The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nicolas Courtois: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nicolas Courtois, Blandine Debraize, Eric Garrido
    On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:76-86 [Conf]
  2. Nicolas Courtois
    General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:67-83 [Conf]
  3. Nicolas Courtois
    The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:170-188 [Conf]
  4. Nicolas Courtois
    Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:402-421 [Conf]
  5. Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier
    How to Achieve a McEliece-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:157-174 [Conf]
  6. Nicolas Courtois, Josef Pieprzyk
    Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:267-287 [Conf]
  7. Louis Goubin, Nicolas Courtois
    Cryptanalysis of the TTM Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:44-57 [Conf]
  8. Jacques Patarin, Louis Goubin, Nicolas Courtois
    C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:35-49 [Conf]
  9. Nicolas Courtois
    Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:176-194 [Conf]
  10. Nicolas Courtois
    Feistel Schemes and Bi-linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:23-40 [Conf]
  11. Nicolas Courtois
    The Security of Hidden Field Equations (HFE). [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:266-281 [Conf]
  12. Nicolas Courtois, Jacques Patarin
    About the XL Algorithm over GF(2). [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:141-157 [Conf]
  13. Jacques Patarin, Nicolas Courtois, Louis Goubin
    QUARTZ, 128-Bit Long Digital Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:282-297 [Conf]
  14. Jacques Patarin, Nicolas Courtois, Louis Goubin
    FLASH, a Fast Multivariate Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:298-307 [Conf]
  15. Nicolas Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir
    Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:392-407 [Conf]
  16. Nicolas Courtois, Willi Meier
    Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:345-359 [Conf]
  17. Jacques Patarin, Louis Goubin, Nicolas Courtois
    Improved Algorithms for Isomorphisms of Polynomials. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:184-200 [Conf]
  18. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell
    Analysis of the Bit-Search Generator and Sequence Compression Techniques. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:196-214 [Conf]
  19. Bo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois
    On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:401-413 [Conf]
  20. Nicolas Courtois
    Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:182-199 [Conf]
  21. Nicolas Courtois
    Algebraic Attacks on Combiners with Memory and Several Outputs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:3-20 [Conf]
  22. Nicolas Courtois
    Cryptanalysis of Sfinks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:261-269 [Conf]
  23. Nicolas Courtois, Louis Goubin
    An Algebraic Masking Method to Protect AES Against Power Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:199-209 [Conf]
  24. Mehdi-Laurent Akkar, Nicolas Courtois, Romain Duteuil, Louis Goubin
    A Fast and Secure Implementation of Sflash. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:267-278 [Conf]
  25. Nicolas Courtois
    Generic Attacks and the Security of Quartz. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:351-364 [Conf]
  26. Nicolas Courtois
    Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:201-217 [Conf]
  27. Nicolas Courtois, Magnus Daum, Patrick Felke
    On the Security of HFE, HFEv- and Quartz. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:337-350 [Conf]
  28. Nicolas Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier
    Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:211-227 [Conf]

  29. How Fast can be Algebraic Attacks on Block Ciphers?. [Citation Graph (, )][DBLP]


  30. Algebraic and Slide Attacks on KeeLoq. [Citation Graph (, )][DBLP]


  31. Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. [Citation Graph (, )][DBLP]


  32. Algebraic Cryptanalysis of the Data Encryption Standard. [Citation Graph (, )][DBLP]


  33. Practical Algebraic Attacks on the Hitag2 Stream Cipher. [Citation Graph (, )][DBLP]


  34. The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. [Citation Graph (, )][DBLP]


  35. Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. [Citation Graph (, )][DBLP]


  36. SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002