List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Cryptanalysis of MD2 Journal of Cryptology | 2010-03-01 | Paper |
| Loosening the KNOT. Lecture Notes in Computer Science | 2010-01-05 | Paper |
| A new attack against Khazad Lecture Notes in Computer Science | 2010-01-05 | Paper |
| Chosen-Ciphertext Attacks Against MOSQUITO Fast Software Encryption | 2009-04-02 | Paper |
| Cryptanalysis of Achterbahn Fast Software Encryption | 2009-04-02 | Paper |
| Power Attack on Small RSA Public Exponent Lecture Notes in Computer Science | 2008-08-29 | Paper |
| Cryptanalysis of T-Function-Based Hash Functions Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
| Combining Compression Functions and Block Cipher-Based Hash Functions Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
| New Improvements of Davies-Murphy Cryptanalysis Lecture Notes in Computer Science | 2008-03-18 | Paper |
| Some Attacks Against a Double Length Hash Proposal Lecture Notes in Computer Science | 2008-03-18 | Paper |
| Linear Cryptanalysis of the TSC Family of Stream Ciphers Lecture Notes in Computer Science | 2008-03-18 | Paper |
| Cryptanalysis of the F-FCSR Stream Cipher Family Selected Areas in Cryptography | 2007-11-15 | Paper |
| SCARE of the DES Applied Cryptography and Network Security | 2007-09-24 | Paper |
| Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
| Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
| Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
| Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
| Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| The MD2 Hash Function Is Not One-Way | 2005-08-12 | Paper |
| The Davies-Murphy Power Attack | 2005-08-12 | Paper |
Research outcomes over time
This page was built for person: Frédéric Muller