What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yannick Seurin
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
Benoît Cogliati
Jérémy Jean
Thomas Peyrin
Yannick Seurin
2021
journals/joc
The Deoxys AEAD Family.
Jérémy Jean
Ivica Nikolic
Thomas Peyrin
Yannick Seurin
2021
conf/crypto
MuSig2: Simple Two-Round Schnorr Multi-signatures.
Jonas Nick
Tim Ruffing
Yannick Seurin
2021
conf/ctrsa
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers.
Pooya Farshim
Louiza Khati
Yannick Seurin
Damien Vergnaud
2021
conf/asiacrypt
QCB: Efficient Quantum-Secure Authenticated Encryption.
Ritam Bhaumik
Xavier Bonnetain
André Chailloux
Gaëtan Leurent
María Naya-Plasencia
André Schrottenloher
Yannick Seurin
2020
conf/ccs
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces.
Jonas Nick
Tim Ruffing
Yannick Seurin
Pieter Wuille
2020
conf/eurocrypt
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model.
Georg Fuchsbauer
Antoine Plouviez
Yannick Seurin
2019
conf/eurocrypt
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble.
Georg Fuchsbauer
Michele Orrù
Yannick Seurin
2018
journals/joc
Minimizing the Two-Round Even-Mansour Cipher.
Shan Chen
Rodolphe Lampe
Jooyoung Lee
Yannick Seurin
John P. Steinberger
2017
journals/tosc
Reconsidering the Security Bound of AES-GCM-SIV.
Tetsu Iwata
Yannick Seurin
2017
journals/tosc
New Constructions of MACs from (Tweakable) Block Ciphers.
Benoît Cogliati
Jooyoung Lee
Yannick Seurin
2017
conf/crypto
Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient.
Yuanxi Dai
Yannick Seurin
John P. Steinberger
Aishwarya Thiruvengadam
2017
conf/crypto
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
Tetsu Iwata
Kazuhiko Minematsu
Thomas Peyrin
Yannick Seurin
2016
journals/joc
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction.
Jean-Sébastien Coron
Thomas Holenstein
Robin Künzler
Jacques Patarin
Yannick Seurin
Stefano Tessaro
2016
conf/fse
Strengthening the Known-Key Security Notion for Block Ciphers.
Benoît Cogliati
Yannick Seurin
2016
conf/crypto
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC.
Benoît Cogliati
Yannick Seurin
2016
conf/crypto
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers.
Thomas Peyrin
Yannick Seurin
2015
conf/fse
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes.
Peter Gazi
Jooyoung Lee
Yannick Seurin
John P. Steinberger
Stefano Tessaro
2015
conf/crypto
The Iterated Random Permutation Problem with Applications to Cascade Encryption.
Brice Minaud
Yannick Seurin
2015
conf/crypto
Tweaking Even-Mansour Ciphers.
Benoit Cogliati
Rodolphe Lampe
Yannick Seurin
2015
conf/eurocrypt
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks.
Benoit Cogliati
Yannick Seurin
2015
conf/asiacrypt
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing.
Benoît Cogliati
Yannick Seurin
2014
conf/fse
Security Analysis of Key-Alternating Feistel Ciphers.
Rodolphe Lampe
Yannick Seurin
2014
conf/crypto
Minimizing the Two-Round Even-Mansour Cipher.
Shan Chen
Rodolphe Lampe
Jooyoung Lee
Yannick Seurin
John P. Steinberger
2014
conf/pkc
On the Lossiness of the Rabin Trapdoor Function.
Yannick Seurin
2014
conf/sacrypt
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results.
Benoit Cogliati
Jacques Patarin
Yannick Seurin
2013
conf/fse
Tweakable Blockciphers with Asymptotically Optimal Security.
Rodolphe Lampe
Yannick Seurin
2013
conf/pkc
New Constructions and Applications of Trapdoor DDH Groups.
Yannick Seurin
2013
conf/ctrsa
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.
Yannick Seurin
Joana Treger
2013
conf/asiacrypt
How to Construct an Ideal Cipher from a Small Set of Public Permutations.
Rodolphe Lampe
Yannick Seurin
2012
conf/eurocrypt
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model.
Yannick Seurin
2012
conf/asiacrypt
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher.
Rodolphe Lampe
Jacques Patarin
Yannick Seurin
2012
conf/tcc
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction.
Avradip Mandal
Jacques Patarin
Yannick Seurin
2010
conf/tcc
A Domain Extender for the Ideal Cipher.
Jean-Sébastien Coron
Yevgeniy Dodis
Avradip Mandal
Yannick Seurin
2008
conf/acisp
Looking Back at a New Hash Function.
Olivier Billet
Matthew J. B. Robshaw
Yannick Seurin
Yiqun Lisa Yin
2008
conf/crypto
The Random Oracle Model and the Ideal Cipher Model Are Equivalent.
Jean-Sébastien Coron
Jacques Patarin
Yannick Seurin
2008
conf/fc
Good Variants of HB<sup>+</sup> Are Hard to Find.
Henri Gilbert
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/ches
Hash Functions and RFID Tags: Mind the Gap.
Andrey Bogdanov
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/eurocrypt
HB<sup>#</sup>: Increasing the Security and Efficiency of HB<sup>+</sup>.
Henri Gilbert
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/sacrypt
Building Secure Block Ciphers on Generic Attacks Assumptions.
Jacques Patarin
Yannick Seurin
2007
conf/fse
Security Analysis of Constructions Combining FIL Random Oracles.
Yannick Seurin
Thomas Peyrin
2007
conf/ches
PRESENT: An Ultra-Lightweight Block Cipher.
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
C. Vikkelsoe
Coauthors
Aishwarya Thiruvengadam
(1)
André Chailloux
(1)
André Schrottenloher
(1)
Andrey Bogdanov
(2)
Antoine Plouviez
(1)
Avradip Mandal
(2)
Axel Poschmann
(2)
Benoît Cogliati
(8)
Brice Minaud
(1)
C. Vikkelsoe
(1)
Christof Paar
(2)
Damien Vergnaud
(1)
Gaëtan Leurent
(1)
Georg Fuchsbauer
(2)
Gregor Leander
(2)
Henri Gilbert
(2)
Ivica Nikolic
(1)
Jacques Patarin
(6)
Jean-Sébastien Coron
(3)
Jérémy Jean
(2)
Joana Treger
(1)
John P. Steinberger
(4)
Jonas Nick
(2)
Jooyoung Lee
(4)
Kazuhiko Minematsu
(1)
Lars R. Knudsen
(1)
Louiza Khati
(1)
María Naya-Plasencia
(1)
Matthew J. B. Robshaw
(5)
Michele Orrù
(1)
Olivier Billet
(1)
Peter Gazi
(1)
Pieter Wuille
(1)
Pooya Farshim
(1)
Ritam Bhaumik
(1)
Robin Künzler
(1)
Rodolphe Lampe
(7)
Shan Chen
(2)
Stefano Tessaro
(2)
Tetsu Iwata
(2)
Thomas Holenstein
(1)
Thomas Peyrin
(5)
Tim Ruffing
(2)
Xavier Bonnetain
(1)
Yannick Seurin
(42)
Yevgeniy Dodis
(1)
Yiqun Lisa Yin
(1)
Yuanxi Dai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to