Yannick Seurin


Ontology type: schema:Person     


Person Info

NAME

Yannick

SURNAME

Seurin

Publications in SciGraph latest 50 shown

  • 2021-12-01 QCB: Efficient Quantum-Secure Authenticated Encryption in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2021
  • 2021-08-11 MuSig2: Simple Two-Round Schnorr Multi-signatures in ADVANCES IN CRYPTOLOGY – CRYPTO 2021
  • 2021-06-10 The Deoxys AEAD Family in JOURNAL OF CRYPTOLOGY
  • 2021-05-11 The Key-Dependent Message Security of Key-Alternating Feistel Ciphers in TOPICS IN CRYPTOLOGY – CT-RSA 2021
  • 2020-05-01 Blind Schnorr Signatures and Signed ElGamal Encryption in the Algebraic Group Model in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2019-04-18 Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2019
  • 2019-02-02 Simple Schnorr multi-signatures with applications to Bitcoin in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2018-05-16 Minimizing the Two-Round Even–Mansour Cipher in JOURNAL OF CRYPTOLOGY
  • 2018-03-05 Analysis of the single-permutation encrypted Davies–Meyer construction in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2017-08-02 ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2017-08-02 Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2016-07-21 EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-07-21 Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-07-20 Strengthening the Known-Key Security Notion for Block Ciphers in FAST SOFTWARE ENCRYPTION
  • 2015-12-30 Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2015-08-12 Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes in FAST SOFTWARE ENCRYPTION
  • 2015-08-01 The Iterated Random Permutation Problem with Applications to Cascade Encryption in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-08-01 Tweaking Even-Mansour Ciphers in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-04-19 Security Analysis of Key-Alternating Feistel Ciphers in FAST SOFTWARE ENCRYPTION
  • 2015-04-14 On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2014-11-29 Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2014-11-01 How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction in JOURNAL OF CRYPTOLOGY
  • 2014-07-08 Tweakable Blockciphers with Asymptotically Optimal Security in FAST SOFTWARE ENCRYPTION
  • 2014 Minimizing the Two-Round Even-Mansour Cipher in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2014 On the Lossiness of the Rabin Trapdoor Function in PUBLIC-KEY CRYPTOGRAPHY – PKC 2014
  • 2013 A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption in TOPICS IN CRYPTOLOGY – CT-RSA 2013
  • 2013 New Constructions and Applications of Trapdoor DDH Groups in PUBLIC-KEY CRYPTOGRAPHY – PKC 2013
  • 2013 How to Construct an Ideal Cipher from a Small Set of Public Permutations in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2012 On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction in THEORY OF CRYPTOGRAPHY
  • 2012 On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2012 An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2010 A Domain Extender for the Ideal Cipher in THEORY OF CRYPTOGRAPHY
  • 2009 Building Secure Block Ciphers on Generic Attacks Assumptions in SELECTED AREAS IN CRYPTOGRAPHY
  • 2008-01-01 Looking Back at a New Hash Function in INFORMATION SECURITY AND PRIVACY
  • 2008-01-01 How to Encrypt with the LPN Problem in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2008-01-01 The Random Oracle Model and the Ideal Cipher Model Are Equivalent in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2008-01-01 Hash Functions and RFID Tags: Mind the Gap in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2008
  • 2008-01-01 : Increasing the Security and Efficiency of in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2008
  • 2008 Good Variants of HB + Are Hard to Find in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2007-01-01 PRESENT: An Ultra-Lightweight Block Cipher in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007
  • 2007-01-01 Security Analysis of Constructions Combining FIL Random Oracles in FAST SOFTWARE ENCRYPTION
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "familyName": "Seurin", 
        "givenName": "Yannick", 
        "id": "sg:person.011724731171.01", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-09-02T16:35", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/person/person_952.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011724731171.01'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011724731171.01'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011724731171.01'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011724731171.01'


     

    This table displays all metadata directly associated to this object as RDF triples.

    11 TRIPLES      9 PREDICATES      10 URIs      6 LITERALS      1 BLANK NODES

    Subject Predicate Object
    1 sg:person.011724731171.01 schema:familyName Seurin
    2 schema:givenName Yannick
    3 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011724731171.01
    4 schema:sdDatePublished 2022-09-02T16:35
    5 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    6 schema:sdPublisher N0b10a19659544cfaade9b011b9d1bb06
    7 sgo:license sg:explorer/license/
    8 sgo:sdDataset persons
    9 rdf:type schema:Person
    10 N0b10a19659544cfaade9b011b9d1bb06 schema:name Springer Nature - SN SciGraph project
    11 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...