Serge Vaudenay

From MaRDI portal
Person:181986

Available identifiers

zbMath Open vaudenay.sergeWikidataQ3479573 ScholiaQ3479573MaRDI QIDQ181986

List of research outcomes

PublicationDate of PublicationType
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity2024-03-14Paper
On active attack detection in messaging with immediate decryption2024-02-06Paper
Anonymous tokens with stronger metadata bit hiding from algebraic MACs2024-02-02Paper
Post-Compromise Security in Self-Encryption2023-07-03Paper
Solving the learning parity with noise problem using quantum algorithms2023-06-02Paper
New attacks on LowMC instances with a single plaintext/ciphertext pair2023-05-12Paper
FAST: secure and high performance format-preserving encryption and tokenization2023-05-12Paper
Determining the core primitive for optimally secure ratcheting2023-03-29Paper
Towards witness encryption without multilinear maps2022-12-07Paper
On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.32022-08-30Paper
FO-like combiners and hybrid post-quantum cryptography2022-06-29Paper
Towards efficient LPN-based symmetric encryption2022-03-21Paper
Beyond security and efficiency: on-demand ratcheting with security awareness2021-12-21Paper
On the effectiveness of time travel to inject COVID-19 alerts2021-12-20Paper
Sublinear bounds on the distinguishing advantage for multiple samples2021-02-23Paper
Symmetric asynchronous ratcheted communication with associated data2021-02-23Paper
Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes2021-02-23Paper
\(\mathsf{BioLocker}\): a practical biometric authentication mechanism based on 3D fingervein2021-02-23Paper
Misuse attacks on post-quantum cryptosystems2020-02-06Paper
Cryptanalysis of Enhanced More2019-09-30Paper
Side-channel attacks on threshold implementations using a glitch algebra2018-10-26Paper
Secure contactless payment2018-09-26Paper
Generic round-function-recovery attacks for Feistel networks over small domains2018-08-10Paper
Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks2018-08-10Paper
Formal analysis of distance bounding with secure hardware2018-08-10Paper
XMX: A firmware-oriented block cipher based on modular multiplications2018-05-09Paper
CS-Cipher2018-05-09Paper
Cryptanalysis of a homomorphic encryption scheme2018-01-29Paper
Breaking the FF3 format-preserving encryption standard over small domains2017-11-15Paper
On the weak keys of blowfish2017-11-15Paper
Authenticated Encryption with Variable Stretch2017-02-01Paper
Optimization of $$\mathsf {LPN}$$ Solving Algorithms2017-02-01Paper
Efficient Public-Key Distance Bounding Protocol2017-01-06Paper
Cryptanalysis of chosen symmetric homomorphic schemes2016-11-25Paper
On solving LPN using BKW and variants, Implementation and analysis2016-05-04Paper
Clever Arbiters Versus Malicious Adversaries2016-05-02Paper
OMD: A Compression Function Mode of Operation for Authenticated Encryption2016-04-13Paper
How to Sequentialize Independent Parallel Attacks?2016-03-23Paper
Optimal Proximity Proofs Revisited2016-03-10Paper
On Privacy for RFID2016-01-27Paper
Sound Proof of Proximity of Knowledge2016-01-27Paper
Capacity and Data Complexity in Multidimensional Linear Attack2015-12-10Paper
Optimal Proximity Proofs2015-11-25Paper
Hidden Collisions on DSS2015-11-11Paper
Better Algorithms for LWE and LWR2015-09-30Paper
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode2015-09-29Paper
Towards Secure Distance Bounding2015-09-18Paper
Smashing WEP in a Passive Attack2015-09-18Paper
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation2015-09-18Paper
Boosting OMD for Almost Free Authentication of Associated Data2015-09-18Paper
Compact and Efficient UC Commitments Under Atomic-Exchanges2015-09-11Paper
On the Key Schedule of Lightweight Block Ciphers2015-09-10Paper
Improved Linear Cryptanalysis of Reduced-Round MIBS2015-05-27Paper
Revisiting iterated attacks in the context of decorrelation theory2014-10-08Paper
Short 2-Move Undeniable Signatures2014-08-21Paper
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers2014-08-20Paper
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations2014-07-24Paper
Breaking the IOC Authenticated Encryption Mode2014-06-24Paper
Primeless Factoring-Based Cryptography2014-01-24Paper
On Modeling Terrorist Frauds2013-10-23Paper
Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges2013-10-23Paper
Secure and Lightweight Distance-Bounding2013-10-10Paper
Synthetic linear analysis with applications to CubeHash and Rabbit2013-06-24Paper
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems2013-06-07Paper
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks2013-05-28Paper
ElimLin Algorithm Revisited2013-01-08Paper
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices2012-11-06Paper
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit2012-11-01Paper
Resistance against Iterated Attacks by Decorrelation Revisited2012-09-25Paper
Short undeniable signatures based on group homomorphisms2012-09-21Paper
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols2012-09-21Paper
Deniable RSA Signature2012-06-08Paper
On Hiding a Plaintext Length by Preencryption2011-06-28Paper
Statistical Attack on RC42011-05-27Paper
Discovery and Exploitation of New Biases in RC42011-03-15Paper
https://portal.mardi4nfdi.de/entity/Q30643192010-12-21Paper
Cryptanalysis of Reduced-Round MIBS Block Cipher2010-12-07Paper
Distinguishing Distributions Using Chernoff Information2010-10-12Paper
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware2010-08-17Paper
How to safely close a discussion2010-01-29Paper
Fast Software Encryption2010-01-05Paper
Generating anomalous elliptic curves2009-08-27Paper
On the Impossibility of Strong Encryption Over $\aleph_0$2009-07-23Paper
Cryptanalysis of an E0-like combiner with memory2009-06-08Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Smashing SQUASH-02009-05-12Paper
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher2009-03-06Paper
Hash-and-Sign with Weak Hashing Made Secure2009-03-06Paper
On the Security of HB# against a Man-in-the-Middle Attack2009-02-10Paper
The Complexity of Distinguishing Distributions (Invited Talk)2009-01-09Paper
On Privacy Models for RFID2008-05-15Paper
RFID Privacy Based on Public-Key Cryptography2008-05-06Paper
Linear Cryptanalysis of Non Binary Ciphers2008-03-25Paper
Passive–Only Key Recovery Attacks on RC42008-03-25Paper
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption2008-03-17Paper
Secure Communications over Insecure Channels Based on Short Authenticated Strings2008-03-17Paper
When Stream Cipher Analysis Meets Public-Key Cryptography2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Proving the Security of AES Substitution-Permutation Network2007-11-15Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Selected Areas in Cryptography2005-12-27Paper
A Classical Introduction to Cryptography Exercise Book2005-11-17Paper
A Classical Introduction to Cryptography2005-11-01Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Information and Communications Security2005-08-19Paper
Generic Homomorphic Undeniable Signatures2005-08-12Paper
How Far Can We Go Beyond Linear Cryptanalysis?2005-08-12Paper
Cryptanalysis of Bluetooth Keystream Generator Two-Level E02005-08-12Paper
Decorrelation: a theory for block cipher security2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q47372692004-08-11Paper
Decorrelation over infinite domains: The encrypted CBC-MAC case2004-05-18Paper
https://portal.mardi4nfdi.de/entity/Q44525572004-03-01Paper
The Security of DSA and ECDSA2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q45362462003-03-07Paper
https://portal.mardi4nfdi.de/entity/Q45362482003-02-14Paper
https://portal.mardi4nfdi.de/entity/Q45362392002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45379832002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q42493332002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q27627412002-01-09Paper
https://portal.mardi4nfdi.de/entity/Q27627542002-01-09Paper
Cryptanalysis of the Chor-Rivest cryptosystem2001-11-07Paper
https://portal.mardi4nfdi.de/entity/Q27074262001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q45024792000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q44994052000-08-30Paper
https://portal.mardi4nfdi.de/entity/Q49418172000-08-24Paper
On the need for multipermutations: Cryptanalysis of MD4 and SAFER2000-06-05Paper
https://portal.mardi4nfdi.de/entity/Q49493232000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49493262000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42508012000-02-01Paper
The black-box model for cryptographic primitives1999-10-25Paper
https://portal.mardi4nfdi.de/entity/Q42507661999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42508071999-06-17Paper
The security of the birational permutation signature schemes1999-01-31Paper
https://portal.mardi4nfdi.de/entity/Q43813901998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q43657301998-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43657541998-01-26Paper
https://portal.mardi4nfdi.de/entity/Q43417701997-12-15Paper
https://portal.mardi4nfdi.de/entity/Q43187271995-03-30Paper
https://portal.mardi4nfdi.de/entity/Q42763381994-01-27Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Serge Vaudenay