Willi Meier
ScholarGPS® ID: 79969627857208
Affiliation History
Discipline
Computer Science
Top Specialties
Cryptography | Information Security | Embedded System | Energy | Privacy
Metrics Summary
Publication Count
63
Predicted Citations
2,074
Predicted h-index
25
Ranking
Publications and Citation History
Publications based on Top Specialties
Types of Publication
- Publications
- Books
- Patents
- NIH/NSF
Add
Delete
|
---|
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions (journal article) IACR Transactions on Symmetric Cryptology, volume 2024, issue 1, pages 214-233 (2024). |
Algebraic Attacks on RAIN and AIM Using Equivalent Representations (journal article) IACR Transactions on Symmetric Cryptology, volume 2023, issue 4, pages 166-186 (2023). |
2023 IEEE International Symposium on Information Theory (ISIT) (2023) Taipei, Taiwan |
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting (journal article) IACR Transactions on Symmetric Cryptology (2022). |
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences (journal article) IACR Transactions on Symmetric Cryptology (2022). |
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021 (journal article) IEEE Transactions on Information Theory, volume 68, issue 9, pages 6114-6133 (2022). |
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives (journal article) IACR Transactions on Symmetric Cryptology (2021). |
Modeling for Three-Subset Division Property without Unknown Subset (journal article) Journal of Cryptology, volume 34, issue 3 (2021). |
Weak Keys in Reduced AEGIS and Tiaoxin (journal article) IACR Transactions on Symmetric Cryptology (2021). |
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques (book chapter) In Advances in Cryptology – CRYPTO 2021 Springer International Publishing (2021) |
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations (book chapter) In Advances in Cryptology – ASIACRYPT 2021 Springer International Publishing (2021) |
Algebraic Attacks on Round-Reduced Keccak (book chapter) In Information Security and Privacy Springer International Publishing (2021) |
Links between Division Property and Other Cube Attack Variants (journal article) IACR Transactions on Symmetric Cryptology (2020). |
Cube-Based Cryptanalysis of Subterranean-SAE (journal article) IACR Transactions on Symmetric Cryptology (2020). |
Automatic Verification of Differential Characteristics: Application to Reduced Gimli (book chapter) In Advances in Cryptology – CRYPTO 2020 Springer International Publishing (2020) |
Modeling for Three-Subset Division Property Without Unknown Subset (book chapter) In Advances in Cryptology – EUROCRYPT 2020 Springer International Publishing (2020) |
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet (book chapter) In Selected Areas in Cryptography – SAC 2019 Springer International Publishing (2020) |
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (journal article) IEEE Transactions on Computers, volume 68, issue 10, pages 1470-1486 (2019). |
New Conditional Cube Attack on Keccak Keyed Modes (journal article) IACR Transactions on Symmetric Cryptology (2019). |
Cryptanalysis of ForkAES (book chapter) In Applied Cryptography and Network Security Springer International Publishing (2019) |