BibTeX records: Yannick Seurin

download as .bib file

@article{DBLP:journals/iacr/CogliatiJPS22,
  author       = {Beno{\^{\i}}t Cogliati and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {A Long Tweak Goes a Long Way: High Multi-user Security Authenticated
                  Encryption from Tweakable Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {846},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/846},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiJPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JeanNPS21,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {The Deoxys {AEAD} Family},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {31},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09397-w},
  doi          = {10.1007/S00145-021-09397-W},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/JeanNPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BhaumikBCLNSS21,
  author       = {Ritam Bhaumik and
                  Xavier Bonnetain and
                  Andr{\'{e}} Chailloux and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher and
                  Yannick Seurin},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {{QCB:} Efficient Quantum-Secure Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {668--698},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_23},
  doi          = {10.1007/978-3-030-92062-3\_23},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BhaumikBCLNSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NickRS21,
  author       = {Jonas Nick and
                  Tim Ruffing and
                  Yannick Seurin},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {MuSig2: Simple Two-Round Schnorr Multi-signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {189--221},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_8},
  doi          = {10.1007/978-3-030-84242-0\_8},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NickRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FarshimKSV21,
  author       = {Pooya Farshim and
                  Louiza Khati and
                  Yannick Seurin and
                  Damien Vergnaud},
  editor       = {Kenneth G. Paterson},
  title        = {The Key-Dependent Message Security of Key-Alternating Feistel Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {351--374},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_15},
  doi          = {10.1007/978-3-030-75539-3\_15},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FarshimKSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimKSV21,
  author       = {Pooya Farshim and
                  Louiza Khati and
                  Yannick Seurin and
                  Damien Vergnaud},
  title        = {The Key-Dependent Message Security of Key-Alternating Feistel Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/330},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimKSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NickRSW20,
  author       = {Jonas Nick and
                  Tim Ruffing and
                  Yannick Seurin and
                  Pieter Wuille},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1717--1731},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417236},
  doi          = {10.1145/3372297.3417236},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NickRSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerPS20,
  author       = {Georg Fuchsbauer and
                  Antoine Plouviez and
                  Yannick Seurin},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic
                  Group Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {63--95},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_3},
  doi          = {10.1007/978-3-030-45724-2\_3},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NickRSW20,
  author       = {Jonas Nick and
                  Tim Ruffing and
                  Yannick Seurin and
                  Pieter Wuille},
  title        = {MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1057},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NickRSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NickRS20,
  author       = {Jonas Nick and
                  Tim Ruffing and
                  Yannick Seurin},
  title        = {MuSig2: Simple Two-Round Schnorr Multi-Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1261},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1261},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NickRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikBCLNSS20,
  author       = {Ritam Bhaumik and
                  Xavier Bonnetain and
                  Andr{\'{e}} Chailloux and
                  Ga{\"{e}}tan Leurent and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher and
                  Yannick Seurin},
  title        = {{QCB:} Efficient Quantum-secure Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1304},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1304},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikBCLNSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaxwellPSW19,
  author       = {Gregory Maxwell and
                  Andrew Poelstra and
                  Yannick Seurin and
                  Pieter Wuille},
  title        = {Simple Schnorr multi-signatures with applications to Bitcoin},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2139--2164},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00608-x},
  doi          = {10.1007/S10623-019-00608-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaxwellPSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FuchsbauerOS19,
  author       = {Georg Fuchsbauer and
                  Michele Orr{\`{u}} and
                  Yannick Seurin},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {657--689},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_22},
  doi          = {10.1007/978-3-030-17653-2\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FuchsbauerOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerPS19,
  author       = {Georg Fuchsbauer and
                  Antoine Plouviez and
                  Yannick Seurin},
  title        = {Blind Schnorr Signatures in the Algebraic Group Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {877},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/877},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CogliatiS18,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {Analysis of the single-permutation encrypted Davies-Meyer construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2703--2723},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0470-9},
  doi          = {10.1007/S10623-018-0470-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CogliatiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChenLLSS18,
  author       = {Shan Chen and
                  Rodolphe Lampe and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger},
  title        = {Minimizing the Two-Round Even-Mansour Cipher},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {4},
  pages        = {1064--1119},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-018-9295-y},
  doi          = {10.1007/S00145-018-9295-Y},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChenLLSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaxwellPSW18,
  author       = {Gregory Maxwell and
                  Andrew Poelstra and
                  Yannick Seurin and
                  Pieter Wuille},
  title        = {Simple Schnorr Multi-Signatures with Applications to Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaxwellPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerOS18,
  author       = {Georg Fuchsbauer and
                  Michele Orr{\`{u}} and
                  Yannick Seurin},
  title        = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/CogliatiLS17,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jooyoung Lee and
                  Yannick Seurin},
  title        = {New Constructions of MACs from (Tweakable) Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {27--58},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.27-58},
  doi          = {10.13154/TOSC.V2017.I2.27-58},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/CogliatiLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataS17,
  author       = {Tetsu Iwata and
                  Yannick Seurin},
  title        = {Reconsidering the Security Bound of {AES-GCM-SIV}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {240--267},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.240-267},
  doi          = {10.13154/TOSC.V2017.I4.240-267},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IwataMPS17,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Thomas Peyrin and
                  Yannick Seurin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message
                  Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_2},
  doi          = {10.1007/978-3-319-63697-9\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/IwataMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaiSST17,
  author       = {Yuanxi Dai and
                  Yannick Seurin and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized
                  Key-Schedules: Five Rounds Are Necessary and Sufficient},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {524--555},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_18},
  doi          = {10.1007/978-3-319-63697-9\_18},
  timestamp    = {Mon, 14 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaiSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiSST17,
  author       = {Yuanxi Dai and
                  Yannick Seurin and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam},
  title        = {Five Rounds are Sufficient and Necessary for the Indifferentiability
                  of Iterated Even-Mansour},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataMPS17,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message
                  Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataS17,
  author       = {Tetsu Iwata and
                  Yannick Seurin},
  title        = {Reconsidering the Security Bound of {AES-GCM-SIV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CoronHKPST16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Thomas Holenstein and
                  Robin K{\"{u}}nzler and
                  Jacques Patarin and
                  Yannick Seurin and
                  Stefano Tessaro},
  title        = {How to Build an Ideal Cipher: The Indifferentiability of the Feistel
                  Construction},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {1},
  pages        = {61--114},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-014-9189-6},
  doi          = {10.1007/S00145-014-9189-6},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CoronHKPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PeyrinS16,
  author       = {Thomas Peyrin and
                  Yannick Seurin},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block
                  Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_2},
  doi          = {10.1007/978-3-662-53018-4\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/PeyrinS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CogliatiS16,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant
                  {MAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {121--149},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_5},
  doi          = {10.1007/978-3-662-53018-4\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CogliatiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/CogliatiS16,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  editor       = {Thomas Peyrin},
  title        = {Strengthening the Known-Key Security Notion for Block Ciphers},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {494--513},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_25},
  doi          = {10.1007/978-3-662-52993-5\_25},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/CogliatiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS16,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {Strengthening the Known-Key Security Notion for Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS16a,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant
                  {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CogliatiS15,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers
                  with Linear Tweak and Key Mixing},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {134--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_6},
  doi          = {10.1007/978-3-662-48800-3\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CogliatiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CogliatiLS15,
  author       = {Benoit Cogliati and
                  Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Tweaking Even-Mansour Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {189--208},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_9},
  doi          = {10.1007/978-3-662-47989-6\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CogliatiLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MinaudS15,
  author       = {Brice Minaud and
                  Yannick Seurin},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {The Iterated Random Permutation Problem with Applications to Cascade
                  Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_17},
  doi          = {10.1007/978-3-662-47989-6\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MinaudS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CogliatiS15,
  author       = {Benoit Cogliati and
                  Yannick Seurin},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {On the Provable Security of the Iterated Even-Mansour Cipher Against
                  Related-Key and Chosen-Key Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {584--613},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_23},
  doi          = {10.1007/978-3-662-46800-5\_23},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CogliatiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GaziLSST15,
  author       = {Peter Gazi and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger and
                  Stefano Tessaro},
  editor       = {Gregor Leander},
  title        = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length
                  Extension Schemes},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {319--341},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_16},
  doi          = {10.1007/978-3-662-48116-5\_16},
  timestamp    = {Sat, 19 Oct 2019 20:27:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GaziLSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS15,
  author       = {Benoit Cogliati and
                  Yannick Seurin},
  title        = {On the Provable Security of the Iterated Even-Mansour Cipher against
                  Related-Key and Chosen-Key Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampeS15,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  title        = {Tweakable Blockciphers with Asymptotically Optimal Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziLSST15,
  author       = {Peter Gazi and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger and
                  Stefano Tessaro},
  title        = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length
                  Extension Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziLSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinaudS15,
  author       = {Brice Minaud and
                  Yannick Seurin},
  title        = {The Iterated Random Permutation Problem with Applications to Cascade
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinaudS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiLS15,
  author       = {Benoit Cogliati and
                  Rodolphe Lampe and
                  Yannick Seurin},
  title        = {Tweaking Even-Mansour Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS15a,
  author       = {Benoit Cogliati and
                  Yannick Seurin},
  title        = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers
                  with Linear Tweak and Key Mixing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seurin15,
  author       = {Yannick Seurin},
  title        = {A Note on the Indifferentiability of the 10-Round Feistel Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seurin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeyrinS15,
  author       = {Thomas Peyrin and
                  Yannick Seurin},
  title        = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeyrinS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChenLLSS14,
  author       = {Shan Chen and
                  Rodolphe Lampe and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Minimizing the Two-Round Even-Mansour Cipher},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_3},
  doi          = {10.1007/978-3-662-44371-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChenLLSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LampeS14,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Security Analysis of Key-Alternating Feistel Ciphers},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {243--264},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_13},
  doi          = {10.1007/978-3-662-46706-0\_13},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LampeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Seurin14,
  author       = {Yannick Seurin},
  editor       = {Hugo Krawczyk},
  title        = {On the Lossiness of the Rabin Trapdoor Function},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {380--398},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_22},
  doi          = {10.1007/978-3-642-54631-0\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Seurin14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CogliatiPS14,
  author       = {Benoit Cogliati and
                  Jacques Patarin and
                  Yannick Seurin},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Security Amplification for the Composition of Block Ciphers: Simpler
                  Proofs and New Results},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_8},
  doi          = {10.1007/978-3-319-13051-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/CogliatiPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampeS14,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  title        = {Security Analysis of Key-Alternating Feistel Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampeS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLSS14,
  author       = {Shan Chen and
                  Rodolphe Lampe and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger},
  title        = {Minimizing the Two-Round Even-Mansour Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LampeS13,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {How to Construct an Ideal Cipher from a Small Set of Public Permutations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {444--463},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_23},
  doi          = {10.1007/978-3-642-42033-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LampeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SeurinT13,
  author       = {Yannick Seurin and
                  Joana Treger},
  editor       = {Ed Dawson},
  title        = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {68--83},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_5},
  doi          = {10.1007/978-3-642-36095-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SeurinT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LampeS13,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  editor       = {Shiho Moriai},
  title        = {Tweakable Blockciphers with Asymptotically Optimal Security},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_8},
  doi          = {10.1007/978-3-662-43933-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LampeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Seurin13,
  author       = {Yannick Seurin},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {New Constructions and Applications of Trapdoor {DDH} Groups},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {443--460},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_27},
  doi          = {10.1007/978-3-642-36362-7\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Seurin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampeS13,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  title        = {How to Construct an Ideal Cipher from a Small Set of Public Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seurin13,
  author       = {Yannick Seurin},
  title        = {On the Lossiness of the Rabin Trapdoor Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seurin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seurin13a,
  author       = {Yannick Seurin},
  title        = {New Constructions and Applications of Trapdoor {DDH} Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seurin13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LampePS12,
  author       = {Rodolphe Lampe and
                  Jacques Patarin and
                  Yannick Seurin},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {An Asymptotically Tight Security Analysis of the Iterated Even-Mansour
                  Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {278--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_18},
  doi          = {10.1007/978-3-642-34961-4\_18},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LampePS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Seurin12,
  author       = {Yannick Seurin},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle
                  Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {554--571},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_33},
  doi          = {10.1007/978-3-642-29011-4\_33},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Seurin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MandalPS12,
  author       = {Avradip Mandal and
                  Jacques Patarin and
                  Yannick Seurin},
  editor       = {Ronald Cramer},
  title        = {On the Public Indifferentiability and Correlation Intractability of
                  the 6-Round Feistel Construction},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_16},
  doi          = {10.1007/978-3-642-28914-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MandalPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seurin12,
  author       = {Yannick Seurin},
  title        = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seurin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeurinT12,
  author       = {Yannick Seurin and
                  Joana Treger},
  title        = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeurinT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalPS11,
  author       = {Avradip Mandal and
                  Jacques Patarin and
                  Yannick Seurin},
  title        = {On the Public Indifferentiability and Correlation Intractability of
                  the 6-Round Feistel Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CoronDMS10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Yevgeniy Dodis and
                  Avradip Mandal and
                  Yannick Seurin},
  editor       = {Daniele Micciancio},
  title        = {A Domain Extender for the Ideal Cipher},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {273--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_17},
  doi          = {10.1007/978-3-642-11799-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CoronDMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronDMS09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Yevgeniy Dodis and
                  Avradip Mandal and
                  Yannick Seurin},
  title        = {A Domain Extender for the Ideal Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronDMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilletPS09,
  author       = {Olivier Billet and
                  Jacques Patarin and
                  Yannick Seurin},
  title        = {Analysis of Intermediate Field Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilletPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BilletRSY08,
  author       = {Olivier Billet and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  Yiqun Lisa Yin},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Looking Back at a New Hash Function},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_18},
  doi          = {10.1007/978-3-540-70500-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08,
  author       = {Andrey Bogdanov and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Hash Functions and {RFID} Tags: Mind the Gap},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_18},
  doi          = {10.1007/978-3-540-85053-3\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronPS08,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Jacques Patarin and
                  Yannick Seurin},
  editor       = {David A. Wagner},
  title        = {The Random Oracle Model and the Ideal Cipher Model Are Equivalent},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_1},
  doi          = {10.1007/978-3-540-85174-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Nigel P. Smart},
  title        = {HB\({}^{\mbox{{\#}}}\): Increasing the Security and Efficiency of
                  HB\({}^{\mbox{+}}\)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {361--378},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_21},
  doi          = {10.1007/978-3-540-78967-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Gene Tsudik},
  title        = {Good Variants of HB\({}^{\mbox{+}}\) Are Hard to Find},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_12},
  doi          = {10.1007/978-3-540-85230-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {How to Encrypt with the {LPN} Problem},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {679--690},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_55},
  doi          = {10.1007/978-3-540-70583-3\_55},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PatarinS08,
  author       = {Jacques Patarin and
                  Yannick Seurin},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Building Secure Block Ciphers on Generic Attacks Assumptions},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_5},
  doi          = {10.1007/978-3-642-04159-4\_5},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PatarinS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertRS08,
  author       = {Henri Gilbert and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  title        = {HB{\#}: Increasing the Security and Efficiency of {HB+}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronPS08,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Jacques Patarin and
                  Yannick Seurin},
  title        = {The Random Oracle Model and the Ideal Cipher Model are Equivalent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  C. Vikkelsoe},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{PRESENT:} An Ultra-Lightweight Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {450--466},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_31},
  doi          = {10.1007/978-3-540-74735-2\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SeurinP07,
  author       = {Yannick Seurin and
                  Thomas Peyrin},
  editor       = {Alex Biryukov},
  title        = {Security Analysis of Constructions Combining {FIL} Random Oracles},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_8},
  doi          = {10.1007/978-3-540-74619-5\_8},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/SeurinP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics