Search the dblp DataBase
Nicolas Courtois :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Nicolas Courtois , Blandine Debraize , Eric Garrido On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:76-86 [Conf ] Nicolas Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. [Citation Graph (0, 0)][DBLP ] AES Conference, 2004, pp:67-83 [Conf ] Nicolas Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. [Citation Graph (0, 0)][DBLP ] AES Conference, 2004, pp:170-188 [Conf ] Nicolas Courtois Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:402-421 [Conf ] Nicolas Courtois , Matthieu Finiasz , Nicolas Sendrier How to Achieve a McEliece-Based Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:157-174 [Conf ] Nicolas Courtois , Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:267-287 [Conf ] Louis Goubin , Nicolas Courtois Cryptanalysis of the TTM Cryptosystem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:44-57 [Conf ] Jacques Patarin , Louis Goubin , Nicolas Courtois C * -+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:35-49 [Conf ] Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:176-194 [Conf ] Nicolas Courtois Feistel Schemes and Bi-linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:23-40 [Conf ] Nicolas Courtois The Security of Hidden Field Equations (HFE). [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:266-281 [Conf ] Nicolas Courtois , Jacques Patarin About the XL Algorithm over GF(2). [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:141-157 [Conf ] Jacques Patarin , Nicolas Courtois , Louis Goubin QUARTZ, 128-Bit Long Digital Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:282-297 [Conf ] Jacques Patarin , Nicolas Courtois , Louis Goubin FLASH, a Fast Multivariate Signature Algorithm. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:298-307 [Conf ] Nicolas Courtois , Alexander Klimov , Jacques Patarin , Adi Shamir Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:392-407 [Conf ] Nicolas Courtois , Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:345-359 [Conf ] Jacques Patarin , Louis Goubin , Nicolas Courtois Improved Algorithms for Isomorphisms of Polynomials. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:184-200 [Conf ] Aline Gouget , Hervé Sibert , Côme Berbain , Nicolas Courtois , Blandine Debraize , Chris J. Mitchell Analysis of the Bit-Search Generator and Sequence Compression Techniques. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:196-214 [Conf ] Bo-Yin Yang , Jiun-Ming Chen , Nicolas Courtois On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:401-413 [Conf ] Nicolas Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:182-199 [Conf ] Nicolas Courtois Algebraic Attacks on Combiners with Memory and Several Outputs. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:3-20 [Conf ] Nicolas Courtois Cryptanalysis of Sfinks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:261-269 [Conf ] Nicolas Courtois , Louis Goubin An Algebraic Masking Method to Protect AES Against Power Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:199-209 [Conf ] Mehdi-Laurent Akkar , Nicolas Courtois , Romain Duteuil , Louis Goubin A Fast and Secure Implementation of Sflash. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:267-278 [Conf ] Nicolas Courtois Generic Attacks and the Security of Quartz. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:351-364 [Conf ] Nicolas Courtois Algebraic Attacks over GF(2k ), Application to HFE Challenge 2 and Sflash-v2. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:201-217 [Conf ] Nicolas Courtois , Magnus Daum , Patrick Felke On the Security of HFE, HFEv- and Quartz. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:337-350 [Conf ] Nicolas Courtois , Louis Goubin , Willi Meier , Jean-Daniel Tacier Solving Underdefined Systems of Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:211-227 [Conf ] How Fast can be Algebraic Attacks on Block Ciphers?. [Citation Graph (, )][DBLP ] Algebraic and Slide Attacks on KeeLoq. [Citation Graph (, )][DBLP ] Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. [Citation Graph (, )][DBLP ] Algebraic Cryptanalysis of the Data Encryption Standard. [Citation Graph (, )][DBLP ] Practical Algebraic Attacks on the Hitag2 Stream Cipher. [Citation Graph (, )][DBLP ] The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. [Citation Graph (, )][DBLP ] Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. [Citation Graph (, )][DBLP ] SOSEMANUK: a fast software-oriented stream cipher [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs