What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Benoît Cogliati
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Finding a Polytope: A Practical Fault Attack Against Dilithium.
Paco Azevedo Oliveira
Andersson Calle Viera
Benoît Cogliati
Louis Goubin
2025
conf/crypto
Uncompressing Dilithium's Public Key.
Paco Azevedo Oliveira
Andersson Calle Viera
Benoît Cogliati
Louis Goubin
2024
journals/cic
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
Benoît Cogliati
Jérémy Jean
Thomas Peyrin
Yannick Seurin
2024
conf/acns
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function.
Elena Andreeva
Benoît Cogliati
Virginie Lallemand
Marine Minier
Antoon Purnal
Arnab Roy
2024
conf/asiacrypt
Mind the Bad Norms - Revisiting Compressed Oracle-Based Quantum Indistinguishability Proofs.
Ritam Bhaumik
Benoît Cogliati
Jordan Ethan
Ashwin Jha
2024
conf/sacrypt
Classical and Quantum Generic Attacks on 6-Round Feistel Schemes.
Maya Chartouny
Benoît Cogliati
Jacques Patarin
2023
journals/tosc
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing.
Benoît Cogliati
Jordan Ethan
Ashwin Jha
Soumya Kanti Saha
2023
journals/tosc
Subverting Telegram's End-to-End Encryption.
Benoît Cogliati
Jordan Ethan
Ashwin Jha
2023
conf/eurocrypt
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$.
Benoît Cogliati
Avijit Dutta
Mridul Nandi
Jacques Patarin
Abishanka Saha
2023
conf/asiacrypt
On Quantum Secure Compressing Pseudorandom Functions.
Ritam Bhaumik
Benoît Cogliati
Jordan Ethan
Ashwin Jha
2021
journals/tosc
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation.
Benoît Cogliati
Jordan Ethan
Virginie Lallemand
ByeongHak Lee
Jooyoung Lee
Marine Minier
2020
conf/asiacrypt
How to Build Optimally Secure PRFs Using Block Ciphers.
Benoît Cogliati
Ashwin Jha
Mridul Nandi
2018
conf/crypto
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks.
Benoît Cogliati
Yevgeniy Dodis
Jonathan Katz
Jooyoung Lee
John P. Steinberger
Aishwarya Thiruvengadam
Zhe Zhang
2017
journals/tosc
New Constructions of MACs from (Tweakable) Block Ciphers.
Benoît Cogliati
Jooyoung Lee
Yannick Seurin
2016
conf/fse
Strengthening the Known-Key Security Notion for Block Ciphers.
Benoît Cogliati
Yannick Seurin
2016
conf/crypto
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC.
Benoît Cogliati
Yannick Seurin
2015
conf/crypto
Tweaking Even-Mansour Ciphers.
Benoit Cogliati
Rodolphe Lampe
Yannick Seurin
2015
conf/eurocrypt
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks.
Benoit Cogliati
Yannick Seurin
2015
conf/asiacrypt
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing.
Benoît Cogliati
Yannick Seurin
2014
conf/fse
The Indistinguishability of the XOR of k Permutations.
Benoit Cogliati
Rodolphe Lampe
Jacques Patarin
2014
conf/sacrypt
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.
Benoit Cogliati
Jacques Patarin
Yannick Seurin
Coauthors
Abishanka Saha
(1)
Aishwarya Thiruvengadam
(1)
Andersson Calle Viera
(2)
Antoon Purnal
(1)
Arnab Roy
(1)
Ashwin Jha
(5)
Avijit Dutta
(1)
Benoît Cogliati
(21)
ByeongHak Lee
(1)
Elena Andreeva
(1)
Jacques Patarin
(4)
Jérémy Jean
(1)
John P. Steinberger
(1)
Jonathan Katz
(1)
Jooyoung Lee
(3)
Jordan Ethan
(5)
Louis Goubin
(2)
Marine Minier
(2)
Maya Chartouny
(1)
Mridul Nandi
(2)
Paco Azevedo Oliveira
(2)
Ritam Bhaumik
(2)
Rodolphe Lampe
(2)
Soumya Kanti Saha
(1)
Thomas Peyrin
(1)
Virginie Lallemand
(2)
Yannick Seurin
(8)
Yevgeniy Dodis
(1)
Zhe Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to