The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Willi Meier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
    Analysis Methods for (Alleged) RC4. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:327-341 [Conf]
  2. Lars R. Knudsen, Willi Meier
    Improved Differential Attacks on RC5. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:216-228 [Conf]
  3. Yi Lu 0002, Willi Meier, Serge Vaudenay
    The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:97-117 [Conf]
  4. Willi Meier, Othmar Staffelbach
    Efficient Multiplication on Certain Nonsupersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:333-344 [Conf]
  5. Othmar Staffelbach, Willi Meier
    Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:601-614 [Conf]
  6. Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli 0002, Willi Meier, Olivier Ruatta
    Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:147-164 [Conf]
  7. Nicolas Courtois, Willi Meier
    Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:345-359 [Conf]
  8. Patrik Ekdahl, Willi Meier, Thomas Johansson
    Predicting the Shrinking Generator with Fixed Connections. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:330-344 [Conf]
  9. Lars R. Knudsen, Willi Meier
    Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:363-374 [Conf]
  10. Willi Meier
    On the Security of the IDEA Block Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:371-385 [Conf]
  11. Willi Meier, Enes Pasalic, Claude Carlet
    Algebraic Attacks and Decomposition of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:474-491 [Conf]
  12. Willi Meier, Othmar Staffelbach
    Fast Correltaion Attacks on Stream Ciphers (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:301-314 [Conf]
  13. Willi Meier, Othmar Staffelbach
    Nonlinearity Criteria for Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:549-562 [Conf]
  14. Willi Meier, Othmar Staffelbach
    Correlation Properties of Combiners with Memory in Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:204-213 [Conf]
  15. Willi Meier, Othmar Staffelbach
    Analysis of Pseudo Random Sequence Generated by Cellular Automata. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:186-199 [Conf]
  16. Willi Meier, Othmar Staffelbach
    The Self-Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:205-214 [Conf]
  17. Daniel Bleichenbacher, Willi Meier
    Analysis of SSC2. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:219-232 [Conf]
  18. Lars R. Knudsen, Willi Meier
    Correlations in RC6 with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:94-108 [Conf]
  19. Thomas Johansson, Willi Meier, Frédéric Muller
    Cryptanalysis of Achterbahn. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:1-14 [Conf]
  20. Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw
    Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:2-16 [Conf]
  21. Simon Künzli 0002, Pascal Junod, Willi Meier
    Distinguishing Attacks on T-Functions. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:2-15 [Conf]
  22. Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier
    Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:211-227 [Conf]
  23. Frederik Armknecht, Willi Meier
    Fault Attacks on Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:36-50 [Conf]
  24. Willi Geiselmann, Willi Meier, Rainer Steinwandt
    An attack on the isomorphisms of polynomials problem with one secret. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:2, n:1, pp:59-64 [Journal]
  25. Willi Meier, Othmar Staffelbach
    Fast Correlation Attacks on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1989, v:1, n:3, pp:159-176 [Journal]
  26. Willi Meier, Othmar Staffelbach
    Correlation Properties of Combiners with Memory in Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1992, v:5, n:1, pp:67-86 [Journal]
  27. Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
    TCHo: A Hardware-Oriented Trapdoor Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:184-199 [Conf]
  28. Simon Fischer 0002, Willi Meier
    Algebraic Immunity of S-Boxes and Augmented Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:366-381 [Conf]
  29. Jean-Philippe Aumasson, Willi Meier
    Analysis of Multivariate Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:309-323 [Conf]

  30. Inside the Hypercube. [Citation Graph (, )][DBLP]


  31. Improved Cryptanalysis of Skein. [Citation Graph (, )][DBLP]


  32. Linearization Framework for Collision Attacks: Application to CubeHash and MD6. [Citation Graph (, )][DBLP]


  33. Quark: A Lightweight Hash. [Citation Graph (, )][DBLP]


  34. Differential and Invertibility Properties of BLAKE. [Citation Graph (, )][DBLP]


  35. Cryptanalysis of ESSENCE. [Citation Graph (, )][DBLP]


  36. The Hash Function Family LAKE. [Citation Graph (, )][DBLP]


  37. New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. [Citation Graph (, )][DBLP]


  38. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. [Citation Graph (, )][DBLP]


  39. New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. [Citation Graph (, )][DBLP]


  40. Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. [Citation Graph (, )][DBLP]


  41. Reduced Complexity Attacks on the Alternating Step Generator. [Citation Graph (, )][DBLP]


  42. Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. [Citation Graph (, )][DBLP]


  43. Improved Linear Differential Attacks on CubeHash. [Citation Graph (, )][DBLP]


  44. On Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002