Serge Vaudenay
Orcid: 0000-0001-9185-1449Affiliations:
- Swiss Federal Institute of Technology in Lausanne, Switzerland
According to our database1,
Serge Vaudenay
authored at least 222 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
IACR Commun. Cryptol., 2024
2023
Making Classical (Threshold) Signatures Post-Quantum for Single Use on a Public Ledger.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Progress in Cryptology, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Information and Computer Security, 2020
Proceedings of the Advances in Information and Computer Security, 2020
\(\mathsf {BioLocker}\): A Practical Biometric Authentication Mechanism Based on 3D Fingervein.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Advances in Information and Computer Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks.
Proceedings of the Applied Cryptography and Network Security, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security - 20th International Conference, 2017
2016
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations.
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Cryptogr. Commun., 2016
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security.
Proceedings of the New Codebreakers, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
J. Comput. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Comput. Secur., 2014
Cryptogr. Commun., 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Sci. Ann. Comput. Sci., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems.
Proceedings of the Progress in Cryptology, 2013
Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-.
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Cryptogr. Commun., 2012
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
Related-key Attack against Triple Encryption based on Fixed Points.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
CoRR, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Coding and Cryptology, Second International Workshop, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Topics in Cryptology, 2006
Springer, ISBN: 978-0-387-27934-3, 2006
2005
The Pairing Problem with User Interaction.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Springer, ISBN: 978-0-387-25464-7, 2005
2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Commun. Inf. Syst., 2001
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the STACS 98, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Advances in Cryptology, 1996
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992