Serge Vaudenay

From MaRDI portal
Person:181986

Available identifiers

zbMath Open vaudenay.sergeDBLPv/SergeVaudenayWikidataQ3479573 ScholiaQ3479573MaRDI QIDQ181986

List of research outcomes





PublicationDate of PublicationType
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity2024-03-14Paper
On active attack detection in messaging with immediate decryption2024-02-06Paper
Anonymous tokens with stronger metadata bit hiding from algebraic MACs2024-02-02Paper
A gapless post-quantum hash proof system in the Hamming metric2023-11-09Paper
Post-Compromise Security in Self-Encryption2023-07-03Paper
Solving the learning parity with noise problem using quantum algorithms2023-06-02Paper
New attacks on LowMC instances with a single plaintext/ciphertext pair2023-05-12Paper
FAST: secure and high performance format-preserving encryption and tokenization2023-05-12Paper
Determining the core primitive for optimally secure ratcheting2023-03-29Paper
Towards witness encryption without multilinear maps2022-12-07Paper
On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.32022-08-30Paper
FO-like combiners and hybrid post-quantum cryptography2022-06-29Paper
Towards efficient LPN-based symmetric encryption2022-03-21Paper
Beyond security and efficiency: on-demand ratcheting with security awareness2021-12-21Paper
On the effectiveness of time travel to inject COVID-19 alerts2021-12-20Paper
\(\mathsf{BioLocker}\): a practical biometric authentication mechanism based on 3D fingervein2021-02-23Paper
Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes2021-02-23Paper
Sublinear bounds on the distinguishing advantage for multiple samples2021-02-23Paper
Symmetric asynchronous ratcheted communication with associated data2021-02-23Paper
Misuse attacks on post-quantum cryptosystems2020-02-06Paper
Cryptanalysis of Enhanced More2019-09-30Paper
Side-channel attacks on threshold implementations using a glitch algebra2018-10-26Paper
Secure contactless payment2018-09-26Paper
Generic round-function-recovery attacks for Feistel networks over small domains2018-08-10Paper
Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks2018-08-10Paper
Formal analysis of distance bounding with secure hardware2018-08-10Paper
XMX: A firmware-oriented block cipher based on modular multiplications2018-05-09Paper
CS-Cipher2018-05-09Paper
Cryptanalysis of a homomorphic encryption scheme2018-01-29Paper
On the weak keys of blowfish2017-11-15Paper
Breaking the FF3 format-preserving encryption standard over small domains2017-11-15Paper
Authenticated Encryption with Variable Stretch2017-02-01Paper
Optimization of $$\mathsf {LPN}$$ Solving Algorithms2017-02-01Paper
Efficient Public-Key Distance Bounding Protocol2017-01-06Paper
Cryptanalysis of chosen symmetric homomorphic schemes2016-11-25Paper
On solving LPN using BKW and variants, Implementation and analysis2016-05-04Paper
Clever Arbiters Versus Malicious Adversaries2016-05-02Paper
OMD: A Compression Function Mode of Operation for Authenticated Encryption2016-04-13Paper
How to Sequentialize Independent Parallel Attacks?2016-03-23Paper
Optimal Proximity Proofs Revisited2016-03-10Paper
Sound Proof of Proximity of Knowledge2016-01-27Paper
On Privacy for RFID2016-01-27Paper
Capacity and Data Complexity in Multidimensional Linear Attack2015-12-10Paper
Optimal Proximity Proofs2015-11-25Paper
Hidden Collisions on DSS2015-11-11Paper
Better Algorithms for LWE and LWR2015-09-30Paper
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode2015-09-29Paper
Towards Secure Distance Bounding2015-09-18Paper
Boosting OMD for Almost Free Authentication of Associated Data2015-09-18Paper
Smashing WEP in a Passive Attack2015-09-18Paper
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation2015-09-18Paper
Compact and Efficient UC Commitments Under Atomic-Exchanges2015-09-11Paper
On the Key Schedule of Lightweight Block Ciphers2015-09-10Paper
Improved Linear Cryptanalysis of Reduced-Round MIBS2015-05-27Paper
Revisiting iterated attacks in the context of decorrelation theory2014-10-08Paper
Short 2-Move Undeniable Signatures2014-08-21Paper
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers2014-08-20Paper
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations2014-07-24Paper
Breaking the IOC Authenticated Encryption Mode2014-06-24Paper
Primeless Factoring-Based Cryptography2014-01-24Paper
Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges2013-10-23Paper
On Modeling Terrorist Frauds2013-10-23Paper
Secure and Lightweight Distance-Bounding2013-10-10Paper
Synthetic linear analysis with applications to CubeHash and Rabbit2013-06-24Paper
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems2013-06-07Paper
The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks2013-05-28Paper
ElimLin Algorithm Revisited2013-01-08Paper
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices2012-11-06Paper
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit2012-11-01Paper
Resistance against Iterated Attacks by Decorrelation Revisited2012-09-25Paper
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols2012-09-21Paper
Short undeniable signatures based on group homomorphisms2012-09-21Paper
Deniable RSA Signature2012-06-08Paper
On Hiding a Plaintext Length by Preencryption2011-06-28Paper
Statistical Attack on RC42011-05-27Paper
Discovery and Exploitation of New Biases in RC42011-03-15Paper
https://portal.mardi4nfdi.de/entity/Q30643192010-12-21Paper
Cryptanalysis of Reduced-Round MIBS Block Cipher2010-12-07Paper
Distinguishing Distributions Using Chernoff Information2010-10-12Paper
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware2010-08-17Paper
How to safely close a discussion2010-01-29Paper
Fast Software Encryption2010-01-05Paper
Generating anomalous elliptic curves2009-08-27Paper
On the Impossibility of Strong Encryption Over $\aleph_0$2009-07-23Paper
Cryptanalysis of an E0-like combiner with memory2009-06-08Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Smashing SQUASH-02009-05-12Paper
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher2009-03-06Paper
Hash-and-Sign with Weak Hashing Made Secure2009-03-06Paper
On the Security of HB# against a Man-in-the-Middle Attack2009-02-10Paper
The Complexity of Distinguishing Distributions (Invited Talk)2009-01-09Paper
On Privacy Models for RFID2008-05-15Paper
RFID Privacy Based on Public-Key Cryptography2008-05-06Paper
Linear Cryptanalysis of Non Binary Ciphers2008-03-25Paper
Passive–Only Key Recovery Attacks on RC42008-03-25Paper
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption2008-03-17Paper
Secure Communications over Insecure Channels Based on Short Authenticated Strings2008-03-17Paper
When Stream Cipher Analysis Meets Public-Key Cryptography2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Proving the Security of AES Substitution-Permutation Network2007-11-15Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Information Security and Cryptology2006-11-14Paper
Information Security and Cryptology2006-11-14Paper
Information Security2006-10-20Paper
Selected Areas in Cryptography2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Selected Areas in Cryptography2005-12-27Paper
A Classical Introduction to Cryptography Exercise Book2005-11-17Paper
A Classical Introduction to Cryptography2005-11-01Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Information and Communications Security2005-08-19Paper
How Far Can We Go Beyond Linear Cryptanalysis?2005-08-12Paper
Cryptanalysis of Bluetooth Keystream Generator Two-Level E02005-08-12Paper
Generic Homomorphic Undeniable Signatures2005-08-12Paper
Decorrelation: a theory for block cipher security2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q47372692004-08-11Paper
Decorrelation over infinite domains: The encrypted CBC-MAC case2004-05-18Paper
https://portal.mardi4nfdi.de/entity/Q44525572004-03-01Paper
The Security of DSA and ECDSA2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q45362462003-03-07Paper
https://portal.mardi4nfdi.de/entity/Q45362482003-02-14Paper
https://portal.mardi4nfdi.de/entity/Q45362392002-11-28Paper
https://portal.mardi4nfdi.de/entity/Q45379832002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q42493332002-05-05Paper
https://portal.mardi4nfdi.de/entity/Q27627542002-01-09Paper
https://portal.mardi4nfdi.de/entity/Q27627412002-01-09Paper
Cryptanalysis of the Chor-Rivest cryptosystem2001-11-07Paper
https://portal.mardi4nfdi.de/entity/Q27074262001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q45024792000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q44994052000-08-30Paper
https://portal.mardi4nfdi.de/entity/Q49418172000-08-24Paper
On the need for multipermutations: Cryptanalysis of MD4 and SAFER2000-06-05Paper
https://portal.mardi4nfdi.de/entity/Q49493232000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49493262000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49500512000-05-07Paper
https://portal.mardi4nfdi.de/entity/Q42508012000-02-01Paper
The black-box model for cryptographic primitives1999-10-25Paper
https://portal.mardi4nfdi.de/entity/Q42507661999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42508071999-06-17Paper
The security of the birational permutation signature schemes1999-01-31Paper
https://portal.mardi4nfdi.de/entity/Q43813901998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q43657301998-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43657541998-01-26Paper
https://portal.mardi4nfdi.de/entity/Q43417701997-12-15Paper
https://portal.mardi4nfdi.de/entity/Q43187271995-03-30Paper
https://portal.mardi4nfdi.de/entity/Q42763381994-01-27Paper

Research outcomes over time

This page was built for person: Serge Vaudenay