The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Serge Vaudenay: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gildas Avoine, Serge Vaudenay
    Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:74-85 [Conf]
  2. Serge Vaudenay
    Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:188-199 [Conf]
  3. Ross J. Anderson, Serge Vaudenay
    Minding your p's and q`s. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:26-35 [Conf]
  4. Thomas Baignères, Pascal Junod, Serge Vaudenay
    How Far Can We Go Beyond Linear Cryptanalysis? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:432-450 [Conf]
  5. Yi Lu 0002, Serge Vaudenay
    Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:483-499 [Conf]
  6. Mike Just, Serge Vaudenay
    Authenticated Multi-Party Key Agreement. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:36-49 [Conf]
  7. Jean Monnerat, Serge Vaudenay
    Generic Homomorphic Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:354-371 [Conf]
  8. Shiho Moriai, Serge Vaudenay
    On the Pseudorandomness of Top-Level Schemes of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:289-302 [Conf]
  9. Serge Vaudenay
    On the Lai-Massey Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:8-19 [Conf]
  10. Guillaume Poupard, Serge Vaudenay
    Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:254-264 [Conf]
  11. Serge Vaudenay
    An Experiment on DES Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:139-147 [Conf]
  12. Marc Joye, Pascal Paillier, Serge Vaudenay
    Efficient Generation of Prime Numbers. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:340-354 [Conf]
  13. Roman Schlegel, Serge Vaudenay
    Enforcing Email Addresses Privacy Using Tokens. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:91-100 [Conf]
  14. Serge Vaudenay
    On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:1-9 [Conf]
  15. Yi Lu 0002, Serge Vaudenay
    Faster Correlation Attack on Bluetooth Keystream Generator E0. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:407-425 [Conf]
  16. Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux
    Password Interception in a SSL/TLS Channel. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:583-599 [Conf]
  17. Don Coppersmith, Jacques Stern, Serge Vaudenay
    Attacks on the Birational Permutation Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:435-443 [Conf]
  18. Yi Lu 0002, Willi Meier, Serge Vaudenay
    The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:97-117 [Conf]
  19. Serge Vaudenay
    Secure Communications over Insecure Channels Based on Short Authenticated Strings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:309-326 [Conf]
  20. Serge Vaudenay
    FFT-Hash-II is not yet Collision-free. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:587-593 [Conf]
  21. Serge Vaudenay
    Hidden Collisions on DSS. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:83-88 [Conf]
  22. Serge Vaudenay
    Cryptanalysis of the Chor-Rivest Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:243-256 [Conf]
  23. Sylvain Pasini, Serge Vaudenay
    An Optimal Non-interactive Message Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:280-294 [Conf]
  24. Florent Chabaud, Serge Vaudenay
    Links Between Differential and Linear Cryptoanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:356-365 [Conf]
  25. David Naccache, David M'Raïhi, Serge Vaudenay, Dan Raphaeli
    Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:77-85 [Conf]
  26. Claus-Peter Schnorr, Serge Vaudenay
    Black Box Cryptoanalysis of Hash Networks Based on Multipermutations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:47-57 [Conf]
  27. Serge Vaudenay
    Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:534-546 [Conf]
  28. Serge Vaudenay
    Resistance Against General Iterated Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:255-271 [Conf]
  29. Jacques Stern, Serge Vaudenay
    SVP: A Flexible Micropayment Scheme. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:161-172 [Conf]
  30. Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay
    A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:64-74 [Conf]
  31. Pascal Junod, Serge Vaudenay
    Optimal Key Ranking Procedures in a Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:235-246 [Conf]
  32. David M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay
    XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:166-171 [Conf]
  33. Serge Vaudenay
    On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:286-297 [Conf]
  34. Claus-Peter Schnorr, Serge Vaudenay
    Parallel FFT-Hashing. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:149-156 [Conf]
  35. Serge Vaudenay
    On the Weak Keys of Blowfish. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:27-32 [Conf]
  36. Serge Vaudenay
    On the Security of CS-Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:260-274 [Conf]
  37. Jacques Stern, Serge Vaudenay
    CS-Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:189-205 [Conf]
  38. Jean Monnerat, Serge Vaudenay
    On Some Weak Extensions of AES and BES. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:414-426 [Conf]
  39. Serge Vaudenay
    RFID Privacy Based on Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:1-6 [Conf]
  40. Serge Vaudenay
    On Probable Security for Conventional Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:1-16 [Conf]
  41. Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg
    The Newton Channel. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:151-156 [Conf]
  42. Jean Monnerat, Serge Vaudenay
    Chaum's Designated Confirmer Signature Revisited. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:164-178 [Conf]
  43. Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
    Optimization of the MOVA Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:196-209 [Conf]
  44. Ernest F. Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Design Validations for Discrete Logarithm Based Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:276-292 [Conf]
  45. Jean Monnerat, Serge Vaudenay
    Undeniable Signatures Based on Characters: How to Sign with One Bit. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:69-85 [Conf]
  46. Sylvain Pasini, Serge Vaudenay
    SAS-Based Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:395-409 [Conf]
  47. Serge Vaudenay
    The Security of DSA and ECDSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:309-323 [Conf]
  48. Helena Handschuh, Serge Vaudenay
    A Universal Encryption Standard. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:1-12 [Conf]
  49. Kazumaro Aoki, Serge Vaudenay
    On the Use of GF-Inversion as a Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:234-247 [Conf]
  50. Thomas Baignères, Serge Vaudenay
    Proving the Security of AES Substitution-Permutation Network. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:65-81 [Conf]
  51. Pascal Junod, Serge Vaudenay
    Perfect Diffusion Primitives for Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:84-99 [Conf]
  52. Pascal Junod, Serge Vaudenay
    FOX : A New Family of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:114-129 [Conf]
  53. David M'Raïhi, David Naccache, David Pointcheval, Serge Vaudenay
    Computational Alternatives to Random Number Generators. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:72-80 [Conf]
  54. Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay
    DFCv2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:57-71 [Conf]
  55. Serge Vaudenay
    Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:189-201 [Conf]
  56. Serge Vaudenay
    Feistel Ciphers with L2-Decorrelation. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:1-14 [Conf]
  57. Serge Vaudenay
    Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:49-61 [Conf]
  58. Thomas Peyrin, Serge Vaudenay
    The Pairing Problem with User Interaction. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:251-266 [Conf]
  59. Serge Vaudenay
    Provable Security for Block Ciphers by Decorrelation. [Citation Graph (0, 0)][DBLP]
    STACS, 1998, pp:249-275 [Conf]
  60. Gildas Avoine, Serge Vaudenay
    Optimal Fair Exchange with Guardian Angels. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:188-202 [Conf]
  61. Jean Monnerat, Serge Vaudenay
    Short 2-Move Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:19-36 [Conf]
  62. Franck Leprévost, Jean Monnerat, Sébastien Varrette, Serge Vaudenay
    Generating anomalous elliptic curves. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:93, n:5, pp:225-230 [Journal]
  63. Gildas Avoine, Serge Vaudenay
    How to safely close a discussion. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:102, n:4, pp:138-142 [Journal]
  64. Don Coppersmith, Jacques Stern, Serge Vaudenay
    The Security of the Birational Permutation Signature Schemes. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:3, pp:207-221 [Journal]
  65. Claus-Peter Schnorr, Serge Vaudenay
    The Black-Box Model for Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1998, v:11, n:2, pp:125-140 [Journal]
  66. Serge Vaudenay
    Cryptanalysis of the Chor - Rivest Cryptosystem. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:2, pp:87-100 [Journal]
  67. Serge Vaudenay
    Decorrelation: A Theory for Block Cipher Security. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2003, v:16, n:4, pp:249-286 [Journal]
  68. Sylvain Pasini, Serge Vaudenay
    Hash-and-Sign with Weak Hashing Made Secure. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:338-354 [Conf]
  69. Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
    TCHo: A Hardware-Oriented Trapdoor Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:184-199 [Conf]
  70. Serge Vaudenay
    On Privacy Models for RFID. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:68-87 [Conf]
  71. Raphael C.-W. Phan, Serge Vaudenay
    Security-Preserving Asymmetric Protocol Encapsulation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:346-366 [Conf]
  72. Matthieu Finiasz, Serge Vaudenay
    When Stream Cipher Analysis Meets Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:266-284 [Conf]

  73. Efficient Deniable Authentication for Signatures. [Citation Graph (, )][DBLP]


  74. A Message Recognition Protocol Based on Standard Assumptions. [Citation Graph (, )][DBLP]


  75. On the Security of HB# against a Man-in-the-Middle Attack. [Citation Graph (, )][DBLP]


  76. The Extended Access Control for Machine Readable Travel Documents. [Citation Graph (, )][DBLP]


  77. Mutual authentication in RFID: security and privacy. [Citation Graph (, )][DBLP]


  78. On Tamper-Resistance from a Theoretical Viewpoint. [Citation Graph (, )][DBLP]


  79. ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. [Citation Graph (, )][DBLP]


  80. Smashing SQUASH-0. [Citation Graph (, )][DBLP]


  81. Passive-Only Key Recovery Attacks on RC4. [Citation Graph (, )][DBLP]


  82. Linear Cryptanalysis of Non Binary Ciphers. [Citation Graph (, )][DBLP]


  83. The Complexity of Distinguishing Distributions (Invited Talk). [Citation Graph (, )][DBLP]


  84. On the Impossibility of Strong Encryption Over . [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.461secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002