Willi Meier

From MaRDI portal
Person:483132

Available identifiers

zbMath Open meier.williMaRDI QIDQ483132

List of research outcomes

PublicationDate of PublicationType
Coefficient grouping for complex affine layers2024-02-02Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP2023-12-08Paper
Coefficient grouping: breaking Chaghri and more2023-12-08Paper
Algebraic meet-in-the-middle attack on LowMC2023-08-25Paper
Algebraic attacks on Rasta and Dasta using low-degree equations2023-05-12Paper
Automatic verification of differential characteristics: application to reduced Gimli2022-12-07Paper
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 20212022-10-11Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers2022-10-06Paper
Grain-128AEADv2: strengthening the initialization against key reconstruction2022-06-29Paper
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques2022-04-22Paper
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD2021-12-01Paper
Modeling for three-subset division property without unknown subset2021-08-10Paper
On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet2020-07-21Paper
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT2020-05-21Paper
Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-1282020-05-12Paper
Cryptanalysis of ForkAES2020-01-30Paper
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly2020-01-28Paper
A New Cube Attack on MORUS by Using Division Property2020-01-28Paper
New cube distinguishers on NFSR-based stream ciphers2020-01-09Paper
An AEAD variant of the Grain stream cipher2019-10-14Paper
Cube Attacks on Non-Blackbox Polynomials Based on Division Property2019-03-07Paper
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v12018-09-26Paper
A key-recovery attack on 855-round Trivium2018-09-26Paper
Improved division property based cube attacks exploiting algebraic properties of superpoly2018-09-12Paper
Fast near collision attack on the Grain v1 stream cipher2018-07-09Paper
Design and analysis of small-state grain-like stream ciphers2018-05-28Paper
Cube attacks on non-blackbox polynomials based on division property2017-10-27Paper
Truncated differential based known-key attacks on round-reduced SIMON2017-04-13Paper
Optimized Interpolation Attacks on LowMC2016-03-23Paper
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.02015-12-10Paper
Improved Differential Attacks on RC52015-11-11Paper
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA2015-09-18Paper
The hash function \texttt{BLAKE}2014-12-15Paper
Differential Biases in Reduced-Round Keccak2014-06-24Paper
Quark: a lightweight hash2013-06-27Paper
High order differential attacks on stream ciphers2013-06-24Paper
Synthetic linear analysis with applications to CubeHash and Rabbit2013-06-24Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit2012-11-01Paper
Stream Ciphers, a Perspective2012-07-23Paper
Conditional Differential Cryptanalysis of Trivium and KATAN2012-06-08Paper
Practical Analysis of Reduced-Round Keccak2011-12-16Paper
Fast Correlation Attacks: Methods and Countermeasures2011-07-07Paper
Cryptanalysis of the Knapsack Generator2011-07-07Paper
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems2010-12-07Paper
Quark: A Lightweight Hash2010-08-17Paper
Cryptanalysis of ESSENCE2010-07-13Paper
Differential and Invertibility Properties of BLAKE2010-07-13Paper
Improved Linear Differential Attacks on CubeHash2010-05-04Paper
Some remarks on FCSRs and implications for stream ciphers2010-02-05Paper
Improved Cryptanalysis of Skein2009-12-15Paper
Linearization Framework for Collision Attacks: Application to CubeHash and MD62009-12-15Paper
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD52009-11-03Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium2009-08-11Paper
Inside the Hypercube2009-06-25Paper
Cryptanalysis of Achterbahn2009-04-02Paper
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher2009-03-06Paper
On Reconstruction of RC4 Keys from Internal States2009-01-22Paper
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers2009-01-22Paper
The Hash Function Family LAKE2008-09-18Paper
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba2008-09-18Paper
Algebraic Immunity of S-Boxes and Augmented Functions2008-09-16Paper
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers2008-06-13Paper
Analysis of Multivariate Hash Functions2008-05-06Paper
Non-randomness in eSTREAM Candidates Salsa20 and TSC-42008-04-11Paper
Reduced Complexity Attacks on the Alternating Step Generator2008-03-25Paper
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption2008-03-17Paper
Fault Attacks on Combiners with Memory2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks2007-09-24Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Analysis of SSC22004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30439402004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44348842003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348852003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q45379852002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q42507732000-04-10Paper
https://portal.mardi4nfdi.de/entity/Q49347062000-01-31Paper
Analysis Methods for (Alleged) RC41999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43657401998-02-11Paper
Cryptography and elliptic curves1997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48572471996-07-04Paper
https://portal.mardi4nfdi.de/entity/Q43187071995-08-13Paper
https://portal.mardi4nfdi.de/entity/Q42796061994-05-16Paper
https://portal.mardi4nfdi.de/entity/Q40368721993-05-18Paper
Analysis of Pseudo Random Sequences Generated by Cellular Automata1993-05-18Paper
Correlation properties of combiners with memory in stream ciphers1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q52026221990-01-01Paper
Fast correlation attacks on certain stream ciphers1989-01-01Paper
Some topological properties of Kaehler manifolds and homogeneous spaces1983-01-01Paper
On Fibre Inclusions and Kahler Manifolds1983-01-01Paper
Rational universal fibrations and flag manifolds1982-01-01Paper
HOMOTOPY GROUPS OF ACYCLIC SPACES1981-01-01Paper
Minimal models for non-nilpotent spaces1980-01-01Paper
Complex and real K-theory and localization1979-01-01Paper
Acyclic maps and knot complements1979-01-01Paper
Homotopy nilpotency and localization1978-01-01Paper
PULLBACK THEOREMS AND PHANTOM MAPS1978-01-01Paper
https://portal.mardi4nfdi.de/entity/Q41977511978-01-01Paper
https://portal.mardi4nfdi.de/entity/Q41126371976-01-01Paper
https://portal.mardi4nfdi.de/entity/Q40741071975-01-01Paper
https://portal.mardi4nfdi.de/entity/Q40820411975-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Willi Meier