Check also DBLP and Google Scholar.
Here you can find links to most papers , some slides , and a few talk recordings .
Cryptography
2024
- A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers
B. Cogliati, J. Jean, T. Peyrin, and Y. Seurin
Communications in Cryptology ≻
2021
-
QCB: Efficient Quantum-secure Authenticated Encryption
R. Bhaumik, X. Bonnetain, A. Chailloux, G. Leurent, M. Naya-Plasencia, A. Schrottenloher, and Y. Seurin
Proceedings of ASIACRYPT 2021 ≻ -
MuSig2: Simple Two-Round Schnorr Multi-signatures
J. Nick, T. Ruffing, and Y. Seurin
Proceedings of CRYPTO 2021 ≻ -
The Deoxys AEAD Family
J. Jean, I. Nikolic, T. Peyrin, and Y. Seurin
Journal of Cryptology ≻ -
The Key-Dependent Message Security of Key-Alternating Feistel Ciphers
P. Farshim, L. Kathi, Y. Seurin, and D. Vergnaud
Proceedings of CT-RSA 2021 ≻
2020
-
MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces
J. Nick, T. Ruffing, Y. Seurin, and P. Wuille
Proceedings of ACM CCS 2020 ≻ -
Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model
G. Fuchsbauer, A. Plouviez, and Y. Seurin
Proceedings of EUROCRYPT 2020 ≻
2019
-
Simple Schnorr multi-signatures with applications to Bitcoin
G. Maxwell, A. Poelstra, Y. Seurin, and P. Wuille
Designs, Codes and Cryptography ≻ -
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
G. Fuchsbauer, M. Orrù, and Y. Seurin
Proceedings of EUROCRYPT 2019 ≻
2018
-
Analysis of the single-permutation encrypted Davies-Meyer construction
B. Cogliati and Y. Seurin
Designs, Codes and Cryptography ≻ -
Minimizing the Two-Round Even-Mansour Cipher
S. Chen, R. Lampe, J. Lee, Y. Seurin, and J. Steinberger
Journal of Cryptology ≻
2017
-
Reconsidering the Security Bound of AES-GCM-SIV
T. Iwata and Y. Seurin
Transactions on Symmetric Cryptology ≻ -
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
T. Iwata, K. Minematsu, T. Peyrin, and Y. Seurin
Proceedings of CRYPTO 2017 ≻ -
Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient
Y. Dai, Y. Seurin, J. Steinberger, and A. Thiruvengadam
Proceedings of CRYPTO 2017 ≻ -
New Constructions of MACs from (Tweakable) Block Ciphers
B. Cogliati, J. Lee, and Y. Seurin
Transactions on Symmetric Cryptology ≻
2016
-
How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction
J.-S. Coron, T. Holenstein, R. Künzler, J. Patarin, Y. Seurin, and S. Tessaro
Journal of Cryptology ≻ -
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
T. Peyrin and Y. Seurin
Proceedings of CRYPTO 2016 ≻ -
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
B. Cogliati and Y. Seurin
Proceedings of CRYPTO 2016 ≻ -
Strengthening the Known-Key Security Notion for Block Ciphers
B. Cogliati and Y. Seurin
Proceedings of FSE 2016 ≻
2015
-
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
B. Cogliati and Y. Seurin
Proceedings of ASIACRYPT 2015 ≻ -
The Iterated Random Permutation Problem with Applications to Cascade Encryption
B. Minaud and Y. Seurin
Proceedings of CRYPTO 2015 ≻ -
Tweaking Even-Mansour Ciphers
B. Cogliati, R. Lampe, and Y. Seurin
Proceedings of CRYPTO 2015 ≻ -
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
B. Cogliati and Y. Seurin
Proceedings of EUROCRYPT 2015 ≻ -
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, and S. Tessaro
Proceedings of FSE 2015 ≻
2014
-
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
B. Cogliati, J. Patarin, and Y. Seurin
Proceedings of SAC 2014 ≻ -
Minimizing the Two-Round Even-Mansour Cipher
S. Chen, R. Lampe, J. Lee, Y. Seurin, and J. Steinberger
Proceedings of CRYPTO 2014 ≻ -
On the Lossiness of the Rabin Trapdoor Function
Y. Seurin
Proceedings of PKC 2014 ≻ -
Security Analysis of Key-Alternating Feistel Ciphers
R. Lampe and Y. Seurin
Proceedings of FSE 2014 ≻
2013
-
How to Construct an Ideal Cipher from a Small Set of Public Permutations
R. Lampe and Y. Seurin
Proceedings of ASIACRYPT 2013 ≻ -
Tweakable Blockciphers with Asymptotically Optimal Security
R. Lampe and Y. Seurin
Proceedings of FSE 2013 ≻ -
New Constructions and Applications of Trapdoor DDH Groups
Y. Seurin
Proceedings of PKC 2013 ≻ -
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Y. Seurin and J. Treger
Proceedings of CT-RSA 2013 ≻
2012
-
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
R. Lampe, J. Patarin, and Y. Seurin
Proceedings of ASIACRYPT 2012 ≻ -
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Y. Seurin
Proceedings of EUROCRYPT 2012 ≻ -
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
A. Mandal, J. Patarin, and Y. Seurin
Proceedings of TCC 2012 ≻
2011
2010
- A Domain Extender for the Ideal Cipher
J.-S. Coron, Y. Dodis, A. Mandal, and Y. Seurin
Proceedings of TCC 2010 ≻
2008
-
SHA-3 Proposal: ECHO
R. Benadjila, O. Billet, H. Gilbert, G. Macario-Rat, T. Peyrin, M. Robshaw, and Y. Seurin
A candidate hash function for the NIST SHA-3 competition ≻ -
The Random Oracle Model and The Ideal Cipher Model are Equivalent
J.-S. Coron, J. Patarin, and Y. Seurin
Proceedings of CRYPTO 2008 ≻
Warning: the proof of Theorem 2 is flawed, see this paper. See also this journal paper. -
Analysis of intermediate field systems
O. Billet, J. Patarin, and Y. Seurin
Presented at SCC 2008 ≻ -
Building Secure Block Ciphers on Generic Attacks Assumptions
J. Patarin and Y. Seurin
Proceedings of SAC 2008 ≻ -
Hash Functions and RFID Tags: Mind the Gap
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, and Y. Seurin
Proceedings of CHES 2008 ≻ -
How to Encrypt with the LPN Problem
H. Gilbert, M.J.B. Robshaw, and Y. Seurin
Proceedings of ICALP 2008 ≻ -
Looking Back at a New Hash Function
O. Billet, M.J.B. Robshaw, Y. Seurin, and Y.L. Yin
Proceedings of ACISP 2008 ≻ -
HB#: Increasing the Security and Efficiency of HB+
H. Gilbert, M.J.B. Robshaw, and Y. Seurin
Proceedings of EUROCRYPT 2008 ≻ -
Good Variants of HB+ are Hard to Find
H. Gilbert, M.J.B. Robshaw, and Y. Seurin
Proceedings of Financial Crypto 2008 ≻
2007
-
PRESENT: An Ultra-Lightweight Block Cipher
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe
Proceedings of CHES 2007 ≻ -
Security Analysis of Constructions Combining FIL Random Oracles
Y. Seurin and T. Peyrin
Proceedings of FSE 2007 ≻
PhD Thesis
- Primitives et protocoles cryptographiques à sécurité prouvée
Y. Seurin
PhD thesis, Versailles University, 2009 ≻
Warning: problems have been found in Theorem 2.4, see this paper. See also this note and this journal paper.
Physics
-
Semiconductor Sources of Twin Photons for Quantum Information
S. Ducci, L. Lanco, Y. Seurin, G. Leo, V. Berger, A. De Rossi, and X. Marcadet
Journal of Optics B: Quantum and Semiclassical Optics ≻ -
Nonlinear AlGaAs Waveguide for the Generation of Counterpropagating Twin Photons in the Telecom Range
M. Ravaro, Y. Seurin, S. Ducci, G. Leo, V. Berger, A. De Rossi, and G. Assanto
Journal of Applied Physics -
Fast Rotation of a Bose-Einstein Condensate
V. Bretin, S. Stock, Y. Seurin, and J. Dalibard
Physical Review Letters ≻