Follow
Friedrich Wiemer
Friedrich Wiemer
cryptosolutions
Verified email at mailbox.org - Homepage
Title
Cited by
Cited by
Year
Shorter Linear Straight-Line Programs for MDS Matrices
T Kranz, G Leander, K Stoffelen, F Wiemer
IACR Transactions on Symmetric Cryptology 2017 (4), 188-211, 2017
952017
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
IACR Transactions on Symmetric Cryptology, 295-349, 2020
822020
Out of Oddity – New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
752020
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication
S Paul, P Scheible, F Wiemer
Journal of Computer Security 30 (4), 623-653, 2022
492022
High-Speed Implementation of bcrypt Password Search using Special-Purpose Hardware
F Wiemer, R Zimmermann
ReConFigurable Computing and FPGAs (ReConFig), 2014 International Conference …, 2014
432014
Searching for Subspace Trails and Truncated Differentials
G Leander, C Tezcan, F Wiemer
IACR Transactions on Symmetric Cryptology 2018 (1), 74-100, 2018
392018
PRINCEv2 - More Security for (Almost) No Overhead
D Božilov, M Eichlseder, M Knezevic, B Lambin, G Leander, T Moos, ...
Selected Areas in Cryptography-SAC 2020, 2020
332020
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
T Kranz, G Leander, F Wiemer
Transactions on Symmetric Cryptology 2017 (1), 2017
332017
Autocorrelations of vectorial Boolean functions
A Canteaut, L Kölsch, C Li, C Li, K Li, L Qu, F Wiemer
LatinCrypt 2021, 0
25*
Parallel Implementation of BDD Enumeration for LWE
E Kirshanova, A May, F Wiemer
Applied Cryptography and Network Security: 14th International Conference …, 2016
182016
Weak-Key Distinguishers for AES
L Grassi, G Leander, C Rechberger, C Tezcan, F Wiemer
Selected Areas in Cryptography 2020, 0
14*
On the security of the Rescue hash function.
T Beyne, A Canteaut, G Leander, M Naya-Plasencia, L Perrin, F Wiemer
IACR Cryptol. ePrint Arch. 2020, 820, 2020
102020
Spook: sponge-based leakage-resilient authenticated encryption with a masked tweakable block cipher (2019)
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
92019
BISON - Instantiating the Whitened Swap-Or-Not Construction
A Canteaut, V Lallemand, G Leander, P Neumann, F Wiemer
Advances in Cryptology–EUROCRYPT 2019, 2019
72019
Report on the Security of STARK-friendly Hash Functions (Version 2.0)
A Canteaut, T Beyne, I Dinur, M Eichlseder, G Leander, G Leurent, ...
22020
Security Arguments and Tool-based Design of Block Ciphers
F Wiemer
Ruhr-Universität Bochum, 2020
22020
Enabling Secure Communication for Automotive Endpoint-ECUs through Lightweight-Cryptography
F Wiemer, A Zeh
7th ACM Computer Science in Cars Symposium December 5, 2023 Darmstadt …, 2023
2023
Spook: Updates on the Round-2 Submission
D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ...
2020
The system can't perform the operation now. Try again later.
Articles 1–18