Nicolas Courtois

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Can a differential attack work for an arbitrarily large number of rounds?2022-03-24Paper
Systematic construction of nonlinear product attacks on block ciphers2020-07-08Paper
Invariant Hopping Attacks on Block Ciphers2020-02-08Paper
How many weak-keys exist in T-310?
Tatra Mountains Mathematical Publications
2019-09-30Paper
Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher2019-02-07Paper
Two philosophies for solving non-linear equations in algebraic cryptanalysis2017-10-23Paper
On optimal size in truncated differential attacks
Studia Scientiarum Mathematicarum Hungarica
2017-03-31Paper
Speed optimizations in bitcoin key recovery attacks
Tatra Mountains Mathematical Publications
2017-03-29Paper
An improved differential attack on full GOST
The New Codebreakers
2016-05-02Paper
Advanced truncated differential attacks against GOST block cipher and its variants
Computation, Cryptography, and Network Security
2016-03-04Paper
Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers
Tatra Mountains Mathematical Publications
2016-02-24Paper
Cryptanalysis of GOST in the multiple-key scenario
Tatra Mountains Mathematical Publications
2014-03-14Paper
Aggregated differentials and cryptanalysis of PP-1 and GOST
Periodica Mathematica Hungarica
2013-08-06Paper
Contradiction immunity and guess-then-determine attacks on GOST
Tatra Mountains Mathematical Publications
2013-02-11Paper
ElimLin algorithm revisited
Fast Software Encryption
2013-01-08Paper
Self-similarity attacks on block ciphers and application to KeeLoq
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Random permutation statistics and an improved slide-determine attack on KeeLoq
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Practical Algebraic Attacks on the Hitag2 Stream Cipher
Lecture Notes in Computer Science
2009-09-29Paper
Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers2009-05-22Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts
Research in Cryptology
2009-01-22Paper
Algebraic and Slide Attacks on KeeLoq
Fast Software Encryption
2008-09-18Paper
Algebraic Attacks on Combiners with Memory and Several Outputs
Lecture Notes in Computer Science
2008-03-17Paper
Algebraic Cryptanalysis of the Data Encryption Standard
Cryptography and Coding
2008-03-07Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
On Exact Algebraic [Non-Immunity of S-Boxes Based on Power Functions]
Information Security and Privacy
2007-09-07Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Efficient algorithms for solving overdefined systems of multivariate polynomial equations2006-03-01Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
scientific article; zbMATH DE number 2085432 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2081064 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081078 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2009966 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1962148 (Why is no real title available?)2003-08-10Paper
A Fast and Secure Implementation of Sflash
Public Key Cryptography — PKC 2003
2003-07-27Paper
On the Security of HFE, HFEv- and Quartz
Public Key Cryptography — PKC 2003
2003-07-27Paper
Generic Attacks and the Security of Quartz
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1950612 (Why is no real title available?)2003-07-17Paper
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1617932 (Why is no real title available?)2002-09-01Paper
scientific article; zbMATH DE number 1617934 (Why is no real title available?)2001-11-18Paper
scientific article; zbMATH DE number 1617933 (Why is no real title available?)2001-07-12Paper
scientific article; zbMATH DE number 1583768 (Why is no real title available?)2001-07-03Paper
scientific article; zbMATH DE number 1302783 (Why is no real title available?)1999-10-06Paper
scientific article; zbMATH DE number 1303122 (Why is no real title available?)1999-09-06Paper


Research outcomes over time


This page was built for person: Nicolas Courtois