Jérémy Jean
Orcid: 0009-0007-7340-8591
According to our database1,
Jérémy Jean
authored at least 42 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Commun. Cryptol., 2024
2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2021
2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020
2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement AES).
PhD thesis, 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
A Parallel Algorithm for Dot Product over Word-Size Finite Field Using Floating-Point Arithmetic.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010