Yannick Seurin

Orcid: 0000-0002-2948-9423

According to our database1, Yannick Seurin authored at least 49 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Commun. Cryptol., 2024

2021
The Deoxys AEAD Family.
J. Cryptol., 2021

The Key-Dependent Message Security of Key-Alternating Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2021

2020
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces.
IACR Cryptol. ePrint Arch., 2020

MuSig2: Simple Two-Round Schnorr Multi-Signatures.
IACR Cryptol. ePrint Arch., 2020

QCB: Efficient Quantum-secure Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2020

Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Blind Schnorr Signatures in the Algebraic Group Model.
IACR Cryptol. ePrint Arch., 2019

Simple Schnorr multi-signatures with applications to Bitcoin.
Des. Codes Cryptogr., 2019

2018
Minimizing the Two-Round Even-Mansour Cipher.
J. Cryptol., 2018

Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble.
IACR Cryptol. ePrint Arch., 2018

Analysis of the single-permutation encrypted Davies-Meyer construction.
Des. Codes Cryptogr., 2018

2017
Reconsidering the Security Bound of AES-GCM-SIV.
IACR Trans. Symmetric Cryptol., 2017

New Constructions of MACs from (Tweakable) Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
IACR Cryptol. ePrint Arch., 2017

Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour.
IACR Cryptol. ePrint Arch., 2017

Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction.
J. Cryptol., 2016

EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC.
IACR Cryptol. ePrint Arch., 2016

Strengthening the Known-Key Security Notion for Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

2015
A Note on the Indifferentiability of the 10-Round Feistel Construction.
IACR Cryptol. ePrint Arch., 2015

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

The Iterated Random Permutation Problem with Applications to Cascade Encryption.
IACR Cryptol. ePrint Arch., 2015

Tweakable Blockciphers with Asymptotically Optimal Security.
IACR Cryptol. ePrint Arch., 2015

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.
IACR Cryptol. ePrint Arch., 2015

Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing.
IACR Cryptol. ePrint Arch., 2015

On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks.
IACR Cryptol. ePrint Arch., 2015

Tweaking Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2015

2014
Security Analysis of Key-Alternating Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2014

Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

2013
New Constructions and Applications of Trapdoor DDH Groups.
IACR Cryptol. ePrint Arch., 2013

On the Lossiness of the Rabin Trapdoor Function.
IACR Cryptol. ePrint Arch., 2013

How to Construct an Ideal Cipher from a Small Set of Public Permutations.
IACR Cryptol. ePrint Arch., 2013

2012
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2012

On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2012

An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction.
IACR Cryptol. ePrint Arch., 2011

2009
A Domain Extender for the Ideal Cipher.
IACR Cryptol. ePrint Arch., 2009

Analysis of Intermediate Field Systems.
IACR Cryptol. ePrint Arch., 2009

2008
HB#: Increasing the Security and Efficiency of HB+.
IACR Cryptol. ePrint Arch., 2008

The Random Oracle Model and the Ideal Cipher Model are Equivalent.
IACR Cryptol. ePrint Arch., 2008

Building Secure Block Ciphers on Generic Attacks Assumptions.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

How to Encrypt with the LPN Problem.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Good Variants of HB<sup>+</sup> Are Hard to Find.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

HB<sup>#</sup>: Increasing the Security and Efficiency of HB<sup>+</sup>.
Proceedings of the Advances in Cryptology, 2008

Hash Functions and RFID Tags: Mind the Gap.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Looking Back at a New Hash Function.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Security Analysis of Constructions Combining FIL Random Oracles.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

PRESENT: An Ultra-Lightweight Block Cipher.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007


  Loading...