Algebraic attacks on stream ciphers with linear feedback NT Courtois, W Meier Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 1402 | 2003 |
Cryptanalysis of block ciphers with overdefined systems of equations NT Courtois, J Pieprzyk Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002 | 1317 | 2002 |
Efficient algorithms for solving overdefined systems of multivariate polynomial equations N Courtois, A Klimov, J Patarin, A Shamir International Conference on the Theory and Applications of Cryptographic …, 2000 | 1207 | 2000 |
Fast algebraic attacks on stream ciphers with linear feedback NT Courtois Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003 | 814 | 2003 |
How to achieve a McEliece-based digital signature scheme NT Courtois, M Finiasz, N Sendrier Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 677 | 2001 |
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt NT Courtois Information Security and Cryptology—ICISC 2002: 5th International …, 2003 | 332 | 2003 |
Cryptanalysis of the TTM cryptosystem L Goubin, NT Courtois Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000 | 302 | 2000 |
Algebraic cryptanalysis of the data encryption standard NT Courtois, GV Bard Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007 | 298 | 2007 |
On subversive miner strategies and block withholding attack in bitcoin digital currency NT Courtois, L Bahack arXiv preprint arXiv:1402.1718, 2014 | 283 | 2014 |
QUARTZ, 128-Bit Long Digital Signatures: http://www. minrank. org/quartz J Patarin, N Courtois, L Goubin Cryptographers’ Track at the RSA Conference, 282-297, 2001 | 230 | 2001 |
Algebraic and slide attacks on KeeLoq NT Courtois, GV Bard, D Wagner Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 221 | 2008 |
Sosemanuk, a Fast Software-Oriented Stream Cipher C Berbain, O Billet, A Canteaut, N Courtois, H Gilbert, L Goubin, A Gouget, ... New Stream Cipher Designs: The eSTREAM Finalists, 98-118, 2008 | 219 | 2008 |
The security of hidden field equations (HFE) NT Courtois Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001 | 214 | 2001 |
C −+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai J Patarin, L Goubin, N Courtois Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998 | 196 | 1998 |
Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF (2) via SAT-solvers GV Bard, NT Courtois, C Jefferson Cryptology ePrint Archive, 2007 | 189 | 2007 |
FLASH, a Fast Multivariate Signature Algorithm: http://www. minrank. org/flash J Patarin, N Courtois, L Goubin Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001 | 177 | 2001 |
Algebraic attacks on combiners with memory and several outputs NT Courtois Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 159 | 2005 |
About the XL Algorithm over GF(2) NT Courtois, J Patarin Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003 | 142 | 2003 |
Improved algorithms for isomorphisms of polynomials J Patarin, L Goubin, N Courtois International Conference on the Theory and Applications of Cryptographic …, 1998 | 138 | 1998 |
Optimizing sha256 in bitcoin mining NT Courtois, M Grajek, R Naik Cryptography and Security Systems: Third International Conference, CSS 2014 …, 2014 | 128 | 2014 |