Yannick Seurin

From MaRDI portal
(Redirected from Person:271583)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
QCB: efficient quantum-secure authenticated encryption
Lecture Notes in Computer Science
2023-05-12Paper
MuSig2: simple two-round Schnorr multi-signatures2022-03-31Paper
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
The \texttt{Deoxys} AEAD family
Journal of Cryptology
2021-08-10Paper
Simple Schnorr multi-signatures with applications to bitcoin
Designs, Codes and Cryptography
2019-09-12Paper
Minimizing the two-round Even-Mansour cipher
Journal of Cryptology
2018-11-01Paper
Analysis of the single-permutation encrypted Davies-Meyer construction
Designs, Codes and Cryptography
2018-10-26Paper
Strengthening the known-key security notion for block ciphers
Fast Software Encryption
2018-05-09Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Security amplification for the composition of block ciphers: simpler proofs and new results
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
How to build an ideal cipher: the indifferentiability of the Feistel construction
Journal of Cryptology
2016-04-07Paper
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
The iterated random permutation problem with applications to cascade encryption
Lecture Notes in Computer Science
2015-12-10Paper
Tweaking Even-Mansour ciphers
Lecture Notes in Computer Science
2015-12-10Paper
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Security analysis of key-alternating Feistel ciphers
Fast Software Encryption
2015-09-18Paper
Tweakable blockciphers with asymptotically optimal security
Fast Software Encryption
2015-09-18Paper
Relaxing full-codebook security: a refined analysis of key-length extension schemes
Fast Software Encryption
2015-09-18Paper
Minimizing the two-round Even-Mansour cipher
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the lossiness of the Rabin trapdoor function
Public-Key Cryptography – PKC 2014
2014-03-25Paper
How to construct an ideal cipher from a small set of public permutations
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
New Constructions and Applications of Trapdoor DDH Groups
Public-Key Cryptography – PKC 2013
2013-04-19Paper
An asymptotically tight security analysis of the iterated Even-Mansour cipher
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A robust and plaintext-aware variant of signed ElGamal encryption
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
On the exact security of Schnorr-type signatures in the random oracle model
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On the public indifferentiability and correlation intractability of the 6-round Feistel construction
Theory of Cryptography
2012-06-15Paper
A domain extender for the ideal cipher
Theory of Cryptography
2010-02-24Paper
Building Secure Block Ciphers on Generic Attacks Assumptions
Selected Areas in Cryptography
2009-11-03Paper
Good Variants of HB +  Are Hard to Find
Financial Cryptography and Data Security
2009-02-12Paper
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
Lecture Notes in Computer Science
2009-02-10Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Security Analysis of Constructions Combining FIL Random Oracles
Fast Software Encryption
2008-09-16Paper
How to Encrypt with the LPN Problem
Automata, Languages and Programming
2008-08-19Paper
Looking Back at a New Hash Function
Information Security and Privacy
2008-07-08Paper
: Increasing the Security and Efficiency of
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper


Research outcomes over time


This page was built for person: Yannick Seurin