Yannick Seurin

From MaRDI portal
Person:271583

Available identifiers

zbMath Open seurin.yannickDBLP25/3463WikidataQ102362452 ScholiaQ102362452MaRDI QIDQ271583

List of research outcomes





PublicationDate of PublicationType
QCB: efficient quantum-secure authenticated encryption2023-05-12Paper
MuSig2: simple two-round Schnorr multi-signatures2022-03-31Paper
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
The \texttt{Deoxys} AEAD family2021-08-10Paper
Simple Schnorr multi-signatures with applications to bitcoin2019-09-12Paper
Minimizing the two-round Even-Mansour cipher2018-11-01Paper
Analysis of the single-permutation encrypted Davies-Meyer construction2018-10-26Paper
Strengthening the known-key security notion for block ciphers2018-05-09Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers2016-11-30Paper
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC2016-11-30Paper
Security amplification for the composition of block ciphers: simpler proofs and new results2016-04-13Paper
How to build an ideal cipher: the indifferentiability of the Feistel construction2016-04-07Paper
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing2016-03-23Paper
The iterated random permutation problem with applications to cascade encryption2015-12-10Paper
Tweaking Even-Mansour ciphers2015-12-10Paper
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks2015-09-30Paper
Security analysis of key-alternating Feistel ciphers2015-09-18Paper
Tweakable blockciphers with asymptotically optimal security2015-09-18Paper
Relaxing full-codebook security: a refined analysis of key-length extension schemes2015-09-18Paper
Minimizing the two-round Even-Mansour cipher2014-08-07Paper
On the lossiness of the Rabin trapdoor function2014-03-25Paper
How to construct an ideal cipher from a small set of public permutations2013-12-10Paper
New Constructions and Applications of Trapdoor DDH Groups2013-04-19Paper
An asymptotically tight security analysis of the iterated Even-Mansour cipher2013-03-19Paper
A robust and plaintext-aware variant of signed ElGamal encryption2013-03-18Paper
On the exact security of Schnorr-type signatures in the random oracle model2012-06-29Paper
On the public indifferentiability and correlation intractability of the 6-round Feistel construction2012-06-15Paper
A domain extender for the ideal cipher2010-02-24Paper
Building Secure Block Ciphers on Generic Attacks Assumptions2009-11-03Paper
Good Variants of HB +  Are Hard to Find2009-02-12Paper
The Random Oracle Model and the Ideal Cipher Model Are Equivalent2009-02-10Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
Security Analysis of Constructions Combining FIL Random Oracles2008-09-16Paper
How to Encrypt with the LPN Problem2008-08-19Paper
Looking Back at a New Hash Function2008-07-08Paper
: Increasing the Security and Efficiency of2008-04-15Paper

Research outcomes over time

This page was built for person: Yannick Seurin