Nicolas T. Courtois

According to our database1, Nicolas T. Courtois authored at least 109 papers between 1998 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
On latin squares, invariant differentials, random permutations and historical Enigma rotors.
Cryptologia, 2022

2021
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES.
IACR Cryptol. ePrint Arch., 2021

A nonlinear invariant attack on T-310 with the original Boolean function.
Cryptologia, 2021

Crypto Currency Regulation and Law Enforcement Perspectives.
CoRR, 2021

2020
Construction of a polynomial invariant annihilation attack of degree 7 for T-310.
Cryptologia, 2020

Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310.
Cryptologia, 2020

Invariant Hopping Attacks on Block Ciphers.
CoRR, 2020

Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Linear cryptanalysis and block cipher design in East Germany in the 1970s.
Cryptologia, 2019

Slide attacks and LC-weak keys in T-310.
Cryptologia, 2019

Lack of Unique Factorization as a Tool in Block Cipher Cryptanalysis.
CoRR, 2019

Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher.
CoRR, 2019

Distributed Ledger Privacy: Ring Signatures, Möbius and CryptoNote.
CoRR, 2019

Systematic Construction of Nonlinear Product Attacks on Block Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions.
IACR Cryptol. ePrint Arch., 2018

On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers.
IACR Cryptol. ePrint Arch., 2018

Ciphertext-only attacks and weak long-term keys in T-310.
Cryptologia, 2018

Feistel ciphers in East Germany in the communist era.
Cryptologia, 2018

Decryption oracle slide attacks on T-310.
Cryptologia, 2018

The Evolution of Embedding Metadata in Blockchain Transactions.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Cryptographic Security Analysis of T-310.
IACR Cryptol. ePrint Arch., 2017

Stealth Address and Key Management Techniques in Blockchain Systems.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

On Feasibility and Performance of Rowhammmer Attack.
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017

2016
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations.
Int. J. Inf. Sec., 2016

Speed Optimizations in Bitcoin Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2016

High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem.
IACR Cryptol. ePrint Arch., 2016

On Splitting a Point with Summation Polynomials in Binary Elliptic Curves.
IACR Cryptol. ePrint Arch., 2016

Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2015
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers.
IACR Cryptol. ePrint Arch., 2015

Can GOST Be Made Secure Against Differential Cryptanalysis?
Cryptologia, 2015

On Multiple Symmetric Fixed Points in GOST.
Cryptologia, 2015

On Detection of Bitcoin Mining Redirection Attacks.
Proceedings of the ICISSP 2015, 2015

2014
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of Two GOST Variants with 128-Bit Keys.
Cryptologia, 2014

On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency.
CoRR, 2014

On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies.
CoRR, 2014

Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon.
Proceedings of the SECRYPT 2014, 2014

Could Bitcoin Transactions Be 100x Faster?.
Proceedings of the SECRYPT 2014, 2014

Optimizing SHA256 in Bitcoin Mining.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

2013
Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors.
IACR Cryptol. ePrint Arch., 2013

Low-Complexity Key Recovery Attacks on GOST Block Cipher.
Cryptologia, 2013

The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining.
CoRR, 2013

On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Enhanced Truncated Differential Cryptanalysis of GOST.
Proceedings of the SECRYPT 2013, 2013

2012
Aggregated differentials and cryptanalysis of PP-1 and gost.
Period. Math. Hung., 2012

An Improved Differential Attack on Full GOST.
IACR Cryptol. ePrint Arch., 2012

Security Evaluation of GOST 28147-89 in View of International Standardisation.
Cryptologia, 2012

Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers.
Cryptologia, 2012

Extension of de Weger's Attack on RSA with Large Public Keys.
Proceedings of the SECRYPT 2012, 2012

ElimLin Algorithm Revisited.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Self-similarity Attacks on Block Ciphers and Application to KeeLoq.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Differential Cryptanalysis of GOST.
IACR Cryptol. ePrint Arch., 2011

Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis.
IACR Cryptol. ePrint Arch., 2011

Algebraic Complexity Reduction and Cryptanalysis of GOST.
IACR Cryptol. ePrint Arch., 2011

A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications
CoRR, 2011

Black-box Collision Attacks on the Compression Function of the GOST Hash Function.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.
Proceedings of the 5th International Conference on Network and System Security, 2011

First Differential Attack on Full 32-Round GOST.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime.
IACR Cryptol. ePrint Arch., 2009

Practical Algebraic Attacks on the Hitag2 Stream Cipher.
Proceedings of the Information Security, 12th International Conference, 2009

2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards.
IACR Cryptol. ePrint Arch., 2008

SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Algebraic and Slide Attacks on KeeLoq.
IACR Cryptol. ePrint Arch., 2007

CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited.
IACR Cryptol. ePrint Arch., 2007

Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers.
IACR Cryptol. ePrint Arch., 2007

Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

2006
Algebraic Cryptanalysis of the Data Encryption Standard.
IACR Cryptol. ePrint Arch., 2006

How Fast can be Algebraic Attacks on Block Ciphers ?
IACR Cryptol. ePrint Arch., 2006

2005
An Algebraic Masking Method to Protect AES Against Power Attacks.
IACR Cryptol. ePrint Arch., 2005

On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions.
IACR Cryptol. ePrint Arch., 2005

Feistel Schemes and Bi-Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of Sfinks.
IACR Cryptol. ePrint Arch., 2005

The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES.
IACR Cryptol. ePrint Arch., 2005

Analysis of the Bit-Search Generator and Sequence Compression Techniques.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash.
IACR Cryptol. ePrint Arch., 2004

Algebraic Attacks over GF(2<sup>k</sup>), Application to HFE Challenge 2 and Sflash-v2.
Proceedings of the Public Key Cryptography, 2004

On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

General Principles of Algebraic Attacks and New Design Criteria for Cipher Components.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Did Filiol Break AES ?
IACR Cryptol. ePrint Arch., 2003

SFLASHv3, a fast asymmetric signature scheme.
IACR Cryptol. ePrint Arch., 2003

What do DES S-boxes Say to Each Other ?
IACR Cryptol. ePrint Arch., 2003

Algebraic Attacks on Combiners with Memory and Several Outputs.
IACR Cryptol. ePrint Arch., 2003

Generic Attacks and the Security of Quartz.
Proceedings of the Public Key Cryptography, 2003

A Fast and Secure Implementation of Sflash.
Proceedings of the Public Key Cryptography, 2003

Algebraic Attacks on Stream Ciphers with Linear Feedback.
Proceedings of the Advances in Cryptology, 2003

About the XL Algorithm over GF(2).
Proceedings of the Topics in Cryptology, 2003

Fast Algebraic Attacks on Stream Ciphers with Linear Feedback.
Proceedings of the Advances in Cryptology, 2003

2002
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations.
IACR Cryptol. ePrint Arch., 2002

On the Security of HFE, HFEv- and Quartz.
IACR Cryptol. ePrint Arch., 2002

About Filliol's Observations on DES, AES and Hash Functions (draft).
IACR Cryptol. ePrint Arch., 2002

Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt.
IACR Cryptol. ePrint Arch., 2002

Solving Underdefined Systems of Multivariate Quadratic Equations.
Proceedings of the Public Key Cryptography, 2002

2001
How to achieve a McEliece-based Digital Signature Scheme.
IACR Cryptol. ePrint Arch., 2001

Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank.
IACR Cryptol. ePrint Arch., 2001

On multivariate signature-only public key cryptosystems.
IACR Cryptol. ePrint Arch., 2001

FLASH, a Fast Multivariate Signature Algorithm.
Proceedings of the Topics in Cryptology, 2001

QUARTZ, 128-Bit Long Digital Signatures.
Proceedings of the Topics in Cryptology, 2001

The Security of Hidden Field Equations (HFE).
Proceedings of the Topics in Cryptology, 2001

2000
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Proceedings of the Advances in Cryptology, 2000

Cryptanalysis of the TTM Cryptosystem.
Proceedings of the Advances in Cryptology, 2000

1998
Improved Algorithms for Isomorphisms of Polynomials.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

<i>C</i><sup>*</sup><sub>-+</sub> and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
Proceedings of the Advances in Cryptology, 1998


  Loading...