Follow
Yannick Seurin
Yannick Seurin
Cryptographer at Ledger
Verified email at ledger.com - Homepage
Title
Cited by
Cited by
Year
PRESENT: An ultra-lightweight block cipher
A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, ...
International workshop on cryptographic hardware and embedded systems, 450-466, 2007
31902007
Fast rotation of a Bose-Einstein condensate
V Bretin, S Stock, Y Seurin, J Dalibard
Physical review letters 92 (5), 50403, 2004
4642004
HB#: Increasing the Security and Efficiency of HB+
H Gilbert, MJB Robshaw, Y Seurin
Advances in Cryptology–EUROCRYPT 2008, 361-378, 2008
253*2008
Simple schnorr multi-signatures with applications to bitcoin
G Maxwell, A Poelstra, Y Seurin, P Wuille
Designs, Codes and Cryptography 87 (9), 2139-2164, 2019
2352019
Hash functions and RFID tags: Mind the gap
A Bogdanov, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin
International workshop on cryptographic hardware and embedded systems, 283-299, 2008
2292008
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1682008
On the exact security of Schnorr-type signatures in the random oracle model
Y Seurin
Annual International Conference on the Theory and Applications of …, 2012
1172012
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
1122016
Good variants of HB+ are hard to find
H Gilbert, M Robshaw, Y Seurin
Financial Cryptography and Data Security, 156-170, 2008
1122008
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
1032018
How to encrypt with the LPN problem
H Gilbert, MJB Robshaw, Y Seurin
International Colloquium on Automata, Languages, and Programming, 679-690, 2008
942008
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
90*2008
An asymptotically tight security analysis of the iterated Even-Mansour cipher
R Lampe, J Patarin, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2012
822012
EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC
B Cogliati, Y Seurin
Annual International Cryptology Conference, 121-149, 2016
732016
Aggregate cash systems: A cryptographic investigation of mimblewimble
G Fuchsbauer, M Orrù, Y Seurin
Annual International Conference on the Theory and Applications of …, 2019
692019
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin
Annual Cryptology Conference, 189-208, 2015
692015
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
652016
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin
Annual International Conference on the Theory and Applications of …, 2015
642015
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
T Iwata, K Minematsu, T Peyrin, Y Seurin
Annual international cryptology conference, 34-65, 2017
562017
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
G Fuchsbauer, A Plouviez, Y Seurin
Annual International Conference on the Theory and Applications of …, 2020
552020
The system can't perform the operation now. Try again later.
Articles 1–20