Willi Meier
Orcid: 0000-0003-4594-1501
According to our database1,
Willi Meier
authored at least 142 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith.
IACR Trans. Symmetric Cryptol., 2024
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Comput. J., December, 2023
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
IEEE Trans. Inf. Theory, 2022
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Symmetric Cryptol., 2021
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Comput. J., 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
IACR Cryptol. ePrint Arch., 2020
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks.
IACR Cryptol. ePrint Arch., 2020
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT.
Des. Codes Cryptogr., 2020
Comput. J., 2020
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019
IACR Cryptol. ePrint Arch., 2019
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
IACR Cryptol. ePrint Arch., 2019
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
IEEE Trans. Computers, 2018
IACR Cryptol. ePrint Arch., 2018
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Cryptogr. Commun., 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
2016
Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0.
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Information Security and Cryptography, Springer, ISBN: 978-3-662-44757-4, 2014
CoRR, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Proceedings of the Progress in Cryptology, 2013
2012
Cryptogr. Commun., 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
IEEE Trans. Very Large Scale Integr. Syst., 2011
Int. J. Wirel. Mob. Comput., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Proceedings of the Progress in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Int. J. Comput. Commun. Control, 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Mathematical Methods in Computer Science, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Int. J. Wirel. Mob. Comput., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Public Key Cryptography, 2002
2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1999
Proceedings of the Advances in Cryptology, 1999
1998
1997
1996
Proceedings of the Advances in Cryptology, 1996
1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Advances in Cryptology, 1988