Serge Vaudenay entered at the Ecole Normale Supérieure in 1989 with a major in mathematics. He earned his agrégation (secondary teaching degree) in mathematics in 1992, then a PhD in Computer Science at the University of Paris 7 - Denis Diderot in 1995. He subsequently became a senior research fellow at the CNRS, prior to being granted his habilitation à diriger des recherches (a postdoctoral degree authorizing the recipient to supervise doctoral students). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.
- Cryptographic analysis: security analysis (security proofs, attacks) of cryptographic primitives
- Lightweight cryptography: design and analysis of cryptographic primitives in constrained environments (stream cipher, key agreement, RFID privacy)
- Secure communication channels: key agreement, authentication and confidentiality, privacy
Serge Vaudenay's research is sponsored by the Swiss National Science Foundation.
JOB APPLICATION AND SUPPORT LETTER REQUEST
Please read this document. Any request not following these guidelines is most likely to be discarded.
Fields of expertise
Cryptography, Communication security
PPUR - 2010
|La fracture cryptographique|
Springer - 2005
|A Classical Introduction to Cryptography - Applications for Communications Security|
|J. Monnerat, S. Vaudenay
Journal of Cryptology, 24, 2011
|Short Undeniable Signatures Based on Group Homomorphisms|
Advances in Cryptology - ASIACRYPT 07 - LNCS 4833 - 2007
|On Privacy Models for RFID|
Advances in Cryptology - CRYPTO 05 - LNCS 3621 - 2005
|Secure Communications over Insecure Channels Based on Short Authenticated Strings|
|B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux
Advances in Cryptology - CRYPTO 03 - LNCS 2729 - 2003
|Password Interception in a SSL/TLS Channel|
Journal of Cryptology, 16, 2003
|Decorrelation: a Theory for Block Cipher Security|
Journal of Cryptology, 14, 2001
|Cryptanalysis of the Chor-Rivest Cryptosystem|
|D. Coppersmith, J. Stern, S. Vaudenay
Journal of Cryptology, 10, 1997
|The Security of the Birational Permutation Signature Schemes|
Teaching & PhD
- Communication Systems
- Computer Science
- Doctoral program in computer and communication sciences
Past PhD StudentsAumasson Jean-Philippe ...
Avoine Gildas ...
Baignères Thomas ...
Barral Claude ...
Bay Asli ...
Bogos Sonia Mihaela ...
Chaabouni Rafik ...
Duc Alexandre Raphaël ...
Fischer Simon ...
Junod Pascal ...
Kilinç Alper Handan ...
Lu Yi ...
Monnerat Jean ...
Ouafi Khaled ...
Pasini Sylvain ...
Sepehrdad Pouyan ...
Susil Petr ...
Vizár Damian ...
Vuagnoux Martin ...
This course reviews some failure cases in public-key cryptography. It introduces some cryptanalysis techniques. It also presents fundamentals in cryptography such as interactive proofs. Finally, it presents some techniques to validate the security of cryp...
This course introduces the basics of cryptography. We review several types of cryptographic primitives, when it is safe to use them and how to select the appropriate security parameters. We detail how they work and sketch how they can be implemented.