Search the dblp DataBase
Serge Vaudenay :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gildas Avoine , Serge Vaudenay Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:74-85 [Conf ] Serge Vaudenay Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:188-199 [Conf ] Ross J. Anderson , Serge Vaudenay Minding your p's and q`s. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:26-35 [Conf ] Thomas Baignères , Pascal Junod , Serge Vaudenay How Far Can We Go Beyond Linear Cryptanalysis? [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:432-450 [Conf ] Yi Lu 0002 , Serge Vaudenay Cryptanalysis of Bluetooth Keystream Generator Two-Level E0. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:483-499 [Conf ] Mike Just , Serge Vaudenay Authenticated Multi-Party Key Agreement. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:36-49 [Conf ] Jean Monnerat , Serge Vaudenay Generic Homomorphic Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:354-371 [Conf ] Shiho Moriai , Serge Vaudenay On the Pseudorandomness of Top-Level Schemes of Block Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:289-302 [Conf ] Serge Vaudenay On the Lai-Massey Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:8-19 [Conf ] Guillaume Poupard , Serge Vaudenay Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:254-264 [Conf ] Serge Vaudenay An Experiment on DES Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:139-147 [Conf ] Marc Joye , Pascal Paillier , Serge Vaudenay Efficient Generation of Prime Numbers. [Citation Graph (0, 0)][DBLP ] CHES, 2000, pp:340-354 [Conf ] Roman Schlegel , Serge Vaudenay Enforcing Email Addresses Privacy Using Tokens. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:91-100 [Conf ] Serge Vaudenay On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:1-9 [Conf ] Yi Lu 0002 , Serge Vaudenay Faster Correlation Attack on Bluetooth Keystream Generator E0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:407-425 [Conf ] Brice Canvel , Alain P. Hiltgen , Serge Vaudenay , Martin Vuagnoux Password Interception in a SSL/TLS Channel. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:583-599 [Conf ] Don Coppersmith , Jacques Stern , Serge Vaudenay Attacks on the Birational Permutation Signature Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:435-443 [Conf ] Yi Lu 0002 , Willi Meier , Serge Vaudenay The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:97-117 [Conf ] Serge Vaudenay Secure Communications over Insecure Channels Based on Short Authenticated Strings. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:309-326 [Conf ] Serge Vaudenay FFT-Hash-II is not yet Collision-free. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:587-593 [Conf ] Serge Vaudenay Hidden Collisions on DSS. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:83-88 [Conf ] Serge Vaudenay Cryptanalysis of the Chor-Rivest Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:243-256 [Conf ] Sylvain Pasini , Serge Vaudenay An Optimal Non-interactive Message Authentication Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:280-294 [Conf ] Florent Chabaud , Serge Vaudenay Links Between Differential and Linear Cryptoanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:356-365 [Conf ] David Naccache , David M'Raïhi , Serge Vaudenay , Dan Raphaeli Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:77-85 [Conf ] Claus-Peter Schnorr , Serge Vaudenay Black Box Cryptoanalysis of Hash Networks Based on Multipermutations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:47-57 [Conf ] Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:534-546 [Conf ] Serge Vaudenay Resistance Against General Iterated Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:255-271 [Conf ] Jacques Stern , Serge Vaudenay SVP: A Flexible Micropayment Scheme. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:161-172 [Conf ] Henri Gilbert , Helena Handschuh , Antoine Joux , Serge Vaudenay A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:64-74 [Conf ] Pascal Junod , Serge Vaudenay Optimal Key Ranking Procedures in a Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:235-246 [Conf ] David M'Raïhi , David Naccache , Jacques Stern , Serge Vaudenay XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:166-171 [Conf ] Serge Vaudenay On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:286-297 [Conf ] Claus-Peter Schnorr , Serge Vaudenay Parallel FFT-Hashing. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:149-156 [Conf ] Serge Vaudenay On the Weak Keys of Blowfish. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:27-32 [Conf ] Serge Vaudenay On the Security of CS-Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:260-274 [Conf ] Jacques Stern , Serge Vaudenay CS-Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:189-205 [Conf ] Jean Monnerat , Serge Vaudenay On Some Weak Extensions of AES and BES. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:414-426 [Conf ] Serge Vaudenay RFID Privacy Based on Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:1-6 [Conf ] Serge Vaudenay On Probable Security for Conventional Cryptography. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:1-16 [Conf ] Ross J. Anderson , Serge Vaudenay , Bart Preneel , Kaisa Nyberg The Newton Channel. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:151-156 [Conf ] Jean Monnerat , Serge Vaudenay Chaum's Designated Confirmer Signature Revisited. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:164-178 [Conf ] Jean Monnerat , Yvonne Anne Oswald , Serge Vaudenay Optimization of the MOVA Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:196-209 [Conf ] Ernest F. Brickell , David Pointcheval , Serge Vaudenay , Moti Yung Design Validations for Discrete Logarithm Based Signature Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:276-292 [Conf ] Jean Monnerat , Serge Vaudenay Undeniable Signatures Based on Characters: How to Sign with One Bit. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:69-85 [Conf ] Sylvain Pasini , Serge Vaudenay SAS-Based Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:395-409 [Conf ] Serge Vaudenay The Security of DSA and ECDSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:309-323 [Conf ] Helena Handschuh , Serge Vaudenay A Universal Encryption Standard. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:1-12 [Conf ] Kazumaro Aoki , Serge Vaudenay On the Use of GF-Inversion as a Cryptographic Primitive. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:234-247 [Conf ] Thomas Baignères , Serge Vaudenay Proving the Security of AES Substitution-Permutation Network. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:65-81 [Conf ] Pascal Junod , Serge Vaudenay Perfect Diffusion Primitives for Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:84-99 [Conf ] Pascal Junod , Serge Vaudenay FOX : A New Family of Block Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2004, pp:114-129 [Conf ] David M'Raïhi , David Naccache , David Pointcheval , Serge Vaudenay Computational Alternatives to Random Number Generators. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:72-80 [Conf ] Louis Granboulan , Phong Q. Nguyen , Fabrice Noilhan , Serge Vaudenay DFCv2. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:57-71 [Conf ] Serge Vaudenay Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:189-201 [Conf ] Serge Vaudenay Feistel Ciphers with L2 -Decorrelation. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:1-14 [Conf ] Serge Vaudenay Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:49-61 [Conf ] Thomas Peyrin , Serge Vaudenay The Pairing Problem with User Interaction. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:251-266 [Conf ] Serge Vaudenay Provable Security for Block Ciphers by Decorrelation. [Citation Graph (0, 0)][DBLP ] STACS, 1998, pp:249-275 [Conf ] Gildas Avoine , Serge Vaudenay Optimal Fair Exchange with Guardian Angels. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:188-202 [Conf ] Jean Monnerat , Serge Vaudenay Short 2-Move Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:19-36 [Conf ] Franck Leprévost , Jean Monnerat , Sébastien Varrette , Serge Vaudenay Generating anomalous elliptic curves. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2005, v:93, n:5, pp:225-230 [Journal ] Gildas Avoine , Serge Vaudenay How to safely close a discussion. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2007, v:102, n:4, pp:138-142 [Journal ] Don Coppersmith , Jacques Stern , Serge Vaudenay The Security of the Birational Permutation Signature Schemes. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1997, v:10, n:3, pp:207-221 [Journal ] Claus-Peter Schnorr , Serge Vaudenay The Black-Box Model for Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1998, v:11, n:2, pp:125-140 [Journal ] Serge Vaudenay Cryptanalysis of the Chor - Rivest Cryptosystem. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2001, v:14, n:2, pp:87-100 [Journal ] Serge Vaudenay Decorrelation: A Theory for Block Cipher Security. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2003, v:16, n:4, pp:249-286 [Journal ] Sylvain Pasini , Serge Vaudenay Hash-and-Sign with Weak Hashing Made Secure. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:338-354 [Conf ] Jean-Philippe Aumasson , Matthieu Finiasz , Willi Meier , Serge Vaudenay TCH o : A Hardware-Oriented Trapdoor Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:184-199 [Conf ] Serge Vaudenay On Privacy Models for RFID. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:68-87 [Conf ] Raphael C.-W. Phan , Serge Vaudenay Security-Preserving Asymmetric Protocol Encapsulation. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:346-366 [Conf ] Matthieu Finiasz , Serge Vaudenay When Stream Cipher Analysis Meets Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:266-284 [Conf ] Efficient Deniable Authentication for Signatures. [Citation Graph (, )][DBLP ] A Message Recognition Protocol Based on Standard Assumptions. [Citation Graph (, )][DBLP ] On the Security of HB# against a Man-in-the-Middle Attack. [Citation Graph (, )][DBLP ] The Extended Access Control for Machine Readable Travel Documents. [Citation Graph (, )][DBLP ] Mutual authentication in RFID: security and privacy. [Citation Graph (, )][DBLP ] On Tamper-Resistance from a Theoretical Viewpoint. [Citation Graph (, )][DBLP ] ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware. [Citation Graph (, )][DBLP ] Smashing SQUASH-0. [Citation Graph (, )][DBLP ] Passive-Only Key Recovery Attacks on RC4. [Citation Graph (, )][DBLP ] Linear Cryptanalysis of Non Binary Ciphers. [Citation Graph (, )][DBLP ] The Complexity of Distinguishing Distributions (Invited Talk). [Citation Graph (, )][DBLP ] On the Impossibility of Strong Encryption Over . [Citation Graph (, )][DBLP ] Search in 0.007secs, Finished in 0.010secs