


default search action
Willi Meier
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j42]Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes:
Observations on TETRA Encryption Algorithm TEA-3. IACR Trans. Symmetric Cryptol. 2025(1): 276-308 (2025) - 2024
- [j41]Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier:
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions. IACR Trans. Symmetric Cryptol. 2024(1): 214-233 (2024) - [j40]Fukang Liu, Katharina Koschatko
, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier:
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith. IACR Trans. Symmetric Cryptol. 2024(4): 97-137 (2024) - [c78]Fukang Liu, Mohammad Mahzoun, Willi Meier:
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit. ASIACRYPT (7) 2024: 424-456 - [i68]Fukang Liu, Mohammad Mahzoun, Willi Meier:
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit. IACR Cryptol. ePrint Arch. 2024: 786 (2024) - [i67]Fukang Liu, Katharina Koschatko, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier:
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith. IACR Cryptol. ePrint Arch. 2024: 1900 (2024) - [i66]Abul Kalam, Santanu Sarkar, Willi Meier:
A Combinatorial Attack on Ternary Sparse Learning with Errors (sLWE). IACR Cryptol. ePrint Arch. 2024: 2007 (2024) - [i65]Jens Alich, Amund Askeland, Subhadeep Banik, Tim Beyne, Anne Canteaut, Patrick Felke, Gregor Leander, Willi Meier, Lukas Stennes:
Cryptanalysis of TETRA Encryption Algorithms - Episode 1: TEA-3. IACR Cryptol. ePrint Arch. 2024: 2045 (2024) - 2023
- [j39]Congming Wei, Xiaoyang Dong, Willi Meier, Lingyue Qin, Ximing Fu
:
Differential-Aided Preimage Attacks On Round-Reduced Keccak. Comput. J. 66(12): 3069-3091 (2023) - [j38]Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier:
Algebraic Attacks on RAIN and AIM Using Equivalent Representations. IACR Trans. Symmetric Cryptol. 2023(4): 166-186 (2023) - [c77]Subhadeep Banik, Daniel Collins, Willi Meier:
Near Collision Attack Against Grain V1. ACNS (1) 2023: 178-207 - [c76]Fukang Liu, Lorenzo Grassi
, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. CRYPTO (3) 2023: 540-572 - [c75]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. EUROCRYPT (4) 2023: 189-219 - [c74]Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. EUROCRYPT (4) 2023: 287-317 - [c73]Thomas Johansson, Willi Meier, Vu Nguyen
:
Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs. ISIT 2023: 477-482 - [c72]Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH. SAC 2023: 22-42 - [i64]Robin Müller, Willi Meier, Christoph F. Wildfeuer:
Area Efficient Modular Reduction in Hardware for Arbitrary Static Moduli. CoRR abs/2308.15079 (2023) - [i63]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. IACR Cryptol. ePrint Arch. 2023: 277 (2023) - [i62]Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe:
Coefficient Grouping for Complex Affine Layers. IACR Cryptol. ePrint Arch. 2023: 782 (2023) - [i61]Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun, Willi Meier:
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH. IACR Cryptol. ePrint Arch. 2023: 865 (2023) - [i60]Subhadeep Banik, Daniel Collins, Willi Meier:
Near Collision Attack Against Grain v1. IACR Cryptol. ePrint Arch. 2023: 884 (2023) - [i59]Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier:
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions. IACR Cryptol. ePrint Arch. 2023: 1800 (2023) - 2022
- [j37]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-Like Ciphers. J. Cryptol. 35(4): 28 (2022) - [j36]Sabyasachi Dey
, Chandan Dey
, Santanu Sarkar
, Willi Meier
:
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021. IEEE Trans. Inf. Theory 68(9): 6114-6133 (2022) - [j35]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Trans. Symmetric Cryptol. 2022(3): 102-122 (2022) - [j34]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito
, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. IACR Trans. Symmetric Cryptol. 2022(3): 152-190 (2022) - [j33]Thomas Johansson
, Willi Meier, Vu Nguyen
:
Attacks on the Firekite Cipher. IACR Trans. Symmetric Cryptol. 2022(3): 191-216 (2022) - [c71]Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. ASIACRYPT (1) 2022: 225-255 - [i58]Simon M. Burkhardt, Ayesha Reezwana, Tanvirul Islam, Willi Meier, Alexander Ling, Christoph F. Wildfeuer:
First demonstration of a post-quantum key-exchange with a nanosatellite. CoRR abs/2206.00978 (2022) - [i57]Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. IACR Cryptol. ePrint Arch. 2022: 19 (2022) - [i56]Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. IACR Cryptol. ePrint Arch. 2022: 135 (2022) - [i55]Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite cipher. IACR Cryptol. ePrint Arch. 2022: 148 (2022) - [i54]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. IACR Cryptol. ePrint Arch. 2022: 399 (2022) - [i53]Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe:
Coefficient Grouping: Breaking Chaghri and More. IACR Cryptol. ePrint Arch. 2022: 991 (2022) - [i52]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Cryptol. ePrint Arch. 2022: 1022 (2022) - [i51]Tomer Ashur, Al Kindi, Willi Meier, Alan Szepieniec, Bobbin Threadbare:
Rescue-Prime Optimized. IACR Cryptol. ePrint Arch. 2022: 1577 (2022) - 2021
- [j32]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. Comput. J. 64(4): 628-638 (2021) - [j31]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo
, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [j30]Subhadeep Banik
, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
:
Atom: A Stream Cipher with Double Key Filter. IACR Trans. Symmetric Cryptol. 2021(1): 5-36 (2021) - [j29]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks. IACR Trans. Symmetric Cryptol. 2021(1): 185-216 (2021) - [j28]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Trans. Symmetric Cryptol. 2021(2): 104-139 (2021) - [j27]Andrea Caforio, Subhadeep Banik
, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [c70]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang
:
Algebraic Attacks on Round-Reduced Keccak. ACISP 2021: 91-110 - [c69]Fukang Liu, Santanu Sarkar
, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. ASIACRYPT (1) 2021: 214-240 - [c68]Martin Hell, Thomas Johansson
, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. CANS 2021: 24-41 - [c67]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. CRYPTO (3) 2021: 368-401 - [i50]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Cryptol. ePrint Arch. 2021: 187 (2021) - [i49]Fukang Liu, Takanori Isobe, Willi Meier:
A Simple Algebraic Attack on 3-Round LowMC. IACR Cryptol. ePrint Arch. 2021: 255 (2021) - [i48]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Cryptol. ePrint Arch. 2021: 403 (2021) - [i47]Fukang Liu, Takanori Isobe, Willi Meier:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. IACR Cryptol. ePrint Arch. 2021: 474 (2021) - [i46]Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier, Hirotaka Yoshida:
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction. IACR Cryptol. ePrint Arch. 2021: 751 (2021) - [i45]Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier:
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021. IACR Cryptol. ePrint Arch. 2021: 1059 (2021) - [i44]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
Finding Practical Distinguishers for ZUC-256 Using Modular Differences. IACR Cryptol. ePrint Arch. 2021: 1104 (2021) - [i43]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - 2020
- [j26]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. Comput. J. 63(8): 1231-1246 (2020) - [j25]Abhishek Kesarwani
, Dibyendu Roy, Santanu Sarkar
, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. Des. Codes Cryptogr. 88(1): 173-199 (2020) - [j24]Boxin Zhao, Xiaoyang Dong
, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. Des. Codes Cryptogr. 88(6): 1103-1126 (2020) - [j23]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo
, Qingju Wang
:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - [c66]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. CRYPTO (3) 2020: 219-248 - [c65]Yonglin Hao, Gregor Leander
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [i42]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128. IACR Cryptol. ePrint Arch. 2020: 103 (2020) - [i41]Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang:
Algebraic Attacks on Round-Reduced Keccak/Xoodoo. IACR Cryptol. ePrint Arch. 2020: 346 (2020) - [i40]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i39]Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks. IACR Cryptol. ePrint Arch. 2020: 561 (2020) - [i38]Fukang Liu, Takanori Isobe, Willi Meier:
Automatic Verification of Differential Characteristics: Application to Reduced Gimli. IACR Cryptol. ePrint Arch. 2020: 591 (2020) - [i37]Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier:
Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff. IACR Cryptol. ePrint Arch. 2020: 781 (2020) - [i36]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques. IACR Cryptol. ePrint Arch. 2020: 1034 (2020)
2010 – 2019
- 2019
- [j22]Yonglin Hao
, Takanori Isobe, Lin Jiao
, Chaoyun Li
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [j21]Tao Ye, Yongzhuang Wei
, Willi Meier:
A New Cube Attack on MORUS by Using Division Property. IEEE Trans. Computers 68(12): 1731-1740 (2019) - [j20]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [j19]Fukang Liu, Takanori Isobe, Willi Meier:
Cube-Based Cryptanalysis of Subterranean-SAE. IACR Trans. Symmetric Cryptol. 2019(4): 192-222 (2019) - [c64]Subhadeep Banik
, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha
, Yu Sasaki:
Cryptanalysis of ForkAES. ACNS 2019: 43-63 - [c63]Martin Hell, Thomas Johansson
, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida:
An AEAD Variant of the Grain Stream Cipher. C2SI 2019: 55-71 - [c62]Boxin Zhao, Xiaoyang Dong, Keting Jia, Willi Meier:
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128. INDOCRYPT 2019: 139-159 - [c61]Yosuke Todo
, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. SAC 2019: 365-392 - [i35]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. IACR Cryptol. ePrint Arch. 2019: 289 (2019) - [i34]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i33]Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. IACR Cryptol. ePrint Arch. 2019: 447 (2019) - [i32]Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang:
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule. IACR Cryptol. ePrint Arch. 2019: 714 (2019) - [i31]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. IACR Cryptol. ePrint Arch. 2019: 809 (2019) - [i30]Fukang Liu, Takanori Isobe, Willi Meier:
Cryptanalysis of Subterranean-SAE. IACR Cryptol. ePrint Arch. 2019: 879 (2019) - [i29]Fukang Liu, Takanori Isobe, Willi Meier:
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods. IACR Cryptol. ePrint Arch. 2019: 1080 (2019) - 2018
- [j18]Matthias Hamann, Matthias Krause, Willi Meier
, Bin Zhang:
Design and analysis of small-state grain-like stream ciphers. Cryptogr. Commun. 10(5): 803-834 (2018) - [j17]Yosuke Todo
, Takanori Isobe, Yonglin Hao
, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IEEE Trans. Computers 67(12): 1720-1736 (2018) - [j16]Subhadeep Banik
, Vasily Mikhalev, Frederik Armknecht
, Takanori Isobe, Willi Meier, Andrey Bogdanov
, Yuhei Watanabe
, Francesco Regazzoni
:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - [c60]Yosuke Todo
, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c59]Ximing Fu
, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 - [c58]Qingju Wang
, Yonglin Hao, Yosuke Todo
, Chaoyun Li
, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [c57]Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. EUROCRYPT (2) 2018: 771-802 - [i28]Bin Zhang, Chao Xu, Willi Meier:
Fast Near Collision Attack on the Grain v1 Stream Cipher. IACR Cryptol. ePrint Arch. 2018: 145 (2018) - [i27]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. IACR Cryptol. ePrint Arch. 2018: 198 (2018) - [i26]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - [i25]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. IACR Cryptol. ePrint Arch. 2018: 972 (2018) - [i24]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao:
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. IACR Cryptol. ePrint Arch. 2018: 999 (2018) - 2017
- [j15]Yonglin Hao, Willi Meier:
Truncated differential based known-key attacks on round-reduced SIMON. Des. Codes Cryptogr. 83(2): 467-492 (2017) - [j14]Matthias Hamann, Matthias Krause, Willi Meier:
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. IACR Trans. Symmetric Cryptol. 2017(1): 45-79 (2017) - [j13]Bin Zhang, Xinxin Gong, Willi Meier:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers. IACR Trans. Symmetric Cryptol. 2017(4): 58-81 (2017) - [c56]Yosuke Todo
, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. CRYPTO (3) 2017: 250-279 - [i23]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IACR Cryptol. ePrint Arch. 2017: 306 (2017) - [i22]Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers. IACR Cryptol. ePrint Arch. 2017: 384 (2017) - [i21]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017) - [i20]Matthias Hamann, Matthias Krause, Willi Meier:
A Note on Stream Ciphers that Continuously Use the IV. IACR Cryptol. ePrint Arch. 2017: 1172 (2017) - 2016
- [i19]Yonglin Hao, Willi Meier:
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon. IACR Cryptol. ePrint Arch. 2016: 20 (2016) - [i18]Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0. IACR Cryptol. ePrint Arch. 2016: 311 (2016) - [i17]Matthias Hamann, Matthias Krause, Willi Meier:
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. IACR Cryptol. ePrint Arch. 2016: 926 (2016) - 2015
- [c55]Itai Dinur, Yunwen Liu
, Willi Meier, Qingju Wang
:
Optimized Interpolation Attacks on LowMC. ASIACRYPT (2) 2015: 535-560 - [c54]Bin Zhang, Chao Xu, Willi Meier:
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0. CRYPTO (1) 2015: 643-662 - [i16]Sourav Das, Subhamoy Maitra, Willi Meier:
Higher Order Differential Analysis of NORX. IACR Cryptol. ePrint Arch. 2015: 186 (2015) - [i15]Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. IACR Cryptol. ePrint Arch. 2015: 217 (2015) - [i14]Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:
Optimized Interpolation Attacks on LowMC. IACR Cryptol. ePrint Arch. 2015: 418 (2015) - 2014
- [b1]Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen:
The Hash Function BLAKE. Information Security and Cryptography, Springer 2014, ISBN 978-3-662-44756-7, pp. 1-185 - [c53]Sourav Das, Willi Meier:
Differential Biases in Reduced-Round Keccak. AFRICACRYPT 2014: 69-87 - [c52]Sourav Sen Gupta
, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - [e2]Willi Meier, Debdeep Mukhopadhyay:
Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings. Lecture Notes in Computer Science 8885, Springer 2014, ISBN 978-3-319-13038-5 [contents] - [i13]Markus Knecht, Willi Meier, Carlo U. Nicola:
A space- and time-efficient Implementation of the Merkle Tree Traversal Algorithm. CoRR abs/1409.4081 (2014) - 2013
- [j12]Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:
Quark: A Lightweight Hash. J. Cryptol. 26(2): 313-339 (2013) - [c51]Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. AFRICACRYPT 2013: 222-239 - [i12]Sourav Sen Gupta, Subhamoy Maitra, Willi Meier:
Distinguishing WPA. IACR Cryptol. ePrint Arch. 2013: 476 (2013) - 2012
- [j11]Simon Knellwolf, Willi Meier:
High order differential attacks on stream ciphers. Cryptogr. Commun. 4(3-4): 203-215 (2012) - [j10]Yi Lu, Serge Vaudenay, Willi Meier:
Synthetic linear analysis with applications to CubeHash and Rabbit. Cryptogr. Commun. 4(3-4): 259-276 (2012) - [c50]Willi Meier:
Stream Ciphers, a Perspective. AFRICACRYPT 2012: 412 - [c49]Michael Lehmann, Willi Meier:
Conditional Differential Cryptanalysis of Grain-128a. CANS 2012: 1-11 - 2011
- [j9]Martin Ågren, Martin Hell
, Thomas Johansson
, Willi Meier:
Grain-128a: a new version of Grain-128 with optional authentication. Int. J. Wirel. Mob. Comput. 5(1): 48-59 (2011) - [j8]Luca Henzen, Jean-Philippe Aumasson, Willi Meier, Raphael Chung-Wei Phan
:
VLSI Characterization of the Cryptographic Hash Function BLAKE. IEEE Trans. Very Large Scale Integr. Syst. 19(10): 1746-1754 (2011) - [c48]Willi Meier:
Fast Correlation Attacks: Methods and Countermeasures. FSE 2011: 55-67 - [c47]Simon Knellwolf, Willi Meier:
Cryptanalysis of the Knapsack Generator. FSE 2011: 188-198 - [c46]Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang:
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. ICISC 2011: 248-260 - [c45]María Naya-Plasencia, Andrea Röck, Willi Meier:
Practical Analysis of Reduced-Round Keccak. INDOCRYPT 2011: 236-254 - [c44]Simon Knellwolf, Willi Meier, María Naya-Plasencia:
Conditional Differential Cryptanalysis of Trivium and KATAN. Selected Areas in Cryptography 2011: 200-212 - 2010
- [c43]Shahram Khazaei
, Simon Knellwolf, Willi Meier, Deian Stefan:
Improved Linear Differential Attacks on CubeHash. AFRICACRYPT 2010: 407-418 - [c42]Simon Knellwolf, Willi Meier, María Naya-Plasencia:
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. ASIACRYPT 2010: 130-145 - [c41]Jean-Philippe Aumasson, Luca Henzen, Willi Meier, María Naya-Plasencia:
Quark: A Lightweight Hash. CHES 2010: 1-15 - [c40]María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent
, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. FSE 2010: 134-152 - [c39]Jean-Philippe Aumasson, Jian Guo
, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and Invertibility Properties of BLAKE. FSE 2010: 318-332 - [i11]Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier:
Differential and invertibility properties of BLAKE (full version). IACR Cryptol. ePrint Arch. 2010: 43 (2010)
2000 – 2009
- 2009
- [j7]Simon Fischer, Willi Meier, Dirk Stegemann:
Some remarks on FCSRs and implications for stream ciphers. J. Math. Cryptol. 3(3): 227-236 (2009) - [c38]Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:
Inside the Hypercube. ACISP 2009: 202-213 - [c37]Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan
, Kerem Varici:
Improved Cryptanalysis of Skein. ASIACRYPT 2009: 542-559 - [c36]Eric Brier, Shahram Khazaei
, Willi Meier, Thomas Peyrin:
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. ASIACRYPT 2009: 560-577 - [c35]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. FSE 2009: 1-22 - [i10]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. Symmetric Cryptography 2009 - [i9]Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir:
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128. IACR Cryptol. ePrint Arch. 2009: 218 (2009) - [i8]María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin:
Cryptanalysis of ESSENCE. IACR Cryptol. ePrint Arch. 2009: 302 (2009) - [i7]Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin:
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. IACR Cryptol. ePrint Arch. 2009: 382 (2009) - [i6]Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici:
Improved Cryptanalysis of Skein. IACR Cryptol. ePrint Arch. 2009: 438 (2009) - 2008
- [j6]Reza Ebrahimi Atani
, Sattar Mirzakuchaki
, Shahabaddin Ebrahimi Atani
, Willi Meier:
On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles. Int. J. Comput. Commun. Control 3(4): 324-335 (2008) - [c34]Simon Fischer, Shahram Khazaei
, Willi Meier:
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. AFRICACRYPT 2008: 236-245 - [c33]Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan
:
The Hash Function Family LAKE. FSE 2008: 36-53 - [c32]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei
, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488 - [c31]Shahram Khazaei
, Willi Meier:
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. INDOCRYPT 2008: 15-26 - [c30]Shahram Khazaei
, Willi Meier:
On Reconstruction of RC4 Keys from Internal States. MMICS 2008: 179-189 - [c29]Jean-Philippe Aumasson, Willi Meier, Florian Mendel
:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Selected Areas in Cryptography 2008: 120-135 - [p1]Martin Hell
, Thomas Johansson, Alexander Maximov, Willi Meier:
The Grain Family of Stream Ciphers. The eSTREAM Finalists 2008: 179-190 - [i5]Jean-Philippe Aumasson, Willi Meier, Florian Mendel:
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. IACR Cryptol. ePrint Arch. 2008: 183 (2008) - [i4]Shahram Khazaei, Willi Meier:
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. IACR Cryptol. ePrint Arch. 2008: 369 (2008) - [i3]Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:
Inside the Hypercube. IACR Cryptol. ePrint Arch. 2008: 486 (2008) - 2007
- [j5]Martin Hell
, Thomas Johansson
, Willi Meier:
Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1): 86-93 (2007) - [c28]Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay:
TCHo: A Hardware-Oriented Trapdoor Cipher. ACISP 2007: 184-199 - [c27]Simon Fischer, Willi Meier:
Algebraic Immunity of S-Boxes and Augmented Functions. FSE 2007: 366-381 - [c26]Jean-Philippe Aumasson, Willi Meier:
Analysis of Multivariate Hash Functions. ICISC 2007: 309-323 - [c25]Shahram Khazaei, Simon Fischer, Willi Meier:
Reduced Complexity Attacks on the Alternating Step Generator. Selected Areas in Cryptography 2007: 1-16 - [i2]Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. IACR Cryptol. ePrint Arch. 2007: 472 (2007) - 2006
- [c24]Frederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli, Willi Meier, Olivier Ruatta:
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. EUROCRYPT 2006: 147-164 - [c23]Thomas Johansson, Willi Meier, Frédéric Muller:
Cryptanalysis of Achterbahn. FSE 2006: 1-14 - [c22]Simon Fischer, Willi Meier, Côme Berbain, Jean-François Biasse
, Matthew J. B. Robshaw:
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. INDOCRYPT 2006: 2-16 - [c21]Martin Hell
, Thomas Johansson
, Alexander Maximov, Willi Meier:
A Stream Cipher Proposal: Grain-128. ISIT 2006: 1614-1618 - 2005
- [c20]Yi Lu, Willi Meier, Serge Vaudenay:
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. CRYPTO 2005: 97-117 - [c19]Simon Künzli, Pascal Junod
, Willi Meier:
Distinguishing Attacks on T-Functions. Mycrypt 2005: 2-15 - [c18]Frederik Armknecht
, Willi Meier:
Fault Attacks on Combiners with Memory. Selected Areas in Cryptography 2005: 36-50 - 2004
- [c17]Willi Meier, Enes Pasalic, Claude Carlet:
Algebraic Attacks and Decomposition of Boolean Functions. EUROCRYPT 2004: 474-491 - [e1]Bimal K. Roy, Willi Meier:
Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Lecture Notes in Computer Science 3017, Springer 2004, ISBN 3-540-22171-9 [contents] - 2003
- [j4]Willi Geiselmann, Willi Meier, Rainer Steinwandt:
An attack on the isomorphisms of polynomials problem with one secret. Int. J. Inf. Sec. 2(1): 59-64 (2003) - [c16]Patrik Ekdahl, Willi Meier, Thomas Johansson
:
Predicting the Shrinking Generator with Fixed Connections. EUROCRYPT 2003: 330-344 - [c15]Nicolas T. Courtois, Willi Meier:
Algebraic Attacks on Stream Ciphers with Linear Feedback. EUROCRYPT 2003: 345-359 - 2002
- [c14]Nicolas T. Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier:
Solving Underdefined Systems of Multivariate Quadratic Equations. Public Key Cryptography 2002: 211-227 - [i1]Willi Geiselmann, Willi Meier, Rainer Steinwandt:
An Attack on the Isomorphisms of Polynomials Problem with One Secret. IACR Cryptol. ePrint Arch. 2002: 143 (2002) - 2001
- [c13]Daniel Bleichenbacher, Willi Meier:
Analysis of SSC2. FSE 2001: 219-232 - 2000
- [c12]Lars R. Knudsen, Willi Meier:
Correlations in RC6 with a Reduced Number of Rounds. FSE 2000: 94-108
1990 – 1999
- 1999
- [c11]Lars R. Knudsen, Willi Meier:
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. EUROCRYPT 1999: 363-374 - 1998
- [c10]Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege:
Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 - 1997
- [j3]Lars R. Knudsen, Willi Meier:
Differential cryptanalysis of RC5. Eur. Trans. Telecommun. 8(5): 445-454 (1997) - 1996
- [c9]Lars R. Knudsen, Willi Meier:
Improved Differential Attacks on RC5. CRYPTO 1996: 216-228 - 1994
- [c8]Willi Meier, Othmar Staffelbach:
The Self-Shrinking Generator. EUROCRYPT 1994: 205-214 - 1993
- [c7]Willi Meier:
On the Security of the IDEA Block Cipher. EUROCRYPT 1993: 371-385 - 1992
- [j2]Willi Meier, Othmar Staffelbach:
Correlation Properties of Combiners with Memory in Stream Ciphers. J. Cryptol. 5(1): 67-86 (1992) - [c6]Willi Meier, Othmar Staffelbach:
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves. CRYPTO 1992: 333-344 - 1991
- [c5]Willi Meier, Othmar Staffelbach:
Analysis of Pseudo Random Sequence Generated by Cellular Automata. EUROCRYPT 1991: 186-199 - 1990
- [c4]Othmar Staffelbach, Willi Meier:
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. CRYPTO 1990: 601-614 - [c3]Willi Meier, Othmar Staffelbach:
Correlation Properties of Combiners with Memory in Stream Ciphers. EUROCRYPT 1990: 204-213
1980 – 1989
- 1989
- [j1]Willi Meier, Othmar Staffelbach:
Fast Correlation Attacks on Certain Stream Ciphers. J. Cryptol. 1(3): 159-176 (1989) - [c2]Willi Meier, Othmar Staffelbach:
Nonlinearity Criteria for Cryptographic Functions. EUROCRYPT 1989: 549-562 - 1988
- [c1]Willi Meier, Othmar Staffelbach:
Fast Correlation Attacks on Stream Ciphers (Extended Abstract). EUROCRYPT 1988: 301-314
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 23:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint