Jérémy Jean

Orcid: 0009-0007-7340-8591

According to our database1, Jérémy Jean authored at least 42 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Commun. Cryptol., 2024

2023
Cryptanalysis of Elisabeth-4.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2021
The Deoxys AEAD Family.
J. Cryptol., 2021

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

2018
Key-Recovery Attacks on Full Kravatte.
IACR Trans. Symmetric Cryptol., 2018

Two Notions of Differential Equivalence on Sboxes.
IACR Cryptol. ePrint Arch., 2018

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

2017
Optimizing Implementations of Lightweight Building Blocks.
IACR Trans. Symmetric Cryptol., 2017

Cryptanalysis of NORX v2.0.
IACR Trans. Symmetric Cryptol., 2017

Optimizing Implementations of Lightweight Building Blocks.
IACR Cryptol. ePrint Arch., 2017

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Practical Forgeries and Distinguishers against PAES.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Cryptanalysis of Haraka.
IACR Cryptol. ePrint Arch., 2016

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016

Extended meet-in-the-middle attacks on some Feistel constructions.
Des. Codes Cryptogr., 2016

Efficient Design Strategies Based on the AES Round Function.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Improved Cryptanalysis of AES-like Permutations.
IACR Cryptol. ePrint Arch., 2015

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation.
IACR Cryptol. ePrint Arch., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

More Rounds, Less Security?
IACR Cryptol. ePrint Arch., 2015

Analysis of the CAESAR Candidate Silver.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

Practical Cryptanalysis of PAES.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Cryptanalysis of FIDES.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Tweaks and Keys for Block Ciphers: The TWEAKEY Framework.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement AES).
PhD thesis, 2013

Multiple Limited-Birthday Distinguishers and Applications.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Security Analysis of PRINCE.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
Proceedings of the Advances in Cryptology, 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

Improved Rebound Attack on the Finalist Grøstl.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Improved Analysis of ECHO-256.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
A Parallel Algorithm for Dot Product over Word-Size Finite Field Using Floating-Point Arithmetic.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010


  Loading...