|
Search the dblp DataBase
Frédéric Muller:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette
SCARE of the DES. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:393-406 [Conf]
- Lars R. Knudsen, Frédéric Muller
Some Attacks Against a Double Length Hash Proposal. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:462-473 [Conf]
- Sébastien Kunz-Jacques, Frédéric Muller
New Improvements of Davies-Murphy Cryptanalysis. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:425-442 [Conf]
- Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette
The Davies-Murphy Power Attack. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:451-467 [Conf]
- Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2006, pp:315-331 [Conf]
- Frédéric Muller
A New Attack against Khazad. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2003, pp:347-358 [Conf]
- Frédéric Muller
The MD2 Hash Function Is Not One-Way. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:214-229 [Conf]
- Frédéric Muller, Thomas Peyrin
Linear Cryptanalysis of the TSC Family of Stream Ciphers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:373-394 [Conf]
- Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP] CHES, 2004, pp:312-327 [Conf]
- Hervé Ledig, Frédéric Muller, Frédéric Valette
Enhancing Collision Attacks. [Citation Graph (0, 0)][DBLP] CHES, 2004, pp:176-190 [Conf]
- Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette
Power Attack on Small RSA Public Exponent. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:339-353 [Conf]
- Antoine Joux, Frédéric Muller
Loosening the KNOT. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:87-99 [Conf]
- Antoine Joux, Frédéric Muller
Two Attacks Against the HBB Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2005, pp:330-341 [Conf]
- Frédéric Muller
Differential Attacks against the Helix Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:94-108 [Conf]
- Antoine Joux, Frédéric Muller
Chosen-Ciphertext Attacks Against MOSQUITO. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:390-404 [Conf]
- Thomas Johansson, Willi Meier, Frédéric Muller
Cryptanalysis of Achterbahn. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:1-14 [Conf]
- Frédéric Muller, Thomas Peyrin
Cryptanalysis of T-Function-Based Hash Functions. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:267-285 [Conf]
- Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel
Cryptanalysis of the Tractable Rational Map Cryptosystem. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:258-274 [Conf]
- Frédéric Muller, Frédéric Valette
High-Order Attacks Against the Exponent Splitting Protection. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:315-329 [Conf]
- Éliane Jaulmes, Frédéric Muller
Cryptanalysis of the F-FCSR Stream Cipher Family. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2005, pp:20-35 [Conf]
- Antoine Joux, Frédéric Muller
A Chosen IV Attack Against Turing. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:194-207 [Conf]
Search in 0.004secs, Finished in 0.005secs
|