The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Frédéric Muller: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette
    SCARE of the DES. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:393-406 [Conf]
  2. Lars R. Knudsen, Frédéric Muller
    Some Attacks Against a Double Length Hash Proposal. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:462-473 [Conf]
  3. Sébastien Kunz-Jacques, Frédéric Muller
    New Improvements of Davies-Murphy Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:425-442 [Conf]
  4. Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette
    The Davies-Murphy Power Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:451-467 [Conf]
  5. Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
    Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:315-331 [Conf]
  6. Frédéric Muller
    A New Attack against Khazad. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:347-358 [Conf]
  7. Frédéric Muller
    The MD2 Hash Function Is Not One-Way. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:214-229 [Conf]
  8. Frédéric Muller, Thomas Peyrin
    Linear Cryptanalysis of the TSC Family of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:373-394 [Conf]
  9. Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
    Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:312-327 [Conf]
  10. Hervé Ledig, Frédéric Muller, Frédéric Valette
    Enhancing Collision Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:176-190 [Conf]
  11. Pierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette
    Power Attack on Small RSA Public Exponent. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:339-353 [Conf]
  12. Antoine Joux, Frédéric Muller
    Loosening the KNOT. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:87-99 [Conf]
  13. Antoine Joux, Frédéric Muller
    Two Attacks Against the HBB Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:330-341 [Conf]
  14. Frédéric Muller
    Differential Attacks against the Helix Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:94-108 [Conf]
  15. Antoine Joux, Frédéric Muller
    Chosen-Ciphertext Attacks Against MOSQUITO. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:390-404 [Conf]
  16. Thomas Johansson, Willi Meier, Frédéric Muller
    Cryptanalysis of Achterbahn. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:1-14 [Conf]
  17. Frédéric Muller, Thomas Peyrin
    Cryptanalysis of T-Function-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:267-285 [Conf]
  18. Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel
    Cryptanalysis of the Tractable Rational Map Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:258-274 [Conf]
  19. Frédéric Muller, Frédéric Valette
    High-Order Attacks Against the Exponent Splitting Protection. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:315-329 [Conf]
  20. Éliane Jaulmes, Frédéric Muller
    Cryptanalysis of the F-FCSR Stream Cipher Family. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:20-35 [Conf]
  21. Antoine Joux, Frédéric Muller
    A Chosen IV Attack Against Turing. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:194-207 [Conf]

Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002