Frédéric Muller

According to our database1, Frédéric Muller authored at least 22 papers between 2003 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Cryptanalysis of MD2.
J. Cryptol., 2010

2006
High-Order Attacks Against the Exponent Splitting Protection.
Proceedings of the Public Key Cryptography, 2006

Cryptanalysis of T-Function-Based Hash Functions.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Chosen-Ciphertext Attacks Against MOSQUITO.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Cryptanalysis of Achterbahn.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Power Attack on Small RSA Public Exponent.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Combining Compression Functions and Block Cipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2006

2005
Cryptanalysis of the F-FCSR Stream Cipher Family.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Cryptanalysis of the Tractable Rational Map Cryptosystem.
Proceedings of the Public Key Cryptography, 2005

Two Attacks Against the HBB Stream Cipher.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Proceedings of the Advances in Cryptology, 2005

New Improvements of Davies-Murphy Cryptanalysis.
Proceedings of the Advances in Cryptology, 2005

Some Attacks Against a Double Length Hash Proposal.
Proceedings of the Advances in Cryptology, 2005

SCARE of the DES.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Differential Attacks against the Helix Stream Cipher.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Enhancing Collision Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

Defeating Countermeasures Based on Randomized BSD Representations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

The MD2 Hash Function Is Not One-Way.
Proceedings of the Advances in Cryptology, 2004

The Davies-Murphy Power Attack.
Proceedings of the Advances in Cryptology, 2004

2003
A Chosen IV Attack Against Turing.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Loosening the KNOT.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

A New Attack against Khazad.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003


  Loading...