What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Serge Vaudenay
Google Scholar
151
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
New Attacks on LowMC Using Partial Sets in the Single-Data Setting.
Subhadeep Banik
Andrea Caforio
Serge Vaudenay
2024
journals/cic
Impossibility of Post-Quantum Shielding Black-Box Constructions of CCA from CPA.
Loïs Huguenin-Dumittan
Serge Vaudenay
2024
conf/ccs
Non-Transferable Anonymous Tokens by Secret Binding.
F. Betül Durak
Laurane Marco
Abdullah Talayhan
Serge Vaudenay
2024
conf/uss
K-Waay: Fast and Deniable Post-Quantum X3DH without Ring Signatures.
Daniel Collins
Loïs Huguenin-Dumittan
Ngoc Khanh Nguyen
Nicolas Rolin
Serge Vaudenay
2024
conf/sacrypt
SILBE: An Updatable Public Key Encryption Scheme from Lollipop Attacks.
Max Duparc
Tako Boris Fouotsa
Serge Vaudenay
2023
conf/uss
Cryptographic Administration for Secure Group Messaging.
David Balbás
Daniel Collins
Serge Vaudenay
2023
conf/crypto
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs.
Melissa Chase
F. Betül Durak
Serge Vaudenay
2023
conf/crypto
On Active Attack Detection in Messaging with Immediate Decryption.
Khashayar Barooti
Daniel Collins
Simone Colombo
Loïs Huguenin-Dumittan
Serge Vaudenay
2023
conf/acns
A Gapless Post-quantum Hash Proof System in the Hamming Metric.
Bénédikt Tran
Serge Vaudenay
2023
conf/icics
Private Message Franking with After Opening Privacy.
Iraklis Leontiadis
Serge Vaudenay
2023
conf/iwsec
Extractable Witness Encryption for the Homogeneous Linear Equations Problem.
Bénédikt Tran
Serge Vaudenay
2023
conf/iwsec
Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger.
Laurane Marco
Abdullah Talayhan
Serge Vaudenay
2022
conf/eurocrypt
On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3.
Loïs Huguenin-Dumittan
Serge Vaudenay
2022
conf/africacrypt
Solving the Learning Parity with Noise Problem Using Quantum Algorithms.
Bénédikt Tran
Serge Vaudenay
2021
conf/acns
Towards Efficient LPN-Based Symmetric Encryption.
Sonia Bogos
Dario Korolija
Thomas Locher
Serge Vaudenay
2021
conf/icisc
Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem.
Gwangbae Choi
Serge Vaudenay
2021
conf/pkc
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness.
Andrea Caforio
F. Betül Durak
Serge Vaudenay
2021
conf/ctrsa
On the Effectiveness of Time Travel to Inject COVID-19 Alerts.
Vincenzo Iovino
Serge Vaudenay
Martin Vuagnoux
2021
conf/asiacrypt
FAST: Secure and High Performance Format-Preserving Encryption and Tokenization.
F. Betül Durak
Henning Horst
Michael Horst
Serge Vaudenay
2021
conf/asiacrypt
New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair.
Subhadeep Banik
Khashayar Barooti
Serge Vaudenay
Hailun Yan
2021
conf/cans
FO-like Combiners and Hybrid Post-Quantum Cryptography.
Loïs Huguenin-Dumittan
Serge Vaudenay
2020
journals/tosc
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair.
Subhadeep Banik
Khashayar Barooti
F. Betül Durak
Serge Vaudenay
2020
journals/tosc
Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers.
Subhadeep Banik
Fatih Balli
Francesco Regazzoni
Serge Vaudenay
2020
conf/acns
Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based Schemes.
Loïs Huguenin-Dumittan
Serge Vaudenay
2020
conf/acns
\(\mathsf {BioLocker}\): A Practical Biometric Authentication Mechanism Based on 3D Fingervein.
F. Betül Durak
Loïs Huguenin-Dumittan
Serge Vaudenay
2020
conf/iwsec
Symmetric Asynchronous Ratcheted Communication with Associated Data.
Hailun Yan
Serge Vaudenay
2020
conf/iwsec
Sublinear Bounds on the Distinguishing Advantage for Multiple Samples.
Serge Fehr
Serge Vaudenay
2020
conf/asiacrypt
Determining the Core Primitive for Optimally Secure Ratcheting.
Fatih Balli
Paul Rösler
Serge Vaudenay
2019
conf/wisa
Timed-Release Encryption with Master Time Bound Key.
Gwangbae Choi
Serge Vaudenay
2019
conf/iwsec
Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity.
F. Betül Durak
Serge Vaudenay
2019
conf/eurocrypt
Misuse Attacks on Post-quantum Cryptosystems.
Ciprian Baetu
F. Betül Durak
Loïs Huguenin-Dumittan
Abdullah Talayhan
Serge Vaudenay
2018
conf/acisp
Secure Contactless Payment.
Handan Kilinç
Serge Vaudenay
2018
conf/acns
Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks.
Serge Vaudenay
Damian Vizár
2018
conf/acns
Formal Analysis of Distance Bounding with Secure Hardware.
Handan Kilinç
Serge Vaudenay
2018
conf/acns
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains.
F. Betül Durak
Serge Vaudenay
2017
conf/crypto
Breaking the FF3 Format-Preserving Encryption Standard over Small Domains.
F. Betül Durak
Serge Vaudenay
2016
conf/asiacrypt
Optimization of \mathsf LPN Solving Algorithms.
Sonia Bogos
Serge Vaudenay
2016
conf/asiacrypt
Authenticated Encryption with Variable Stretch.
Reza Reyhanitabar
Serge Vaudenay
Damian Vizár
2016
conf/asiacrypt
Efficient Public-Key Distance Bounding Protocol.
Handan Kilinç
Serge Vaudenay
2016
conf/cans
Distance Bounding Based on PUF.
Mathilde Igier
Serge Vaudenay
2016
conf/cans
Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra.
Serge Vaudenay
2016
conf/cans
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015.
Thierry Kaufmann
Hervé Pelletier
Serge Vaudenay
Karine Villegas
2015
conf/fse
Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation.
Céline Blondeau
Aslí Bay
Serge Vaudenay
2015
conf/fse
Boosting OMD for Almost Free Authentication of Associated Data.
Reza Reyhanitabar
Serge Vaudenay
Damian Vizár
2015
conf/ccs
The Limits of Composable Crypto with Transferable Setup Devices.
Ioana Boureanu
Miyako Ohkubo
Serge Vaudenay
2015
conf/crypto
Capacity and Data Complexity in Multidimensional Linear Attack.
Jialin Huang
Serge Vaudenay
Xuejia Lai
Kaisa Nyberg
2015
conf/fc
Private and Secure Public-Key Distance Bounding - Application to NFC Payment.
Serge Vaudenay
2015
conf/acns
Optimal Proximity Proofs Revisited.
Handan Kilinç
Serge Vaudenay
2015
conf/provsec
Sound Proof of Proximity of Knowledge.
Serge Vaudenay
2015
conf/provsec
On Privacy for RFID.
Serge Vaudenay
2015
conf/eurocrypt
Better Algorithms for LWE and LWR.
Alexandre Duc
Florian Tramèr
Serge Vaudenay
2015
conf/asiacrypt
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition.
Sonia Bogos
Serge Vaudenay
2014
journals/compsec
Location leakage in distance bounding: Why location privacy does not work.
Aikaterini Mitrokotsa
Cristina Onete
Serge Vaudenay
2014
conf/acisp
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations.
Petr Susil
Pouyan Sepehrdad
Serge Vaudenay
2014
conf/icisc
Compact and Efficient UC Commitments Under Atomic-Exchanges.
Ioana Boureanu
Serge Vaudenay
2014
conf/provsec
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode.
Reza Reyhanitabar
Serge Vaudenay
Damian Vizár
2014
conf/iwsec
Improved Linear Cryptanalysis of Reduced-Round MIBS.
Aslí Bay
Jialin Huang
Serge Vaudenay
2014
conf/africacrypt
Breaking the IOC Authenticated Encryption Mode.
Paul Bottinelli
Reza Reyhanitabar
Serge Vaudenay
2014
conf/sacrypt
OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Simon Cogliani
Diana-Stefania Maimut
David Naccache
Rodrigo Portella do Canto
Reza Reyhanitabar
Serge Vaudenay
Damian Vizár
2013
conf/fse
Smashing WEP in a Passive Attack.
Pouyan Sepehrdad
Petr Susil
Serge Vaudenay
Martin Vuagnoux
2013
conf/fse
Towards Secure Distance Bounding.
Ioana Boureanu
Aikaterini Mitrokotsa
Serge Vaudenay
2013
conf/acns
Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-.
Sonia Bogos
Ioana Boureanu
Serge Vaudenay
2013
conf/lightsec
Secure and Lightweight Distance-Bounding.
Ioana Boureanu
Aikaterini Mitrokotsa
Serge Vaudenay
2013
conf/provsec
Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges.
Ioana Boureanu
Serge Vaudenay
2013
conf/provsec
On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols.
Serge Vaudenay
2013
conf/africacrypt
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems.
Alexandre Duc
Serge Vaudenay
2012
conf/fse
ElimLin Algorithm Revisited.
Nicolas T. Courtois
Pouyan Sepehrdad
Petr Susil
Serge Vaudenay
2012
conf/latincrypt
On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols - PRF-ness alone Does Not Stop the Frauds!
Ioana Boureanu
Aikaterini Mitrokotsa
Serge Vaudenay
2012
conf/crypto
Resistance against Iterated Attacks by Decorrelation Revisited, .
Aslí Bay
Atefeh Mashatan
Serge Vaudenay
2012
conf/provsec
Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices.
Ioana Boureanu
Serge Vaudenay
2012
conf/cans
Strong Privacy for RFID Systems from Plaintext-Aware Encryption.
Khaled Ouafi
Serge Vaudenay
2011
journals/joc
Short Undeniable Signatures Based on Group Homomorphisms.
Jean Monnerat
Serge Vaudenay
2011
conf/acns
On Hiding a Plaintext Length by Preencryption.
Cihangir Tezcan
Serge Vaudenay
2011
conf/icisc
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit.
Yi Lu
Serge Vaudenay
Willi Meier
Liping Ding
Jianchun Jiang
2011
conf/eurocrypt
Statistical Attack on RC4 - Distinguishing WPA.
Pouyan Sepehrdad
Serge Vaudenay
Martin Vuagnoux
2010
conf/acns
A Message Recognition Protocol Based on Standard Assumptions.
Atefeh Mashatan
Serge Vaudenay
2010
conf/provsec
Distinguishing Distributions Using Chernoff Information.
Thomas Baignères
Pouyan Sepehrdad
Serge Vaudenay
2010
conf/ches
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.
Stéphane Badel
Nilay Dagtekin
Jorge Nakahara Jr.
Khaled Ouafi
Nicolas Reffé
Pouyan Sepehrdad
Petr Susil
Serge Vaudenay
2010
conf/sacrypt
Discovery and Exploitation of New Biases in RC4.
Pouyan Sepehrdad
Serge Vaudenay
Martin Vuagnoux
2010
conf/cans
Cryptanalysis of Reduced-Round MIBS Block Cipher.
Aslí Bay
Jorge Nakahara Jr.
Serge Vaudenay
2009
conf/acns
Efficient Deniable Authentication for Signatures.
Jean Monnerat
Sylvain Pasini
Serge Vaudenay
2009
conf/ches
On Tamper-Resistance from a Theoretical Viewpoint.
Paulo Mateus
Serge Vaudenay
2009
conf/eurocrypt
Smashing SQUASH-0.
Khaled Ouafi
Serge Vaudenay
2008
journals/joc
Cryptanalysis of an E0-like Combiner with Memory.
Yi Lu
Serge Vaudenay
2008
conf/ccs
Mutual authentication in RFID: security and privacy.
Radu-Ioan Paise
Serge Vaudenay
2008
conf/asiacrypt
On the Security of HB# against a Man-in-the-Middle Attack.
Khaled Ouafi
Raphael Overbeck
Serge Vaudenay
2007
conf/acisp
: A Hardware-Oriented Trapdoor Cipher.
Jean-Philippe Aumasson
Matthieu Finiasz
Willi Meier
Serge Vaudenay
2007
conf/acisp
Hash-and-Sign with Weak Hashing Made Secure.
Sylvain Pasini
Serge Vaudenay
2007
conf/icisc
Security-Preserving Asymmetric Protocol Encapsulation.
Raphael C.-W. Phan
Serge Vaudenay
2007
conf/asiacrypt
On Privacy Models for RFID.
Serge Vaudenay
2007
conf/sacrypt
Linear Cryptanalysis of Non Binary Ciphers.
Thomas Baignères
Jacques Stern
Serge Vaudenay
2007
conf/sacrypt
Passive-Only Key Recovery Attacks on RC4.
Serge Vaudenay
Martin Vuagnoux
2006
conf/icisc
RFID Privacy Based on Public-Key Cryptography.
Serge Vaudenay
2006
conf/pkc
SAS-Based Authenticated Key Agreement.
Sylvain Pasini
Serge Vaudenay
2006
conf/ctrsa
An Optimal Non-interactive Message Authentication Protocol.
Sylvain Pasini
Serge Vaudenay
2006
conf/sacrypt
When Stream Cipher Analysis Meets Public-Key Cryptography.
Matthieu Finiasz
Serge Vaudenay
2005
conf/sec
The Pairing Problem with User Interaction.
Thomas Peyrin
Serge Vaudenay
2005
conf/crypto
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.
Yi Lu
Willi Meier
Serge Vaudenay
2005
conf/crypto
Secure Communications over Insecure Channels Based on Short Authenticated Strings.
Serge Vaudenay
2005
conf/sacrypt
Proving the Security of AES Substitution-Permutation Network.
Thomas Baignères
Serge Vaudenay
2004
conf/acisp
Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA.
Serge Vaudenay
2004
conf/acisp
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing.
Gildas Avoine
Serge Vaudenay
2004
conf/crypto
Faster Correlation Attack on Bluetooth Keystream Generator E0.
Yi Lu
Serge Vaudenay
2004
conf/pkc
Undeniable Signatures Based on Characters: How to Sign with One Bit.
Jean Monnerat
Serge Vaudenay
2004
conf/icics
On Some Weak Extensions of AES and BES.
Jean Monnerat
Serge Vaudenay
2004
conf/asiacrypt
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0.
Yi Lu
Serge Vaudenay
2004
conf/asiacrypt
Generic Homomorphic Undeniable Signatures.
Jean Monnerat
Serge Vaudenay
2004
conf/asiacrypt
How Far Can We Go Beyond Linear Cryptanalysis?
Thomas Baignères
Pascal Junod
Serge Vaudenay
2004
conf/sacrypt
FOX : A New Family of Block Ciphers.
Pascal Junod
Serge Vaudenay
2004
conf/sacrypt
Perfect Diffusion Primitives for Block Ciphers.
Pascal Junod
Serge Vaudenay
2003
journals/joc
Decorrelation: A Theory for Block Cipher Security.
Serge Vaudenay
2003
conf/fse
Optimal Key Ranking Procedures in a Statistical Cryptanalysis.
Pascal Junod
Serge Vaudenay
2003
conf/crypto
Password Interception in a SSL/TLS Channel.
Brice Canvel
Alain P. Hiltgen
Serge Vaudenay
Martin Vuagnoux
2003
conf/wisa
Optimal Fair Exchange with Guardian Angels.
Gildas Avoine
Serge Vaudenay
2003
conf/pkc
The Security of DSA and ECDSA.
Serge Vaudenay
2003
conf/sacrypt
On the Use of GF-Inversion as a Cryptographic Primitive.
Kazumaro Aoki
Serge Vaudenay
2002
conf/eurocrypt
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ....
Serge Vaudenay
2001
journals/joc
Cryptanalysis of the Chor - Rivest Cryptosystem.
Serge Vaudenay
2000
conf/fse
A Statistical Attack on RC6.
Henri Gilbert
Helena Handschuh
Antoine Joux
Serge Vaudenay
2000
conf/ches
Efficient Generation of Prime Numbers.
Marc Joye
Pascal Paillier
Serge Vaudenay
2000
conf/pkc
Design Validations for Discrete Logarithm Based Signature Schemes.
Ernest F. Brickell
David Pointcheval
Serge Vaudenay
Moti Yung
2000
conf/asiacrypt
On the Pseudorandomness of Top-Level Schemes of Block Ciphers.
Shiho Moriai
Serge Vaudenay
2000
conf/sacrypt
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case.
Serge Vaudenay
2000
conf/sacrypt
DFCv2.
Louis Granboulan
Phong Q. Nguyen
Fabrice Noilhan
Serge Vaudenay
1999
conf/fse
On the Security of CS-Cipher.
Serge Vaudenay
1999
conf/icisc
On Probable Security for Conventional Cryptography.
Serge Vaudenay
1999
conf/eurocrypt
Resistance Against General Iterated Attacks.
Serge Vaudenay
1999
conf/asiacrypt
On the Lai-Massey Scheme.
Serge Vaudenay
1999
conf/sacrypt
A Universal Encryption Standard.
Helena Handschuh
Serge Vaudenay
1999
conf/sacrypt
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness.
Serge Vaudenay
1998
journals/joc
The Black-Box Model for Cryptographic Primitives.
Claus-Peter Schnorr
Serge Vaudenay
1998
conf/fse
CS-Cipher.
Jacques Stern
Serge Vaudenay
1998
conf/crypto
Cryptanalysis of the Chor-Rivest Cryptosystem.
Serge Vaudenay
1998
conf/sacrypt
Computational Alternatives to Random Number Generators.
David M'Raïhi
David Naccache
David Pointcheval
Serge Vaudenay
1998
conf/sacrypt
Feistel Ciphers with L<sub>2</sub>-Decorrelation.
Serge Vaudenay
1997
journals/joc
The Security of the Birational Permutation Signature Schemes.
Don Coppersmith
Jacques Stern
Serge Vaudenay
1997
conf/fse
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications.
David M'Raïhi
David Naccache
Jacques Stern
Serge Vaudenay
1997
conf/fc
SVP: A Flexible Micropayment Scheme.
Jacques Stern
Serge Vaudenay
1996
conf/fse
On the Weak Keys of Blowfish.
Serge Vaudenay
1996
conf/ccs
An Experiment on DES Statistical Cryptanalysis.
Serge Vaudenay
1996
conf/crypto
Hidden Collisions on DSS.
Serge Vaudenay
1996
conf/ih
The Newton Channel.
Ross J. Anderson
Serge Vaudenay
Bart Preneel
Kaisa Nyberg
1996
conf/asiacrypt
Authenticated Multi-Party Key Agreement.
Mike Just
Serge Vaudenay
1996
conf/asiacrypt
Minding your p's and q's.
Ross J. Anderson
Serge Vaudenay
1994
conf/fse
On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER.
Serge Vaudenay
1994
conf/eurocrypt
Links Between Differential and Linear Cryptanalysis.
Florent Chabaud
Serge Vaudenay
1994
conf/eurocrypt
Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard.
David Naccache
David M'Raïhi
Serge Vaudenay
Dan Raphaeli
1994
conf/eurocrypt
Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Claus-Peter Schnorr
Serge Vaudenay
1993
conf/fse
Parallel FFT-Hashing.
Claus-Peter Schnorr
Serge Vaudenay
1993
conf/crypto
Attacks on the Birational Permutation Signature Schemes.
Don Coppersmith
Jacques Stern
Serge Vaudenay
1992
conf/crypto
FFT-Hash-II is not yet Collision-free.
Serge Vaudenay
Coauthors
Abdullah Talayhan
(3)
Aikaterini Mitrokotsa
(4)
Alain P. Hiltgen
(1)
Alexandre Duc
(2)
Andrea Caforio
(2)
Antoine Joux
(1)
Aslí Bay
(4)
Atefeh Mashatan
(2)
Bart Preneel
(1)
Bénédikt Tran
(3)
Brice Canvel
(1)
Céline Blondeau
(1)
Cihangir Tezcan
(1)
Ciprian Baetu
(1)
Claus-Peter Schnorr
(3)
Cristina Onete
(1)
Damian Vizár
(5)
Dan Raphaeli
(1)
Daniel Collins
(3)
Dario Korolija
(1)
David Balbás
(1)
David M'Raïhi
(3)
David Naccache
(4)
David Pointcheval
(2)
Diana-Stefania Maimut
(1)
Don Coppersmith
(2)
Ernest F. Brickell
(1)
F. Betül Durak
(10)
Fabrice Noilhan
(1)
Fatih Balli
(2)
Florent Chabaud
(1)
Florian Tramèr
(1)
Francesco Regazzoni
(1)
Gildas Avoine
(2)
Gwangbae Choi
(2)
Hailun Yan
(2)
Handan Kilinç
(4)
Helena Handschuh
(2)
Henning Horst
(1)
Henri Gilbert
(1)
Hervé Pelletier
(1)
Ioana Boureanu
(8)
Iraklis Leontiadis
(1)
Jacques Stern
(6)
Jean Monnerat
(5)
Jean-Philippe Aumasson
(1)
Jialin Huang
(2)
Jianchun Jiang
(1)
Jorge Nakahara Jr.
(2)
Kaisa Nyberg
(2)
Karine Villegas
(1)
Kazumaro Aoki
(1)
Khaled Ouafi
(4)
Khashayar Barooti
(3)
Laurane Marco
(2)
Liping Ding
(1)
Loïs Huguenin-Dumittan
(8)
Louis Granboulan
(1)
Marc Joye
(1)
Martin Vuagnoux
(6)
Mathilde Igier
(1)
Matthieu Finiasz
(2)
Max Duparc
(1)
Melissa Chase
(1)
Michael Horst
(1)
Mike Just
(1)
Miyako Ohkubo
(1)
Moti Yung
(1)
Ngoc Khanh Nguyen
(1)
Nicolas Reffé
(1)
Nicolas Rolin
(1)
Nicolas T. Courtois
(1)
Nilay Dagtekin
(1)
Pascal Junod
(4)
Pascal Paillier
(1)
Paul Bottinelli
(1)
Paul Rösler
(1)
Paulo Mateus
(1)
Petr Susil
(4)
Phong Q. Nguyen
(1)
Pouyan Sepehrdad
(7)
Radu-Ioan Paise
(1)
Raphaël C.-W. Phan
(1)
Raphael Overbeck
(1)
Reza Reyhanitabar
(5)
Rodrigo Portella do Canto
(1)
Ross J. Anderson
(2)
Serge Fehr
(1)
Serge Vaudenay
(151)
Shiho Moriai
(1)
Simon Cogliani
(1)
Simone Colombo
(1)
Sonia Bogos
(4)
Stéphane Badel
(1)
Subhadeep Banik
(4)
Sylvain Pasini
(4)
Tako Boris Fouotsa
(1)
Thierry Kaufmann
(1)
Thomas Baignères
(4)
Thomas Locher
(1)
Thomas Peyrin
(1)
Vincenzo Iovino
(1)
Willi Meier
(3)
Xuejia Lai
(1)
Yi Lu
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to