Willi Meier


Ontology type: schema:Person     


Person Info

NAME

Willi

SURNAME

Meier

Publications in SciGraph latest 50 shown

  • 2021-08-11 Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques in ADVANCES IN CRYPTOLOGY – CRYPTO 2021
  • 2021-05-20 Modeling for Three-Subset Division Property without Unknown Subset in JOURNAL OF CRYPTOLOGY
  • 2020-08-10 Automatic Verification of Differential Characteristics: Application to Reduced Gimli in ADVANCES IN CRYPTOLOGY – CRYPTO 2020
  • 2020-05-01 Modeling for Three-Subset Division Property Without Unknown Subset in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2020-02-13 Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2020-01-10 On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2019
  • 2019-11-19 Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128 in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2019
  • 2019-09-11 New cube distinguishers on NFSR-based stream ciphers in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2019-05-29 Cryptanalysis of ForkAES in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2019-03-28 An AEAD Variant of the Grain Stream Cipher in CODES, CRYPTOLOGY AND INFORMATION SECURITY
  • 2018-07-25 Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-07-24 A Key-Recovery Attack on 855-round Trivium in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-07-24 Fast Correlation Attack Revisited in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-03-31 Fast Near Collision Attack on the Grain v1 Stream Cipher in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2017-11-08 Design and analysis of small-state grain-like stream ciphers in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2017-08-02 Cube Attacks on Non-Blackbox Polynomials Based on Division Property in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2016-06-28 Truncated differential based known-key attacks on round-reduced SIMON in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-12-30 Optimized Interpolation Attacks on LowMC in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2015-08-01 Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-04-19 Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA in FAST SOFTWARE ENCRYPTION
  • 2014 Differential Biases in Reduced-Round Keccak in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2014
  • 2014 The Hash Function BLAKE in NONE
  • 2013 New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2013
  • 2012-08-29 High order differential attacks on stream ciphers in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2012-07-31 Synthetic linear analysis with applications to CubeHash and Rabbit in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2012-05-10 Quark: A Lightweight Hash in JOURNAL OF CRYPTOLOGY
  • 2012 Conditional Differential Cryptanalysis of Trivium and KATAN in SELECTED AREAS IN CRYPTOGRAPHY
  • 2012 Conditional Differential Cryptanalysis of Grain-128a in CRYPTOLOGY AND NETWORK SECURITY
  • 2012 Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2011
  • 2011 Fast Correlation Attacks: Methods and Countermeasures in FAST SOFTWARE ENCRYPTION
  • 2011 Practical Analysis of Reduced-Round Keccak in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2011
  • 2011 Cryptanalysis of the Knapsack Generator in FAST SOFTWARE ENCRYPTION
  • 2010 Quark: A Lightweight Hash in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2010 Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2010 Differential and Invertibility Properties of BLAKE in FAST SOFTWARE ENCRYPTION
  • 2010 Cryptanalysis of ESSENCE in FAST SOFTWARE ENCRYPTION
  • 2010 Improved Linear Differential Attacks on CubeHash in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2010
  • 2009 Linearization Framework for Collision Attacks: Application to CubeHash and MD6 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2009 Improved Cryptanalysis of Skein in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2009 Inside the Hypercube in INFORMATION SECURITY AND PRIVACY
  • 2009 Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium in FAST SOFTWARE ENCRYPTION
  • 2009 Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 in SELECTED AREAS IN CRYPTOGRAPHY
  • 2008-01-01 Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2008
  • 2008 New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers in PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008
  • 2008-01-01 The Hash Function Family LAKE in FAST SOFTWARE ENCRYPTION
  • 2008-01-01 New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba in FAST SOFTWARE ENCRYPTION
  • 2008-01-01 The Grain Family of Stream Ciphers in NEW STREAM CIPHER DESIGNS
  • 2008 On Reconstruction of RC4 Keys from Internal States in MATHEMATICAL METHODS IN COMPUTER SCIENCE
  • 2007-01-01 Analysis of Multivariate Hash Functions in INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007
  • 2007-01-01 Algebraic Immunity of S-Boxes and Augmented Functions in FAST SOFTWARE ENCRYPTION
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.410380.e", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2021-12-01T20:43", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20211201/entities/gbq_results/person/person_877.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.07653531142.18'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.07653531142.18'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.07653531142.18'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.07653531142.18'


     




    Preview window. Press ESC to close (or click here)


    ...