Willi Meier

Orcid: 0000-0003-4594-1501

According to our database1, Willi Meier authored at least 138 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Differential-Aided Preimage Attacks On Round-Reduced Keccak.
Comput. J., December, 2023

Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
IACR Trans. Symmetric Cryptol., 2023

A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH.
IACR Cryptol. ePrint Arch., 2023

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
IACR Cryptol. ePrint Arch., 2023

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions.
IACR Cryptol. ePrint Arch., 2023

Coefficient Grouping for Complex Affine Layers.
IACR Cryptol. ePrint Arch., 2023

Near Collision Attack Against Grain v1.
IACR Cryptol. ePrint Arch., 2023

Area Efficient Modular Reduction in Hardware for Arbitrary Static Moduli.
CoRR, 2023

Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
IACR Trans. Symmetric Cryptol., 2022

Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.
IEEE Trans. Inf. Theory, 2022

The Inverse of χ and Its Applications to Rasta-Like Ciphers.
J. Cryptol., 2022

Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022

Algebraic Meet-in-the-Middle Attack on LowMC.
IACR Cryptol. ePrint Arch., 2022

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
IACR Cryptol. ePrint Arch., 2022

Coefficient Grouping: Breaking Chaghri and More.
IACR Cryptol. ePrint Arch., 2022

Attacks on the Firekite cipher.
IACR Cryptol. ePrint Arch., 2022

Rescue-Prime Optimized.
IACR Cryptol. ePrint Arch., 2022

First demonstration of a post-quantum key-exchange with a nanosatellite.
CoRR, 2022

2021
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.
IACR Trans. Symmetric Cryptol., 2021

Modeling for Three-Subset Division Property without Unknown Subset.
J. Cryptol., 2021

Finding Practical Distinguishers for ZUC-256 Using Modular Differences.
IACR Cryptol. ePrint Arch., 2021

Weak Keys in Reduced AEGIS and Tiaoxin.
IACR Cryptol. ePrint Arch., 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
IACR Cryptol. ePrint Arch., 2021

A Simple Algebraic Attack on 3-Round LowMC.
IACR Cryptol. ePrint Arch., 2021

Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.
IACR Cryptol. ePrint Arch., 2021

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
IACR Cryptol. ePrint Arch., 2021

Atom: A Stream Cipher with Double Key Filter.
IACR Cryptol. ePrint Arch., 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Algebraic Attacks on Round-Reduced Keccak.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Links between Division Property and Other Cube Attack Variants.
IACR Trans. Symmetric Cryptol., 2020

Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff.
IACR Cryptol. ePrint Arch., 2020

Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128.
IACR Cryptol. ePrint Arch., 2020

Algebraic Attacks on Round-Reduced Keccak/Xoodoo.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.
IACR Cryptol. ePrint Arch., 2020

Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
IACR Cryptol. ePrint Arch., 2020

Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks.
IACR Cryptol. ePrint Arch., 2020

Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT.
Des. Codes Cryptogr., 2020

New cube distinguishers on NFSR-based stream ciphers.
Des. Codes Cryptogr., 2020

Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Cube-Based Cryptanalysis of Subterranean-SAE.
IACR Trans. Symmetric Cryptol., 2019

A New Cube Attack on MORUS by Using Division Property.
IEEE Trans. Computers, 2019

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019

Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak.
IACR Cryptol. ePrint Arch., 2019

Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule.
IACR Cryptol. ePrint Arch., 2019

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
IACR Cryptol. ePrint Arch., 2019

Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of Subterranean-SAE.
IACR Cryptol. ePrint Arch., 2019

New Conditional Cube Attack on Keccak Keyed Modes.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of ForkAES.
IACR Cryptol. ePrint Arch., 2019

An AEAD Variant of the Grain Stream Cipher.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Towards Low Energy Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2018

Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
IEEE Trans. Computers, 2018

Fast Near Collision Attack on the Grain v1 Stream Cipher.
IACR Cryptol. ePrint Arch., 2018

Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018

Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
IACR Cryptol. ePrint Arch., 2018

A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018.
IACR Cryptol. ePrint Arch., 2018

A Key-recovery Attack on 855-round Trivium.
IACR Cryptol. ePrint Arch., 2018

Design and analysis of small-state grain-like stream ciphers.
Cryptogr. Commun., 2018

2017
Fast Correlation Attacks on Grain-like Small State Stream Ciphers.
IACR Trans. Symmetric Cryptol., 2017

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptol. ePrint Arch., 2017

Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers.
IACR Cryptol. ePrint Arch., 2017

A Note on Stream Ciphers that Continuously Use the IV.
IACR Cryptol. ePrint Arch., 2017

Truncated differential based known-key attacks on round-reduced SIMON.
Des. Codes Cryptogr., 2017

2016
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0.
IACR Cryptol. ePrint Arch., 2016

LIZARD - A Lightweight Stream Cipher for Power-constrained Devices.
IACR Cryptol. ePrint Arch., 2016

2015
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles.
IACR Cryptol. ePrint Arch., 2015

Optimized Interpolation Attacks on LowMC.
IACR Cryptol. ePrint Arch., 2015

Higher Order Differential Analysis of NORX.
IACR Cryptol. ePrint Arch., 2015

2014
The Hash Function BLAKE
Information Security and Cryptography, Springer, ISBN: 978-3-662-44757-4, 2014

A space- and time-efficient Implementation of the Merkle Tree Traversal Algorithm.
CoRR, 2014

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Differential Biases in Reduced-Round Keccak.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Quark: A Lightweight Hash.
J. Cryptol., 2013

Distinguishing WPA.
IACR Cryptol. ePrint Arch., 2013

New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4.
Proceedings of the Progress in Cryptology, 2013

2012
High order differential attacks on stream ciphers.
Cryptogr. Commun., 2012

Synthetic linear analysis with applications to CubeHash and Rabbit.
Cryptogr. Commun., 2012

Conditional Differential Cryptanalysis of Grain-128a.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Stream Ciphers, a Perspective.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
VLSI Characterization of the Cryptographic Hash Function BLAKE.
IEEE Trans. Very Large Scale Integr. Syst., 2011

Grain-128a: a new version of Grain-128 with optional authentication.
Int. J. Wirel. Mob. Comput., 2011

Conditional Differential Cryptanalysis of Trivium and KATAN.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Analysis of Reduced-Round Keccak.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Fast Correlation Attacks: Methods and Countermeasures.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Cryptanalysis of the Knapsack Generator.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Differential and invertibility properties of BLAKE (full version).
IACR Cryptol. ePrint Arch., 2010

Differential and Invertibility Properties of BLAKE.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Improved Linear Differential Attacks on CubeHash.
Proceedings of the Progress in Cryptology, 2010

2009
Some remarks on FCSRs and implications for stream ciphers.
J. Math. Cryptol., 2009

Cryptanalysis of ESSENCE.
IACR Cryptol. ePrint Arch., 2009

Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
IACR Cryptol. ePrint Arch., 2009

Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009

Improved Cryptanalysis of Skein.
IACR Cryptol. ePrint Arch., 2009

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
The Grain Family of Stream Ciphers.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles.
Int. J. Comput. Commun. Control, 2008

New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers.
IACR Cryptol. ePrint Arch., 2008

Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.
IACR Cryptol. ePrint Arch., 2008

Inside the Hypercube.
IACR Cryptol. ePrint Arch., 2008

On Reconstruction of RC4 Keys from Internal States.
Proceedings of the Mathematical Methods in Computer Science, 2008

The Hash Function Family LAKE.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers.
Proceedings of the Progress in Cryptology, 2008

2007
Grain: a stream cipher for constrained environments.
Int. J. Wirel. Mob. Comput., 2007

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
IACR Cryptol. ePrint Arch., 2007

Reduced Complexity Attacks on the Alternating Step Generator.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Analysis of Multivariate Hash Functions.
Proceedings of the Information Security and Cryptology, 2007

Algebraic Immunity of S-Boxes and Augmented Functions.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

<i>TCH</i><i>o</i>: A Hardware-Oriented Trapdoor Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
A Stream Cipher Proposal: Grain-128.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.
Proceedings of the Progress in Cryptology, 2006

Cryptanalysis of Achterbahn.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Fault Attacks on Combiners with Memory.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Distinguishing Attacks on T-Functions.
Proceedings of the Progress in Cryptology, 2005

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.
Proceedings of the Advances in Cryptology, 2005

2004
Algebraic Attacks and Decomposition of Boolean Functions.
Proceedings of the Advances in Cryptology, 2004

2003
An attack on the isomorphisms of polynomials problem with one secret.
Int. J. Inf. Sec., 2003

Predicting the Shrinking Generator with Fixed Connections.
Proceedings of the Advances in Cryptology, 2003

Algebraic Attacks on Stream Ciphers with Linear Feedback.
Proceedings of the Advances in Cryptology, 2003

2002
Solving Underdefined Systems of Multivariate Quadratic Equations.
Proceedings of the Public Key Cryptography, 2002

2001
Analysis of SSC2.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Correlations in RC6 with a Reduced Number of Rounds.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

1999
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.
Proceedings of the Advances in Cryptology, 1999

1998
Analysis Methods for (Alleged) RC4.
Proceedings of the Advances in Cryptology, 1998

1997
Differential cryptanalysis of RC5.
Eur. Trans. Telecommun., 1997

1996
Improved Differential Attacks on RC5.
Proceedings of the Advances in Cryptology, 1996

1994
The Self-Shrinking Generator.
Proceedings of the Advances in Cryptology, 1994

1993
On the Security of the IDEA Block Cipher.
Proceedings of the Advances in Cryptology, 1993

1992
Correlation Properties of Combiners with Memory in Stream Ciphers.
J. Cryptol., 1992

Efficient Multiplication on Certain Nonsupersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1992

1991
Analysis of Pseudo Random Sequence Generated by Cellular Automata.
Proceedings of the Advances in Cryptology, 1991

1990
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition.
Proceedings of the Advances in Cryptology, 1990

1989
Fast Correlation Attacks on Certain Stream Ciphers.
J. Cryptol., 1989

Nonlinearity Criteria for Cryptographic Functions.
Proceedings of the Advances in Cryptology, 1989

1988
Fast Correlation Attacks on Stream Ciphers (Extended Abstract).
Proceedings of the Advances in Cryptology, 1988


  Loading...