The SCEAS System
| |||||||

## Search the dblp DataBase
Willi Meier:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
**Analysis Methods for (Alleged) RC4.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:327-341 [Conf] - Lars R. Knudsen, Willi Meier
**Improved Differential Attacks on RC5.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:216-228 [Conf] - Yi Lu 0002, Willi Meier, Serge Vaudenay
**The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:97-117 [Conf] - Willi Meier, Othmar Staffelbach
**Efficient Multiplication on Certain Nonsupersingular Elliptic Curves.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:333-344 [Conf] - Othmar Staffelbach, Willi Meier
**Cryptographic Significance of the Carry for Ciphers Based on Integer Addition.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1990, pp:601-614 [Conf] - Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta
**Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:147-164 [Conf] - Nicolas Courtois, Willi Meier
**Algebraic Attacks on Stream Ciphers with Linear Feedback.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:345-359 [Conf] - Patrik Ekdahl, Willi Meier, Thomas Johansson
**Predicting the Shrinking Generator with Fixed Connections.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:330-344 [Conf] - Lars R. Knudsen, Willi Meier
**Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:363-374 [Conf] - Willi Meier
**On the Security of the IDEA Block Cipher.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1993, pp:371-385 [Conf] - Willi Meier, Enes Pasalic, Claude Carlet
**Algebraic Attacks and Decomposition of Boolean Functions.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:474-491 [Conf] - Willi Meier, Othmar Staffelbach
**Fast Correltaion Attacks on Stream Ciphers (Extended Abstract).**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1988, pp:301-314 [Conf] - Willi Meier, Othmar Staffelbach
**Nonlinearity Criteria for Cryptographic Functions.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:549-562 [Conf] - Willi Meier, Othmar Staffelbach
**Correlation Properties of Combiners with Memory in Stream Ciphers.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:204-213 [Conf] - Willi Meier, Othmar Staffelbach
**Analysis of Pseudo Random Sequence Generated by Cellular Automata.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:186-199 [Conf] - Willi Meier, Othmar Staffelbach
**The Self-Shrinking Generator.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:205-214 [Conf] - Daniel Bleichenbacher, Willi Meier
**Analysis of SSC2.**[Citation Graph (0, 0)][DBLP] FSE, 2001, pp:219-232 [Conf] - Lars R. Knudsen, Willi Meier
**Correlations in RC6 with a Reduced Number of Rounds.**[Citation Graph (0, 0)][DBLP] FSE, 2000, pp:94-108 [Conf] - Thomas Johansson, Willi Meier, Frédéric Muller
**Cryptanalysis of Achterbahn.**[Citation Graph (0, 0)][DBLP] FSE, 2006, pp:1-14 [Conf] - Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw
**Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:2-16 [Conf] - Simon Künzli 0002, Pascal Junod, Willi Meier
**Distinguishing Attacks on T-Functions.**[Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:2-15 [Conf] - Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier
**Solving Underdefined Systems of Multivariate Quadratic Equations.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:211-227 [Conf] - Frederik Armknecht, Willi Meier
**Fault Attacks on Combiners with Memory.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:36-50 [Conf] - Willi Geiselmann, Willi Meier, Rainer Steinwandt
**An attack on the isomorphisms of polynomials problem with one secret.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal] - Willi Meier, Othmar Staffelbach
**Fast Correlation Attacks on Certain Stream Ciphers.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1989, v:1, n:3, pp:159-176 [Journal] - Willi Meier, Othmar Staffelbach
**Correlation Properties of Combiners with Memory in Stream Ciphers.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 1992, v:5, n:1, pp:67-86 [Journal] - Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
[Citation Graph (0, 0)][DBLP]*TCH**o*: A Hardware-Oriented Trapdoor Cipher. ACISP, 2007, pp:184-199 [Conf] - Simon Fischer 0002, Willi Meier
**Algebraic Immunity of S-Boxes and Augmented Functions.**[Citation Graph (0, 0)][DBLP] FSE, 2007, pp:366-381 [Conf] - Jean-Philippe Aumasson, Willi Meier
**Analysis of Multivariate Hash Functions.**[Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:309-323 [Conf] **Inside the Hypercube.**[Citation Graph (, )][DBLP]**Improved Cryptanalysis of Skein.**[Citation Graph (, )][DBLP]**Linearization Framework for Collision Attacks: Application to CubeHash and MD6.**[Citation Graph (, )][DBLP]**Quark: A Lightweight Hash.**[Citation Graph (, )][DBLP]**Differential and Invertibility Properties of BLAKE.**[Citation Graph (, )][DBLP]**Cryptanalysis of ESSENCE.**[Citation Graph (, )][DBLP]**The Hash Function Family LAKE.**[Citation Graph (, )][DBLP]**New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.**[Citation Graph (, )][DBLP]**Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.**[Citation Graph (, )][DBLP]**New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers.**[Citation Graph (, )][DBLP]**Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.**[Citation Graph (, )][DBLP]**Reduced Complexity Attacks on the Alternating Step Generator.**[Citation Graph (, )][DBLP]**Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers.**[Citation Graph (, )][DBLP]**Improved Linear Differential Attacks on CubeHash.**[Citation Graph (, )][DBLP]**On Reconstruction of RC4 Keys from Internal States.**[Citation Graph (, )][DBLP]
Search in 0.371secs, Finished in 0.373secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |