Algebraic attacks on stream ciphers with linear feedback NT Courtois, W Meier Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 1402 | 2003 |
Fast correlation attacks on certain stream ciphers W Meier, O Staffelbach Journal of cryptology 1, 159-176, 1989 | 741 | 1989 |
Algebraic attacks and decomposition of Boolean functions W Meier, E Pasalic, C Carlet Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 731 | 2004 |
Grain: a stream cipher for constrained environments M Hell, T Johansson, W Meier International journal of wireless and mobile computing 2 (1), 86-93, 2007 | 700 | 2007 |
Nonlinearity criteria for cryptographic functions W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 549-562, 1989 | 681 | 1989 |
The self-shrinking generator W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 205-214, 1994 | 400 | 1994 |
A stream cipher proposal: Grain-128 M Hell, T Johansson, A Maximov, W Meier 2006 IEEE International Symposium on Information Theory, 1614-1618, 2006 | 349 | 2006 |
Sha-3 proposal blake JP Aumasson, L Henzen, W Meier, RCW Phan Submission to NIST 92, 194, 2008 | 348 | 2008 |
Fast correlation attacks on stream ciphers W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 301-314, 1988 | 338 | 1988 |
Grain-128a: a new version of Grain-128 with optional authentication M ? gren, M Hell, T Johansson, W Meier International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011 | 312* | 2011 |
The grain family of stream ciphers M Hell, T Johansson, A Maximov, W Meier New stream cipher designs: The eSTREAM finalists, 179-190, 2008 | 303 | 2008 |
Cube testers and key recovery attacks on reduced-round MD6 and Trivium JP Aumasson, I Dinur, W Meier, A Shamir International Workshop on Fast Software Encryption, 1-22, 2009 | 293 | 2009 |
Quark: A Lightweight Hash JP Aumasson, L Henzen, W Meier, M Naya-Plasencia International workshop on cryptographic hardware and embedded systems, 1-15, 2010 | 262 | 2010 |
Quark: A Lightweight Hash JP Aumasson, L Henzen, W Meier, M Naya-Plasencia Journal of cryptology 26, 313-339, 2013 | 235 | 2013 |
Analysis methods for (alleged) RC4 LR Knudsen, W Meier, B Preneel, V Rijmen, S Verdoolaege Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998 | 230 | 1998 |
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 213 | 2008 |
Analysis of pseudo random sequences generated by cellular automata W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 186-199, 1991 | 183 | 1991 |
Efficient computation of algebraic immunity for algebraic and fast algebraic attacks F Armknecht, C Carlet, P Gaborit, S Künzli, W Meier, O Ruatta Annual International Conference on the Theory and Applications of …, 2006 | 177 | 2006 |
Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 163 | 2018 |
Conditional differential cryptanalysis of NLFSR-based cryptosystems S Knellwolf, W Meier, M Naya-Plasencia Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 163 | 2010 |