Yannick Seurin
Yannick Seurin
Cryptography Expert, ANSSI
Verifierad e-postadress på ssi.gouv.fr - Startsida
Titel
Citeras av
Citeras av
År
PRESENT: An ultra-lightweight block cipher
A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, ...
International workshop on cryptographic hardware and embedded systems, 450-466, 2007
26412007
Fast rotation of a Bose-Einstein condensate
V Bretin, S Stock, Y Seurin, J Dalibard
Physical review letters 92 (5), 50403, 2004
4412004
HB#: Increasing the Security and Efficiency of HB+
H Gilbert, MJB Robshaw, Y Seurin
Advances in Cryptology–EUROCRYPT 2008, 361-378, 2008
240*2008
Hash functions and RFID tags: Mind the gap
A Bogdanov, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin
International workshop on cryptographic hardware and embedded systems, 283-299, 2008
2152008
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1512008
Simple schnorr multi-signatures with applications to bitcoin
G Maxwell, A Poelstra, Y Seurin, P Wuille
Designs, Codes and Cryptography 87 (9), 2139-2164, 2019
1162019
Good variants of HB+ are hard to find
H Gilbert, M Robshaw, Y Seurin
Financial Cryptography and Data Security, 156-170, 2008
1052008
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
912018
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
86*2008
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
842016
On the exact security of schnorr-type signatures in the random oracle model
Y Seurin
Annual International Conference on the Theory and Applications of …, 2012
822012
How to encrypt with the LPN problem
H Gilbert, MJB Robshaw, Y Seurin
International Colloquium on Automata, Languages, and Programming, 679-690, 2008
802008
An asymptotically tight security analysis of the iterated Even-Mansour cipher
R Lampe, J Patarin, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2012
742012
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR, 2016
61*2016
EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC
B Cogliati, Y Seurin
Annual International Cryptology Conference, 121-149, 2016
552016
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin
Annual Cryptology Conference, 189-208, 2015
552015
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin
Annual International Conference on the Theory and Applications of …, 2015
542015
A domain extender for the ideal cipher
JS Coron, Y Dodis, A Mandal, Y Seurin
Theory of Cryptography Conference, 273-289, 2010
452010
How to construct an ideal cipher from a small set of public permutations
R Lampe, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2013
392013
Tweakable blockciphers with asymptotically optimal security
R Lampe, Y Seurin
International Workshop on Fast Software Encryption, 133-151, 2013
392013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20