Cryptographers' World
 

Willi Meier


Author's Web Page Link

34 papers in database with 2345 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 20

Conference Proceedings

 
1. Bimal K. RoyWilli Meier, editors, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Springer, 2004. ISBN 3-540-22171-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Willi Meier,  Othmar Staffelbach,  Correlation Properties of Combiners with Memory in Stream Ciphers, Journal of Cryptology, Volume 5(1), pp. 67 - 86, Springer, 1992.

[Cited 86 times Red Star]

2. Willi Meier,  Othmar Staffelbach,  Fast Correlation Attacks on Certain Stream Ciphers, Journal of Cryptology, Volume 1(3), pp. 159 - 176, Springer, 1989.

[Cited 345 times Red StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Eric Brier,  Shahram Khazaei,  Willi Meier,  Thomas Peyrin,  Linearization Framework for Collision Attacks: Application to CubeHash and MD6, pp. 560 - 577, ASIACRYPT 2009.

[Electronic Edition][Cited 9 times ]

2. Jean-Philippe Aumasson,  ├çagdas ├çalik,  Willi Meier,  Onur ├ľzen,  Raphael Chung-Wei Phan,  Kerem Varici,  Improved Cryptanalysis of Skein, pp. 542 - 559, ASIACRYPT 2009.

[Electronic Edition][Cited 6 times ]

3. Jean-Philippe Aumasson,  Itai Dinur,  Willi Meier,  Adi Shamir,  Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium, pp. 1 - 22, FSE 2009.

[Electronic Edition][Cited 33 times ]

4. Shahram Khazaei,  Willi Meier,  New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers, pp. 15 - 26, INDOCRYPT 2008.

[Electronic Edition][Cited 2 times ]

5. Simon Fischer (aka K├╝nzli),  Shahram Khazaei,  Willi Meier,  Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers, pp. 236 - 245, AFRICACRYPT 2008.

[Electronic Edition][Cited 15 times ]

6. Jean-Philippe Aumasson,  Willi Meier,  Raphael Chung-Wei Phan,  The Hash Function Family LAKE, pp. 36 - 53, FSE 2008.

[Electronic Edition][Cited 22 times ]

7. Jean-Philippe Aumasson,  Simon Fischer (aka K├╝nzli),  Shahram Khazaei,  Willi Meier,  Christian Rechberger,  New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba, pp. 470 - 488, FSE 2008.

[Electronic Edition][Cited 11 times ]

8. Simon Fischer (aka K├╝nzli),  Willi Meier,  Algebraic Immunity of S-Boxes and Augmented Functions, pp. 366 - 381, FSE 2007.

[Electronic Edition][Cited 14 times ]

9. Shahram Khazaei,  Simon Fischer (aka K├╝nzli),  Willi Meier,  Reduced Complexity Attacks on the Alternating Step Generator, pp. 1 - 16, SAC 2007.

[Electronic Edition][Cited 2 times ]

10. Simon Fischer (aka K├╝nzli),  Willi Meier,  C├┤me Berbain,  Jean-Fran├žois Biasse,  Matthew J. B. Robshaw,  Non-randomness in eSTREAM Candidates Salsa20 and TSC-4, pp. 2 - 16, INDOCRYPT 2006.

[Electronic Edition][Cited 10 times ]

11. Frederik Armknecht,  Claude Carlet,  Philippe Gaborit,  Simon Fischer (aka K├╝nzli),  Willi Meier,  Olivier Ruatta,  Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks, pp. 147 - 164, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 53 times Red Star]

12. Thomas Johansson,  Willi Meier,  Fr├ęd├ęric Muller,  Cryptanalysis of Achterbahn, pp. 1 - 14, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

13. Simon Fischer (aka K├╝nzli),  Pascal Junod,  Willi Meier,  Distinguishing Attacks on T-Functions, pp. 2 - 15, MYCRYPT 2005.

[Electronic Edition][Cited 14 times ]

14. Yi Lu,  Willi Meier,  Serge Vaudenay,  The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption, pp. 97 - 117, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

15. Frederik Armknecht,  Willi Meier,  Fault Attacks on Combiners with Memory, pp. 36 - 50, SAC 2005.

[Electronic Edition][Cited 7 times ]

16. Willi Meier,  Enes Pasalic,  Claude Carlet,  Algebraic Attacks and Decomposition of Boolean Functions, pp. 474 - 491, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 219 times Red StarRed Star]

17. Nicolas Courtois,  Willi Meier,  Algebraic Attacks on Stream Ciphers with Linear Feedback, pp. 345 - 359, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 457 times Red StarRed StarRed Star]

18. Patrik Ekdahl,  Willi Meier,  Thomas Johansson,  Predicting the Shrinking Generator with Fixed Connections, pp. 330 - 344, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

19. Nicolas Courtois,  Louis Goubin,  Willi Meier,  Jean-Daniel Tacier,  Solving Underdefined Systems of Multivariate Quadratic Equations, pp. 211 - 227, PKC 2002.

[Electronic Edition][Cited 42 times ]

20. Daniel Bleichenbacher,  Willi Meier,  Analysis of SSC2, pp. 219 - 232, FSE 2001.

[Electronic Edition][Cited 3 times ]

21. Lars R. Knudsen,  Willi Meier,  Correlations in RC6 with a Reduced Number of Rounds, pp. 94 - 108, FSE 2000.

[Electronic Edition][Cited 44 times ]

22. Lars R. Knudsen,  Willi Meier,  Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem, pp. 363 - 374, EUROCRYPT 1999.

[Electronic Edition][Cited 20 times ]

23. Lars R. Knudsen,  Willi Meier,  Bart Preneel,  Vincent Rijmen,  Sven Verdoolaege,  Analysis Methods for (Alleged) RC4, pp. 327 - 341, ASIACRYPT 1998.

[Electronic Edition][Cited 91 times Red Star]

24. Lars R. Knudsen,  Willi Meier,  Improved Differential Attacks on RC5, pp. 216 - 228, CRYPTO 1996.

[Electronic Edition][Cited 60 times Red Star]

25. Willi Meier,  Othmar Staffelbach,  The Self-Shrinking Generator, pp. 205 - 214, EUROCRYPT 1994.

[Electronic Edition][Cited 171 times Red StarRed Star]

26. Willi Meier,  On the Security of the IDEA Block Cipher, pp. 371 - 385, EUROCRYPT 1993.

[Electronic Edition][Cited 39 times ]

27. Willi Meier,  Othmar Staffelbach,  Efficient Multiplication on Certain Nonsupersingular Elliptic Curves, pp. 333 - 344, CRYPTO 1992.

[Electronic Edition][Cited 73 times Red Star]

28. Willi Meier,  Othmar Staffelbach,  Analysis of Pseudo Random Sequences Generated by Cellular Automata, pp. 186 - 199, EUROCRYPT 1991.

[Electronic Edition][Cited 56 times Red Star]

29. Willi Meier,  Othmar Staffelbach,  Correlation Properties of Combiners with Memory in Stream Ciphers, pp. 204 - 213, EUROCRYPT 1990.

[Electronic Edition][Cited 98 times Red Star]

30. Othmar Staffelbach,  Willi Meier,  Cryptographic Significance of the Carry for Ciphers Based on Integer Addition, pp. 601 - 614, CRYPTO 1990.

[Electronic Edition][Cited 26 times ]

31. Willi Meier,  Othmar Staffelbach,  Nonlinearity Criteria for Cryptographic Functions, pp. 549 - 562, EUROCRYPT 1989.

[Electronic Edition][Cited 309 times Red StarRed StarRed Star]

32. Willi Meier,  Othmar Staffelbach,  Fast Correlation Attacks on Stream Ciphers (Extended Abstract), pp. 301 - 314, EUROCRYPT 1988.

[Electronic Edition][Cited 9 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...