Friedrich Wiemer
Friedrich Wiemer
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Shorter Linear Straight-Line Programs for MDS Matrices
T Kranz, G Leander, K Stoffelen, F Wiemer
IACR Transactions on Symmetric Cryptology 2017 (4), 188-211, 2017
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology, 295-349, 2020
Out of Oddity – New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware
F Wiemer, R Zimmermann
ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference …, 2014
Searching for Subspace Trails and Truncated Differentials
G Leander, C Tezcan, F Wiemer
IACR Transactions on Symmetric Cryptology 2018 (1), 74-100, 2018
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
T Kranz, G Leander, F Wiemer
Transactions on Symmetric Cryptology 2017 (1), 2017
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication
S Paul, P Scheible, F Wiemer
Journal of Computer Security 30 (4), 623-653, 2022
PRINCEv2 - More Security for (Almost) No Overhead
D Božilov, M Eichlseder, M Knezevic, B Lambin, G Leander, T Moos, ...
Selected Areas in Cryptography-SAC 2020, 2020
Autocorrelations of vectorial Boolean functions
A Canteaut, L Kölsch, C Li, C Li, K Li, L Qu, F Wiemer
LatinCrypt 2021, 0
Parallel Implementation of BDD Enumeration for LWE
E Kirshanova, A May, F Wiemer
Applied Cryptography and Network Security: 14th International Conference …, 2016
Weak-Key Distinguishers for AES
L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer
Selected Areas in Cryptography 2020, 0
BISON - Instantiating the Whitened Swap-Or-Not Construction
A Canteaut, V Lallemand, G Leander, P Neumann, F Wiemer
Advances in Cryptology–EUROCRYPT 2019, 2019
On the security of the Rescue hash function.
T Beyne, A Canteaut, G Leander, M Naya-Plasencia, L Perrin, F Wiemer
IACR Cryptol. ePrint Arch. 2020, 820, 2020
Report on the Security of STARK-friendly Hash Functions (Version 2.0)
A Canteaut, T Beyne, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Security Arguments and Tool-based Design of Block Ciphers
F Wiemer
Ruhr-Universität Bochum, 2020
Spook: Updates on the Round-2 Submission
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–16