


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Friedrich Wiemer
Ruhr-University Bochum, Germany
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2022
- Sebastian Paul, Patrik Scheible, Friedrich Wiemer:
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication. J. Comput. Secur. 30(4): 623-653 (2022) - 2021
- Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of Vectorial Boolean Functions. LATINCRYPT 2021: 233-253 - Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of vectorial Boolean functions. IACR Cryptol. ePrint Arch. 2021: 947 (2021) - Sebastian Paul, Patrik Scheible, Friedrich Wiemer:
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. IACR Cryptol. ePrint Arch. 2021: 1563 (2021) - 2020
- Friedrich Wiemer:
Security arguments and tool-based design of block ciphers. Ruhr University Bochum, Germany, 2020 - Davide Bellizia
, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval
, Chun Guo, Gregor Leander
, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
, Balazs Udvarhelyi, Friedrich Wiemer
:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. IACR Trans. Symmetric Cryptol. 2020(S1): 295-349 (2020) - Tim Beyne
, Anne Canteaut, Itai Dinur, Maria Eichlseder
, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo
, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - Dusan Bozilov, Maria Eichlseder
, Miroslav Knezevic, Baptiste Lambin, Gregor Leander
, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo
, Friedrich Wiemer
:
PRINCEv2 - More Security for (Almost) No Overhead. SAC 2020: 483-511 - Lorenzo Grassi
, Gregor Leander
, Christian Rechberger, Cihangir Tezcan
, Friedrich Wiemer
:
Weak-Key Distinguishers for AES. SAC 2020: 141-170 - Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - Tim Beyne, Anne Canteaut, Gregor Leander, María Naya-Plasencia, Léo Perrin, Friedrich Wiemer:
On the security of the Rescue hash function. IACR Cryptol. ePrint Arch. 2020: 820 (2020) - Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. IACR Cryptol. ePrint Arch. 2020: 1269 (2020) - 2019
- Anne Canteaut, Virginie Lallemand, Gregor Leander
, Patrick Neumann
, Friedrich Wiemer
:
bison Instantiating the Whitened Swap-Or-Not Construction. EUROCRYPT (3) 2019: 585-616 - Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer
:
On the Differential-Linear Connectivity Table of Vectorial Boolean Functions. CoRR abs/1908.07445 (2019) - Anne Canteaut, Lukas Kölsch, Friedrich Wiemer
:
Observations on the DLCT and Absolute Indicators. IACR Cryptol. ePrint Arch. 2019: 848 (2019) - Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer
:
Weak-Key Subspace Trails and Applications to AES. IACR Cryptol. ePrint Arch. 2019: 852 (2019) - 2018
- Gregor Leander
, Cihangir Tezcan
, Friedrich Wiemer
:
Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): 74-100 (2018) - Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer:
BISON - Instantiating the Whitened Swap-Or-Not Construction. Krypto-Tag 2018 - Anne Canteaut, Virginie Lallemand, Gregor Leander, Patrick Neumann, Friedrich Wiemer
:
BISON - Instantiating the Whitened Swap-Or-Not Construction. IACR Cryptol. ePrint Arch. 2018: 1011 (2018) - 2017
- Thorsten Kranz, Gregor Leander
, Ko Stoffelen, Friedrich Wiemer
:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Trans. Symmetric Cryptol. 2017(4): 188-211 (2017) - Thorsten Kranz, Gregor Leander
, Friedrich Wiemer
:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(1): 474-505 (2017) - Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. IACR Cryptol. ePrint Arch. 2017: 1151 (2017) - Thorsten Kranz, Friedrich Wiemer, Gregor Leander:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 154 (2017) - 2016
- Elena Kirshanova
, Alexander May
, Friedrich Wiemer
:
Parallel Implementation of BDD Enumeration for LWE. ACNS 2016: 580-591 - Elena Kirshanova, Alexander May, Friedrich Wiemer:
Parallel Implementation of BDD enumeration for LWE. IACR Cryptol. ePrint Arch. 2016: 380 (2016) - 2014
- Friedrich Wiemer
, Ralf Zimmermann:
High-speed implementation of bcrypt password search using special-purpose hardware. ReConFig 2014: 1-6
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-06-03 20:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint