The following pages link to Yannick Seurin (Q271583):
Displaying 36 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication (Q1675192) (← links)
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient (Q1675219) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model (Q2119006) (← links)
- MuSig2: simple two-round Schnorr multi-signatures (Q2120074) (← links)
- Simple Schnorr multi-signatures with applications to bitcoin (Q2324793) (← links)
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing (Q2795969) (← links)
- Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results (Q2798610) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- How to Construct an Ideal Cipher from a Small Set of Public Permutations (Q2867234) (← links)
- Minimizing the Two-Round Even-Mansour Cipher (Q2874495) (← links)
- On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction (Q2891489) (← links)
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model (Q2894431) (← links)
- Tweakable Blockciphers with Asymptotically Optimal Security (Q2946875) (← links)
- Security Analysis of Key-Alternating Feistel Ciphers (Q2946913) (← links)
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes (Q2946949) (← links)
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks (Q2948345) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- Tweaking Even-Mansour Ciphers (Q3457110) (← links)
- The Iterated Random Permutation Problem with Applications to Cascade Encryption (Q3457118) (← links)
- Looking Back at a New Hash Function (Q3511167) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- Security Analysis of Constructions Combining FIL Random Oracles (Q3524885) (← links)
- PRESENT: An Ultra-Lightweight Block Cipher (Q3525066) (← links)
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent (Q3600210) (← links)
- Good Variants of HB + Are Hard to Find (Q3603007) (← links)
- Building Secure Block Ciphers on Generic Attacks Assumptions (Q3644193) (← links)
- Strengthening the Known-Key Security Notion for Block Ciphers (Q4639495) (← links)
- A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption (Q4910226) (← links)
- An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher (Q4911591) (← links)
- New Constructions and Applications of Trapdoor DDH Groups (Q4916024) (← links)