Follow
Nicolas T. Courtois
Nicolas T. Courtois
Qualcomm Sophia Antipolis
Verified email at bettercrypto.com - Homepage
Title
Cited by
Cited by
Year
Algebraic attacks on stream ciphers with linear feedback
NT Courtois, W Meier
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
14022003
Cryptanalysis of block ciphers with overdefined systems of equations
NT Courtois, J Pieprzyk
Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002
13172002
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
N Courtois, A Klimov, J Patarin, A Shamir
International Conference on the Theory and Applications of Cryptographic …, 2000
12072000
Fast algebraic attacks on stream ciphers with linear feedback
NT Courtois
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
8142003
How to achieve a McEliece-based digital signature scheme
NT Courtois, M Finiasz, N Sendrier
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
6772001
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
NT Courtois
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
3322003
Cryptanalysis of the TTM cryptosystem
L Goubin, NT Courtois
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
3022000
Algebraic cryptanalysis of the data encryption standard
NT Courtois, GV Bard
Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007
2982007
On subversive miner strategies and block withholding attack in bitcoin digital currency
NT Courtois, L Bahack
arXiv preprint arXiv:1402.1718, 2014
2832014
QUARTZ, 128-Bit Long Digital Signatures: http://www. minrank. org/quartz
J Patarin, N Courtois, L Goubin
Cryptographers’ Track at the RSA Conference, 282-297, 2001
2302001
Algebraic and slide attacks on KeeLoq
NT Courtois, GV Bard, D Wagner
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
2212008
Sosemanuk, a Fast Software-Oriented Stream Cipher
C Berbain, O Billet, A Canteaut, N Courtois, H Gilbert, L Goubin, A Gouget, ...
New Stream Cipher Designs: The eSTREAM Finalists, 98-118, 2008
2192008
The security of hidden field equations (HFE)
NT Courtois
Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001
2142001
C −+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai
J Patarin, L Goubin, N Courtois
Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998
1961998
Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF (2) via SAT-solvers
GV Bard, NT Courtois, C Jefferson
Cryptology ePrint Archive, 2007
1892007
FLASH, a Fast Multivariate Signature Algorithm: http://www. minrank. org/flash
J Patarin, N Courtois, L Goubin
Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001
1772001
Algebraic attacks on combiners with memory and several outputs
NT Courtois
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
1592005
About the XL Algorithm over GF(2)
NT Courtois, J Patarin
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
1422003
Improved algorithms for isomorphisms of polynomials
J Patarin, L Goubin, N Courtois
International Conference on the Theory and Applications of Cryptographic …, 1998
1381998
Optimizing sha256 in bitcoin mining
NT Courtois, M Grajek, R Naik
Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014
1282014
The system can't perform the operation now. Try again later.
Articles 1–20