


Остановите войну!
for scientists:
Willi Meier
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i54]Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. IACR Cryptol. ePrint Arch. 2022: 19 (2022) - [i53]Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. IACR Cryptol. ePrint Arch. 2022: 135 (2022) - [i52]Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite cipher. IACR Cryptol. ePrint Arch. 2022: 148 (2022) - [i51]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. IACR Cryptol. ePrint Arch. 2022: 399 (2022) - 2021
- [j32]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. Comput. J. 64(4): 628-638 (2021) - [j31]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo
, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [j30]Subhadeep Banik
, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Trans. Symmetric Cryptol. 2021(1): 5-36 (2021) - [j29]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks. IACR Trans. Symmetric Cryptol. 2021(1): 185-216 (2021) - [j28]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Trans. Symmetric Cryptol. 2021(2): 104-139 (2021) - [j27]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [c70]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak. ACISP 2021: 91-110 - [c69]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. ASIACRYPT (1) 2021: 214-240 - [c68]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. CANS 2021: 24-41 - [c67]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. CRYPTO (3) 2021: 368-401 - [i50]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Cryptol. ePrint Arch. 2021: 187 (2021) - [i49]Fukang Liu, Takanori Isobe, Willi Meier:
A Simple Algebraic Attack on 3-Round LowMC. IACR Cryptol. ePrint Arch. 2021: 255 (2021) - [i48]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Cryptol. ePrint Arch. 2021: 403 (2021) - [i47]Fukang Liu, Takanori Isobe, Willi Meier:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. IACR Cryptol. ePrint Arch. 2021: 474 (2021) - [i46]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. IACR Cryptol. ePrint Arch. 2021: 751 (2021) - [i45]Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier:
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021. IACR Cryptol. ePrint Arch. 2021: 1059 (2021) - [i44]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
Finding Practical Distinguishers for ZUC-256 Using Modular Differences. IACR Cryptol. ePrint Arch. 2021: 1104 (2021) - [i43]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - 2020
- [j26]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. Comput. J. 63(8): 1231-1246 (2020) - [j25]Abhishek Kesarwani
, Dibyendu Roy, Santanu Sarkar
, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. Des. Codes Cryptogr. 88(1): 173-199 (2020) - [j24]Boxin Zhao, Xiaoyang Dong
, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020) - [j23]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo
, Qingju Wang
:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - [c66]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. CRYPTO (3) 2020: 219-248 - [c65]Yonglin Hao, Gregor Leander
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [i42]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. IACR Cryptol. ePrint Arch. 2020: 103 (2020) - [i41]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak/Xoodoo. IACR Cryptol. ePrint Arch. 2020: 346 (2020) - [i40]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i39]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks. IACR Cryptol. ePrint Arch. 2020: 561 (2020) - [i38]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. IACR Cryptol. ePrint Arch. 2020: 591 (2020) - [i37]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. IACR Cryptol. ePrint Arch. 2020: 781 (2020) - [i36]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. IACR Cryptol. ePrint Arch. 2020: 1034 (2020)
2010 – 2019
- 2019
- [j22]Yonglin Hao
, Takanori Isobe, Lin Jiao
, Chaoyun Li
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [j21]Tao Ye, Yongzhuang Wei
, Willi Meier:
A New Cube Attack on MORUS by Using Division Property. IEEE Trans. Computers 68(12): 1731-1740 (2019) - [j20]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [j19]Fukang Liu, Takanori Isobe, Willi Meier:
Cube-Based Cryptanalysis of Subterranean-SAE. IACR Trans. Symmetric Cryptol. 2019(4): 192-222 (2019) - [c64]Subhadeep Banik
, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. ACNS 2019: 43-63 - [c63]Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida:
An AEAD Variant of the Grain Stream Cipher. C2SI 2019: 55-71 - [c62]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. INDOCRYPT 2019: 139-159 - [c61]Yosuke Todo
, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. SAC 2019: 365-392 - [i35]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. IACR Cryptol. ePrint Arch. 2019: 289 (2019) - [i34]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i33]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. IACR Cryptol. ePrint Arch. 2019: 447 (2019) - [i32]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. IACR Cryptol. ePrint Arch. 2019: 714 (2019) - [i31]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. IACR Cryptol. ePrint Arch. 2019: 809 (2019) - [i30]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Subterranean-SAE. IACR Cryptol. ePrint Arch. 2019: 879 (2019) - [i29]Fukang Liu, Takanori Isobe, Willi Meier:
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods. IACR Cryptol. ePrint Arch. 2019: 1080 (2019) - 2018
- [j18]Matthias Hamann, Matthias Krause, Willi Meier
, Bin Zhang:
Design and analysis of small-state grain-like stream ciphers. Cryptogr. Commun. 10(5): 803-834 (2018) - [j17]Yosuke Todo
, Takanori Isobe, Yonglin Hao
, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IEEE Trans. Computers 67(12): 1720-1736 (2018) - [j16]Subhadeep Banik
, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov
, Yuhei Watanabe
, Francesco Regazzoni:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - [c60]Yosuke Todo
, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c59]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 - [c58]Qingju Wang
, Yonglin Hao, Yosuke Todo
, Chaoyun Li
, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [c57]Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. EUROCRYPT (2) 2018: 771-802 - [i28]Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. IACR Cryptol. ePrint Arch. 2018: 145 (2018) - [i27]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. IACR Cryptol. ePrint Arch. 2018: 198 (2018) - [i26]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - [i25]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. IACR Cryptol. ePrint Arch. 2018: 972 (2018) - [i24]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao:
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. IACR Cryptol. ePrint Arch. 2018: 999 (2018) - 2017
- [j15]Yonglin Hao, Willi Meier:
Truncated differential based known-key attacks on round-reduced SIMON. Des. Codes Cryptogr. 83(2): 467-492 (2017) - [j14]Matthias Hamann, Matthias Krause, Willi Meier:
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. IACR Trans. Symmetric Cryptol. 2017(1): 45-79 (2017) - [j13]Bin Zhang, Xinxin Gong, Willi Meier:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers. IACR Trans. Symmetric Cryptol. 2017(4): 58-81 (2017) - [c56]Yosuke Todo
, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. CRYPTO (3) 2017: 250-279 - [i23]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IACR Cryptol. ePrint Arch. 2017: 306 (2017) - [i22]Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers. IACR Cryptol. ePrint Arch. 2017: 384 (2017) - [i21]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017) - [i20]Matthias Hamann, Matthias Krause, Willi Meier:
A Note on Stream Ciphers that Continuously Use the IV. IACR Cryptol. ePrint Arch. 2017: 1172 (2017) - 2016
- [i19]Yonglin Hao, Willi Meier:
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon. IACR Cryptol. ePrint Arch. 2016: 20 (2016) - [i18]Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0. IACR Cryptol. ePrint Arch. 2016: 311 (2016) - [i17]Matthias Hamann, Matthias Krause, Willi Meier:
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. IACR Cryptol. ePrint Arch. 2016: 926 (2016) - 2015
- [c55]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
:
Optimized Interpolation Attacks on LowMC. ASIACRYPT (2) 2015: 535-560 - [c54]Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0. CRYPTO (1) 2015: 643-662 - [i16]Sourav Das, Subhamoy Maitra, Willi Meier:
Higher Order Differential Analysis of NORX. IACR Cryptol. ePrint Arch. 2015: 186 (2015) - [i15]Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. IACR Cryptol. ePrint Arch. 2015: 217 (2015) - [i14]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. IACR Cryptol. ePrint Arch. 2015: 418 (2015) - 2014
- [b1]Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen:
The Hash Function BLAKE. Information Security and Cryptography, Springer 2014, ISBN 978-3-662-44756-7, pp. 1-185 - [c53]Sourav Das, Willi Meier:
Differential Biases in Reduced-Round Keccak. AFRICACRYPT 2014: 69-87 - [c52]Sourav Sen Gupta
, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - [e2]Willi Meier, Debdeep Mukhopadhyay:
Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings. Lecture Notes in Computer Science 8885, Springer 2014, ISBN 978-3-319-13038-5 [contents] - [i13]Markus Knecht, Willi Meier, Carlo U. Nicola:
A space- and time-efficient Implementation of the Merkle Tree Traversal Algorithm. CoRR abs/1409.4081 (2014) - 2013
- [j12]Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:
Quark: A Lightweight Hash. J. Cryptol. 26(2): 313-339 (2013) - [c51]Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. AFRICACRYPT 2013: 222-239 - [i12]Sourav Sen Gupta, Subhamoy Maitra, Willi Meier:
Distinguishing WPA. IACR Cryptol. ePrint Arch. 2013: 476 (2013) - 2012
- [j11]Simon Knellwolf, Willi Meier:
High order differential attacks on stream ciphers. Cryptogr. Commun. 4(3-4): 203-215 (2012) - [j10]Yi Lu, Serge Vaudenay, Willi Meier:
Synthetic linear analysis with applications to CubeHash and Rabbit. Cryptogr. Commun. 4(3-4): 259-276 (2012) - [c50]Willi Meier:
Stream Ciphers, a Perspective. AFRICACRYPT 2012: 412 - [c49]Michael Lehmann, Willi Meier:
Conditional Differential Cryptanalysis of Grain-128a. CANS 2012: 1-11 - 2011
- [j9]Martin Ågren, Martin Hell
, Thomas Johansson, Willi Meier:
Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5(1): 48-59 (2011) - [j8]Luca Henzen, Jean-Philippe Aumasson, Willi Meier, Raphael Chung-Wei Phan
:
VLSI Characterization of the Cryptographic Hash Function BLAKE. IEEE Trans. Very Large Scale Integr. Syst. 19(10): 1746-1754 (2011) - [c48]Willi Meier:
Fast Correlation Attacks: Methods and Countermeasures. FSE 2011: 55-67 - [c47]Simon Knellwolf, Willi Meier:
Cryptanalysis of the Knapsack Generator. FSE 2011: 188-198 - [c46]Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang:
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. ICISC 2011: 248-260 - [c45]María Naya-Plasencia, Andrea Röck, Willi Meier:
Practical Analysis of Reduced-Round Keccak. INDOCRYPT 2011: 236-254 - [c44]Simon Knellwolf, Willi Meier, María Naya-Plasencia:
Conditional Differential Cryptanalysis of Trivium and KATAN. Selected Areas in Cryptography 2011: 200-212 - 2010
- [c43]Shahram Khazaei
, Simon Knellwolf, Willi Meier, Deian Stefan:
Improved Linear Differential Attacks on CubeHash. AFRICACRYPT 2010: 407-418 - [c42]Simon Knellwolf, Willi Meier, María Naya-Plasencia:
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. ASIACRYPT 2010: 130-145 - [c41]Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:
Quark: A Lightweight Hash. CHES 2010: 1-15 - [c40]María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent
, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. FSE 2010: 134-152 - [c39]Jean-Philippe Aumasson, Jian Guo
, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and Invertibility Properties of BLAKE. FSE 2010: 318-332 - [i11]Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and invertibility properties of BLAKE (full version). IACR Cryptol. ePrint Arch. 2010: 43 (2010)
2000 – 2009
- 2009
- [j7]Simon Fischer, Willi Meier, Dirk Stegemann:
Some remarks on FCSRs and implications for stream ciphers. J. Math. Cryptol. 3(3): 227-236 (2009) - [c38]Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:
Inside the Hypercube. ACISP 2009: 202-213 - [c37]Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan
, Kerem Varici:
Improved Cryptanalysis of Skein. ASIACRYPT 2009: 542-559 - [c36]Eric Brier, Shahram Khazaei
, Willi Meier, Thomas Peyrin:
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. ASIACRYPT 2009: 560-577 - [c35]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. FSE 2009: 1-22 - [i10]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. Symmetric Cryptography 2009 - [i9]Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir:
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128. IACR Cryptol. ePrint Arch. 2009: 218 (2009) - [i8]María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. IACR Cryptol. ePrint Arch. 2009: 302 (2009) - [i7]Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin:
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. IACR Cryptol. ePrint Arch. 2009: 382 (2009) - [i6]Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici:
Improved Cryptanalysis of Skein. IACR Cryptol. ePrint Arch. 2009: 438 (2009) - 2008
- [j6]Reza Ebrahimi Atani
, Sattar Mirzakuchaki
, Shahabaddin Ebrahimi Atani
, Willi Meier:
On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles. Int. J. Comput. Commun. Control 3(4): 324-335 (2008) - [c34]Simon Fischer, Shahram Khazaei
, Willi Meier:
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. AFRICACRYPT 2008: 236-245 - [c33]Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan
:
The Hash Function Family LAKE. FSE 2008: 36-53 - [c32]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei
, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488 - [c31]Shahram Khazaei
, Willi Meier:
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. INDOCRYPT 2008: 15-26 - [c30]Shahram Khazaei
, Willi Meier:
On Reconstruction of RC4 Keys from Internal States. MMICS 2008: 179-189 - [c29]Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Selected Areas in Cryptography 2008: 120-135 - [p1]Martin Hell
, Thomas Johansson, Alexander Maximov, Willi Meier:
The Grain Family of Stream Ciphers. The eSTREAM Finalists 2008: 179-190 - [i5]Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. IACR Cryptol. ePrint Arch. 2008: 183 (2008)