|
Search the dblp DataBase
Willi Meier:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
Analysis Methods for (Alleged) RC4. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:327-341 [Conf]
- Lars R. Knudsen, Willi Meier
Improved Differential Attacks on RC5. [Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:216-228 [Conf]
- Yi Lu 0002, Willi Meier, Serge Vaudenay
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:97-117 [Conf]
- Willi Meier, Othmar Staffelbach
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:333-344 [Conf]
- Othmar Staffelbach, Willi Meier
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. [Citation Graph (0, 0)][DBLP] CRYPTO, 1990, pp:601-614 [Conf]
- Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:147-164 [Conf]
- Nicolas Courtois, Willi Meier
Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:345-359 [Conf]
- Patrik Ekdahl, Willi Meier, Thomas Johansson
Predicting the Shrinking Generator with Fixed Connections. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:330-344 [Conf]
- Lars R. Knudsen, Willi Meier
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:363-374 [Conf]
- Willi Meier
On the Security of the IDEA Block Cipher. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1993, pp:371-385 [Conf]
- Willi Meier, Enes Pasalic, Claude Carlet
Algebraic Attacks and Decomposition of Boolean Functions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:474-491 [Conf]
- Willi Meier, Othmar Staffelbach
Fast Correltaion Attacks on Stream Ciphers (Extended Abstract). [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1988, pp:301-314 [Conf]
- Willi Meier, Othmar Staffelbach
Nonlinearity Criteria for Cryptographic Functions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1989, pp:549-562 [Conf]
- Willi Meier, Othmar Staffelbach
Correlation Properties of Combiners with Memory in Stream Ciphers. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:204-213 [Conf]
- Willi Meier, Othmar Staffelbach
Analysis of Pseudo Random Sequence Generated by Cellular Automata. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:186-199 [Conf]
- Willi Meier, Othmar Staffelbach
The Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:205-214 [Conf]
- Daniel Bleichenbacher, Willi Meier
Analysis of SSC2. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:219-232 [Conf]
- Lars R. Knudsen, Willi Meier
Correlations in RC6 with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:94-108 [Conf]
- Thomas Johansson, Willi Meier, Frédéric Muller
Cryptanalysis of Achterbahn. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:1-14 [Conf]
- Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:2-16 [Conf]
- Simon Künzli 0002, Pascal Junod, Willi Meier
Distinguishing Attacks on T-Functions. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:2-15 [Conf]
- Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier
Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:211-227 [Conf]
- Frederik Armknecht, Willi Meier
Fault Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:36-50 [Conf]
- Willi Geiselmann, Willi Meier, Rainer Steinwandt
An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal]
- Willi Meier, Othmar Staffelbach
Fast Correlation Attacks on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1989, v:1, n:3, pp:159-176 [Journal]
- Willi Meier, Othmar Staffelbach
Correlation Properties of Combiners with Memory in Stream Ciphers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 1992, v:5, n:1, pp:67-86 [Journal]
- Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
TCHo: A Hardware-Oriented Trapdoor Cipher. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:184-199 [Conf]
- Simon Fischer 0002, Willi Meier
Algebraic Immunity of S-Boxes and Augmented Functions. [Citation Graph (0, 0)][DBLP] FSE, 2007, pp:366-381 [Conf]
- Jean-Philippe Aumasson, Willi Meier
Analysis of Multivariate Hash Functions. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:309-323 [Conf]
Inside the Hypercube. [Citation Graph (, )][DBLP]
Improved Cryptanalysis of Skein. [Citation Graph (, )][DBLP]
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. [Citation Graph (, )][DBLP]
Quark: A Lightweight Hash. [Citation Graph (, )][DBLP]
Differential and Invertibility Properties of BLAKE. [Citation Graph (, )][DBLP]
Cryptanalysis of ESSENCE. [Citation Graph (, )][DBLP]
The Hash Function Family LAKE. [Citation Graph (, )][DBLP]
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. [Citation Graph (, )][DBLP]
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. [Citation Graph (, )][DBLP]
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. [Citation Graph (, )][DBLP]
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. [Citation Graph (, )][DBLP]
Reduced Complexity Attacks on the Alternating Step Generator. [Citation Graph (, )][DBLP]
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. [Citation Graph (, )][DBLP]
Improved Linear Differential Attacks on CubeHash. [Citation Graph (, )][DBLP]
On Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|