Friedrich Wiemer
Friedrich Wiemer
cryptosolutions
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
Shorter Linear Straight-Line Programs for MDS Matrices
T Kranz, G Leander, K Stoffelen, F Wiemer
IACR Transactions on Symmetric Cryptology 2017 (4), 188-211, 2017
392017
High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware
F Wiemer, R Zimmermann
ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference …, 2014
292014
Searching for Subspace Trails and Truncated Differentials
G Leander, C Tezcan, F Wiemer
IACR Transactions on Symmetric Cryptology 2018 (1), 74-100, 2018
172018
Parallel Implementation of BDD enumeration for LWE
E Kirshanova, A May, F Wiemer
International Conference on Applied Cryptography and Network Security, 580-591, 2016
172016
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
T Kranz, G Leander, F Wiemer
Transactions on Symmetric Cryptology 2017 (1), 2017
162017
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology, 295-349, 2020
132020
Out of Oddity – New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
62020
On the Differential-Linear Connectivity Table of Vectorial Boolean Functions
A Canteaut, L Kölsch, C Li, C Li, K Li, L Qu, F Wiemer
arXiv preprint arXiv:1908.07445, 2019
32019
BISON - Instantiating the Whitened Swap-Or-Not Construction
A Canteaut, V Lallemand, G Leander, P Neumann, F Wiemer
IACR ePrint 2018 1011, 2018
32018
On the security of the Rescue hash function
T Beyne, A Canteaut, G Leander, M Naya-Plasencia, L Perrin, F Wiemer
Cryptology ePrint Archive, Report 2020/820. https://eprint. iacr. org/2020/820, 2020
22020
Observations on the DLCT and absolute indicators
A Canteaut, L Kölsch, F Wiemer
IACR ePrint 2019 848, 2019
22019
Report on the Security of STARK-friendly Hash Functions (Version 2.0)
A Canteaut, T Beyne, I Dinur, M Eichlseder, G Leander, G Leurent, ...
12020
Weak-Key Subspace Trails and Applications to AES
L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer
IACR ePrint 2019 852, 0
1*
Spook: Updates on the Round-2 Submission
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
2020
Security Arguments and Tool-based Design of Block Ciphers
F Wiemer
Ruhr-Universität Bochum, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–15