Yannick Seurin

From MaRDI portal
Revision as of 17:20, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:271583

Available identifiers

zbMath Open seurin.yannickDBLP25/3463WikidataQ102362452 ScholiaQ102362452MaRDI QIDQ271583

List of research outcomes





PublicationDate of PublicationType
QCB: efficient quantum-secure authenticated encryption2023-05-12Paper
MuSig2: simple two-round Schnorr multi-signatures2022-03-31Paper
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
The \texttt{Deoxys} AEAD family2021-08-10Paper
Simple Schnorr multi-signatures with applications to bitcoin2019-09-12Paper
Minimizing the two-round Even-Mansour cipher2018-11-01Paper
Analysis of the single-permutation encrypted Davies-Meyer construction2018-10-26Paper
Strengthening the Known-Key Security Notion for Block Ciphers2018-05-09Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers2016-11-30Paper
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC2016-11-30Paper
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results2016-04-13Paper
How to build an ideal cipher: the indifferentiability of the Feistel construction2016-04-07Paper
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing2016-03-23Paper
Tweaking Even-Mansour Ciphers2015-12-10Paper
The Iterated Random Permutation Problem with Applications to Cascade Encryption2015-12-10Paper
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks2015-09-30Paper
Tweakable Blockciphers with Asymptotically Optimal Security2015-09-18Paper
Security Analysis of Key-Alternating Feistel Ciphers2015-09-18Paper
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes2015-09-18Paper
Minimizing the Two-Round Even-Mansour Cipher2014-08-07Paper
On the Lossiness of the Rabin Trapdoor Function2014-03-25Paper
How to Construct an Ideal Cipher from a Small Set of Public Permutations2013-12-10Paper
New Constructions and Applications of Trapdoor DDH Groups2013-04-19Paper
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher2013-03-19Paper
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption2013-03-18Paper
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model2012-06-29Paper
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction2012-06-15Paper
A Domain Extender for the Ideal Cipher2010-02-24Paper
Building Secure Block Ciphers on Generic Attacks Assumptions2009-11-03Paper
Good Variants of HB +  Are Hard to Find2009-02-12Paper
The Random Oracle Model and the Ideal Cipher Model Are Equivalent2009-02-10Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
Security Analysis of Constructions Combining FIL Random Oracles2008-09-16Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
How to Encrypt with the LPN Problem2008-08-19Paper
Looking Back at a New Hash Function2008-07-08Paper
: Increasing the Security and Efficiency of2008-04-15Paper

Research outcomes over time

This page was built for person: Yannick Seurin