Nicolas Courtois
French and British cryptographer
Nicolas Courtois's AcademicInfluence.com Rankings
Download Badge
Computer Science Mathematics
Nicolas Courtois's Degrees
- Bachelors Mathematics Université Paris Cité
Similar Degrees You Can Earn
Why Is Nicolas Courtois Influential?
(Suggest an Edit or Addition)According to Wikipedia, Nicolas Tadeusz Courtois is a cryptographer and senior lecturer in computer science at University College London. Courtois was one of the co-authors of both the XSL attack against block ciphers, such as the Advanced Encryption Standard, and the XL system for solving systems of algebraic equations used in the attack. Other cryptographic results of Courtois include algebraic attacks on stream ciphers, attacks on the KeeLoq and Hitag 2 systems used for remote keyless automobile entry systems, and an analysis of cryptographic weaknesses in public transit smart cards including the London Underground Oyster card and the Dutch OV-chipkaart. More recently, he has written about cryptocurrency.
Nicolas Courtois's Published Works
Published Works
- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations (2002) (873)
- Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations (2000) (839)
- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback (2003) (752)
- Algebraic Attacks on Stream Ciphers with Linear Feedback (2003) (732)
- How to Achieve a McEliece-Based Digital Signature Scheme (2001) (402)
- Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt (2002) (224)
- Cryptanalysis of the TTM Cryptosystem (2000) (217)
- Algebraic Cryptanalysis of the Data Encryption Standard (2007) (210)
- QUARTZ, 128-Bit Long Digital Signatures (2001) (207)
- On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency (2014) (204)
- Algebraic and Slide Attacks on KeeLoq (2008) (164)
- The Security of Hidden Field Equations (HFE) (2001) (162)
- Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers (2007) (151)
- Sosemanuk, a Fast Software-Oriented Stream Cipher (2008) (143)
- FLASH, a Fast Multivariate Signature Algorithm (2001) (143)
- C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai (1998) (135)
- Algebraic Attacks on Combiners with Memory and Several Outputs (2004) (120)
- About the XL Algorithm over GF(2) (2003) (113)
- Improved Algorithms for Isomorphisms of Polynomials (1998) (112)
- Solving Underdefined Systems of Multivariate Quadratic Equations (2002) (94)
- The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime (2009) (93)
- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank (2001) (86)
- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis (2004) (86)
- On the Security of HFE, HFEv- and Quartz (2003) (86)
- Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards (2008) (83)
- A Fast and Secure Implementation of Sflash (2003) (75)
- Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis (2011) (73)
- Optimizing SHA256 in Bitcoin Mining (2014) (71)
- Algebraic Complexity Reduction and Cryptanalysis of GOST (2011) (67)
- Practical Algebraic Attacks on the Hitag2 Stream Cipher (2009) (64)
- Cryptanalysis of Sfinks (2005) (64)
- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers (2010) (60)
- Stealth Address and Key Management Techniques in Blockchain Systems (2017) (56)
- Security Evaluation of GOST 28147-89 in View of International Standardisation (2012) (56)
- How Fast can be Algebraic Attacks on Block Ciphers ? (2006) (55)
- SFLASHv3, a fast asymmetric signature scheme (2003) (55)
- Feistel Schemes and Bi-linear Cryptanalysis (2004) (52)
- The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers (2004) (46)
- On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies (2014) (46)
- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions (2006) (41)
- The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining (2013) (38)
- Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 (2004) (38)
- General Principles of Algebraic Attacks and New Design Criteria for Cipher Components (2004) (37)
- Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events (2014) (32)
- An Improved Differential Attack on Full GOST (2015) (30)
- ElimLin Algorithm Revisited (2012) (28)
- CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited (2007) (28)
- Aggregated differentials and cryptanalysis of PP-1 and gost (2012) (28)
- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0 (2008) (27)
- A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications (2011) (27)
- An Algebraic Masking Method to Protect AES Against Power Attacks (2005) (27)
- Could Bitcoin transactions be 100x faster? (2014) (26)
- Differential Cryptanalysis of GOST (2011) (26)
- DECIM, a new stream cipher for hardware applications (2005) (25)
- Contradiction Immunity and Guess-Then-Determine Attacks on Gost (2012) (23)
- Speed Optimizations in Bitcoin Key Recovery Attacks (2016) (23)
- Combined algebraic and truncated differential cryptanalysis on reduced-round SIMON (2014) (22)
- Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash (2004) (21)
- What do DES S-boxes Say to Each Other ? (2003) (21)
- Generic Attacks and the Security of Quartz (2003) (20)
- Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers (2015) (19)
- Analysis of the Bit-Search Generator and Sequence Compression Techniques (2005) (17)
- Low-Complexity Key Recovery Attacks on GOST Block Cipher (2013) (17)
- Can GOST Be Made Secure Against Differential Cryptanalysis? (2015) (17)
- Cryptographic Security Analysis of T-310 (2017) (16)
- Feistel ciphers in East Germany in the communist era (2018) (16)
- Linear cryptanalysis and block cipher design in East Germany in the 1970s (2018) (16)
- Ciphertext-only attacks and weak long-term keys in T-310 (2018) (15)
- First Differential Attack on Full 32-Round GOST (2011) (15)
- Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication (2011) (15)
- Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers (2009) (15)
- On selection of samples in algebraic attacks and a new technique to find hidden low degree equations (2014) (15)
- The Evolution of Embedding Metadata in Blockchain Transactions (2018) (14)
- Multiplicative Complexity and Solving Generalized Brent Equations With SAT Solvers (2012) (14)
- Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq (2008) (14)
- Enhanced truncated differential cryptanalysis of GOST (2013) (14)
- On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers (2018) (14)
- Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts (2007) (14)
- Exact Logic Minimization and Multiplicative Complexity of Concrete Algebraic and Cryptographic Circuits (2013) (13)
- Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions (2018) (12)
- Propagation of Truncated Differentials in GOST (2013) (11)
- On Multiple Symmetric Fixed Points in GOST (2015) (10)
- On Bad Randomness and Cloning of Contactless Payment and Building Smart Cards (2013) (9)
- The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES (2005) (9)
- Slide attacks and LC-weak keys in T-310 (2019) (8)
- Features or Bugs: The Seven Sins of Current Bitcoin (2016) (8)
- Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq (2012) (7)
- Invariant Hopping Attacks on Block Ciphers (2020) (7)
- CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO (2013) (7)
- Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher (2019) (6)
- On detection of bitcoin mining redirection attacks (2015) (6)
- Solving Optimisation Problems in Cryptography, Its Implementation and Cryptanalysis, (2011) (6)
- Systematic Construction of Nonlinear Product Attacks on Block Ciphers (2019) (6)
- Lack of Unique Factorization as a Tool in Block Cipher Cryptanalysis (2019) (6)
- Did Filiol Break AES ? (2003) (6)
- On Optimal Size in Truncated Differential Attacks (2015) (6)
- Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310 (2019) (6)
- Feistel Schemes and Bi-linear Cryptanalysis (Extended Abstract) (2004) (6)
- Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon (2016) (5)
- Self-similarity Attacks on Block Ciphers and Application to KeeLoq (2012) (5)
- Decryption oracle slide attacks on T-310 (2018) (5)
- On multivariate signature-only public key cryptosystems (2001) (5)
- Black-box collision attacks on the compression function of the GOST Hash function (2011) (5)
- Construction of a polynomial invariant annihilation attack of degree 7 for T-310 (2020) (4)
- Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants (2015) (4)
- Cryptanalysis of Two GOST Variants with 128-Bit Keys (2014) (4)
- Advanced Differential Cryptanalysis and GOST Cipher (2013) (3)
- On Feasibility and Performance of Rowhammmer Attack (2017) (3)
- On the Method of "xl" and Its Ineeciency to Ttm (2000) (3)
- Quartz , an asymmetric signature scheme for short signatures on PC Primitive specification and supporting documentation (2001) (3)
- Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers (2016) (2)
- A nonlinear invariant attack on T-310 with the original Boolean function (2020) (2)
- High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem (2016) (2)
- Distributed Ledger Privacy: Ring Signatures, Möbius and CryptoNote (2019) (2)
- How Many Weak-Keys Exist in T-310 ? (2019) (2)
- Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors (2013) (2)
- Crypto Currency Regulation and Law Enforcement Perspectives (2021) (2)
- DECIM−128 ∗ (2006) (1)
- On weak rotors, Latin squares, linear algebraic representations, invariant differentials and cryptanalysis of Enigma (2021) (1)
- Privilege Escalation and Combination Attacks on HD Wallet Systems in Bitcoin (2015) (1)
- Sliding Attacks, Ciphers with Small Blocks and Recent Attacks on KeeLoq (2007) (1)
- Optimising the SHA256 Hashing Algorithm for Faster & More Efficient Bitcoin Mining (2013) (1)
- Can a Differential Attack Work for an Arbitrarily Large Number of Rounds? (2020) (1)
- Two Philosophies for Solving Non-linear Equations in Algebraic Cryptanalysis (2016) (1)
- MinRank problem and Zero-knowledge authentication (2001) (1)
- On Splitting a Point with Summation Polynomials in Binary Elliptic Curves (2016) (1)
- Extension of de Weger's Attack on RSA with Large Public Keys (2012) (0)
- On latin squares, invariant differentials, random permutations and historical Enigma rotors (2021) (0)
- On Multiple Symmetric Fixed Points in GOST NICOLAS COURTOIS (2015) (0)
- Short Signatures, Provable Security and Generic Attacks for Multivariate Polynomial Schemes such as HFE, Quartz and Sflash (2004) (0)
- Hypothesis testing and advanced distiguishers in differential cryptanalysis of block ciphers (2015) (0)
- On selection of samples in algebraic attacks and a new technique to find hidden low degree equations (2015) (0)
- Author Manuscript, Published in "new Stream Cipher Designs -the Estream Finalists (2008) (0)
- On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES (2021) (0)
- Aggregated differentials and cryptanalysis of PP-1 and gost (2012) (0)
- Algebraic Attacks on MiFare Crypto-1, London Oyster Card, Dutch OV-Chipcard + Approx. 1 Billion Other RFID Chips (2008) (0)
- About Filliol's Observations on DES, AES and Hash Functions (draft) (2002) (0)
- Security Evaluation of Russian GOST Cipher (2013) (0)
- Advanced truncated differential cryptanalysis of GOST block cipher (2014) (0)
This paper list is powered by the following services:
Other Resources About Nicolas Courtois
What Schools Are Affiliated With Nicolas Courtois?
Nicolas Courtois is affiliated with the following schools: