dblp.uni-trier.dewww.uni-trier.de

Willi Meier

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
37EESimon Fischer, Shahram Khazaei, Willi Meier: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. AFRICACRYPT 2008: 236-245
36EEJean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan: The Hash Function Family LAKE. FSE 2008: 36-53
35EEJean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger: New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488
34EEShahram Khazaei, Willi Meier: New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. INDOCRYPT 2008: 15-26
33EEShahram Khazaei, Willi Meier: On Reconstruction of RC4 Keys from Internal States. MMICS 2008: 179-189
2007
32EEJean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay: TCHo: A Hardware-Oriented Trapdoor Cipher. ACISP 2007: 184-199
31EESimon Fischer, Willi Meier: Algebraic Immunity of S-Boxes and Augmented Functions. FSE 2007: 366-381
30EEJean-Philippe Aumasson, Willi Meier: Analysis of Multivariate Hash Functions. ICISC 2007: 309-323
29EEShahram Khazaei, Simon Fischer, Willi Meier: Reduced Complexity Attacks on the Alternating Step Generator. Selected Areas in Cryptography 2007: 1-16
28EEMartin Hell, Thomas Johansson, Willi Meier: Grain: a stream cipher for constrained environments. IJWMC 2(1): 86-93 (2007)
2006
27EEFrederik Armknecht, Claude Carlet, Philippe Gaborit, Simon Künzli, Willi Meier, Olivier Ruatta: Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. EUROCRYPT 2006: 147-164
26EEThomas Johansson, Willi Meier, Frédéric Muller: Cryptanalysis of Achterbahn. FSE 2006: 1-14
25EESimon Fischer, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw: Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. INDOCRYPT 2006: 2-16
2005
24EEYi Lu, Willi Meier, Serge Vaudenay: The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. CRYPTO 2005: 97-117
23EESimon Künzli, Pascal Junod, Willi Meier: Distinguishing Attacks on T-Functions. Mycrypt 2005: 2-15
22EEFrederik Armknecht, Willi Meier: Fault Attacks on Combiners with Memory. Selected Areas in Cryptography 2005: 36-50
2004
21 Bimal K. Roy, Willi Meier: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers Springer 2004
20EEWilli Meier, Enes Pasalic, Claude Carlet: Algebraic Attacks and Decomposition of Boolean Functions. EUROCRYPT 2004: 474-491
2003
19EEPatrik Ekdahl, Willi Meier, Thomas Johansson: Predicting the Shrinking Generator with Fixed Connections. EUROCRYPT 2003: 330-344
18EENicolas Courtois, Willi Meier: Algebraic Attacks on Stream Ciphers with Linear Feedback. EUROCRYPT 2003: 345-359
17EEWilli Geiselmann, Willi Meier, Rainer Steinwandt: An attack on the isomorphisms of polynomials problem with one secret. Int. J. Inf. Sec. 2(1): 59-64 (2003)
2002
16EENicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier: Solving Underdefined Systems of Multivariate Quadratic Equations. Public Key Cryptography 2002: 211-227
2001
15EEDaniel Bleichenbacher, Willi Meier: Analysis of SSC2. FSE 2001: 219-232
2000
14EELars R. Knudsen, Willi Meier: Correlations in RC6 with a Reduced Number of Rounds. FSE 2000: 94-108
1999
13EELars R. Knudsen, Willi Meier: Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. EUROCRYPT 1999: 363-374
1998
12EELars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341
1996
11EELars R. Knudsen, Willi Meier: Improved Differential Attacks on RC5. CRYPTO 1996: 216-228
1994
10EEWilli Meier, Othmar Staffelbach: The Self-Shrinking Generator. EUROCRYPT 1994: 205-214
1993
9EEWilli Meier: On the Security of the IDEA Block Cipher. EUROCRYPT 1993: 371-385
1992
8EEWilli Meier, Othmar Staffelbach: Efficient Multiplication on Certain Nonsupersingular Elliptic Curves. CRYPTO 1992: 333-344
7 Willi Meier, Othmar Staffelbach: Correlation Properties of Combiners with Memory in Stream Ciphers. J. Cryptology 5(1): 67-86 (1992)
1991
6EEWilli Meier, Othmar Staffelbach: Analysis of Pseudo Random Sequence Generated by Cellular Automata. EUROCRYPT 1991: 186-199
1990
5EEOthmar Staffelbach, Willi Meier: Cryptographic Significance of the Carry for Ciphers Based on Integer Addition. CRYPTO 1990: 601-614
4EEWilli Meier, Othmar Staffelbach: Correlation Properties of Combiners with Memory in Stream Ciphers. EUROCRYPT 1990: 204-213
1989
3EEWilli Meier, Othmar Staffelbach: Nonlinearity Criteria for Cryptographic Functions. EUROCRYPT 1989: 549-562
2 Willi Meier, Othmar Staffelbach: Fast Correlation Attacks on Certain Stream Ciphers. J. Cryptology 1(3): 159-176 (1989)
1988
1EEWilli Meier, Othmar Staffelbach: Fast Correltaion Attacks on Stream Ciphers (Extended Abstract). EUROCRYPT 1988: 301-314

Coauthor Index

1Frederik Armknecht [22] [27]
2Jean-Philippe Aumasson [30] [32] [35] [36]
3Côme Berbain [25]
4Jean-François Biasse [25]
5Daniel Bleichenbacher [15]
6Claude Carlet [20] [27]
7Nicolas Courtois [16] [18]
8Patrik Ekdahl [19]
9Matthieu Finiasz [32]
10Simon Fischer (Simon Künzli) [23] [25] [27] [29] [31] [35] [37]
11Philippe Gaborit [27]
12Willi Geiselmann [17]
13Louis Goubin [16]
14Martin Hell [28]
15Thomas Johansson [19] [26] [28]
16Pascal Junod [23]
17Shahram Khazaei [29] [33] [34] [35] [37]
18Lars R. Knudsen [11] [12] [13] [14]
19Yi Lu [24]
20Frédéric Muller [26]
21Enes Pasalic [20]
22Raphael Chung-Wei Phan (Raphael C.-W. Phan) [36]
23Bart Preneel [12]
24Christian Rechberger [35]
25Vincent Rijmen [12]
26Matthew J. B. Robshaw [25]
27Bimal K. Roy [21]
28Olivier Ruatta [27]
29Othmar Staffelbach [1] [2] [3] [4] [5] [6] [7] [8] [10]
30Rainer Steinwandt [17]
31Jean-Daniel Tacier [16]
32Serge Vaudenay [24] [32]
33Sven Verdoolaege [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)