Yannick Seurin
Yannick Seurin
Cryptography Expert, ANSSI
Verified email at ssi.gouv.fr - Homepage
Title
Cited by
Cited by
Year
PRESENT: An ultra-lightweight block cipher
A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, ...
International workshop on cryptographic hardware and embedded systems, 450-466, 2007
24352007
Fast rotation of a Bose-Einstein condensate
V Bretin, S Stock, Y Seurin, J Dalibard
Physical review letters 92 (5), 50403, 2004
4322004
HB#: Increasing the Security and Efficiency of HB+
H Gilbert, MJB Robshaw, Y Seurin
Advances in Cryptology–EUROCRYPT 2008, 361-378, 2008
226*2008
Hash functions and RFID tags: Mind the gap
A Bogdanov, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin
International workshop on cryptographic hardware and embedded systems, 283-299, 2008
2022008
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1402008
Good variants of HB+ are hard to find
H Gilbert, M Robshaw, Y Seurin
Financial Cryptography and Data Security, 156-170, 2008
992008
Simple schnorr multi-signatures with applications to bitcoin
G Maxwell, A Poelstra, Y Seurin, P Wuille
Designs, Codes and Cryptography 87 (9), 2139-2164, 2019
902019
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
86*2008
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
832018
On the exact security of schnorr-type signatures in the random oracle model
Y Seurin
Annual International Conference on the Theory and Applications of …, 2012
772012
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
762016
How to encrypt with the LPN problem
H Gilbert, MJB Robshaw, Y Seurin
International Colloquium on Automata, Languages, and Programming, 679-690, 2008
752008
An asymptotically tight security analysis of the iterated Even-Mansour cipher
R Lampe, J Patarin, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2012
732012
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR, 2016
54*2016
EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC
B Cogliati, Y Seurin
Annual International Cryptology Conference, 121-149, 2016
522016
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin
Annual Cryptology Conference, 189-208, 2015
522015
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin
Annual International Conference on the Theory and Applications of …, 2015
512015
A domain extender for the ideal cipher
JS Coron, Y Dodis, A Mandal, Y Seurin
Theory of Cryptography Conference, 273-289, 2010
442010
Tweakable blockciphers with asymptotically optimal security
R Lampe, Y Seurin
International Workshop on Fast Software Encryption, 133-151, 2013
382013
How to construct an ideal cipher from a small set of public permutations
R Lampe, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2013
372013
The system can't perform the operation now. Try again later.
Articles 1–20