See also DBLP and Google scholar.

Journal papers in cryptography

How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction
J.-S. Coron, T. Holenstein, R. Künzler, J. Patarin, Y. Seurin, and S. Tessaro
Journal of Cryptology

Conference papers in cryptography

2016

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
T. Peyrin and Y. Seurin
Proceedings of CRYPTO 2016 (I), LNCS 9814, pp. 33-63
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
B. Cogliati and Y. Seurin
Proceedings of CRYPTO 2016 (I), LNCS 9814, pp. 121-149
Strengthening the Known-Key Security Notion for Block Ciphers
B. Cogliati and Y. Seurin
Proceedings of FSE 2016, LNCS 9783, pp. 494-513

2015

Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
B. Cogliati and Y. Seurin
Proceedings of ASIACRYPT 2015 (II), LNCS 9453, pp. 134-158
The Iterated Random Permutation Problem with Applications to Cascade Encryption
B. Minaud and Y. Seurin
Proceedings of CRYPTO 2015 (I), LNCS 9215, pp. 351-367
Tweaking Even-Mansour Ciphers
B. Cogliati, R. Lampe, and Y. Seurin
Proceedings of CRYPTO 2015 (I), LNCS 9215, pp. 189-298
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
B. Cogliati and Y. Seurin
Proceedings of EUROCRYPT 2015 (I), LNCS 9056, pp. 584-613
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes
P. Gazi, J. Lee, Y. Seurin, J. Steinberger, and S. Tessaro
Proceedings of FSE 2015, LNCS 9054, pp. 319-341

2014

Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results
B. Cogliati, J. Patarin, and Y. Seurin
Proceedings of SAC 2014, LNCS 8781, pp. 129-146
Minimizing the Two-Round Even-Mansour Cipher
S. Chen, R. Lampe, J. Lee, Y. Seurin, and J. Steinberger
Proceedings of CRYPTO 2014 (I), LNCS 8616, pp. 39-56
On the Lossiness of the Rabin Trapdoor Function
Y. Seurin
Proceedings of PKC 2014, LNCS 8383, pp. 380-398
Security Analysis of Key-Alternating Feistel Ciphers
R. Lampe and Y. Seurin
Proceedings of FSE 2014, LNCS 8540, pp. 243-264

2013

How to Construct an Ideal Cipher from a Small Set of Public Permutations
R. Lampe and Y. Seurin
Proceedings of ASIACRYPT 2013, LNCS 8269, pp. 444-463
Tweakable Blockciphers with Asymptotically Optimal Security
R. Lampe and Y. Seurin
Proceedings of FSE 2013, LNCS 8424, pp. 113-151
New Constructions and Applications of Trapdoor DDH Groups
Y. Seurin
Proceedings of PKC 2013, LNCS 7778, pp. 443-460
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption
Y. Seurin and J. Treger
Proceedings of CT-RSA 2013, LNCS 7779, pp. 68-83

2012

An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher
R. Lampe, J. Patarin, and Y. Seurin
Proceedings of ASIACRYPT 2012, LNCS 7658, pp. 278-295
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model
Y. Seurin
Proceedings of EUROCRYPT 2012, LNCS 7237, pp. 554-571
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction
A. Mandal, J. Patarin, and Y. Seurin
Proceedings of TCC 2012, LNCS 7194, pp. 285-302

2010

A Domain Extender for the Ideal Cipher
J.-S. Coron, Y. Dodis, A. Mandal, and Y. Seurin
Proceedings of TCC 2010, LNCS 5978, pp. 273-289

2008

The Random Oracle Model and The Ideal Cipher Model are Equivalent - Best Paper Award!
J.-S. Coron, J. Patarin, and Y. Seurin
Proceedings of CRYPTO 2008, LNCS 5157, pp. 1-20
Warning: the proof of Theorem 2 is flawed, see this paper. See also this journal paper.
Analysis of intermediate field systems
O. Billet, J. Patarin, and Y. Seurin
Proceedings of SCC 2008, pp. 110-117
Building Secure Block Ciphers on Generic Attacks Assumptions
J. Patarin and Y. Seurin
Proceedings of SAC 2008, LNCS 5381, pp. 66-81
Hash Functions and RFID Tags: Mind the Gap
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, and Y. Seurin
Proceedings of CHES 2008, LNCS 5154, pp. 283-299
How to Encrypt with the LPN Problem
H. Gilbert, M.J.B. Robshaw, and Y. Seurin
Proceedings of ICALP 2008, LNCS 5126, pp. 679-690
Looking Back at a New Hash Function
O. Billet, M.J.B. Robshaw, Y. Seurin, and Y.L. Yin
Proceedings of ACISP 2008, LNCS 5107, pp. 239-253
HB#: Increasing the Security and Efficiency of HB+
H. Gilbert, M.J.B. Robshaw, and Y. Seurin
Proceedings of EUROCRYPT 2008, LNCS 4965, pp. 361-378
Good Variants of HB+ are Hard to Find
H. Gilbert, M.J.B. Robshaw, and Y. Seurin
Proceedings of Financial Crypto 2008, LNCS 5143, pp. 156-170

2007

PRESENT: An Ultra-Lightweight Block Cipher
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe
Proceedings of CHES 2007, LNCS 4727, pp. 450-466
Security Analysis of Constructions Combining FIL Random Oracles
Y. Seurin and T. Peyrin
Proceedings of FSE 2007, LNCS 4593, pp. 119-136

Other publications in cryptography

A Note on the Indifferentiability of the 10-Round Feistel Construction
Y. Seurin
Unpublished note, March 2011
Primitives et protocoles cryptographiques à sécurité prouvée
Y. Seurin
PhD thesis, Versailles University, 2009
Warning: problems have been found in Theorem 2.4, see this paper. See also this note and this journal paper.
SHA-3 Proposal: ECHO
R. Benadjila, O. Billet, H. Gilbert, G. Macario-Rat, T. Peyrin, M. Robshaw, and Y. Seurin
A candidate hash function for the NIST SHA-3 competition

Publications in quantum physics

Semiconductor Sources of Twin Photons for Quantum Information
S. Ducci, L. Lanco, Y. Seurin, G. Leo, V. Berger, A. De Rossi, and X. Marcadet
J. Opt. B: Quantum Semiclass. Opt. 7, S158 - S165 (2005)
Nonlinear AlGaAs Waveguide for the Generation of Counterpropagating Twin Photons in the Telecom Range
M. Ravaro, Y. Seurin, S. Ducci, G. Leo, V. Berger, A. De Rossi, and G. Assanto
Journal of Applied Physics 98, 063103 (2005)
Fast Rotation of a Bose-Einstein Condensate
V. Bretin, S. Stock, Y. Seurin, and J. Dalibard
Phys. Rev. Lett. 92, 050403 (2004)

Invited talks

Constructing Tweakable Block Ciphers in the Random Permutation Model
On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks
ENS Crypto Seminar, April 2015
Les preuves de sécurité en cryptographie
University of Cergy, April 2015
Security Analysis of Key-Alternating Ciphers in the Even-Mansour Model
INRIA CCA Seminar, March 2015
A Survey of Recent Results on Key-Alternating Ciphers
Mathcrypt 2013
Indifférentiabilité et modèles de preuve idéalisés
University of Limoges, February 2012
Indifferentiability and Security Proofs in Idealized Models
University of Rennes, May 2010
The Random Oracle Model and the Ideal Cipher Model are Equivalent
ENS Crypto Seminar, June 2008

Professionnal activities

Member of:
IACR (since 2007)