dblp.uni-trier.dewww.uni-trier.de

Frédéric Muller

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
21EEThomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw: Combining Compression Functions and Block Cipher-Based Hash Functions. ASIACRYPT 2006: 315-331
20EEPierre-Alain Fouque, Sébastien Kunz-Jacques, Gwenaëlle Martinet, Frédéric Muller, Frédéric Valette: Power Attack on Small RSA Public Exponent. CHES 2006: 339-353
19EEThomas Johansson, Willi Meier, Frédéric Muller: Cryptanalysis of Achterbahn. FSE 2006: 1-14
18EEAntoine Joux, Frédéric Muller: Chosen-Ciphertext Attacks Against MOSQUITO. FSE 2006: 390-404
17EEFrédéric Muller, Thomas Peyrin: Cryptanalysis of T-Function-Based Hash Functions. ICISC 2006: 267-285
16EEFrédéric Muller, Frédéric Valette: High-Order Attacks Against the Exponent Splitting Protection. Public Key Cryptography 2006: 315-329
2005
15EERémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette: SCARE of the DES. ACNS 2005: 393-406
14EEFrédéric Muller, Thomas Peyrin: Linear Cryptanalysis of the TSC Family of Stream Ciphers. ASIACRYPT 2005: 373-394
13EESébastien Kunz-Jacques, Frédéric Muller: New Improvements of Davies-Murphy Cryptanalysis. ASIACRYPT 2005: 425-442
12EELars R. Knudsen, Frédéric Muller: Some Attacks Against a Double Length Hash Proposal. ASIACRYPT 2005: 462-473
11EEAntoine Joux, Frédéric Muller: Two Attacks Against the HBB Stream Cipher. FSE 2005: 330-341
10EEAntoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel: Cryptanalysis of the Tractable Rational Map Cryptosystem. Public Key Cryptography 2005: 258-274
9EEÉliane Jaulmes, Frédéric Muller: Cryptanalysis of the F-FCSR Stream Cipher Family. Selected Areas in Cryptography 2005: 20-35
2004
8EEFrédéric Muller: The MD2 Hash Function Is Not One-Way. ASIACRYPT 2004: 214-229
7EESébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette: The Davies-Murphy Power Attack. ASIACRYPT 2004: 451-467
6EEHervé Ledig, Frédéric Muller, Frédéric Valette: Enhancing Collision Attacks. CHES 2004: 176-190
5EEPierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette: Defeating Countermeasures Based on Randomized BSD Representations. CHES 2004: 312-327
4EEFrédéric Muller: Differential Attacks against the Helix Stream Cipher. FSE 2004: 94-108
2003
3EEFrédéric Muller: A New Attack against Khazad. ASIACRYPT 2003: 347-358
2EEAntoine Joux, Frédéric Muller: Loosening the KNOT. FSE 2003: 87-99
1EEAntoine Joux, Frédéric Muller: A Chosen IV Attack Against Turing. Selected Areas in Cryptography 2003: 194-207

Coauthor Index

1Rémy Daudigny [15]
2Pierre-Alain Fouque [5] [20]
3Henri Gilbert [21]
4Éliane Jaulmes [9]
5Thomas Johansson [19]
6Antoine Joux [1] [2] [10] [11] [18]
7Lars R. Knudsen [12]
8Sébastien Kunz-Jacques [7] [10] [13] [20]
9Hervé Ledig [6] [15]
10Gwenaëlle Martinet [20]
11Willi Meier [19]
12Thomas Peyrin [14] [17] [21]
13Guillaume Poupard [5]
14Pierre-Michel Ricordel [10]
15Matthew J. B. Robshaw [21]
16Frédéric Valette [5] [6] [7] [15] [16] [20]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)