Algebraic attacks on stream ciphers with linear feedback NT Courtois, W Meier Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 1391 | 2003 |
Fast correlation attacks on certain stream ciphers W Meier, O Staffelbach Journal of cryptology 1, 159-176, 1989 | 738 | 1989 |
Algebraic attacks and decomposition of Boolean functions W Meier, E Pasalic, C Carlet Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 729 | 2004 |
Grain: a stream cipher for constrained environments M Hell, T Johansson, W Meier International journal of wireless and mobile computing 2 (1), 86-93, 2007 | 690 | 2007 |
Nonlinearity criteria for cryptographic functions W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 549-562, 1989 | 674 | 1989 |
The self-shrinking generator W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 205-214, 1994 | 395 | 1994 |
Sha-3 proposal blake JP Aumasson, L Henzen, W Meier, RCW Phan Submission to NIST 92, 194, 2008 | 347 | 2008 |
A stream cipher proposal: Grain-128 M Hell, T Johansson, A Maximov, W Meier 2006 IEEE International Symposium on Information Theory, 1614-1618, 2006 | 345 | 2006 |
Fast correlation attacks on stream ciphers W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 301-314, 1988 | 336 | 1988 |
Grain-128a: a new version of Grain-128 with optional authentication M ? gren, M Hell, T Johansson, W Meier International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011 | 308* | 2011 |
The grain family of stream ciphers M Hell, T Johansson, A Maximov, W Meier New stream cipher designs: The eSTREAM finalists, 179-190, 2008 | 301 | 2008 |
Cube testers and key recovery attacks on reduced-round MD6 and Trivium JP Aumasson, I Dinur, W Meier, A Shamir International Workshop on Fast Software Encryption, 1-22, 2009 | 291 | 2009 |
Quark: A Lightweight Hash JP Aumasson, L Henzen, W Meier, M Naya-Plasencia International workshop on cryptographic hardware and embedded systems, 1-15, 2010 | 260 | 2010 |
Quark: A Lightweight Hash JP Aumasson, L Henzen, W Meier, M Naya-Plasencia Journal of cryptology 26, 313-339, 2013 | 233 | 2013 |
Analysis methods for (alleged) RC4 LR Knudsen, W Meier, B Preneel, V Rijmen, S Verdoolaege Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998 | 230 | 1998 |
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 211 | 2008 |
Analysis of pseudo random sequences generated by cellular automata W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 186-199, 1991 | 181 | 1991 |
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks F Armknecht, C Carlet, P Gaborit, S Künzli, W Meier, O Ruatta Annual International Conference on the Theory and Applications of …, 2006 | 176 | 2006 |
Conditional differential cryptanalysis of NLFSR-based cryptosystems S Knellwolf, W Meier, M Naya-Plasencia Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 161 | 2010 |
Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 160 | 2018 |