Cryptographers' World
 

Serge Vaudenay


Author's Web Page Link

59 papers and 2 books in database with 2112 citations StarStarStar

Editor of 6 conference proceedings books

H-number: 27

Books

 
1. Serge VaudenayA Classical Introduction to Cryptography: Applications for Communications Security. Springer, 2005. ISBN 978-0387254647.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 19 times ]


2. Thomas BaignèresPascal JunodYi LuJean MonneratSerge VaudenayA Classical Introduction to Cryptography - Exercise Book. Springer, 2005. ISBN 978-0-387-27934-3.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 3 times ]


Conference Proceedings

 
1. Serge Vaudenay, editor, Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings. Springer, 2008. ISBN 3-540-68159-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Serge Vaudenay, editor, Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings. Springer, 2006. ISBN 3-540-34546-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Ed DawsonSerge Vaudenay, editors, Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings. Springer, 2005. ISBN 3-540-28938-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

4. Serge Vaudenay, editor, Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings. Springer, 2005. ISBN 3-540-24454-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

5. Serge VaudenayAmr M. Youssef, editors, Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers. Springer, 2001. ISBN 3-540-43066-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

6. Serge Vaudenay, editor, Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings. Springer, 1998. ISBN 3-540-64265-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Yi Lu,  Serge Vaudenay,  Cryptanalysis of an E0-like Combiner with Memory, Journal of Cryptology, Volume 21(3), pp. 430 - 457, Springer, 2008.

[Cited 2 times ]

2. Serge Vaudenay,  Decorrelation: A Theory for Block Cipher Security, Journal of Cryptology, Volume 16(4), pp. 249 - 286, Springer, 2003.

[Cited 39 times ]

3. Serge Vaudenay,  Cryptanalysis of the Chor-Rivest Cryptosystem, Journal of Cryptology, Volume 14(2), pp. 87 - 100, Springer, 2001.

[Cited 35 times ]

4. Claus-Peter Schnorr,  Serge Vaudenay,  The Black-Box Model for Cryptographic Primitives, Journal of Cryptology, Volume 11(2), pp. 125 - 140, Springer, 1998.

[Cited 6 times ]

5. Don Coppersmith,  Jacques Stern,  Serge Vaudenay,  The Security of the Birational Permutation Signature Schemes, Journal of Cryptology, Volume 10(3), pp. 207 - 221, Springer, 1997.

[Cited 36 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Khaled Ouafi,  Serge Vaudenay,  Smashing SQUASH-0, pp. 300 - 312, EUROCRYPT 2009.

[Electronic Edition][Cited 6 times ]

2. Jean Monnerat,  Sylvain Pasini,  Serge Vaudenay,  Efficient Deniable Authentication for Signatures, pp. 272 - 291, ACNS 2009.

[Electronic Edition][Cited 1 times ]

3. Khaled Ouafi,  Raphael Overbeck,  Serge Vaudenay,  On the Security of HB# against a Man-in-the-Middle Attack, pp. 108 - 124, ASIACRYPT 2008.

[Electronic Edition][Cited 19 times ]

4. Thomas Baignères,  Jacques Stern,  Serge Vaudenay,  Linear Cryptanalysis of Non Binary Ciphers, pp. 184 - 211, SAC 2007.

[Electronic Edition][Cited 6 times ]

5. Serge Vaudenay,  Martin Vuagnoux,  Passive-Only Key Recovery Attacks on RC4, pp. 344 - 359, SAC 2007.

[Electronic Edition][Cited 20 times ]

6. Serge Vaudenay,  On Privacy Models for RFID, pp. 68 - 87, ASIACRYPT 2007.

[Electronic Edition][Cited 79 times Red Star]

7. Jean Monnerat,  Serge Vaudenay,  Short 2-Move Undeniable Signatures, pp. 19 - 36, VIETCRYPT 2006.

[Electronic Edition][Cited 14 times ]

8. Sylvain Pasini,  Serge Vaudenay,  SAS-Based Authenticated Key Agreement, pp. 395 - 409, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 45 times ]

9. Sylvain Pasini,  Serge Vaudenay,  An Optimal Non-interactive Message Authentication Protocol, pp. 280 - 294, CT-RSA 2006.

[Electronic Edition][Cited 32 times ]

10. Matthieu Finiasz,  Serge Vaudenay,  When Stream Cipher Analysis Meets Public-Key Cryptography, pp. 266 - 284, SAC 2006.

[Electronic Edition][Cited 9 times ]

11. Jean Monnerat,  Yvonne Anne Oswald,  Serge Vaudenay,  Optimization of the MOVA Undeniable Signature Scheme, pp. 196 - 209, MYCRYPT 2005.

[Electronic Edition][Cited 5 times ]

12. Serge Vaudenay,  Secure Communications over Insecure Channels Based on Short Authenticated Strings, pp. 309 - 326, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 130 times Red StarRed Star]

13. Yi Lu,  Willi Meier,  Serge Vaudenay,  The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption, pp. 97 - 117, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

14. Thomas Baignères,  Serge Vaudenay,  Proving the Security of AES Substitution-Permutation Network, pp. 65 - 81, SAC 2005.

[Electronic Edition][Cited 7 times ]

15. Thomas Baignères,  Pascal Junod,  Serge Vaudenay,  How Far Can We Go Beyond Linear Cryptanalysis?, pp. 432 - 450, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

16. Yi Lu,  Serge Vaudenay,  Cryptanalysis of Bluetooth Keystream Generator Two-Level E0, pp. 483 - 499, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

17. Jean Monnerat,  Serge Vaudenay,  Generic Homomorphic Undeniable Signatures, pp. 354 - 371, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

18. Pascal Junod,  Serge Vaudenay,  FOX : A New Family of Block Ciphers, pp. 114 - 129, SAC 2004.

[Electronic Edition][Cited 38 times ]

19. Pascal Junod,  Serge Vaudenay,  Perfect Diffusion Primitives for Block Ciphers, pp. 84 - 99, SAC 2004.

[Electronic Edition][Cited 10 times ]

20. Yi Lu,  Serge Vaudenay,  Faster Correlation Attack on Bluetooth Keystream Generator E0, pp. 407 - 425, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 43 times ]

21. Jean Monnerat,  Serge Vaudenay,  Undeniable Signatures Based on Characters: How to Sign with One Bit, pp. 69 - 85, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

22. Kazumaro Aoki,  Serge Vaudenay,  On the Use of GF-Inversion as a Cryptographic Primitive, pp. 234 - 247, SAC 2003.

[Electronic Edition][Cited 10 times ]

23. Brice Canvel,  Alain P. Hiltgen,  Serge Vaudenay,  Martin Vuagnoux,  Password Interception in a SSL/TLS Channel, pp. 583 - 599, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 75 times Red Star]

24. Pascal Junod,  Serge Vaudenay,  Optimal Key Ranking Procedures in a Statistical Cryptanalysis, pp. 235 - 246, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

25. Serge Vaudenay,  The Security of DSA and ECDSA, pp. 309 - 323, PKC 2003.

[Electronic Edition][Cited 9 times ]

26. Serge Vaudenay,  Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS , pp. 534 - 546, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 87 times Red Star]

27. Shiho Moriai,  Serge Vaudenay,  On the Pseudorandomness of Top-Level Schemes of Block Ciphers, pp. 289 - 302, ASIACRYPT 2000.

[Electronic Edition][Cited 25 times ]

28. Serge Vaudenay,  Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case, pp. 189 - 201, SAC 2000.

[Electronic Edition][Cited 13 times ]

29. Louis Granboulan,  Phong Q. Nguyen,  Fabrice Noilhan,  Serge Vaudenay,  DFCv2, pp. 57 - 71, SAC 2000.

[Electronic Edition][Cited 10 times ]

30. Henri Gilbert,  Helena Handschuh,  Antoine Joux,  Serge Vaudenay,  A Statistical Attack on RC6, pp. 64 - 74, FSE 2000.

[Electronic Edition][Cited 30 times ]

31. Marc Joye,  Pascal Paillier,  Serge Vaudenay,  Efficient Generation of Prime Numbers, pp. 340 - 354, CHES 2000.

[Electronic Edition][Cited 31 times ]

32. Ernest F. Brickell,  David Pointcheval,  Serge Vaudenay,  Moti Yung,  Design Validations for Discrete Logarithm Based Signature Schemes, pp. 276 - 292, PKC 2000.

[Electronic Edition][Cited 58 times Red Star]

33. Serge Vaudenay,  On the Lai-Massey Scheme, pp. 8 - 19, ASIACRYPT 1999.

[Electronic Edition][Cited 42 times ]

34. Serge Vaudenay,  Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness, pp. 49 - 61, SAC 1999.

[Electronic Edition][Cited 26 times ]

35. Helena Handschuh,  Serge Vaudenay,  A Universal Encryption Standard, pp. 1 - 12, SAC 1999.

[Electronic Edition][Cited 4 times ]

36. Serge Vaudenay,  On the Security of CS-Cipher, pp. 260 - 274, FSE 1999.

[Electronic Edition][Cited 30 times ]

37. Serge Vaudenay,  Resistance Against General Iterated Attacks, pp. 255 - 271, EUROCRYPT 1999.

[Electronic Edition][Cited 24 times ]

38. David M'Raïhi,  David Naccache,  David Pointcheval,  Serge Vaudenay,  Computational Alternatives to Random Number Generators, pp. 72 - 80, SAC 1998.

[Electronic Edition][Cited 9 times ]

39. Serge Vaudenay,  Feistel Ciphers with L 2-Decorrelation, pp. 1 - 14, SAC 1998.

[Electronic Edition][Cited 23 times ]

40. Serge Vaudenay,  Cryptanalysis of the Chor-Rivest Cryptosystem, pp. 243 - 256, CRYPTO 1998.

[Electronic Edition][Cited 25 times ]

41. Jacques Stern,  Serge Vaudenay,  CS-Cipher, pp. 189 - 205, FSE 1998.

[Electronic Edition][Cited 23 times ]

42. Jacques Stern,  Serge Vaudenay,  SVP: A Flexible Micropayment Scheme, pp. 161 - 172, FC 1997.

[Electronic Edition][Cited 29 times ]

43. David M'Raïhi,  David Naccache,  Jacques Stern,  Serge Vaudenay,  XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications, pp. 166 - 171, FSE 1997.

[Electronic Edition][Cited 1 times ]

44. Mike Just,  Serge Vaudenay,  Authenticated Multi-Party Key Agreement, pp. 36 - 49, ASIACRYPT 1996.

[Electronic Edition][Cited 161 times Red StarRed Star]

45. Ross J. Anderson,  Serge Vaudenay,  Minding your p's and q`s, pp. 26 - 35, ASIACRYPT 1996.

[Electronic Edition][Cited 52 times Red Star]

46. Serge Vaudenay,  Hidden Collisions on DSS, pp. 83 - 88, CRYPTO 1996.

[Electronic Edition][Cited 52 times Red Star]

47. Serge Vaudenay,  On the Weak Keys of Blowfish, pp. 27 - 32, FSE 1996.

[Electronic Edition][Cited 51 times Red Star]

48. Serge Vaudenay,  On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER, pp. 286 - 297, FSE 1994.

[Electronic Edition][Cited 105 times Red StarRed Star]

49. Claus-Peter Schnorr,  Serge Vaudenay,  Black Box Cryptanalysis of Hash Networks Based on Multipermutations, pp. 47 - 57, EUROCRYPT 1994.

[Electronic Edition][Cited 39 times ]

50. Florent Chabaud,  Serge Vaudenay,  Links Between Differential and Linear Cryptanalysis, pp. 356 - 365, EUROCRYPT 1994.

[Electronic Edition][Cited 178 times Red StarRed Star]

51. David Naccache,  David M'Raïhi,  Serge Vaudenay,  Dan Raphaeli,  Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard, pp. 77 - 85, EUROCRYPT 1994.

[Electronic Edition][Cited 14 times ]

52. Claus-Peter Schnorr,  Serge Vaudenay,  Parallel FFT-Hashing, pp. 149 - 156, FSE 1993.

[Electronic Edition][Cited 22 times ]

53. Don Coppersmith,  Jacques Stern,  Serge Vaudenay,  Attacks on the Birational Permutation Signature Schemes, pp. 435 - 443, CRYPTO 1993.

[Electronic Edition][Cited 45 times ]

54. Serge Vaudenay,  FFT-Hash-II is not yet Collision-free, pp. 587 - 593, CRYPTO 1992.

[Electronic Edition][Cited 16 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...