scispace - formally typeset
S

Serge Vaudenay

Researcher at École Polytechnique Fédérale de Lausanne

Publications -  307
Citations -  10037

Serge Vaudenay is an academic researcher from École Polytechnique Fédérale de Lausanne. The author has contributed to research in topics: Block cipher & Cryptography. The author has an hindex of 49, co-authored 297 publications receiving 9488 citations. Previous affiliations of Serge Vaudenay include Digital Management, Inc. & Centre national de la recherche scientifique.

Papers
More filters
Book

Advances in Cryptology - Eurocrypt 2006

TL;DR: The complexity of recovering the secret key from O( √ p) to O( p/d) for Boldyreva’s blind signature and the original ElGamal scheme when p − 1 has a divisor d ≤ p and signature or decryption queries are allowed.
Book ChapterDOI

On privacy models for RFID

TL;DR: This model captures the notion of a powerful adversary who can monitor all communications, trace tags within a limited period of time, corrupt tags, and get side channel information on the reader output.
Book ChapterDOI

Links between differential and linear cryptanalysis

TL;DR: Linear cryptanalysis, introduced last year by Matsui, will most certainly open-up the way to new attack methods which may be made more efficient when compared or combined with differential cryptanalysis as mentioned in this paper.
Journal Article

Security flaws induced by CBC padding -applications to SSL, IPSEC, WTLS …

TL;DR: Various ways to perform an efficient side channel attack are shown and potential applications, extensions to other padding schemes and various ways to fix the problem are discussed.
Book ChapterDOI

Secure communications over insecure channels based on short authenticated strings

TL;DR: A way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits, which offers an alternative (or complement) to public-key infrastructures, since it no longer need any central authority, and to password-based authenticated key exchange, since one no longer needs to establish a confidential password.