PRESENT: An ultra-lightweight block cipher A Bogdanov, LR Knudsen, G Leander, C Paar, A Poschmann, ... Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International …, 2007 | 3642 | 2007 |
Fast rotation of a Bose-Einstein condensate V Bretin, S Stock, Y Seurin, J Dalibard Physical review letters 92 (5), 50403, 2004 | 508 | 2004 |
Simple schnorr multi-signatures with applications to bitcoin G Maxwell, A Poelstra, Y Seurin, P Wuille Designs, Codes and Cryptography 87 (9), 2139-2164, 2019 | 346 | 2019 |
HB#: Increasing the Security and Efficiency of HB+ H Gilbert, MJB Robshaw, Y Seurin Advances in Cryptology–EUROCRYPT 2008, 361-378, 2008 | 260* | 2008 |
Hash functions and RFID tags: Mind the gap A Bogdanov, G Leander, C Paar, A Poschmann, MJB Robshaw, Y Seurin Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008 | 237 | 2008 |
The random oracle model and the ideal cipher model are equivalent JS Coron, J Patarin, Y Seurin Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 172 | 2008 |
On the exact security of Schnorr-type signatures in the random oracle model Y Seurin Annual International Conference on the Theory and Applications of …, 2012 | 140 | 2012 |
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers T Peyrin, Y Seurin Annual International Cryptology Conference, 33-63, 2016 | 134 | 2016 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31, 1064-1119, 2018 | 131 | 2018 |
MuSig2: Simple two-round Schnorr multi-signatures J Nick, T Ruffing, Y Seurin Annual International Cryptology Conference, 189-221, 2021 | 116 | 2021 |
Good variants of HB+ are hard to find H Gilbert, M Robshaw, Y Seurin Financial Cryptography and Data Security, 156-170, 2008 | 113 | 2008 |
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model G Fuchsbauer, A Plouviez, Y Seurin Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 110 | 2020 |
Aggregate cash systems: A cryptographic investigation of mimblewimble G Fuchsbauer, M Orrù, Y Seurin Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 104 | 2019 |
How to encrypt with the LPN problem H Gilbert, MJB Robshaw, Y Seurin Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008 | 102 | 2008 |
Sha-3 proposal: ECHO R Benadjila, O Billet, H Gilbert, G Macario-Rat, T Peyrin, M Robshaw, ... Submission to NIST, 2008 | 96* | 2008 |
EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC B Cogliati, Y Seurin Annual International Cryptology Conference, 121-149, 2016 | 92 | 2016 |
An asymptotically tight security analysis of the iterated Even-Mansour cipher R Lampe, J Patarin, Y Seurin Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 90 | 2012 |
Deoxys v1. 41 J Jean, I Nikolic, T Peyrin, Y Seurin Submitted to CAESAR 124 (2), 2016 | 84 | 2016 |
Tweaking even-mansour ciphers B Cogliati, R Lampe, Y Seurin Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 82 | 2015 |
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks B Cogliati, Y Seurin Annual International Conference on the Theory and Applications of …, 2015 | 71 | 2015 |