Follow
Yannick Seurin
Yannick Seurin
Cryptography Expert, ANSSI
Verified email at ssi.gouv.fr - Homepage
Title
Cited by
Cited by
Year
PRESENT: An ultra-lightweight block cipher
A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, ...
International workshop on cryptographic hardware and embedded systems, 450-466, 2007
30432007
Fast rotation of a Bose-Einstein condensate
V Bretin, S Stock, Y Seurin, J Dalibard
Physical review letters 92 (5), 50403, 2004
4582004
HB#: Increasing the Security and Efficiency of HB+
H Gilbert, MJB Robshaw, Y Seurin
Advances in Cryptology–EUROCRYPT 2008, 361-378, 2008
251*2008
Hash functions and RFID tags: Mind the gap
A Bogdanov, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin
International workshop on cryptographic hardware and embedded systems, 283-299, 2008
2282008
Simple Schnorr multi-signatures with applications to Bitcoin
G Maxwell, A Poelstra, Y Seurin, P Wuille
Designs, Codes and Cryptography 87 (9), 2139-2164, 2019
1982019
The random oracle model and the ideal cipher model are equivalent
JS Coron, J Patarin, Y Seurin
Annual International Cryptology Conference, 1-20, 2008
1642008
On the exact security of Schnorr-type signatures in the random oracle model
Y Seurin
Annual International Conference on the Theory and Applications of …, 2012
1112012
Good variants of HB+ are hard to find
H Gilbert, M Robshaw, Y Seurin
Financial Cryptography and Data Security, 156-170, 2008
1082008
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
T Peyrin, Y Seurin
Annual International Cryptology Conference, 33-63, 2016
1072016
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
1002018
How to encrypt with the LPN problem
H Gilbert, MJB Robshaw, Y Seurin
International Colloquium on Automata, Languages, and Programming, 679-690, 2008
942008
Sha-3 proposal: ECHO
R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ...
Submission to NIST, 2008
88*2008
An asymptotically tight security analysis of the iterated Even-Mansour cipher
R Lampe, J Patarin, Y Seurin
International Conference on the Theory and Application of Cryptology and …, 2012
782012
EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC
B Cogliati, Y Seurin
Annual International Cryptology Conference, 121-149, 2016
682016
Tweaking even-mansour ciphers
B Cogliati, R Lampe, Y Seurin
Annual Cryptology Conference, 189-208, 2015
662015
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks
B Cogliati, Y Seurin
Annual International Conference on the Theory and Applications of …, 2015
632015
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
602016
Aggregate cash systems: A cryptographic investigation of mimblewimble
G Fuchsbauer, M Orrù, Y Seurin
Annual International Conference on the Theory and Applications of …, 2019
552019
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
T Iwata, K Minematsu, T Peyrin, Y Seurin
Annual international cryptology conference, 34-65, 2017
522017
A domain extender for the ideal cipher
JS Coron, Y Dodis, A Mandal, Y Seurin
Theory of Cryptography Conference, 273-289, 2010
502010
The system can't perform the operation now. Try again later.
Articles 1–20