2006 |
21 | EE | Thomas Peyrin,
Henri Gilbert,
Frédéric Muller,
Matthew J. B. Robshaw:
Combining Compression Functions and Block Cipher-Based Hash Functions.
ASIACRYPT 2006: 315-331 |
20 | EE | Pierre-Alain Fouque,
Sébastien Kunz-Jacques,
Gwenaëlle Martinet,
Frédéric Muller,
Frédéric Valette:
Power Attack on Small RSA Public Exponent.
CHES 2006: 339-353 |
19 | EE | Thomas Johansson,
Willi Meier,
Frédéric Muller:
Cryptanalysis of Achterbahn.
FSE 2006: 1-14 |
18 | EE | Antoine Joux,
Frédéric Muller:
Chosen-Ciphertext Attacks Against MOSQUITO.
FSE 2006: 390-404 |
17 | EE | Frédéric Muller,
Thomas Peyrin:
Cryptanalysis of T-Function-Based Hash Functions.
ICISC 2006: 267-285 |
16 | EE | Frédéric Muller,
Frédéric Valette:
High-Order Attacks Against the Exponent Splitting Protection.
Public Key Cryptography 2006: 315-329 |
2005 |
15 | EE | Rémy Daudigny,
Hervé Ledig,
Frédéric Muller,
Frédéric Valette:
SCARE of the DES.
ACNS 2005: 393-406 |
14 | EE | Frédéric Muller,
Thomas Peyrin:
Linear Cryptanalysis of the TSC Family of Stream Ciphers.
ASIACRYPT 2005: 373-394 |
13 | EE | Sébastien Kunz-Jacques,
Frédéric Muller:
New Improvements of Davies-Murphy Cryptanalysis.
ASIACRYPT 2005: 425-442 |
12 | EE | Lars R. Knudsen,
Frédéric Muller:
Some Attacks Against a Double Length Hash Proposal.
ASIACRYPT 2005: 462-473 |
11 | EE | Antoine Joux,
Frédéric Muller:
Two Attacks Against the HBB Stream Cipher.
FSE 2005: 330-341 |
10 | EE | Antoine Joux,
Sébastien Kunz-Jacques,
Frédéric Muller,
Pierre-Michel Ricordel:
Cryptanalysis of the Tractable Rational Map Cryptosystem.
Public Key Cryptography 2005: 258-274 |
9 | EE | Éliane Jaulmes,
Frédéric Muller:
Cryptanalysis of the F-FCSR Stream Cipher Family.
Selected Areas in Cryptography 2005: 20-35 |
2004 |
8 | EE | Frédéric Muller:
The MD2 Hash Function Is Not One-Way.
ASIACRYPT 2004: 214-229 |
7 | EE | Sébastien Kunz-Jacques,
Frédéric Muller,
Frédéric Valette:
The Davies-Murphy Power Attack.
ASIACRYPT 2004: 451-467 |
6 | EE | Hervé Ledig,
Frédéric Muller,
Frédéric Valette:
Enhancing Collision Attacks.
CHES 2004: 176-190 |
5 | EE | Pierre-Alain Fouque,
Frédéric Muller,
Guillaume Poupard,
Frédéric Valette:
Defeating Countermeasures Based on Randomized BSD Representations.
CHES 2004: 312-327 |
4 | EE | Frédéric Muller:
Differential Attacks against the Helix Stream Cipher.
FSE 2004: 94-108 |
2003 |
3 | EE | Frédéric Muller:
A New Attack against Khazad.
ASIACRYPT 2003: 347-358 |
2 | EE | Antoine Joux,
Frédéric Muller:
Loosening the KNOT.
FSE 2003: 87-99 |
1 | EE | Antoine Joux,
Frédéric Muller:
A Chosen IV Attack Against Turing.
Selected Areas in Cryptography 2003: 194-207 |