What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Willi Meier
Google Scholar
91
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Observations on TETRA Encryption Algorithm TEA-3.
Jens Alich
Amund Askeland
Subhadeep Banik
Tim Beyne
Anne Canteaut
Patrick Felke
Gregor Leander
Willi Meier
Lukas Stennes
2024
journals/tosc
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions.
Fukang Liu
Abul Kalam
Santanu Sarkar
Willi Meier
2024
journals/tosc
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith.
Fukang Liu
Katharina Koschatko
Lorenzo Grassi
Hailun Yan
Shiyao Chen
Subhadeep Banik
Willi Meier
2024
conf/asiacrypt
Modelling Ciphers with Overdefined Systems of Quadratic Equations: Application to Friday, Vision, RAIN and Biscuit.
Fukang Liu
Mohammad Mahzoun
Willi Meier
2023
journals/tosc
Algebraic Attacks on RAIN and AIM Using Equivalent Representations.
Fukang Liu
Mohammad Mahzoun
Morten Øygarden
Willi Meier
2023
conf/crypto
Coefficient Grouping for Complex Affine Layers.
Fukang Liu
Lorenzo Grassi
Clémence Bouvier
Willi Meier
Takanori Isobe
2023
conf/acns
Near Collision Attack Against Grain V1.
Subhadeep Banik
Daniel Collins
Willi Meier
2023
conf/eurocrypt
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
Fukang Liu
Gaoli Wang
Santanu Sarkar
Ravi Anand
Willi Meier
Yingxin Li
Takanori Isobe
2023
conf/eurocrypt
Coefficient Grouping: Breaking Chaghri and More.
Fukang Liu
Ravi Anand
Libo Wang
Willi Meier
Takanori Isobe
2023
conf/sacrypt
A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH.
Xiaorui Yu
Fukang Liu
Gaoli Wang
Siwei Sun
Willi Meier
2022
journals/tosc
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
Fukang Liu
Willi Meier
Santanu Sarkar
Takanori Isobe
2022
journals/tosc
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
Fukang Liu
Willi Meier
Santanu Sarkar
Gaoli Wang
Ryoma Ito
Takanori Isobe
2022
journals/tosc
Attacks on the Firekite Cipher.
Thomas Johansson
Willi Meier
Vu Nguyen
2022
journals/joc
The Inverse of χ and Its Applications to Rasta-Like Ciphers.
Fukang Liu
Santanu Sarkar
Willi Meier
Takanori Isobe
2022
conf/asiacrypt
Algebraic Meet-in-the-Middle Attack on LowMC.
Fukang Liu
Santanu Sarkar
Gaoli Wang
Willi Meier
Takanori Isobe
2021
journals/tosc
Atom: A Stream Cipher with Double Key Filter.
Subhadeep Banik
Andrea Caforio
Takanori Isobe
Fukang Liu
Willi Meier
Kosei Sakamoto
Santanu Sarkar
2021
journals/tosc
Weak Keys in Reduced AEGIS and Tiaoxin.
Fukang Liu
Takanori Isobe
Willi Meier
Kosei Sakamoto
2021
journals/tosc
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
Andrea Caforio
Subhadeep Banik
Yosuke Todo
Willi Meier
Takanori Isobe
Fukang Liu
Bin Zhang
2021
journals/tosc
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.
Fukang Liu
Takanori Isobe
Willi Meier
2021
journals/joc
Modeling for Three-Subset Division Property without Unknown Subset.
Yonglin Hao
Gregor Leander
Willi Meier
Yosuke Todo
Qingju Wang
2021
conf/acisp
Algebraic Attacks on Round-Reduced Keccak.
Fukang Liu
Takanori Isobe
Willi Meier
Zhonghao Yang
2021
conf/crypto
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.
Fukang Liu
Takanori Isobe
Willi Meier
2021
conf/asiacrypt
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Fukang Liu
Santanu Sarkar
Willi Meier
Takanori Isobe
2021
conf/cans
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction.
Martin Hell
Thomas Johansson
Alexander Maximov
Willi Meier
Hirotaka Yoshida
2020
journals/tosc
Links between Division Property and Other Cube Attack Variants.
Yonglin Hao
Lin Jiao
Chaoyun Li
Willi Meier
Yosuke Todo
Qingju Wang
2020
conf/crypto
Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
Fukang Liu
Takanori Isobe
Willi Meier
2020
conf/eurocrypt
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Yonglin Hao
Gregor Leander
Willi Meier
Yosuke Todo
Qingju Wang
2019
journals/tosc
Cube-Based Cryptanalysis of Subterranean-SAE.
Fukang Liu
Takanori Isobe
Willi Meier
2019
journals/tosc
New Conditional Cube Attack on Keccak Keyed Modes.
Zheng Li
Xiaoyang Dong
Wenquan Bi
Keting Jia
Xiaoyun Wang
Willi Meier
2019
conf/acns
Cryptanalysis of ForkAES.
Subhadeep Banik
Jannis Bossert
Amit Jana
Eik List
Stefan Lucks
Willi Meier
Mostafizar Rahman
Dhiman Saha
Yu Sasaki
2019
conf/sacrypt
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
Yosuke Todo
Willi Meier
Kazumaro Aoki
2018
journals/tosc
Towards Low Energy Stream Ciphers.
Subhadeep Banik
Vasily Mikhalev
Frederik Armknecht
Takanori Isobe
Willi Meier
Andrey Bogdanov
Yuhei Watanabe
Francesco Regazzoni
2018
conf/crypto
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
Qingju Wang
Yonglin Hao
Yosuke Todo
Chaoyun Li
Takanori Isobe
Willi Meier
2018
conf/crypto
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
Yosuke Todo
Takanori Isobe
Willi Meier
Kazumaro Aoki
Bin Zhang
2018
conf/crypto
A Key-Recovery Attack on 855-round Trivium.
Ximing Fu
Xiaoyun Wang
Xiaoyang Dong
Willi Meier
2018
conf/eurocrypt
Fast Near Collision Attack on the Grain v1 Stream Cipher.
Bin Zhang
Chao Xu
Willi Meier
2017
journals/tosc
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices.
Matthias Hamann
Matthias Krause
Willi Meier
2017
journals/tosc
Fast Correlation Attacks on Grain-like Small State Stream Ciphers.
Bin Zhang
Xinxin Gong
Willi Meier
2017
conf/crypto
Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
Yosuke Todo
Takanori Isobe
Yonglin Hao
Willi Meier
2015
conf/crypto
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0.
Bin Zhang
Chao Xu
Willi Meier
2015
conf/asiacrypt
Optimized Interpolation Attacks on LowMC.
Itai Dinur
Yunwen Liu
Willi Meier
Qingju Wang
2014
conf/fse
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Sourav Sen Gupta
Subhamoy Maitra
Willi Meier
Goutam Paul
Santanu Sarkar
2014
conf/africacrypt
Differential Biases in Reduced-Round Keccak.
Sourav Das
Willi Meier
2013
journals/joc
Quark: A Lightweight Hash.
Jean-Philippe Aumasson
Luca Henzen
Willi Meier
María Naya-Plasencia
2013
conf/africacrypt
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4.
Subhamoy Maitra
Goutam Paul
Santanu Sarkar
Michael Lehmann
Willi Meier
2012
conf/africacrypt
Stream Ciphers, a Perspective.
Willi Meier
2012
conf/cans
Conditional Differential Cryptanalysis of Grain-128a.
Michael Lehmann
Willi Meier
2011
conf/fse
Cryptanalysis of the Knapsack Generator.
Simon Knellwolf
Willi Meier
2011
conf/fse
Fast Correlation Attacks: Methods and Countermeasures.
Willi Meier
2011
conf/icisc
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit.
Yi Lu
Serge Vaudenay
Willi Meier
Liping Ding
Jianchun Jiang
2011
conf/sacrypt
Conditional Differential Cryptanalysis of Trivium and KATAN.
Simon Knellwolf
Willi Meier
María Naya-Plasencia
2010
conf/fse
Differential and Invertibility Properties of BLAKE.
Jean-Philippe Aumasson
Jian Guo
Simon Knellwolf
Krystian Matusiewicz
Willi Meier
2010
conf/fse
Cryptanalysis of ESSENCE.
María Naya-Plasencia
Andrea Röck
Jean-Philippe Aumasson
Yann Laigle-Chapuy
Gaëtan Leurent
Willi Meier
Thomas Peyrin
2010
conf/ches
Quark: A Lightweight Hash.
Jean-Philippe Aumasson
Luca Henzen
Willi Meier
María Naya-Plasencia
2010
conf/asiacrypt
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.
Simon Knellwolf
Willi Meier
María Naya-Plasencia
2010
conf/africacrypt
Improved Linear Differential Attacks on CubeHash.
Shahram Khazaei
Simon Knellwolf
Willi Meier
Deian Stefan
2009
conf/fse
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.
Jean-Philippe Aumasson
Itai Dinur
Willi Meier
Adi Shamir
2009
conf/acisp
Inside the Hypercube.
Jean-Philippe Aumasson
Eric Brier
Willi Meier
María Naya-Plasencia
Thomas Peyrin
2009
conf/asiacrypt
Improved Cryptanalysis of Skein.
Jean-Philippe Aumasson
Çagdas Çalik
Willi Meier
Onur Özen
Raphael C.-W. Phan
Kerem Varici
2009
conf/asiacrypt
Linearization Framework for Collision Attacks: Application to CubeHash and MD6.
Eric Brier
Shahram Khazaei
Willi Meier
Thomas Peyrin
2008
conf/fse
The Hash Function Family LAKE.
Jean-Philippe Aumasson
Willi Meier
Raphael C.-W. Phan
2008
conf/fse
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba.
Jean-Philippe Aumasson
Simon Fischer
Shahram Khazaei
Willi Meier
Christian Rechberger
2008
conf/africacrypt
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers.
Simon Fischer
Shahram Khazaei
Willi Meier
2008
conf/sacrypt
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.
Jean-Philippe Aumasson
Willi Meier
Florian Mendel
2007
conf/fse
Algebraic Immunity of S-Boxes and Augmented Functions.
Simon Fischer
Willi Meier
2007
conf/acisp
: A Hardware-Oriented Trapdoor Cipher.
Jean-Philippe Aumasson
Matthieu Finiasz
Willi Meier
Serge Vaudenay
2007
conf/icisc
Analysis of Multivariate Hash Functions.
Jean-Philippe Aumasson
Willi Meier
2007
conf/sacrypt
Reduced Complexity Attacks on the Alternating Step Generator.
Shahram Khazaei
Simon Fischer
Willi Meier
2006
conf/fse
Cryptanalysis of Achterbahn.
Thomas Johansson
Willi Meier
Frédéric Muller
2006
conf/eurocrypt
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
Frederik Armknecht
Claude Carlet
Philippe Gaborit
Simon Künzli
Willi Meier
Olivier Ruatta
2005
conf/crypto
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.
Yi Lu
Willi Meier
Serge Vaudenay
2005
conf/sacrypt
Fault Attacks on Combiners with Memory.
Frederik Armknecht
Willi Meier
2004
conf/eurocrypt
Algebraic Attacks and Decomposition of Boolean Functions.
Willi Meier
Enes Pasalic
Claude Carlet
2003
conf/eurocrypt
Predicting the Shrinking Generator with Fixed Connections.
Patrik Ekdahl
Willi Meier
Thomas Johansson
2003
conf/eurocrypt
Algebraic Attacks on Stream Ciphers with Linear Feedback.
Nicolas T. Courtois
Willi Meier
2002
conf/pkc
Solving Underdefined Systems of Multivariate Quadratic Equations.
Nicolas T. Courtois
Louis Goubin
Willi Meier
Jean-Daniel Tacier
2001
conf/fse
Analysis of SSC2.
Daniel Bleichenbacher
Willi Meier
2000
conf/fse
Correlations in RC6 with a Reduced Number of Rounds.
Lars R. Knudsen
Willi Meier
1999
conf/eurocrypt
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.
Lars R. Knudsen
Willi Meier
1998
conf/asiacrypt
Analysis Methods for (Alleged) RC4.
Lars R. Knudsen
Willi Meier
Bart Preneel
Vincent Rijmen
Sven Verdoolaege
1996
conf/crypto
Improved Differential Attacks on RC5.
Lars R. Knudsen
Willi Meier
1994
conf/eurocrypt
The Self-Shrinking Generator.
Willi Meier
Othmar Staffelbach
1993
conf/eurocrypt
On the Security of the IDEA Block Cipher.
Willi Meier
1992
journals/joc
Correlation Properties of Combiners with Memory in Stream Ciphers.
Willi Meier
Othmar Staffelbach
1992
conf/crypto
Efficient Multiplication on Certain Nonsupersingular Elliptic Curves.
Willi Meier
Othmar Staffelbach
1991
conf/eurocrypt
Analysis of Pseudo Random Sequence Generated by Cellular Automata.
Willi Meier
Othmar Staffelbach
1990
conf/crypto
Cryptographic Significance of the Carry for Ciphers Based on Integer Addition.
Othmar Staffelbach
Willi Meier
1990
conf/eurocrypt
Correlation Properties of Combiners with Memory in Stream Ciphers.
Willi Meier
Othmar Staffelbach
1989
journals/joc
Fast Correlation Attacks on Certain Stream Ciphers.
Willi Meier
Othmar Staffelbach
1989
conf/eurocrypt
Nonlinearity Criteria for Cryptographic Functions.
Willi Meier
Othmar Staffelbach
1988
conf/eurocrypt
Fast Correlation Attacks on Stream Ciphers (Extended Abstract).
Willi Meier
Othmar Staffelbach
Coauthors
Abul Kalam
(1)
Adi Shamir
(1)
Alexander Maximov
(1)
Amit Jana
(1)
Amund Askeland
(1)
Andrea Caforio
(2)
Andrea Röck
(1)
Andrey Bogdanov
(1)
Anne Canteaut
(1)
Bart Preneel
(1)
Bin Zhang
(5)
Çagdas Çalik
(1)
Chao Xu
(2)
Chaoyun Li
(2)
Christian Rechberger
(1)
Claude Carlet
(2)
Clémence Bouvier
(1)
Daniel Bleichenbacher
(1)
Daniel Collins
(1)
Deian Stefan
(1)
Dhiman Saha
(1)
Eik List
(1)
Enes Pasalic
(1)
Eric Brier
(2)
Florian Mendel
(1)
Francesco Regazzoni
(1)
Frédéric Muller
(1)
Frederik Armknecht
(3)
Fukang Liu
(21)
Gaëtan Leurent
(1)
Gaoli Wang
(4)
Goutam Paul
(2)
Gregor Leander
(3)
Hailun Yan
(1)
Hirotaka Yoshida
(1)
Itai Dinur
(2)
Jannis Bossert
(1)
Jean-Daniel Tacier
(1)
Jean-Philippe Aumasson
(12)
Jens Alich
(1)
Jian Guo
(1)
Jianchun Jiang
(1)
Katharina Koschatko
(1)
Kazumaro Aoki
(2)
Kerem Varici
(1)
Keting Jia
(1)
Kosei Sakamoto
(2)
Krystian Matusiewicz
(1)
Lars R. Knudsen
(4)
Libo Wang
(1)
Lin Jiao
(1)
Liping Ding
(1)
Lorenzo Grassi
(2)
Louis Goubin
(1)
Luca Henzen
(2)
Lukas Stennes
(1)
María Naya-Plasencia
(6)
Martin Hell
(1)
Matthias Hamann
(1)
Matthias Krause
(1)
Matthieu Finiasz
(1)
Michael Lehmann
(2)
Mohammad Mahzoun
(2)
Morten Øygarden
(1)
Mostafizar Rahman
(1)
Nicolas T. Courtois
(2)
Olivier Ruatta
(1)
Onur Özen
(1)
Othmar Staffelbach
(9)
Patrick Felke
(1)
Patrik Ekdahl
(1)
Philippe Gaborit
(1)
Qingju Wang
(5)
Raphaël C.-W. Phan
(2)
Ravi Anand
(2)
Ryoma Ito
(1)
Santanu Sarkar
(10)
Serge Vaudenay
(3)
Shahram Khazaei
(5)
Shiyao Chen
(1)
Simon Fischer
(4)
Simon Knellwolf
(5)
Simon Künzli
(1)
Siwei Sun
(1)
Sourav Das
(1)
Sourav Sen Gupta
(1)
Stefan Lucks
(1)
Subhadeep Banik
(7)
Subhamoy Maitra
(2)
Sven Verdoolaege
(1)
Takanori Isobe
(20)
Thomas Johansson
(4)
Thomas Peyrin
(3)
Tim Beyne
(1)
Vasily Mikhalev
(1)
Vincent Rijmen
(1)
Vu Nguyen
(1)
Wenquan Bi
(1)
Willi Meier
(91)
Xiaorui Yu
(1)
Xiaoyang Dong
(2)
Xiaoyun Wang
(2)
Ximing Fu
(1)
Xinxin Gong
(1)
Yann Laigle-Chapuy
(1)
Yi Lu
(2)
Yingxin Li
(1)
Yonglin Hao
(5)
Yosuke Todo
(8)
Yu Sasaki
(1)
Yuhei Watanabe
(1)
Yunwen Liu
(1)
Zheng Li
(1)
Zhonghao Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to