What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Frédéric Muller
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2010
journals/joc
Cryptanalysis of MD2.
Lars R. Knudsen
John Erik Mathiassen
Frédéric Muller
Søren S. Thomsen
2006
conf/fse
Cryptanalysis of Achterbahn.
Thomas Johansson
Willi Meier
Frédéric Muller
2006
conf/fse
Chosen-Ciphertext Attacks Against MOSQUITO.
Antoine Joux
Frédéric Muller
2006
conf/icisc
Cryptanalysis of T-Function-Based Hash Functions.
Frédéric Muller
Thomas Peyrin
2006
conf/ches
Power Attack on Small RSA Public Exponent.
Pierre-Alain Fouque
Sébastien Kunz-Jacques
Gwenaëlle Martinet
Frédéric Muller
Frédéric Valette
2006
conf/pkc
High-Order Attacks Against the Exponent Splitting Protection.
Frédéric Muller
Frédéric Valette
2006
conf/asiacrypt
Combining Compression Functions and Block Cipher-Based Hash Functions.
Thomas Peyrin
Henri Gilbert
Frédéric Muller
Matthew J. B. Robshaw
2005
conf/fse
Two Attacks Against the HBB Stream Cipher.
Antoine Joux
Frédéric Muller
2005
conf/acns
SCARE of the DES.
Rémy Daudigny
Hervé Ledig
Frédéric Muller
Frédéric Valette
2005
conf/pkc
Cryptanalysis of the Tractable Rational Map Cryptosystem.
Antoine Joux
Sébastien Kunz-Jacques
Frédéric Muller
Pierre-Michel Ricordel
2005
conf/asiacrypt
Some Attacks Against a Double Length Hash Proposal.
Lars R. Knudsen
Frédéric Muller
2005
conf/asiacrypt
New Improvements of Davies-Murphy Cryptanalysis.
Sébastien Kunz-Jacques
Frédéric Muller
2005
conf/asiacrypt
Linear Cryptanalysis of the TSC Family of Stream Ciphers.
Frédéric Muller
Thomas Peyrin
2005
conf/sacrypt
Cryptanalysis of the F-FCSR Stream Cipher Family.
Éliane Jaulmes
Frédéric Muller
2004
conf/fse
Differential Attacks against the Helix Stream Cipher.
Frédéric Muller
2004
conf/ches
Enhancing Collision Attacks.
Hervé Ledig
Frédéric Muller
Frédéric Valette
2004
conf/ches
Defeating Countermeasures Based on Randomized BSD Representations.
Pierre-Alain Fouque
Frédéric Muller
Guillaume Poupard
Frédéric Valette
2004
conf/asiacrypt
The MD2 Hash Function Is Not One-Way.
Frédéric Muller
2004
conf/asiacrypt
The Davies-Murphy Power Attack.
Sébastien Kunz-Jacques
Frédéric Muller
Frédéric Valette
2003
conf/fse
Loosening the KNOT.
Antoine Joux
Frédéric Muller
2003
conf/asiacrypt
A New Attack against Khazad.
Frédéric Muller
2003
conf/sacrypt
A Chosen IV Attack Against Turing.
Antoine Joux
Frédéric Muller
Coauthors
Antoine Joux
(5)
Éliane Jaulmes
(1)
Frédéric Muller
(22)
Frédéric Valette
(6)
Guillaume Poupard
(1)
Gwenaëlle Martinet
(1)
Henri Gilbert
(1)
Hervé Ledig
(2)
John Erik Mathiassen
(1)
Lars R. Knudsen
(2)
Matthew J. B. Robshaw
(1)
Pierre-Alain Fouque
(2)
Pierre-Michel Ricordel
(1)
Rémy Daudigny
(1)
Sébastien Kunz-Jacques
(4)
Søren S. Thomsen
(1)
Thomas Johansson
(1)
Thomas Peyrin
(3)
Willi Meier
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to