Nicolas T. Courtois
Orcid: 0000-0003-0736-431X
According to our database1,
Nicolas T. Courtois
authored at least 110 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
On Maximum Size Simultaneous Linear Approximations in Ascon and Keccak and Related Translation and Differential Properties.
IACR Cryptol. ePrint Arch., 2024
2022
On latin squares, invariant differentials, random permutations and historical Enigma rotors.
Cryptologia, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Cryptologia, 2021
2020
Cryptologia, 2020
Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310.
Cryptologia, 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
Cryptologia, 2019
CoRR, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions.
IACR Cryptol. ePrint Arch., 2018
On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security, 2017
2016
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations.
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
2015
Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the ICISSP 2015, 2015
2014
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events.
IACR Cryptol. ePrint Arch., 2014
On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency.
CoRR, 2014
CoRR, 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the SECRYPT 2013, 2013
2012
Period. Math. Hung., 2012
Cryptologia, 2012
Cryptologia, 2012
Extension of de Weger's Attack on RSA with Large Public Keys.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
CoRR, 2011
Black-box Collision Attacks on the Compression Function of the GOST Hash Function.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security, 12th International Conference, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
IACR Cryptol. ePrint Arch., 2008
Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers.
IACR Cryptol. ePrint Arch., 2007
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash.
IACR Cryptol. ePrint Arch., 2004
Algebraic Attacks over GF(2<sup>k</sup>), Application to HFE Challenge 2 and Sflash-v2.
Proceedings of the Public Key Cryptography, 2004
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Public Key Cryptography, 2002
2001
IACR Cryptol. ePrint Arch., 2001
IACR Cryptol. ePrint Arch., 2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Topics in Cryptology, 2001
2000
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
<i>C</i><sup>*</sup><sub>-+</sub> and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.
Proceedings of the Advances in Cryptology, 1998