Warning
Here is my publications list.
Please note that some versions available from here may differ from their
publication form and that the published versions are in general copyright
from the publisher (check on the corresponding links).
Last update: November 11th, 2024.
- Dissertations
- PhD: The Security of Cryptographic Primitives
- Habilitation to Supervise Research: Towards a Theory of Symmetric Encryption
- Books
- Exercices book, Dunod: Algorithmique et optimisation: exercices corrigés
- Textbook on cryptography, Springer: A Classical Introduction to Cryptography - Applications for Communications Security (external URL)
- Exercise book on cryptography, Springer: A Classical Introduction to Cryptography - Exercise Book (external URL)
- Textbook on cryptography, PPUR (in French): La fracture cryptographique (external URL)
- Proceedings
- LNCS volume: FSE' 98 (external URL)
- LNCS volume: SAC' 01 (external URL)
- LNCS volume: PKC' 05 (external URL)
- LNCS volume: Mycrypt' 05 (external URL)
- LNCS volume: EUROCRYPT' 06 (external URL)
- LNCS volume: AFRICACRYPT' 08 (external URL)
- LNCS volume: SAC' 11 (external URL)
- LNCS volume: AFRICACRYPT' 12 (external URL)
- LNCS volume: INDOCRYPT' 13 (external URL)
- LNCS volume: ACNS' 14 (external URL)
- LNCS volume: CANS' 20 (external URL)
- LNCS volume: AFRICACRYPT' 24 (external URL)
- Translations
- Stinson's book (1st Edition), ITP: Cryptographie Théorie et Pratique
- Stinson's book (2nd Edition), Vuibert: Cryptographie Théorie et Pratique
- Prefaces
- Martin's book, PPUR: Codage, Cryptographie et Applications (external URL)
- Journal of Cryptology (published by Springer-Verlag)
- JoC 97: The Security of the Birational Permutation Signature Schemes
- JoC 98: Black Box Cryptanalysis of Cryptographic Primitives
- JoC 01: Cryptanalysis of the Chor-Rivest Cryptosystem
- JoC 03: Decorrelation: a Theory for Block Cipher Security
- JoC 08: Cryptanalysis of an E0-like Combiner with Memory
- JoC 11: Short Undeniable Signatures Based on Group Homomorphisms
- Other Journals
- CIS 01: Decorrelation over Infinite Domains: the Encrypted CBC-MAC Case
- MC2R 03: Cryptography with Guardian Angels: Bringing Civilization to Pirates - Abstract
- IPL 05: Generating Anomalous Elliptic Curves
- IPL 07: How to Safely Close a Discussion
- J. of Physics 07: About Machine-Readable Travel Documents
- Security & Privacy 07: E-Passport Threats
- CCDS 12: Synthetic Linear Analysis with Applications to CubeHash and Rabbit
- IJCNS 12: Cryptanalysis of the Double-Moduli Cryptosystem
- Comput. J. 13: On Selecting the Nonce Length in Distance-Bounding Protocols
- SACS 13: UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence
- Proc Of The Romanian Academy 13: A Fully Dynamic Universal Accumulator
- Computers & Security 14: Location Leakage in Distance Bounding: Why Location Privacy does not Work
- CCDS 14: Revisiting Iterated Attacks in the Context of Decorrelation Theory
- Security & Privacy 15: Challenges in Distance Bounding
- Computer Security 15: Practical and Provably Secure Distance-Bounding
- Computer Security 15: Expected Loss Analysis for Authentication in Constrained Channels
- IJIS 15: On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations
- CCDS 15: On solving LPN using BKW and variants Implementation and Analysis
- Studia Scientiarum Mathematicarum Hungarica 15: Cryptanalysis of Chosen Symmetric Homomorphic Schemes
- IFS 16: Privacy Failure in the Public-Key Distance-Bounding Protocols
- Cryptologia 16: DES S-box Generator
- CCDS 18: Cryptanalysis of a Homomorphic Encryption Scheme
- CSUR 18: Security of Distance-Bounding: A Survey
- TMMP 19: Cryptanalysis of Enhanced MORE
- Comp J 22: Optimal Symmetric Ratcheting for Secure Communication
- DTRAP 22: SwissCovid in the Perspective of its Goals
- Book Chapters
- Springer 12: TCHO: A Code-Based Cryptosystem
- Crypto Series (published as Springer-Verlag's LNCS volumes)
- Crypto' 92: FFT-Hash-II is not yet Collision-Free
- Crypto' 93: Attacks on the Birational Permutation Signature
- Crypto' 96: Hidden Collisions on DSS
- Crypto' 98: Cryptanalysis of the Chor-Rivest Cryptosystem
- Crypto' 03: Password Interception in a SSL/TLS Channel
- Crypto' 04: Faster Correlation Attack on Bluetooth E0 Keystream Generator
- Crypto' 05: Secure Communications over Insecure Channels Based on Short Authenticated Strings
- Crypto' 05: The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Crypto' 12: Resistance Against Iterated Attacks by Decorrelation Revisited
- Crypto' 15: Capacity and Data Complexity in Multidimensional Linear Attack
- Crypto' 17: Breaking the FF3 Format-Preserving Encryption Standard Over a Small Domain (Eprint 2017/521)
- Crypto' 23: On Active Attack Detection in Messaging with Immediate Decryption (Eprint 2023/880)
- Crypto' 23: Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs (Eprint 2022/1622)
- Eurocrypt Series (published as Springer-Verlag's LNCS volumes)
- Eurocrypt' 94: Links between Differential and Linear Cryptanalysis
- Eurocrypt' 94: Complexity Trade-Offs with the Digital Signature Standard
- Eurocrypt' 94: Black Box Cryptanalysis of Hash Networks based on Multipermutations
- Eurocrypt' 99: Resistance Against General Iterated Attacks
- Eurocrypt' 02: Security Flaws Induced by CBC Padding --- Applications to SSL, IPSEC, WTLS...
- Eurocrypt' 09: Smashing SQUASH-0
- Eurocrypt' 11: Statistical Attack on RC4: Distinguishing WPA
- Eurocrypt' 15: Better Algorithms for LWE and LWR
- Eurocrypt' 19: Misuse Attacks on Post-quantum Cryptosystems
- Eurocrypt' 22: On IND-qCCA Security in the ROM and Its Applications - CPA Security Is Sufficient for TLS 1.3
- Asiacrypt Series (published as Springer-Verlag's LNCS volumes)
- Asiacrypt' 96: Authenticated Multi-Party Key Agreement
- Asiacrypt' 96: Minding your p's and q's
- Asiacrypt' 99: On the Lai-Massey Scheme
- Asiacrypt' 00: On the Pseudorandomness of Top-Level Schemes of Block Ciphers
- Asiacrypt' 04: Generic Homomorphic Undeniable Signatures
- Asiacrypt' 04: Cryptanalysis of Bluetooth Keystream Generator Two-level E0
- Asiacrypt' 04: How Far Can We Go Beyond Linear Cryptanalysis?
- Asiacrypt' 07: On Privacy Models for RFID
- Asiacrypt' 08: On the Security of HB# against a Man-in-the-Middle Attack
- Asiacrypt' 15: How to Sequentialize Independent Parallel Attacks? Biased Distributions Have a Phase Transition
- Asiacrypt' 16: Optimization of LPN Solving Algorithms
- Asiacrypt' 16: Efficient Public-Key Distance Bounding Protocol
- Asiacrypt' 16: Authenticated Encryption with Variable Stretch
- Asiacrypt' 20: Determining the Core Primitive for Optimally Secure Ratcheting (also Eprint 2020/148)
- Asiacrypt' 21: FAST: Secure and High Performance Format-Preserving Encryption and Tokenization (also Eprint 2021/1171)
- Asiacrypt' 21: New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair (also Eprint 2021/1345)
- Fast Software Encryption (FSE) Series (published as Springer-Verlag's LNCS volumes or IACR ToSC journal)
- Fse' 93: Parallel FFT-Hashing
- Fse' 94: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
- Fse' 96: On the Weak Keys of Blowfish
- Fse' 97: xmx - a Firmware-Oriented Block Cipher based on Modular Multiplications
- Fse' 98: CS-Cipher
- Fse' 99: On the Security of CS-Cipher
- Fse' 00: A Statistical Attack on RC6
- Fse' 03: Optimal Key Ranking Procedures in a Statistical Cryptanalysis
- Fse' 12: ElimLin Algorithm Revisited
- Fse' 13: Smashing WEP in A Passive Attack
- Fse' 13: Towards Secure Distance Bounding
- Fse' 15: Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation
- Fse' 15: Boosting OMD for Almost Free Authentication of Associated Data
- Fse' 20: Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers
- Fse' 21: Cryptanalysis of LowMC instances using single plaintext/ciphertext pair
- Public Key Cryptography (PKC) Series (published as Springer-Verlag's LNCS volumes)
- Pkc' 00: Design Validations for Discrete Logarithm Based Signature Schemes
- Pkc' 03: The Security of DSA and ECDSA
- Pkc' 04: Undeniable Signatures Based on Characters
- Pkc' 06: SAS-Based Authenticated Key Agreement
- Pkc' 21: Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness (also Eprint 2019/965)
- Cryptographic Hardware and Embedded Systems (CHES) Series (published as Springer-Verlag's LNCS volumes)
- Ches' 00: Efficient Generation of Prime Numbers
- Ches' 09: On Tamper-Resistance from a Theoretical Viewpoint: The Power of Seals
- Ches' 10: ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
- Selected Areas on Cryptography (SAC) Series (published as Springer-Verlag's LNCS volumes)
- Sac' 98: Feistel Ciphers with L_2-Decorrelation
- Sac' 99: Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomnes
- Sac' 99: A Universal Encryption Standard
- Sac' 00: Decorrelation over Infinite Domains: the Encrypted CBC-MAC Case
- Sac' 00: DFCv2
- Sac' 03: On the Use of GF-Inversion as a Cryptographic Primitive
- Sac' 04: FOX: a new Family of Block Ciphers
- Sac' 04: Perfect Diffusion Primitives for Block Ciphers
- Sac' 05: Proving the Security of AES Substitution-Permutation Network
- Sac' 06: When Stream Cipher Analysis Meets Public-Key Cryptography
- Sac' 07: Passive-Only Key Recovery Attacks on RC4
- Sac' 07: Linear Cryptanalysis of Non Binary Ciphers
- Sac' 10: Discovery and Exploitation of New Biases in RC4
- Sac' 14: OMD: A Compression Function Mode of Operation for Authenticated Encryption
- Other Series Published as Springer-Verlag's LNCS Volumes
- Information Hiding' 96: The Newton Channel
- Fc' 97: SVP: a Flexible Micropayment Scheme
- Cardis' 98: Decorrelated Fast Cipher: an AES Candidate well suited for Low Cost Smart Cards Applications
- Stacs' 98: Provable Security for Block Ciphers by Decorrelation
- Icisc' 99: On Provable Security for Conventional Cryptography
- Wisa' 03: Fair Exchange with Guardian Angels
- Acisp' 04: Digital Signature Schemes with Domain Parameters
- Acisp' 04: Optimistic Fair Exchange based on Publicly Verifiable Secret Sharing
- Icics' 04: On someWeak Extensions of AES and BES
- Isc' 05: Chaum's Designated Confirmer Signature Revisited
- Mycrypt' 05: Optimization of the MOVA Undeniable Signature Scheme
- Cisc' 05: On Bluetooth Repairing: Key Agreement based on Symmetric-Key Cryptography
- Cisc' 05: Enforcing Email Addresses Privacy using Tokens
- Ct-rsa' 06: An Optimal Non-Interactive Message Authentication Protocol
- Icisc' 06: RFID Privacy based on Public-Key Cryptography
- Acisp' 07: TCHo: a Hardware-Oriented Trapdoor Cipher
- Acisp' 07: Hash-and-Sign with Weak Hashing Made Secure
- Icisc' 07: Security-Preserving Asymmetric Protocol Encapsulation
- Icits' 08: The Complexity of Distinguishing Distributions
- Iwcc' 09: On the Impossibility of Strong Encryption over aleph0
- Acns' 09: Efficient Deniable Authentication for Signatures, Application to Machine-Readable Travel Document
- Acns' 10: A Message Recognition Protocol Based on Standard Assumptions
- Provsec' 10: Distinguishing Distributions Using Chernoff Information
- Cans' 10: Cryptanalysis of Reduced-Round MIBS Block Cipher
- Icisc' 11: Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
- Acns' 11: On Hiding a Plaintext Length by Preencryption
- Quisquater' 12: Deniable RSA Signature: The Raise and Fall of Ali Baba
- Cardis' 11: Fast Key Recovery Attack on ARMADILLO1 and Variants
- Cardis' 12: Multipurpose Cryptographic Primitive ARMADILLO3
- Provsec' 12: Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices
- Latincrypt' 12: On the Pseudorandom Function Assumption in (Secure) Distance-Bounding Protocols
- Indocrypt' 12: Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers
- Cans' 12: Strong Privacy for RFID Systems from Plaintext-Aware Encryption
- Inscrypt' 12: The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks
- Lightsec' 13: Secure & Lightweight Distance-Bounding
- Provsec' 13: On Modeling Terrorist Frauds
- Provsec' 13: Input-Aware Equivocable Commitments and UC-secure Commitments With Atomic Exchanges
- Acns' 13: Primeless Factoring-Based Cryptography
- Acisp' 14: On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations
- Iwsec' 14: Improved Linear Cryptanalysis of Reduced-Round MIBS
- Provsec' 14: Misuse-Resistant Variants of the OMD Authenticated Encryption Mode
- Inscrypt' 14: Optimal Proximity Proofs
- Indocrypt' 14: On the Key Schedule of Lightweight Block Ciphers
- Icisc' 14: Compact and Efficient UC Commitments under Atomic-Exchanges
- Fc' 15: Private and Secure Public-Key Distance Bounding: Application to NFC Payment
- Acns' 15: Optimal Proximity Proofs Revisited
- Provsec' 15: Sound Proof of Proximity of Knowledge
- Provsec' 15: On Privacy for RFID
- Kahn' 16: Clever Arbiters versus Malicious Adversaries
- Secitc' 16: Circular Security Reconsidered
- Cans' 16: Distance Bounding based on PUF
- Cans' 16: When Constant-time Source Yields Variable-time Binary: Exploiting Curve25519-donna Built with MSVC 2015
- Cans' 16: Side-Channel Attacks on Threshold Implementations using a Glitch Algebra
- Isc' 17: Contactless Access Control Based on Distance Bounding
- Acns' 18: Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
- Acns' 18: Formal Analysis of Distance Bounding with Secure Hardware
- Acns' 18: Can Caesar Beat Galois?
- Acisp' 18: Secure Contactless Payment
- Iwsec' 19: Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity
- Wisa' 19: Timed-Release Encryption With Master Time Bound Key
- Stm' 19: BioID: a Privacy-Friendly Identity Document
- Iwsec' 20: Sublinear Bounds on the Distinguishing Advantage for Multiple Samples
- Iwsec' 20: Symmetric Asynchronous Ratcheted Communication with Associated Data
- Acns' 20: BioLocker: A Practical Biometric Authentication Mechanism Based on 3D Fingervein (also Eprint 2020/453)
- Acns' 20: Classical Misuse Attacks on NIST Round 2 PQC - The Power of Rank-Based Schemes (also Eprint 2020/409)
- Acns' 21: Towards Efficient LPN-Based Symmetric Encryption
- Ct-rsa' 21: On the Effectiveness of Time Travel to Inject COVID-19 Alerts (also Eprint 2020/1393)
- Icisc' 21: Towards Witness Encryption Without Multilinear Maps
- Cans' 21: FO-like Combiners and Hybrid Post-Quantum Cryptography (also Eprint 2021/1288)
- Africacrypt' 22: Solving the Learning Parity with Noise Problem Using Quantum Algorithms
- Iwsec' 23: Extractable Witness Encryption for the Homogeneous Linear Equations Problem
- Iwsec' 23: Making Classical (Threshold) Signatures Post-quantum for Single Use on a Public Ledger (Eprint 2023/420)
- Acns' 23: A Gapless Post-quantum Hash Proof System in the Hamming Metric
- Icics' 23: Private Message Franking with After Opening Privacy (Eprint 2018/938)
- Other Conference Proceedings
- Eurocode' 92: One-Time Identification with Low Memory
- Acm ccs' 96: An Experiment on DES - Statistical Cryptanalysis
- AES Submission, Extended Abstract: Decorrelated Fast Cipher: an AES Candidate
- Report for the AES2 Workshop: Report on the AES Candidates
- Report for the AES2 Workshop: DFC Update
- Santha's crypto get together' 03: On Measuring Resistance to Linear Cryptanalysis
- Yacc' 04: How to Sign with One Bit
- Sec' 05: The Pairing Problem with User Interaction
- Bsym' 06: A Protection Scheme for MoC-Enabled Smart Cards
- Rfid sec' 07: About Machine-Readable Travel Documents
- Asiaccs' 08: Mutual Authentication in RFID: Security and Privacy
- Rfid sec' 09: Pathchecker: An RFID Application for Tracing Products in Supply-Chains
- Biosig' 09: The Extended Access Control for Machine Readable Travel Documents
- Secrypt' 11: Related-Key Attack against Triple Encryption based on Fixed Points
- Icete' 11: A Related-Key Attack against Multiple Encryption based on Fixed Points
- Yacc' 12: HELEN: a Public-key Cryptosystem Based on the LPN Problem (Extended Abstract)
- Yacc' 12: Primeless Modular Cryptography (Extended Abstract)
- Ieee rfid-ta' 12: Mafia Fraud Attack against the RC Distance-Bounding Protocol
- Infocomm' 12: Expected Loss Bounds for Authentication in Constrained Channels
- Asiaccs' 15: The Limits of Composable Crypto with Transferable Setup Devices
- Scis' 20: Smart Contract with Secret Parameters
- Itc' 21: Post-Compromise Security in Self-Encryption
- Usenix' 23: Cryptographic Administration for Secure Group Messaging (Eprint 2022/1411)
- Miscellaneaous
- Technical Report: On Provable Security for Digital Signature Algorithms
- Rump Session of Asiacrypt'96 (unpublished): On the Security of Lenstra's DSA Variant
- Technical Report: Provable Security for Block Ciphers by Decorrelation
- Official Comment of AES: Comparison of the Randomness Provided by Some AES Candidates
- Technical Report: CBC Padding: Security Flaws in SSL, IPSEC, WTLS, ...
- Technical Report: FOX Specifications Version 1.1
- Technical Report: FOX Specifications Version 1.2
- Eprint 16: Observations on the LPN Solving Algorithm from Eurocrypt'16
- Articcrypt 16: Cryptanalysis of a Homomorphic Encryption Scheme
- Esc' 17: Breaking the FF3 Format-Preserving Encryption
- Eprint 18: Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
- Eprint 20: Analysis of DP3T - Between Scylla and Charybdis
- Online 20: Le traçage anonyme, dangereux oxymore. Analyse de risques à destination des non-spécialistes
- Eprint 20: Centralized or Decentralized? The Contact Tracing Dilemma
- Online 20: Own Analysis of SwissCovid
- Online 20: The Dark Side of SwissCovid
Joint work with David M'Raihi, David Naccache and Dan Raphaeli
In Advances in Cryptology EUROCRYPT'94, Perugia, Italy,
Lecture Notes
in Computer Science No. 950, pp. 77-85,
Springer-Verlag, 1995.
The Digital Signature Algorithm (DSA) was proposed in 1991 by the US National
Institute of Standards and Technology to provide an appropriate core for
applications requiring digital signatures. Undoubtelly, many applications will
include this standard in the future and thus, the foreseen domination of DSA as
legal certification tool is sufficiently important to focus research endeavours
on the suitability of this scheme to various situations. In this paper, we
present six new DSA-based protocols for: performing a quick batch-verification
of n signatures; avoiding the cumbersome calculation of 1/k mod q by the signer;
compressing sets of DSA transactions into shorter archive signatures;
generating signatures from pre-calculated "Use & Throw" 224-bit
signature-coupons; self-certifying the moduli and bit-patterning directly q
on p. All our schemes combine in a natural way full DSA compatibility and
flexible trade-offs between computational complexity, transmission overheads
and key sizes.
Serge Vaudenay