Willi Meier

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Vectorial fast correlation attacks2026-03-31Paper
A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH2024-10-16Paper
Coefficient grouping for complex affine layers
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Coefficient grouping: breaking Chaghri and more
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Near collision attack against Grain v12023-11-09Paper
Algebraic meet-in-the-middle attack on LowMC
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Algebraic attacks on Rasta and Dasta using low-degree equations
Lecture Notes in Computer Science
2023-05-12Paper
Algebraic Attacks on Round-Reduced Keccak2023-04-13Paper
Automatic verification of differential characteristics: application to reduced Gimli2022-12-07Paper
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021
IEEE Transactions on Information Theory
2022-10-11Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers
Journal of Cryptology
2022-10-06Paper
Grain-128AEADv2: strengthening the initialization against key reconstruction2022-06-29Paper
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques2022-04-22Paper
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD2021-12-01Paper
Modeling for three-subset division property without unknown subset
Journal of Cryptology
2021-08-10Paper
On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet2020-07-21Paper
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
Designs, Codes and Cryptography
2020-05-21Paper
Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-1282020-05-12Paper
Cryptanalysis of ForkAES2020-01-30Paper
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly
IEEE Transactions on Computers
2020-01-28Paper
A New Cube Attack on MORUS by Using Division Property
IEEE Transactions on Computers
2020-01-28Paper
New cube distinguishers on NFSR-based stream ciphers
Designs, Codes and Cryptography
2020-01-09Paper
An AEAD variant of the Grain stream cipher2019-10-14Paper
Cube Attacks on Non-Blackbox Polynomials Based on Division Property
IEEE Transactions on Computers
2019-03-07Paper
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v12018-09-26Paper
A key-recovery attack on 855-round Trivium2018-09-26Paper
Improved division property based cube attacks exploiting algebraic properties of superpoly2018-09-12Paper
Fast near collision attack on the Grain v1 stream cipher2018-07-09Paper
Design and analysis of small-state grain-like stream ciphers
Cryptography and Communications
2018-05-28Paper
Cube attacks on non-blackbox polynomials based on division property2017-10-27Paper
Truncated differential based known-key attacks on round-reduced SIMON
Designs, Codes and Cryptography
2017-04-13Paper
Optimized interpolation attacks on lowMC
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
Lecture Notes in Computer Science
2015-12-10Paper
Improved differential attacks on RC5
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Fast Software Encryption
2015-09-18Paper
The hash function \texttt{BLAKE}
Information Security and Cryptography
2014-12-15Paper
Differential biases in reduced-round Keccak
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Quark: a lightweight hash
Journal of Cryptology
2013-06-27Paper
High order differential attacks on stream ciphers
Cryptography and Communications
2013-06-24Paper
Synthetic linear analysis with applications to CubeHash and Rabbit
Cryptography and Communications
2013-06-24Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Stream ciphers, a perspective. (Abstract)
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Conditional Differential Cryptanalysis of Trivium and KATAN
Selected Areas in Cryptography
2012-06-08Paper
Practical Analysis of Reduced-Round Keccak
Lecture Notes in Computer Science
2011-12-16Paper
Fast Correlation Attacks: Methods and Countermeasures
Fast Software Encryption
2011-07-07Paper
Cryptanalysis of the knapsack generator
Fast Software Encryption
2011-07-07Paper
Conditional differential cryptanalysis of NLFSR-based cryptosystems
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Quark: a lightweight hash
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Differential and invertibility properties of BLAKE
Fast Software Encryption
2010-07-13Paper
Cryptanalysis of ESSENCE
Fast Software Encryption
2010-07-13Paper
Improved Linear Differential Attacks on CubeHash
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Some remarks on FCSRs and implications for stream ciphers
Journal of Mathematical Cryptology
2010-02-05Paper
Improved cryptanalysis of Skein
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Linearization framework for collision attacks: application to CubeHash and MD6
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Selected Areas in Cryptography
2009-11-03Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Fast Software Encryption
2009-08-11Paper
Inside the Hypercube
Information Security and Privacy
2009-06-25Paper
Cryptanalysis of Achterbahn
Fast Software Encryption
2009-04-02Paper
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher
Information Security and Privacy
2009-03-06Paper
On Reconstruction of RC4 Keys from Internal States
Mathematical Methods in Computer Science
2009-01-22Paper
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Fast Software Encryption
2008-09-18Paper
The Hash Function Family LAKE
Fast Software Encryption
2008-09-18Paper
Algebraic Immunity of S-Boxes and Augmented Functions
Fast Software Encryption
2008-09-16Paper
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Analysis of Multivariate Hash Functions
Lecture Notes in Computer Science
2008-05-06Paper
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Reduced Complexity Attacks on the Alternating Step Generator
Selected Areas in Cryptography
2008-03-25Paper
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Fault Attacks on Combiners with Memory
Selected Areas in Cryptography
2007-11-15Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Analysis of SSC2
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2085432 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2009966 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 2009965 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1759264 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1304083 (Why is no real title available?)2000-04-10Paper
scientific article; zbMATH DE number 1394293 (Why is no real title available?)2000-01-31Paper
Analysis Methods for (Alleged) RC4
Lecture Notes in Computer Science
1999-06-17Paper
scientific article; zbMATH DE number 1088915 (Why is no real title available?)1998-02-11Paper
Cryptography and elliptic curves
Elemente der Mathematik
1997-01-01Paper
scientific article; zbMATH DE number 820502 (Why is no real title available?)1996-07-04Paper
scientific article; zbMATH DE number 708816 (Why is no real title available?)1995-08-13Paper
scientific article; zbMATH DE number 503278 (Why is no real title available?)1994-05-16Paper
Analysis of Pseudo Random Sequences Generated by Cellular Automata
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 177035 (Why is no real title available?)1993-05-18Paper
Correlation properties of combiners with memory in stream ciphers
Journal of Cryptology
1992-06-28Paper
scientific article; zbMATH DE number 4195884 (Why is no real title available?)1990-01-01Paper
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
1989-01-01Paper
Some topological properties of Kaehler manifolds and homogeneous spaces
Mathematische Zeitschrift
1983-01-01Paper
On Fibre Inclusions and Kahler Manifolds
Proceedings of the American Mathematical Society
1983-01-01Paper
Rational universal fibrations and flag manifolds
Mathematische Annalen
1982-01-01Paper
HOMOTOPY GROUPS OF ACYCLIC SPACES
The Quarterly Journal of Mathematics
1981-01-01Paper
Minimal models for non-nilpotent spaces
Commentarii Mathematici Helvetici
1980-01-01Paper
Complex and real K-theory and localization
Journal of Pure and Applied Algebra
1979-01-01Paper
Acyclic maps and knot complements
Mathematische Annalen
1979-01-01Paper
PULLBACK THEOREMS AND PHANTOM MAPS
The Quarterly Journal of Mathematics
1978-01-01Paper
Homotopy nilpotency and localization
Mathematische Zeitschrift
1978-01-01Paper
scientific article; zbMATH DE number 3638770 (Why is no real title available?)1978-01-01Paper
scientific article; zbMATH DE number 3535328 (Why is no real title available?)1976-01-01Paper
scientific article; zbMATH DE number 3500731 (Why is no real title available?)1975-01-01Paper
scientific article; zbMATH DE number 3491875 (Why is no real title available?)1975-01-01Paper


Research outcomes over time


This page was built for person: Willi Meier