Yannick Seurin

From MaRDI portal
Person:271583

Available identifiers

zbMath Open seurin.yannickWikidataQ102362452 ScholiaQ102362452MaRDI QIDQ271583

List of research outcomes

PublicationDate of PublicationType
QCB: efficient quantum-secure authenticated encryption2023-05-12Paper
MuSig2: simple two-round Schnorr multi-signatures2022-03-31Paper
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
The \texttt{Deoxys} AEAD family2021-08-10Paper
Simple Schnorr multi-signatures with applications to bitcoin2019-09-12Paper
Minimizing the two-round Even-Mansour cipher2018-11-01Paper
Analysis of the single-permutation encrypted Davies-Meyer construction2018-10-26Paper
Strengthening the Known-Key Security Notion for Block Ciphers2018-05-09Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers2016-11-30Paper
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC2016-11-30Paper
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results2016-04-13Paper
How to build an ideal cipher: the indifferentiability of the Feistel construction2016-04-07Paper
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing2016-03-23Paper
Tweaking Even-Mansour Ciphers2015-12-10Paper
The Iterated Random Permutation Problem with Applications to Cascade Encryption2015-12-10Paper
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks2015-09-30Paper
Tweakable Blockciphers with Asymptotically Optimal Security2015-09-18Paper
Security Analysis of Key-Alternating Feistel Ciphers2015-09-18Paper
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes2015-09-18Paper
Minimizing the Two-Round Even-Mansour Cipher2014-08-07Paper
On the Lossiness of the Rabin Trapdoor Function2014-03-25Paper
How to Construct an Ideal Cipher from a Small Set of Public Permutations2013-12-10Paper
New Constructions and Applications of Trapdoor DDH Groups2013-04-19Paper
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher2013-03-19Paper
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption2013-03-18Paper
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model2012-06-29Paper
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction2012-06-15Paper
A Domain Extender for the Ideal Cipher2010-02-24Paper
Building Secure Block Ciphers on Generic Attacks Assumptions2009-11-03Paper
Good Variants of HB +  Are Hard to Find2009-02-12Paper
The Random Oracle Model and the Ideal Cipher Model Are Equivalent2009-02-10Paper
Hash Functions and RFID Tags: Mind the Gap2009-01-09Paper
Security Analysis of Constructions Combining FIL Random Oracles2008-09-16Paper
PRESENT: An Ultra-Lightweight Block Cipher2008-09-16Paper
How to Encrypt with the LPN Problem2008-08-19Paper
Looking Back at a New Hash Function2008-07-08Paper
: Increasing the Security and Efficiency of2008-04-15Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Yannick Seurin