| Algebraic attacks on stream ciphers with linear feedback NT Courtois, W Meier International Conference on the Theory and Applications of Cryptographic …, 2003 | 1452 | 2003 |
| Fast correlation attacks on certain stream ciphers W Meier, O Staffelbach Journal of cryptology 1 (3), 159-176, 1989 | 779 | 1989 |
| Algebraic attacks and decomposition of Boolean functions W Meier, E Pasalic, C Carlet International conference on the theory and applications of cryptographic …, 2004 | 753 | 2004 |
| Grain: a stream cipher for constrained environments M Hell, T Johansson, W Meier International journal of wireless and mobile computing 2 (1), 86-93, 2007 | 739 | 2007 |
| Nonlinearity criteria for cryptographic functions W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 549-562, 1989 | 703 | 1989 |
| The self-shrinking generator W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 205-214, 1994 | 396 | 1994 |
| A stream cipher proposal: Grain-128 M Hell, T Johansson, A Maximov, W Meier 2006 IEEE International Symposium on Information Theory, 1614-1618, 2006 | 381 | 2006 |
| Sha-3 proposal blake JP Aumasson, L Henzen, W Meier, RCW Phan Submission to NIST 92, 1-79, 2008 | 379 | 2008 |
| Fast correlation attacks on stream ciphers W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 301-314, 1988 | 362 | 1988 |
| The grain family of stream ciphers M Hell, T Johansson, A Maximov, W Meier New stream cipher designs: The eSTREAM finalists, 179-190, 2008 | 324 | 2008 |
| Grain-128a: a new version of Grain-128 with optional authentication M ? gren, M Hell, T Johansson, W Meier International Journal of Wireless and Mobile Computing 5 (1), 48-59, 2011 | 322 | 2011 |
| Cube testers and key recovery attacks on reduced-round MD6 and Trivium JP Aumasson, I Dinur, W Meier, A Shamir International Workshop on Fast Software Encryption, 1-22, 2009 | 301 | 2009 |
| Quark: A Lightweight Hash JP Aumasson, L Henzen, W Meier, M Naya-Plasencia International workshop on cryptographic hardware and embedded systems, 1-15, 2010 | 278 | 2010 |
| Quark: A Lightweight Hash JP Aumasson, L Henzen, W Meier, M Naya-Plasencia Journal of cryptology 26 (2), 313-339, 2013 | 261 | 2013 |
| New features of Latin dances: analysis of Salsa, ChaCha, and Rumba JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger International Workshop on Fast Software Encryption, 470-488, 2008 | 239 | 2008 |
| Analysis methods for (alleged) RC4 LR Knudsen, W Meier, B Preneel, V Rijmen, S Verdoolaege International Conference on the Theory and Application of Cryptology and …, 1998 | 228 | 1998 |
| Analysis of pseudo random sequences generated by cellular automata W Meier, O Staffelbach Workshop on the Theory and Application of of Cryptographic Techniques, 186-199, 1991 | 198 | 1991 |
| Efficient computation of algebraic immunity for algebraic and fast algebraic attacks F Armknecht, C Carlet, P Gaborit, S Künzli, W Meier, O Ruatta Annual International Conference on the Theory and Applications of …, 2006 | 183 | 2006 |
| Conditional differential cryptanalysis of NLFSR-based cryptosystems S Knellwolf, W Meier, M Naya-Plasencia International Conference on the Theory and Application of Cryptology and …, 2010 | 176 | 2010 |
| Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 173 | 2018 |