KnellwolfMN10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AumassonHMN10,
  author    = {Jean{-}Philippe Aumasson and
               Luca Henzen and
               Willi Meier and
               Mar{\'{\i}}a Naya{-}Plasencia},
  title     = {Quark: {A} Lightweight Hash},
  booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
               Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  pages     = {1--15},
  year      = {2010},
  crossref  = {DBLP:conf/ches/2010},
  url       = {https://doi.org/10.1007/978-3-642-15031-9\_1},
  doi       = {10.1007/978-3-642-15031-9\_1},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ches/AumassonHMN10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10,
  author    = {Mar{\'{\i}}a Naya{-}Plasencia and
               Andrea R{\"{o}}ck and
               Jean{-}Philippe Aumasson and
               Yann Laigle{-}Chapuy and
               Ga{\"{e}}tan Leurent and
               Willi Meier and
               Thomas Peyrin},
  title     = {Cryptanalysis of {ESSENCE}},
  booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  pages     = {134--152},
  year      = {2010},
  crossref  = {DBLP:conf/fse/2010},
  url       = {https://doi.org/10.1007/978-3-642-13858-4\_8},
  doi       = {10.1007/978-3-642-13858-4\_8},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/Naya-PlasenciaRALLMP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonGKMM10,
  author    = {Jean{-}Philippe Aumasson and
               Jian Guo and
               Simon Knellwolf and
               Krystian Matusiewicz and
               Willi Meier},
  title     = {Differential and Invertibility Properties of {BLAKE}},
  booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  pages     = {318--332},
  year      = {2010},
  crossref  = {DBLP:conf/fse/2010},
  url       = {https://doi.org/10.1007/978-3-642-13858-4\_18},
  doi       = {10.1007/978-3-642-13858-4\_18},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/AumassonGKMM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson0KMM10,
  author    = {Jean{-}Philippe Aumasson and
               Jian Guo and
               Simon Knellwolf and
               Krystian Matusiewicz and
               Willi Meier},
  title     = {Differential and invertibility properties of {BLAKE} (full version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {43},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/043},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Aumasson0KMM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/0002MS09,
  author    = {Simon Fischer and
               Willi Meier and
               Dirk Stegemann},
  title     = {Some remarks on FCSRs and implications for stream ciphers},
  journal   = {J. Mathematical Cryptology},
  volume    = {3},
  number    = {3},
  pages     = {227--236},
  year      = {2009},
  url       = {https://doi.org/10.1515/JMC.2009.013},
  doi       = {10.1515/JMC.2009.013},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jmc/0002MS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonBMNP09,
  author    = {Jean{-}Philippe Aumasson and
               Eric Brier and
               Willi Meier and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Thomas Peyrin},
  title     = {Inside the Hypercube},
  booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  pages     = {202--213},
  year      = {2009},
  crossref  = {DBLP:conf/acisp/2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1\_14},
  doi       = {10.1007/978-3-642-02620-1\_14},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/AumassonBMNP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AumassonCMOPV09,
  author    = {Jean{-}Philippe Aumasson and
               {\c{C}}agdas {\c{C}}alik and
               Willi Meier and
               Onur {\"{O}}zen and
               Raphael C.{-}W. Phan and
               Kerem Varici},
  title     = {Improved Cryptanalysis of Skein},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {542--559},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7\_32},
  doi       = {10.1007/978-3-642-10366-7\_32},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/AumassonCMOPV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrierKMP09,
  author    = {Eric Brier and
               Shahram Khazaei and
               Willi Meier and
               Thomas Peyrin},
  title     = {Linearization Framework for Collision Attacks: Application to CubeHash
               and {MD6}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {560--577},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7\_33},
  doi       = {10.1007/978-3-642-10366-7\_33},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BrierKMP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonDMS09,
  author    = {Jean{-}Philippe Aumasson and
               Itai Dinur and
               Willi Meier and
               Adi Shamir},
  title     = {Cube Testers and Key Recovery Attacks on Reduced-Round {MD6} and Trivium},
  booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  pages     = {1--22},
  year      = {2009},
  crossref  = {DBLP:conf/fse/2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9\_1},
  doi       = {10.1007/978-3-642-03317-9\_1},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/AumassonDMS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/AumassonDMS09,
  author    = {Jean{-}Philippe Aumasson and
               Itai Dinur and
               Willi Meier and
               Adi Shamir},
  title     = {Cube Testers and Key Recovery Attacks On Reduced-Round {MD6} and Trivium},
  booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009},
  year      = {2009},
  crossref  = {DBLP:conf/dagstuhl/2009P9031},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2009/1944/},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/AumassonDMS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonDHMS09,
  author    = {Jean{-}Philippe Aumasson and
               Itai Dinur and
               Luca Henzen and
               Willi Meier and
               Adi Shamir},
  title     = {Efficient {FPGA} Implementations of High-Dimensional Cube Testers
               on the Stream Cipher Grain-128},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {218},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/218},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AumassonDHMS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naya-PlasenciaRALLMP09,
  author    = {Mar{\'{\i}}a Naya{-}Plasencia and
               Andrea R{\"{o}}ck and
               Jean{-}Philippe Aumasson and
               Yann Laigle{-}Chapuy and
               Ga{\"{e}}tan Leurent and
               Willi Meier and
               Thomas Peyrin},
  title     = {Cryptanalysis of {ESSENCE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {302},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/302},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Naya-PlasenciaRALLMP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierKMP09,
  author    = {Eric Brier and
               Shahram Khazaei and
               Willi Meier and
               Thomas Peyrin},
  title     = {Linearization Framework for Collision Attacks: Application to CubeHash
               and {MD6}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {382},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/382},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrierKMP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonCMOPV09,
  author    = {Jean{-}Philippe Aumasson and
               {\c{C}}agdas {\c{C}}alik and
               Willi Meier and
               Onur {\"{O}}zen and
               Raphael C.{-}W. Phan and
               Kerem Varici},
  title     = {Improved Cryptanalysis of Skein},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {438},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/438},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AumassonCMOPV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/FischerKM08,
  author    = {Simon Fischer and
               Shahram Khazaei and
               Willi Meier},
  title     = {Chosen {IV} Statistical Analysis for Key Recovery Attacks on Stream
               Ciphers},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  pages     = {236--245},
  year      = {2008},
  crossref  = {DBLP:conf/africacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-68164-9\_16},
  doi       = {10.1007/978-3-540-68164-9\_16},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/FischerKM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonMP08,
  author    = {Jean{-}Philippe Aumasson and
               Willi Meier and
               Raphael C.{-}W. Phan},
  title     = {The Hash Function Family {LAKE}},
  booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
               Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  pages     = {36--53},
  year      = {2008},
  crossref  = {DBLP:conf/fse/2008},
  url       = {https://doi.org/10.1007/978-3-540-71039-4\_3},
  doi       = {10.1007/978-3-540-71039-4\_3},
  timestamp = {Sat, 24 Nov 2018 11:59:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/AumassonMP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AumassonFKMR08,
  author    = {Jean{-}Philippe Aumasson and
               Simon Fischer and
               Shahram Khazaei and
               Willi Meier and
               Christian Rechberger},
  title     = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba},
  booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
               Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  pages     = {470--488},
  year      = {2008},
  crossref  = {DBLP:conf/fse/2008},
  url       = {https://doi.org/10.1007/978-3-540-71039-4\_30},
  doi       = {10.1007/978-3-540-71039-4\_30},
  timestamp = {Sat, 24 Nov 2018 11:59:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/AumassonFKMR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KhazaeiM08,
  author    = {Shahram Khazaei and
               Willi Meier},
  title     = {New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
               on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  pages     = {15--26},
  year      = {2008},
  crossref  = {DBLP:conf/indocrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89754-5\_2},
  doi       = {10.1007/978-3-540-89754-5\_2},
  timestamp = {Wed, 20 Dec 2017 19:55:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/KhazaeiM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmics/KhazaeiM08,
  author    = {Shahram Khazaei and
               Willi Meier},
  title     = {On Reconstruction of {RC4} Keys from Internal States},
  booktitle = {Mathematical Methods in Computer Science, {MMICS} 2008, Karlsruhe,
               Germany, December 17-19, 2008 - Essays in Memory of Thomas Beth},
  pages     = {179--189},
  year      = {2008},
  crossref  = {DBLP:conf/mmics/2008},
  url       = {https://doi.org/10.1007/978-3-540-89994-5\_14},
  doi       = {10.1007/978-3-540-89994-5\_14},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmics/KhazaeiM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AumassonMM08,
  author    = {Jean{-}Philippe Aumasson and
               Willi Meier and
               Florian Mendel},
  title     = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}},
  booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  pages     = {120--135},
  year      = {2008},
  crossref  = {DBLP:conf/sacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-642-04159-4\_8},
  doi       = {10.1007/978-3-642-04159-4\_8},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/AumassonMM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/HellJMM08,
  author    = {Martin Hell and
               Thomas Johansson and
               Alexander Maximov and
               Willi Meier},
  title     = {The Grain Family of Stream Ciphers},
  booktitle = {New Stream Cipher Designs - The eSTREAM Finalists},
  pages     = {179--190},
  year      = {2008},
  crossref  = {DBLP:series/lncs/4986},
  url       = {https://doi.org/10.1007/978-3-540-68351-3\_14},
  doi       = {10.1007/978-3-540-68351-3\_14},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/lncs/HellJMM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonMM08,
  author    = {Jean{-}Philippe Aumasson and
               Willi Meier and
               Florian Mendel},
  title     = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {183},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/183},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AumassonMM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhazaeiM08,
  author    = {Shahram Khazaei and
               Willi Meier},
  title     = {New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {369},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/369},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KhazaeiM08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonBMNP08,
  author    = {Jean{-}Philippe Aumasson and
               Eric Brier and
               Willi Meier and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Thomas Peyrin},
  title     = {Inside the Hypercube},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {486},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/486},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AumassonBMNP08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/HellJM07,
  author    = {Martin Hell and
               Thomas Johansson and
               Willi Meier},
  title     = {Grain: a stream cipher for constrained environments},
  journal   = {{IJWMC}},
  volume    = {2},
  number    = {1},
  pages     = {86--93},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJWMC.2007.013798},
  doi       = {10.1504/IJWMC.2007.013798},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijwmc/HellJM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonFMV07,
  author    = {Jean{-}Philippe Aumasson and
               Matthieu Finiasz and
               Willi Meier and
               Serge Vaudenay},
  title     = {\emph{TCH}\emph{o}: {A} Hardware-Oriented Trapdoor Cipher},
  booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  pages     = {184--199},
  year      = {2007},
  crossref  = {DBLP:conf/acisp/2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1\_15},
  doi       = {10.1007/978-3-540-73458-1\_15},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/AumassonFMV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FischerM07,
  author    = {Simon Fischer and
               Willi Meier},
  title     = {Algebraic Immunity of S-Boxes and Augmented Functions},
  booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  pages     = {366--381},
  year      = {2007},
  crossref  = {DBLP:conf/fse/2007},
  url       = {https://doi.org/10.1007/978-3-540-74619-5\_23},
  doi       = {10.1007/978-3-540-74619-5\_23},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/FischerM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AumassonM07,
  author    = {Jean{-}Philippe Aumasson and
               Willi Meier},
  title     = {Analysis of Multivariate Hash Functions},
  booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International
               Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  pages     = {309--323},
  year      = {2007},
  crossref  = {DBLP:conf/icisc/2007},
  url       = {https://doi.org/10.1007/978-3-540-76788-6\_25},
  doi       = {10.1007/978-3-540-76788-6\_25},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/AumassonM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KhazaeiFM07,
  author    = {Shahram Khazaei and
               Simon Fischer and
               Willi Meier},
  title     = {Reduced Complexity Attacks on the Alternating Step Generator},
  booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
               2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  pages     = {1--16},
  year      = {2007},
  crossref  = {DBLP:conf/sacrypt/2007},
  url       = {https://doi.org/10.1007/978-3-540-77360-3\_1},
  doi       = {10.1007/978-3-540-77360-3\_1},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/KhazaeiFM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonFKMR07,
  author    = {Jean{-}Philippe Aumasson and
               Simon Fischer and
               Shahram Khazaei and
               Willi Meier and
               Christian Rechberger},
  title     = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {472},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/472},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AumassonFKMR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ArmknechtCGKMR06,
  author    = {Frederik Armknecht and
               Claude Carlet and
               Philippe Gaborit and
               Simon K{\"{u}}nzli and
               Willi Meier and
               Olivier Ruatta},
  title     = {Efficient Computation of Algebraic Immunity for Algebraic and Fast
               Algebraic Attacks},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  pages     = {147--164},
  year      = {2006},
  crossref  = {DBLP:conf/eurocrypt/2006},
  url       = {https://doi.org/10.1007/11761679\_10},
  doi       = {10.1007/11761679\_10},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/ArmknechtCGKMR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JohanssonMM06,
  author    = {Thomas Johansson and
               Willi Meier and
               Fr{\'{e}}d{\'{e}}ric Muller},
  title     = {Cryptanalysis of Achterbahn},
  booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
               Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  pages     = {1--14},
  year      = {2006},
  crossref  = {DBLP:conf/fse/2006},
  url       = {https://doi.org/10.1007/11799313\_1},
  doi       = {10.1007/11799313\_1},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/JohanssonMM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/FischerMBBR06,
  author    = {Simon Fischer and
               Willi Meier and
               C{\^{o}}me Berbain and
               Jean{-}Fran{\c{c}}ois Biasse and
               Matthew J. B. Robshaw},
  title     = {Non-randomness in eSTREAM Candidates Salsa20 and {TSC-4}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
               on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  pages     = {2--16},
  year      = {2006},
  crossref  = {DBLP:conf/indocrypt/2006},
  url       = {https://doi.org/10.1007/11941378\_2},
  doi       = {10.1007/11941378\_2},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/FischerMBBR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LuMV05,
  author    = {Yi Lu and
               Willi Meier and
               Serge Vaudenay},
  title     = {The Conditional Correlation Attack: {A} Practical Attack on Bluetooth
               Encryption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {97--117},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218\_7},
  doi       = {10.1007/11535218\_7},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/LuMV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KunzliJM05,
  author    = {Simon K{\"{u}}nzli and
               Pascal Junod and
               Willi Meier},
  title     = {Distinguishing Attacks on T-Functions},
  booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference
               on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
               2005, Proceedings},
  pages     = {2--15},
  year      = {2005},
  crossref  = {DBLP:conf/mycrypt/2005},
  url       = {https://doi.org/10.1007/11554868\_2},
  doi       = {10.1007/11554868\_2},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mycrypt/KunzliJM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ArmknechtM05,
  author    = {Frederik Armknecht and
               Willi Meier},
  title     = {Fault Attacks on Combiners with Memory},
  booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
               2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  pages     = {36--50},
  year      = {2005},
  crossref  = {DBLP:conf/sacrypt/2005},
  url       = {https://doi.org/10.1007/11693383\_3},
  doi       = {10.1007/11693383\_3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/ArmknechtM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierPC04,
  author    = {Willi Meier and
               Enes Pasalic and
               Claude Carlet},
  title     = {Algebraic Attacks and Decomposition of Boolean Functions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  pages     = {474--491},
  year      = {2004},
  crossref  = {DBLP:conf/eurocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-24676-3\_28},
  doi       = {10.1007/978-3-540-24676-3\_28},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MeierPC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2004,
  editor    = {Bimal K. Roy and
               Willi Meier},
  title     = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
               Delhi, India, February 5-7, 2004, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3017},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98177},
  doi       = {10.1007/b98177},
  isbn      = {3-540-22171-9},
  timestamp = {Tue, 30 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GeiselmannMS03,
  author    = {Willi Geiselmann and
               Willi Meier and
               Rainer Steinwandt},
  title     = {An attack on the isomorphisms of polynomials problem with one secret},
  journal   = {Int. J. Inf. Sec.},
  volume    = {2},
  number    = {1},
  pages     = {59--64},
  year      = {2003},
  url       = {https://doi.org/10.1007/s10207-003-0025-5},
  doi       = {10.1007/s10207-003-0025-5},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/GeiselmannMS03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/EkdahlMJ03,
  author    = {Patrik Ekdahl and
               Willi Meier and
               Thomas Johansson},
  title     = {Predicting the Shrinking Generator with Fixed Connections},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  pages     = {330--344},
  year      = {2003},
  crossref  = {DBLP:conf/eurocrypt/2003},
  url       = {https://doi.org/10.1007/3-540-39200-9\_20},
  doi       = {10.1007/3-540-39200-9\_20},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/EkdahlMJ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CourtoisM03,
  author    = {Nicolas Courtois and
               Willi Meier},
  title     = {Algebraic Attacks on Stream Ciphers with Linear Feedback},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  pages     = {345--359},
  year      = {2003},
  crossref  = {DBLP:conf/eurocrypt/2003},
  url       = {https://doi.org/10.1007/3-540-39200-9\_21},
  doi       = {10.1007/3-540-39200-9\_21},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CourtoisM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CourtoisGMT02,
  author    = {Nicolas Courtois and
               Louis Goubin and
               Willi Meier and
               Jean{-}Daniel Tacier},
  title     = {Solving Underdefined Systems of Multivariate Quadratic Equations},
  booktitle = {Public Key Cryptography, 5th International Workshop on Practice and
               Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
               12-14, 2002, Proceedings},
  pages     = {211--227},
  year      = {2002},
  crossref  = {DBLP:conf/pkc/2002},
  url       = {https://doi.org/10.1007/3-540-45664-3\_15},
  doi       = {10.1007/3-540-45664-3\_15},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/CourtoisGMT02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannMS02,
  author    = {Willi Geiselmann and
               Willi Meier and
               Rainer Steinwandt},
  title     = {An Attack on the Isomorphisms of Polynomials Problem with One Secret},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {143},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/143},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/GeiselmannMS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BleichenbacherM01,
  author    = {Daniel Bleichenbacher and
               Willi Meier},
  title     = {Analysis of {SSC2}},
  booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  pages     = {219--232},
  year      = {2001},
  crossref  = {DBLP:conf/fse/2001},
  url       = {https://doi.org/10.1007/3-540-45473-X\_19},
  doi       = {10.1007/3-540-45473-X\_19},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/BleichenbacherM01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenM00,
  author    = {Lars R. Knudsen and
               Willi Meier},
  title     = {Correlations in {RC6} with a Reduced Number of Rounds},
  booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
               New York, NY, USA, April 10-12, 2000, Proceedings},
  pages     = {94--108},
  year      = {2000},
  crossref  = {DBLP:conf/fse/2000},
  url       = {https://doi.org/10.1007/3-540-44706-7\_7},
  doi       = {10.1007/3-540-44706-7\_7},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/KnudsenM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KnudsenM99,
  author    = {Lars R. Knudsen and
               Willi Meier},
  title     = {Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron
               Problem},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  pages     = {363--374},
  year      = {1999},
  crossref  = {DBLP:conf/eurocrypt/99},
  url       = {https://doi.org/10.1007/3-540-48910-X\_25},
  doi       = {10.1007/3-540-48910-X\_25},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/KnudsenM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98,
  author    = {Lars R. Knudsen and
               Willi Meier and
               Bart Preneel and
               Vincent Rijmen and
               Sven Verdoolaege},
  title     = {Analysis Methods for (Alleged) {RC4}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  pages     = {327--341},
  year      = {1998},
  crossref  = {DBLP:conf/asiacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-49649-1\_26},
  doi       = {10.1007/3-540-49649-1\_26},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/KnudsenMPRV98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/KnudsenM97,
  author    = {Lars R. Knudsen and
               Willi Meier},
  title     = {Differential cryptanalysis of {RC5}},
  journal   = {European Transactions on Telecommunications},
  volume    = {8},
  number    = {5},
  pages     = {445--454},
  year      = {1997},
  url       = {https://doi.org/10.1002/ett.4460080503},
  doi       = {10.1002/ett.4460080503},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ett/KnudsenM97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenM96,
  author    = {Lars R. Knudsen and
               Willi Meier},
  title     = {Improved Differential Attacks on {RC5}},
  booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  pages     = {216--228},
  year      = {1996},
  crossref  = {DBLP:conf/crypto/1996},
  url       = {https://doi.org/10.1007/3-540-68697-5\_17},
  doi       = {10.1007/3-540-68697-5\_17},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/KnudsenM96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierS94,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {The Self-Shrinking Generator},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  pages     = {205--214},
  year      = {1994},
  crossref  = {DBLP:conf/eurocrypt/94},
  url       = {https://doi.org/10.1007/BFb0053436},
  doi       = {10.1007/BFb0053436},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MeierS94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Meier93,
  author    = {Willi Meier},
  title     = {On the Security of the {IDEA} Block Cipher},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
               Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
               1993, Proceedings},
  pages     = {371--385},
  year      = {1993},
  crossref  = {DBLP:conf/eurocrypt/93},
  url       = {https://doi.org/10.1007/3-540-48285-7\_32},
  doi       = {10.1007/3-540-48285-7\_32},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Meier93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MeierS92,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Correlation Properties of Combiners with Memory in Stream Ciphers},
  journal   = {J. Cryptology},
  volume    = {5},
  number    = {1},
  pages     = {67--86},
  year      = {1992},
  url       = {https://doi.org/10.1007/BF00191322},
  doi       = {10.1007/BF00191322},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/MeierS92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MeierS92,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Efficient Multiplication on Certain Nonsupersingular Elliptic Curves},
  booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  pages     = {333--344},
  year      = {1992},
  crossref  = {DBLP:conf/crypto/1992},
  url       = {https://doi.org/10.1007/3-540-48071-4\_24},
  doi       = {10.1007/3-540-48071-4\_24},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/MeierS92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierS91,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Analysis of Pseudo Random Sequence Generated by Cellular Automata},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
               Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
               1991, Proceedings},
  pages     = {186--199},
  year      = {1991},
  crossref  = {DBLP:conf/eurocrypt/91},
  url       = {https://doi.org/10.1007/3-540-46416-6\_17},
  doi       = {10.1007/3-540-46416-6\_17},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MeierS91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/StaffelbachM90,
  author    = {Othmar Staffelbach and
               Willi Meier},
  title     = {Cryptographic Significance of the Carry for Ciphers Based on Integer
               Addition},
  booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  pages     = {601--614},
  year      = {1990},
  crossref  = {DBLP:conf/crypto/1990},
  url       = {https://doi.org/10.1007/3-540-38424-3\_42},
  doi       = {10.1007/3-540-38424-3\_42},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/StaffelbachM90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierS90,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Correlation Properties of Combiners with Memory in Stream Ciphers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
               Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
               1990, Proceedings},
  pages     = {204--213},
  year      = {1990},
  crossref  = {DBLP:conf/eurocrypt/90},
  url       = {https://doi.org/10.1007/3-540-46877-3\_18},
  doi       = {10.1007/3-540-46877-3\_18},
  timestamp = {Fri, 19 May 2017 13:10:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MeierS90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MeierS89,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Fast Correlation Attacks on Certain Stream Ciphers},
  journal   = {J. Cryptology},
  volume    = {1},
  number    = {3},
  pages     = {159--176},
  year      = {1989},
  url       = {https://doi.org/10.1007/BF02252874},
  doi       = {10.1007/BF02252874},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/MeierS89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierS89,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Nonlinearity Criteria for Cryptographic Functions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
               Application of of Cryptographic Techniques, Houthalen, Belgium, April
               10-13, 1989, Proceedings},
  pages     = {549--562},
  year      = {1989},
  crossref  = {DBLP:conf/eurocrypt/89},
  url       = {https://doi.org/10.1007/3-540-46885-4\_53},
  doi       = {10.1007/3-540-46885-4\_53},
  timestamp = {Fri, 19 May 2017 13:10:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MeierS89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MeierS88,
  author    = {Willi Meier and
               Othmar Staffelbach},
  title     = {Fast Correlation Attacks on Stream Ciphers (Extended Abstract)},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
               Application of of Cryptographic Techniques, Davos, Switzerland, May
               25-27, 1988, Proceedings},
  pages     = {301--314},
  year      = {1988},
  crossref  = {DBLP:conf/eurocrypt/88},
  url       = {https://doi.org/10.1007/3-540-45961-8\_28},
  doi       = {10.1007/3-540-45961-8\_28},
  timestamp = {Wed, 14 Nov 2018 10:54:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MeierS88},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-2,
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10992},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96881-0},
  doi       = {10.1007/978-3-319-96881-0},
  isbn      = {978-3-319-96880-3},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-1,
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10991},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96884-1},
  doi       = {10.1007/978-3-319-96884-1},
  isbn      = {978-3-319-96883-4},
  timestamp = {Mon, 13 Aug 2018 13:56:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2018-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-2,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10821},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78375-8},
  doi       = {10.1007/978-3-319-78375-8},
  isbn      = {978-3-319-78374-1},
  timestamp = {Sat, 24 Nov 2018 11:59:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-3,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10403},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63697-9},
  doi       = {10.1007/978-3-319-63697-9},
  isbn      = {978-3-319-63696-2},
  timestamp = {Mon, 14 Aug 2017 14:44:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6},
  doi       = {10.1007/978-3-662-47989-6},
  isbn      = {978-3-662-47988-9},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2014,
  editor    = {David Pointcheval and
               Damien Vergnaud},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8469},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-06734-6},
  doi       = {10.1007/978-3-319-06734-6},
  isbn      = {978-3-319-06733-9},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
  editor    = {Amr Youssef and
               Abderrahmane Nitaj and
               Aboul Ella Hassanien},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7918},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38553-7},
  doi       = {10.1007/978-3-642-38553-7},
  isbn      = {978-3-642-38552-0},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2012,
  editor    = {Aikaterini Mitrokotsa and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7374},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0},
  doi       = {10.1007/978-3-642-31410-0},
  isbn      = {978-3-642-31409-4},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2012,
  editor    = {Josef Pieprzyk and
               Ahmad{-}Reza Sadeghi and
               Mark Manulis},
  title     = {Cryptology and Network Security, 11th International Conference, {CANS}
               2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume    = {7712},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35404-5},
  doi       = {10.1007/978-3-642-35404-5},
  isbn      = {978-3-642-35403-8},
  timestamp = {Wed, 24 May 2017 08:27:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cans/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor    = {Antoine Joux},
  title     = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9},
  doi       = {10.1007/978-3-642-21702-9},
  isbn      = {978-3-642-21701-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2011,
  editor    = {Howon Kim},
  title     = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7259},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31912-9},
  doi       = {10.1007/978-3-642-31912-9},
  isbn      = {978-3-642-31911-2},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2011,
  editor    = {Daniel J. Bernstein and
               Sanjit Chatterjee},
  title     = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
               on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7107},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25578-6},
  doi       = {10.1007/978-3-642-25578-6},
  isbn      = {978-3-642-25577-9},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2011,
  editor    = {Ali Miri and
               Serge Vaudenay},
  title     = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7118},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28496-0},
  doi       = {10.1007/978-3-642-28496-0},
  isbn      = {978-3-642-28495-3},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2010,
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9},
  doi       = {10.1007/978-3-642-12678-9},
  isbn      = {978-3-642-12677-2},
  timestamp = {Wed, 14 Nov 2018 10:55:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2010,
  editor    = {Stefan Mangard and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
               Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6225},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15031-9},
  doi       = {10.1007/978-3-642-15031-9},
  isbn      = {978-3-642-15030-2},
  timestamp = {Sat, 24 Nov 2018 11:59:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ches/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2010,
  editor    = {Seokhie Hong and
               Tetsu Iwata},
  title     = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6147},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13858-4},
  doi       = {10.1007/978-3-642-13858-4},
  isbn      = {978-3-642-13857-7},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5594},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1},
  doi       = {10.1007/978-3-642-02620-1},
  isbn      = {978-3-642-02619-5},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2009,
  editor    = {Orr Dunkelman},
  title     = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
               Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5665},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03317-9},
  doi       = {10.1007/978-3-642-03317-9},
  isbn      = {978-3-642-03316-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9031,
  editor    = {Helena Handschuh and
               Stefan Lucks and
               Bart Preneel and
               Phillip Rogaway},
  title     = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {09031},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2009},
  url       = {http://drops.dagstuhl.de/portals/09031/},
  timestamp = {Wed, 08 Apr 2015 13:43:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dagstuhl/2009P9031},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2008,
  editor    = {Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5023},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68164-9},
  doi       = {10.1007/978-3-540-68164-9},
  isbn      = {978-3-540-68159-5},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/africacrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2008,
  editor    = {Kaisa Nyberg},
  title     = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
               Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5086},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-71039-4},
  doi       = {10.1007/978-3-540-71039-4},
  isbn      = {978-3-540-71038-7},
  timestamp = {Sat, 24 Nov 2018 11:59:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2008,
  editor    = {Dipanwita Roy Chowdhury and
               Vincent Rijmen and
               Abhijit Das},
  title     = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
               on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5365},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89754-5},
  doi       = {10.1007/978-3-540-89754-5},
  isbn      = {978-3-540-89753-8},
  timestamp = {Wed, 20 Dec 2017 19:55:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmics/2008,
  editor    = {Jacques Calmet and
               Willi Geiselmann and
               J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title     = {Mathematical Methods in Computer Science, {MMICS} 2008, Karlsruhe,
               Germany, December 17-19, 2008 - Essays in Memory of Thomas Beth},
  series    = {Lecture Notes in Computer Science},
  volume    = {5393},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89994-5},
  doi       = {10.1007/978-3-540-89994-5},
  isbn      = {978-3-540-89993-8},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmics/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2008,
  editor    = {Roberto Maria Avanzi and
               Liam Keliher and
               Francesco Sica},
  title     = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5381},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04159-4},
  doi       = {10.1007/978-3-642-04159-4},
  isbn      = {978-3-642-04158-7},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/4986,
  editor    = {Matthew J. B. Robshaw and
               Olivier Billet},
  title     = {New Stream Cipher Designs - The eSTREAM Finalists},
  series    = {Lecture Notes in Computer Science},
  volume    = {4986},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68351-3},
  doi       = {10.1007/978-3-540-68351-3},
  isbn      = {978-3-540-68350-6},
  timestamp = {Fri, 09 Jun 2017 11:04:34 +0200},
  biburl    = {https://dblp.org/rec/bib/series/lncs/4986},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2007,
  editor    = {Josef Pieprzyk and
               Hossein Ghodosi and
               Ed Dawson},
  title     = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4586},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1},
  doi       = {10.1007/978-3-540-73458-1},
  isbn      = {978-3-540-73457-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2007,
  editor    = {Alex Biryukov},
  title     = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4593},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74619-5},
  doi       = {10.1007/978-3-540-74619-5},
  isbn      = {978-3-540-74617-1},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2007,
  editor    = {Kil{-}Hyun Nam and
               Gwangsoo Rhee},
  title     = {Information Security and Cryptology - {ICISC} 2007, 10th International
               Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4817},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-76788-6},
  doi       = {10.1007/978-3-540-76788-6},
  isbn      = {978-3-540-76787-9},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2007,
  editor    = {Carlisle M. Adams and
               Ali Miri and
               Michael J. Wiener},
  title     = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
               2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4876},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-77360-3},
  doi       = {10.1007/978-3-540-77360-3},
  isbn      = {978-3-540-77359-7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2006,
  editor    = {Serge Vaudenay},
  title     = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4004},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11761679},
  doi       = {10.1007/11761679},
  isbn      = {3-540-34546-9},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2006,
  editor    = {Matthew J. B. Robshaw},
  title     = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
               Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4047},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11799313},
  doi       = {10.1007/11799313},
  isbn      = {3-540-36597-4},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2006,
  editor    = {Rana Barua and
               Tanja Lange},
  title     = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
               on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4329},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11941378},
  doi       = {10.1007/11941378},
  isbn      = {3-540-49767-6},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor    = {Victor Shoup},
  title     = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535218},
  doi       = {10.1007/11535218},
  isbn      = {3-540-28114-2},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mycrypt/2005,
  editor    = {Ed Dawson and
               Serge Vaudenay},
  title     = {Progress in Cryptology - Mycrypt 2005, First International Conference
               on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3715},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11554868},
  doi       = {10.1007/11554868},
  isbn      = {3-540-28938-0},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mycrypt/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2005,
  editor    = {Bart Preneel and
               Stafford E. Tavares},
  title     = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
               2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3897},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11693383},
  doi       = {10.1007/11693383},
  isbn      = {3-540-33108-5},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sacrypt/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2004,
  editor    = {Christian Cachin and
               Jan Camenisch},
  title     = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3027},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b97182},
  doi       = {10.1007/b97182},
  isbn      = {3-540-21935-8},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2003,
  editor    = {Eli Biham},
  title     = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2656},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-39200-9},
  doi       = {10.1007/3-540-39200-9},
  isbn      = {3-540-14039-5},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2002,
  editor    = {David Naccache and
               Pascal Paillier},
  title     = {Public Key Cryptography, 5th International Workshop on Practice and
               Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
               12-14, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2274},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45664-3},
  doi       = {10.1007/3-540-45664-3},
  isbn      = {3-540-43168-3},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pkc/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2001,
  editor    = {Mitsuru Matsui},
  title     = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
               Japan, April 2-4, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2355},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45473-X},
  doi       = {10.1007/3-540-45473-X},
  isbn      = {3-540-43869-6},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2000,
  editor    = {Bruce Schneier},
  title     = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
               New York, NY, USA, April 10-12, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1978},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44706-7},
  doi       = {10.1007/3-540-44706-7},
  isbn      = {3-540-41728-1},
  timestamp = {Wed, 14 Nov 2018 10:58:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fse/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/99,
  editor    = {Jacques Stern},
  title     = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1592},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48910-X},
  doi       = {10.1007/3-540-48910-X},
  isbn      = {3-540-65889-0},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1998,
  editor    = {Kazuo Ohta and
               Dingyi Pei},
  title     = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1514},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49649-1},
  doi       = {10.1007/3-540-49649-1},
  isbn      = {3-540-65109-8},
  timestamp = {Wed, 14 Nov 2018 10:56:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1996,
  editor    = {Neal Koblitz},
  title     = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1109},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-68697-5},
  doi       = {10.1007/3-540-68697-5},
  isbn      = {3-540-61512-1},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/94,
  editor    = {Alfredo De Santis},
  title     = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {950},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/BFb0053418},
  doi       = {10.1007/BFb0053418},
  isbn      = {3-540-60176-7},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/93,
  editor    = {Tor Helleseth},
  title     = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
               Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
               1993, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {765},
  publisher = {Springer},
  year      = {1994},
  url       = {https://doi.org/10.1007/3-540-48285-7},
  doi       = {10.1007/3-540-48285-7},
  isbn      = {3-540-57600-2},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1992,
  editor    = {Ernest F. Brickell},
  title     = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {740},
  publisher = {Springer},
  year      = {1993},
  url       = {https://doi.org/10.1007/3-540-48071-4},
  doi       = {10.1007/3-540-48071-4},
  isbn      = {3-540-57340-2},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1992},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/91,
  editor    = {Donald W. Davies},
  title     = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
               Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
               1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {547},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-46416-6},
  doi       = {10.1007/3-540-46416-6},
  isbn      = {3-540-54620-0},
  timestamp = {Wed, 14 Nov 2018 10:54:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1990,
  editor    = {Alfred Menezes and
               Scott A. Vanstone},
  title     = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {537},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-38424-3},
  doi       = {10.1007/3-540-38424-3},
  isbn      = {3-540-54508-5},
  timestamp = {Wed, 14 Nov 2018 10:51:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/90,
  editor    = {Ivan Damg{\aa}rd},
  title     = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
               Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
               1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {473},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-46877-3},
  doi       = {10.1007/3-540-46877-3},
  isbn      = {3-540-53587-X},
  timestamp = {Fri, 19 May 2017 13:10:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/89,
  editor    = {Jean{-}Jacques Quisquater and
               Joos Vandewalle},
  title     = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
               Application of of Cryptographic Techniques, Houthalen, Belgium, April
               10-13, 1989, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {434},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/3-540-46885-4},
  doi       = {10.1007/3-540-46885-4},
  isbn      = {3-540-53433-4},
  timestamp = {Fri, 19 May 2017 13:10:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/88,
  editor    = {Christoph G. G{\"{u}}nther},
  title     = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
               Application of of Cryptographic Techniques, Davos, Switzerland, May
               25-27, 1988, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {330},
  publisher = {Springer},
  year      = {1988},
  url       = {https://doi.org/10.1007/3-540-45961-8},
  doi       = {10.1007/3-540-45961-8},
  isbn      = {3-540-50251-3},
  timestamp = {Wed, 14 Nov 2018 10:54:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/88},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier