Yannick Seurin

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
QCB: efficient quantum-secure authenticated encryption
Lecture Notes in Computer Science
2023-05-12Paper
MuSig2: simple two-round Schnorr multi-signatures2022-03-31Paper
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model2022-03-23Paper
The key-dependent message security of key-alternating Feistel ciphers2021-12-20Paper
The \texttt{Deoxys} AEAD family
Journal of Cryptology
2021-08-10Paper
Simple Schnorr multi-signatures with applications to bitcoin
Designs, Codes and Cryptography
2019-09-12Paper
Minimizing the two-round Even-Mansour cipher
Journal of Cryptology
2018-11-01Paper
Analysis of the single-permutation encrypted Davies-Meyer construction
Designs, Codes and Cryptography
2018-10-26Paper
Strengthening the known-key security notion for block ciphers
Fast Software Encryption
2018-05-09Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient2017-10-27Paper
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Security amplification for the composition of block ciphers: simpler proofs and new results
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
How to build an ideal cipher: the indifferentiability of the Feistel construction
Journal of Cryptology
2016-04-07Paper
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
The iterated random permutation problem with applications to cascade encryption
Lecture Notes in Computer Science
2015-12-10Paper
Tweaking Even-Mansour ciphers
Lecture Notes in Computer Science
2015-12-10Paper
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Security analysis of key-alternating Feistel ciphers
Fast Software Encryption
2015-09-18Paper
Tweakable blockciphers with asymptotically optimal security
Fast Software Encryption
2015-09-18Paper
Relaxing full-codebook security: a refined analysis of key-length extension schemes
Fast Software Encryption
2015-09-18Paper
Minimizing the two-round Even-Mansour cipher
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the lossiness of the Rabin trapdoor function
Public-Key Cryptography – PKC 2014
2014-03-25Paper
How to construct an ideal cipher from a small set of public permutations
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
New Constructions and Applications of Trapdoor DDH Groups
Public-Key Cryptography – PKC 2013
2013-04-19Paper
An asymptotically tight security analysis of the iterated Even-Mansour cipher
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A robust and plaintext-aware variant of signed ElGamal encryption
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
On the exact security of Schnorr-type signatures in the random oracle model
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On the public indifferentiability and correlation intractability of the 6-round Feistel construction
Theory of Cryptography
2012-06-15Paper
A domain extender for the ideal cipher
Theory of Cryptography
2010-02-24Paper
Building Secure Block Ciphers on Generic Attacks Assumptions
Selected Areas in Cryptography
2009-11-03Paper
Good Variants of HB +  Are Hard to Find
Financial Cryptography and Data Security
2009-02-12Paper
The Random Oracle Model and the Ideal Cipher Model Are Equivalent
Lecture Notes in Computer Science
2009-02-10Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Security Analysis of Constructions Combining FIL Random Oracles
Fast Software Encryption
2008-09-16Paper
How to Encrypt with the LPN Problem
Automata, Languages and Programming
2008-08-19Paper
Looking Back at a New Hash Function
Information Security and Privacy
2008-07-08Paper
: Increasing the Security and Efficiency of
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper


Research outcomes over time


This page was built for person: Yannick Seurin