Jérémy Jean

According to our database1, Jérémy Jean authored at least 42 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cryptanalysis of Elisabeth-4.
IACR Cryptol. ePrint Arch., 2023

2022
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

2021
The Deoxys AEAD Family.
J. Cryptol., 2021

2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

2019
Cryptanalysis of NORX v2.0.
J. Cryptol., 2019

Variants of the AES Key Schedule for Better Truncated Differential Bounds.
IACR Cryptol. ePrint Arch., 2019

Two notions of differential equivalence on Sboxes.
Des. Codes Cryptogr., 2019

2018
Key-Recovery Attacks on Full Kravatte.
IACR Trans. Symmetric Cryptol., 2018

2017
Optimizing Implementations of Lightweight Building Blocks.
IACR Trans. Symmetric Cryptol., 2017

Optimizing Implementations of Lightweight Building Blocks.
IACR Cryptol. ePrint Arch., 2017

Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY.
IACR Cryptol. ePrint Arch., 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Practical Forgeries and Distinguishers against PAES.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Efficient Design Strategies Based on the AES Round Function.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Haraka.
IACR Cryptol. ePrint Arch., 2016

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
IACR Cryptol. ePrint Arch., 2016

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016

Extended meet-in-the-middle attacks on some Feistel constructions.
Des. Codes Cryptogr., 2016

2015
Security Analysis of PRINCE.
IACR Cryptol. ePrint Arch., 2015

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation.
IACR Cryptol. ePrint Arch., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

More Rounds, Less Security?
IACR Cryptol. ePrint Arch., 2015

Analysis of the CAESAR Candidate Silver.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Improved Cryptanalysis of AES-like Permutations.
J. Cryptol., 2014

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of FIDES.
IACR Cryptol. ePrint Arch., 2014

Breaking POET Authentication with a Single Query.
IACR Cryptol. ePrint Arch., 2014

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
IACR Cryptol. ePrint Arch., 2014

Practical Cryptanalysis of PAES.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement AES).
PhD thesis, 2013

Multiple Limited-Birthday Distinguishers and Applications.
IACR Cryptol. ePrint Arch., 2013

Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128.
IACR Cryptol. ePrint Arch., 2013

2012
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.
IACR Cryptol. ePrint Arch., 2012

Faster Chosen-Key Distinguishers on Reduced-Round AES.
Proceedings of the Progress in Cryptology, 2012

Improved Rebound Attack on the Finalist Grøstl.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Improved Analysis of ECHO-256.
IACR Cryptol. ePrint Arch., 2011

2010
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function.
IACR Cryptol. ePrint Arch., 2010

A Parallel Algorithm for Dot Product over Word-Size Finite Field Using Floating-Point Arithmetic.
Proceedings of the 12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2010


  Loading...