default search action
Willi Meier
- > Home > Persons > Willi Meier
Publications
- 2023
- [c76]Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. CRYPTO (3) 2023: 540-572 - [c75]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. EUROCRYPT (4) 2023: 189-219 - [c74]Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. EUROCRYPT (4) 2023: 287-317 - [i63]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. IACR Cryptol. ePrint Arch. 2023: 277 (2023) - [i62]Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. IACR Cryptol. ePrint Arch. 2023: 782 (2023) - 2022
- [j37]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-Like Ciphers. J. Cryptol. 35(4): 28 (2022) - [j35]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Trans. Symmetric Cryptol. 2022(3): 102-122 (2022) - [j34]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. IACR Trans. Symmetric Cryptol. 2022(3): 152-190 (2022) - [c71]Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. ASIACRYPT (1) 2022: 225-255 - [i57]Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. IACR Cryptol. ePrint Arch. 2022: 19 (2022) - [i54]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. IACR Cryptol. ePrint Arch. 2022: 399 (2022) - [i53]Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. IACR Cryptol. ePrint Arch. 2022: 991 (2022) - [i52]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Cryptol. ePrint Arch. 2022: 1022 (2022) - 2021
- [j30]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Trans. Symmetric Cryptol. 2021(1): 5-36 (2021) - [j29]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks. IACR Trans. Symmetric Cryptol. 2021(1): 185-216 (2021) - [j28]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Trans. Symmetric Cryptol. 2021(2): 104-139 (2021) - [j27]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [c70]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak. ACISP 2021: 91-110 - [c69]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. ASIACRYPT (1) 2021: 214-240 - [c67]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. CRYPTO (3) 2021: 368-401 - [i50]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Cryptol. ePrint Arch. 2021: 187 (2021) - [i49]Fukang Liu, Takanori Isobe, Willi Meier:
A Simple Algebraic Attack on 3-Round LowMC. IACR Cryptol. ePrint Arch. 2021: 255 (2021) - [i48]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Cryptol. ePrint Arch. 2021: 403 (2021) - [i47]Fukang Liu, Takanori Isobe, Willi Meier:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. IACR Cryptol. ePrint Arch. 2021: 474 (2021) - [i44]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
Finding Practical Distinguishers for ZUC-256 Using Modular Differences. IACR Cryptol. ePrint Arch. 2021: 1104 (2021) - [i43]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - 2020
- [c66]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. CRYPTO (3) 2020: 219-248 - [i41]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak/Xoodoo. IACR Cryptol. ePrint Arch. 2020: 346 (2020) - [i39]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks. IACR Cryptol. ePrint Arch. 2020: 561 (2020) - [i38]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. IACR Cryptol. ePrint Arch. 2020: 591 (2020) - [i36]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. IACR Cryptol. ePrint Arch. 2020: 1034 (2020) - 2019
- [j22]Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [j19]Fukang Liu, Takanori Isobe, Willi Meier:
Cube-Based Cryptanalysis of Subterranean-SAE. IACR Trans. Symmetric Cryptol. 2019(4): 192-222 (2019) - [i30]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Subterranean-SAE. IACR Cryptol. ePrint Arch. 2019: 879 (2019) - [i29]Fukang Liu, Takanori Isobe, Willi Meier:
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods. IACR Cryptol. ePrint Arch. 2019: 1080 (2019) - 2018
- [j17]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IEEE Trans. Computers 67(12): 1720-1736 (2018) - [j16]Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - [c60]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c58]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [i26]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - 2017
- [c56]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. CRYPTO (3) 2017: 250-279 - [i23]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IACR Cryptol. ePrint Arch. 2017: 306 (2017) - [i21]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint