Jérémy JEAN
Jérémy JEAN
ANSSI
Verified email at ssi.gouv.fr - Homepage
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Annual International Cryptology Conference, 123-153, 2016
3152016
Tweaks and keys for block ciphers: the TWEAKEY framework
J Jean, I Nikolić, T Peyrin
International Conference on the Theory and Application of Cryptology and …, 2014
1662014
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
1512013
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
PA Fouque, J Jean, T Peyrin
Annual Cryptology Conference, 183-203, 2013
702013
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolic, K Qiao, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 33-56, 2016
62*2016
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR, 2016
61*2016
Security analysis of PRINCE
J Jean, I Nikolić, T Peyrin, L Wang, S Wu
International Workshop on Fast Software Encryption, 92-111, 2013
572013
Optimizing implementations of lightweight building blocks
J Jean, T Peyrin, SM Sim, J Tourteaux
IACR Transactions on Symmetric Cryptology, 130-168, 2017
482017
Improved Rebound Attack on the Finalist Grøstl
J Jean, M Naya-Plasencia, T Peyrin
International Workshop on Fast Software Encryption, 110-126, 2012
472012
TikZ for cryptographers
J Jean
422016
Meet-in-the-middle attacks on generic Feistel constructions
J Guo, J Jean, I Nikolić, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2014
352014
Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives
J Jean, A Moradi, T Peyrin, P Sasdrich
International Conference on Cryptographic Hardware and Embedded Systems, 687-707, 2017
342017
Joltik v1. 3
J Jean, I Nikolić, T Peyrin
CAESAR Round 2, 2015
33*2015
Internal Dierential Boomerangs: Practical Analysis o the Round-Reduced Keccak-$$$$ Permutation
J Jean, I Nikolić
International Workshop on Fast Software Encryption, 537-556, 2015
252015
Multiple limited-birthday distinguishers and applications
J Jean, M Naya-Plasencia, T Peyrin
International Conference on Selected Areas in Cryptography, 533-550, 2013
232013
Cryptanalysis of FIDES
I Dinur, J Jean
International Workshop on Fast Software Encryption, 224-240, 2014
202014
The usage of counter revisited: Second-preimage attack on new russian standardized hash function
J Guo, J Jean, G Leurent, T Peyrin, L Wang
International Conference on Selected Areas in Cryptography, 195-211, 2014
192014
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
J Jean, PA Fouque
International Workshop on Fast Software Encryption, 107-127, 2011
192011
Cryptanalysis of haraka
J Jean
IACR Transactions on Symmetric Cryptology, 1-12, 2016
182016
Cryptanalysis of NORX v2. 0
C Chaigneau, T Fuhr, H Gilbert, J Jean, JR Reinhard
IACR Transactions on Symmetric Cryptology, 156-174, 2017
172017
The system can't perform the operation now. Try again later.
Articles 1–20