Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yannick Seurin
@article{DBLP:journals/iacr/CogliatiJPS22, author = {Beno{\^{\i}}t Cogliati and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Yannick Seurin}, title = {A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {846}, year = {2022}, url = {https://eprint.iacr.org/2022/846}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiJPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JeanNPS21, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin and Yannick Seurin}, title = {The Deoxys {AEAD} Family}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {31}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09397-w}, doi = {10.1007/S00145-021-09397-W}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/JeanNPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BhaumikBCLNSS21, author = {Ritam Bhaumik and Xavier Bonnetain and Andr{\'{e}} Chailloux and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher and Yannick Seurin}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {{QCB:} Efficient Quantum-Secure Authenticated Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {668--698}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_23}, doi = {10.1007/978-3-030-92062-3\_23}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BhaumikBCLNSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NickRS21, author = {Jonas Nick and Tim Ruffing and Yannick Seurin}, editor = {Tal Malkin and Chris Peikert}, title = {MuSig2: Simple Two-Round Schnorr Multi-signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {189--221}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_8}, doi = {10.1007/978-3-030-84242-0\_8}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NickRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FarshimKSV21, author = {Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud}, editor = {Kenneth G. Paterson}, title = {The Key-Dependent Message Security of Key-Alternating Feistel Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {351--374}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_15}, doi = {10.1007/978-3-030-75539-3\_15}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/FarshimKSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimKSV21, author = {Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud}, title = {The Key-Dependent Message Security of Key-Alternating Feistel Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2021}, url = {https://eprint.iacr.org/2021/330}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimKSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NickRSW20, author = {Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1717--1731}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417236}, doi = {10.1145/3372297.3417236}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NickRSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerPS20, author = {Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin}, editor = {Anne Canteaut and Yuval Ishai}, title = {Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {63--95}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_3}, doi = {10.1007/978-3-030-45724-2\_3}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NickRSW20, author = {Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille}, title = {MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2020}, url = {https://eprint.iacr.org/2020/1057}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NickRSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NickRS20, author = {Jonas Nick and Tim Ruffing and Yannick Seurin}, title = {MuSig2: Simple Two-Round Schnorr Multi-Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1261}, year = {2020}, url = {https://eprint.iacr.org/2020/1261}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NickRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikBCLNSS20, author = {Ritam Bhaumik and Xavier Bonnetain and Andr{\'{e}} Chailloux and Ga{\"{e}}tan Leurent and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher and Yannick Seurin}, title = {{QCB:} Efficient Quantum-secure Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1304}, year = {2020}, url = {https://eprint.iacr.org/2020/1304}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikBCLNSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaxwellPSW19, author = {Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille}, title = {Simple Schnorr multi-signatures with applications to Bitcoin}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2139--2164}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00608-x}, doi = {10.1007/S10623-019-00608-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaxwellPSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerOS19, author = {Georg Fuchsbauer and Michele Orr{\`{u}} and Yannick Seurin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {657--689}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_22}, doi = {10.1007/978-3-030-17653-2\_22}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerPS19, author = {Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin}, title = {Blind Schnorr Signatures in the Algebraic Group Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {877}, year = {2019}, url = {https://eprint.iacr.org/2019/877}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CogliatiS18, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {Analysis of the single-permutation encrypted Davies-Meyer construction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2703--2723}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0470-9}, doi = {10.1007/S10623-018-0470-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CogliatiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChenLLSS18, author = {Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger}, title = {Minimizing the Two-Round Even-Mansour Cipher}, journal = {J. Cryptol.}, volume = {31}, number = {4}, pages = {1064--1119}, year = {2018}, url = {https://doi.org/10.1007/s00145-018-9295-y}, doi = {10.1007/S00145-018-9295-Y}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChenLLSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaxwellPSW18, author = {Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille}, title = {Simple Schnorr Multi-Signatures with Applications to Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2018}, url = {http://eprint.iacr.org/2018/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaxwellPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerOS18, author = {Georg Fuchsbauer and Michele Orr{\`{u}} and Yannick Seurin}, title = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2018}, url = {https://eprint.iacr.org/2018/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/CogliatiLS17, author = {Beno{\^{\i}}t Cogliati and Jooyoung Lee and Yannick Seurin}, title = {New Constructions of MACs from (Tweakable) Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {27--58}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.27-58}, doi = {10.13154/TOSC.V2017.I2.27-58}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/CogliatiLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataS17, author = {Tetsu Iwata and Yannick Seurin}, title = {Reconsidering the Security Bound of {AES-GCM-SIV}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {240--267}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.240-267}, doi = {10.13154/TOSC.V2017.I4.240-267}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/IwataS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IwataMPS17, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, editor = {Jonathan Katz and Hovav Shacham}, title = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {34--65}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_2}, doi = {10.1007/978-3-319-63697-9\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/IwataMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaiSST17, author = {Yuanxi Dai and Yannick Seurin and John P. Steinberger and Aishwarya Thiruvengadam}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {524--555}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_18}, doi = {10.1007/978-3-319-63697-9\_18}, timestamp = {Mon, 14 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaiSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiSST17, author = {Yuanxi Dai and Yannick Seurin and John P. Steinberger and Aishwarya Thiruvengadam}, title = {Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2017}, url = {http://eprint.iacr.org/2017/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataMPS17, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, title = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2017}, url = {http://eprint.iacr.org/2017/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataS17, author = {Tetsu Iwata and Yannick Seurin}, title = {Reconsidering the Security Bound of {AES-GCM-SIV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2017}, url = {http://eprint.iacr.org/2017/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CoronHKPST16, author = {Jean{-}S{\'{e}}bastien Coron and Thomas Holenstein and Robin K{\"{u}}nzler and Jacques Patarin and Yannick Seurin and Stefano Tessaro}, title = {How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction}, journal = {J. Cryptol.}, volume = {29}, number = {1}, pages = {61--114}, year = {2016}, url = {https://doi.org/10.1007/s00145-014-9189-6}, doi = {10.1007/S00145-014-9189-6}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CoronHKPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PeyrinS16, author = {Thomas Peyrin and Yannick Seurin}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {33--63}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_2}, doi = {10.1007/978-3-662-53018-4\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/PeyrinS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CogliatiS16, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, editor = {Matthew Robshaw and Jonathan Katz}, title = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant {MAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {121--149}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_5}, doi = {10.1007/978-3-662-53018-4\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CogliatiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CogliatiS16, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, editor = {Thomas Peyrin}, title = {Strengthening the Known-Key Security Notion for Block Ciphers}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {494--513}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_25}, doi = {10.1007/978-3-662-52993-5\_25}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/CogliatiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS16, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {Strengthening the Known-Key Security Notion for Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2016}, url = {http://eprint.iacr.org/2016/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS16a, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2016}, url = {http://eprint.iacr.org/2016/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CogliatiS15, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {134--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_6}, doi = {10.1007/978-3-662-48800-3\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CogliatiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CogliatiLS15, author = {Benoit Cogliati and Rodolphe Lampe and Yannick Seurin}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Tweaking Even-Mansour Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {189--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_9}, doi = {10.1007/978-3-662-47989-6\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CogliatiLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MinaudS15, author = {Brice Minaud and Yannick Seurin}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {The Iterated Random Permutation Problem with Applications to Cascade Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {351--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_17}, doi = {10.1007/978-3-662-47989-6\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MinaudS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CogliatiS15, author = {Benoit Cogliati and Yannick Seurin}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {584--613}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_23}, doi = {10.1007/978-3-662-46800-5\_23}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CogliatiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GaziLSST15, author = {Peter Gazi and Jooyoung Lee and Yannick Seurin and John P. Steinberger and Stefano Tessaro}, editor = {Gregor Leander}, title = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length Extension Schemes}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {319--341}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_16}, doi = {10.1007/978-3-662-48116-5\_16}, timestamp = {Sat, 19 Oct 2019 20:27:47 +0200}, biburl = {https://dblp.org/rec/conf/fse/GaziLSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS15, author = {Benoit Cogliati and Yannick Seurin}, title = {On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2015}, url = {http://eprint.iacr.org/2015/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampeS15, author = {Rodolphe Lampe and Yannick Seurin}, title = {Tweakable Blockciphers with Asymptotically Optimal Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2015}, url = {http://eprint.iacr.org/2015/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziLSST15, author = {Peter Gazi and Jooyoung Lee and Yannick Seurin and John P. Steinberger and Stefano Tessaro}, title = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length Extension Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2015}, url = {http://eprint.iacr.org/2015/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziLSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinaudS15, author = {Brice Minaud and Yannick Seurin}, title = {The Iterated Random Permutation Problem with Applications to Cascade Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2015}, url = {http://eprint.iacr.org/2015/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinaudS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiLS15, author = {Benoit Cogliati and Rodolphe Lampe and Yannick Seurin}, title = {Tweaking Even-Mansour Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2015}, url = {http://eprint.iacr.org/2015/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS15a, author = {Benoit Cogliati and Yannick Seurin}, title = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2015}, url = {http://eprint.iacr.org/2015/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seurin15, author = {Yannick Seurin}, title = {A Note on the Indifferentiability of the 10-Round Feistel Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2015}, url = {http://eprint.iacr.org/2015/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seurin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeyrinS15, author = {Thomas Peyrin and Yannick Seurin}, title = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2015}, url = {http://eprint.iacr.org/2015/1049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeyrinS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenLLSS14, author = {Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Minimizing the Two-Round Even-Mansour Cipher}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {39--56}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_3}, doi = {10.1007/978-3-662-44371-2\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenLLSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LampeS14, author = {Rodolphe Lampe and Yannick Seurin}, editor = {Carlos Cid and Christian Rechberger}, title = {Security Analysis of Key-Alternating Feistel Ciphers}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {243--264}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_13}, doi = {10.1007/978-3-662-46706-0\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/LampeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Seurin14, author = {Yannick Seurin}, editor = {Hugo Krawczyk}, title = {On the Lossiness of the Rabin Trapdoor Function}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {380--398}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_22}, doi = {10.1007/978-3-642-54631-0\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Seurin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/CogliatiPS14, author = {Benoit Cogliati and Jacques Patarin and Yannick Seurin}, editor = {Antoine Joux and Amr M. Youssef}, title = {Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {129--146}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_8}, doi = {10.1007/978-3-319-13051-4\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/CogliatiPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampeS14, author = {Rodolphe Lampe and Yannick Seurin}, title = {Security Analysis of Key-Alternating Feistel Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2014}, url = {http://eprint.iacr.org/2014/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLSS14, author = {Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger}, title = {Minimizing the Two-Round Even-Mansour Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2014}, url = {http://eprint.iacr.org/2014/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LampeS13, author = {Rodolphe Lampe and Yannick Seurin}, editor = {Kazue Sako and Palash Sarkar}, title = {How to Construct an Ideal Cipher from a Small Set of Public Permutations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {444--463}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_23}, doi = {10.1007/978-3-642-42033-7\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LampeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SeurinT13, author = {Yannick Seurin and Joana Treger}, editor = {Ed Dawson}, title = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {68--83}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_5}, doi = {10.1007/978-3-642-36095-4\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SeurinT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LampeS13, author = {Rodolphe Lampe and Yannick Seurin}, editor = {Shiho Moriai}, title = {Tweakable Blockciphers with Asymptotically Optimal Security}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {133--151}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_8}, doi = {10.1007/978-3-662-43933-3\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LampeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Seurin13, author = {Yannick Seurin}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {New Constructions and Applications of Trapdoor {DDH} Groups}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {443--460}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_27}, doi = {10.1007/978-3-642-36362-7\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Seurin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampeS13, author = {Rodolphe Lampe and Yannick Seurin}, title = {How to Construct an Ideal Cipher from a Small Set of Public Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2013}, url = {http://eprint.iacr.org/2013/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seurin13, author = {Yannick Seurin}, title = {On the Lossiness of the Rabin Trapdoor Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2013}, url = {http://eprint.iacr.org/2013/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seurin13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seurin13a, author = {Yannick Seurin}, title = {New Constructions and Applications of Trapdoor {DDH} Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2013}, url = {http://eprint.iacr.org/2013/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seurin13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LampePS12, author = {Rodolphe Lampe and Jacques Patarin and Yannick Seurin}, editor = {Xiaoyun Wang and Kazue Sako}, title = {An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {278--295}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_18}, doi = {10.1007/978-3-642-34961-4\_18}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LampePS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Seurin12, author = {Yannick Seurin}, editor = {David Pointcheval and Thomas Johansson}, title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {554--571}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_33}, doi = {10.1007/978-3-642-29011-4\_33}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/Seurin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MandalPS12, author = {Avradip Mandal and Jacques Patarin and Yannick Seurin}, editor = {Ronald Cramer}, title = {On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {285--302}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_16}, doi = {10.1007/978-3-642-28914-9\_16}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MandalPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seurin12, author = {Yannick Seurin}, title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2012}, url = {http://eprint.iacr.org/2012/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seurin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeurinT12, author = {Yannick Seurin and Joana Treger}, title = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2012}, url = {http://eprint.iacr.org/2012/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeurinT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalPS11, author = {Avradip Mandal and Jacques Patarin and Yannick Seurin}, title = {On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2011}, url = {http://eprint.iacr.org/2011/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CoronDMS10, author = {Jean{-}S{\'{e}}bastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin}, editor = {Daniele Micciancio}, title = {A Domain Extender for the Ideal Cipher}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {273--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_17}, doi = {10.1007/978-3-642-11799-2\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CoronDMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronDMS09, author = {Jean{-}S{\'{e}}bastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin}, title = {A Domain Extender for the Ideal Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2009}, url = {http://eprint.iacr.org/2009/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronDMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilletPS09, author = {Olivier Billet and Jacques Patarin and Yannick Seurin}, title = {Analysis of Intermediate Field Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2009}, url = {http://eprint.iacr.org/2009/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilletPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRSY08, author = {Olivier Billet and Matthew J. B. Robshaw and Yannick Seurin and Yiqun Lisa Yin}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Looking Back at a New Hash Function}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {239--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_18}, doi = {10.1007/978-3-540-70500-0\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08, author = {Andrey Bogdanov and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Hash Functions and {RFID} Tags: Mind the Gap}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {283--299}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_18}, doi = {10.1007/978-3-540-85053-3\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronPS08, author = {Jean{-}S{\'{e}}bastien Coron and Jacques Patarin and Yannick Seurin}, editor = {David A. Wagner}, title = {The Random Oracle Model and the Ideal Cipher Model Are Equivalent}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {1--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_1}, doi = {10.1007/978-3-540-85174-5\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Nigel P. Smart}, title = {HB\({}^{\mbox{{\#}}}\): Increasing the Security and Efficiency of HB\({}^{\mbox{+}}\)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {361--378}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_21}, doi = {10.1007/978-3-540-78967-3\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Gene Tsudik}, title = {Good Variants of HB\({}^{\mbox{+}}\) Are Hard to Find}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {156--170}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_12}, doi = {10.1007/978-3-540-85230-8\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {How to Encrypt with the {LPN} Problem}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {679--690}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_55}, doi = {10.1007/978-3-540-70583-3\_55}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PatarinS08, author = {Jacques Patarin and Yannick Seurin}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Building Secure Block Ciphers on Generic Attacks Assumptions}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {66--81}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_5}, doi = {10.1007/978-3-642-04159-4\_5}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PatarinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, title = {HB{\#}: Increasing the Security and Efficiency of {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2008}, url = {http://eprint.iacr.org/2008/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronPS08, author = {Jean{-}S{\'{e}}bastien Coron and Jacques Patarin and Yannick Seurin}, title = {The Random Oracle Model and the Ideal Cipher Model are Equivalent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2008}, url = {http://eprint.iacr.org/2008/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin and C. Vikkelsoe}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{PRESENT:} An Ultra-Lightweight Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {450--466}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_31}, doi = {10.1007/978-3-540-74735-2\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SeurinP07, author = {Yannick Seurin and Thomas Peyrin}, editor = {Alex Biryukov}, title = {Security Analysis of Constructions Combining {FIL} Random Oracles}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {119--136}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_8}, doi = {10.1007/978-3-540-74619-5\_8}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/SeurinP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.