The following pages link to Yannick Seurin (Q271583):
Displaying 24 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication (Q1675192) (← links)
- Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient (Q1675219) (← links)
- Analysis of the single-permutation encrypted Davies-Meyer construction (Q1801088) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model (Q2119006) (← links)
- MuSig2: simple two-round Schnorr multi-signatures (Q2120074) (← links)
- Simple Schnorr multi-signatures with applications to bitcoin (Q2324793) (← links)
- Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing (Q2795969) (← links)
- Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results (Q2798610) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC (Q2835585) (← links)
- How to Construct an Ideal Cipher from a Small Set of Public Permutations (Q2867234) (← links)
- Minimizing the Two-Round Even-Mansour Cipher (Q2874495) (← links)
- On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction (Q2891489) (← links)
- On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model (Q2894431) (← links)
- Tweakable Blockciphers with Asymptotically Optimal Security (Q2946875) (← links)
- Security Analysis of Key-Alternating Feistel Ciphers (Q2946913) (← links)
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes (Q2946949) (← links)
- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks (Q2948345) (← links)
- A Domain Extender for the Ideal Cipher (Q3408200) (← links)
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent (Q3600210) (← links)