Follow
Jérémy JEAN
Jérémy JEAN
ANSSI
Verified email at ssi.gouv.fr - Homepage
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
6432016
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
J Jean, I Nikolić, T Peyrin
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2532014
Improved key recovery attacks on reduced-round AES in the single-key setting
P Derbez, PA Fouque, J Jean
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
2182013
Optimizing implementations of lightweight building blocks
J Jean, T Peyrin, SM Sim, J Tourteaux
Cryptology ePrint Archive, 2017
992017
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124, 2016
94*2016
Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128
PA Fouque, J Jean, T Peyrin
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
902013
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2016
84*2016
TikZ for cryptographers
J Jean
792016
Security analysis of PRINCE
J Jean, I Nikolić, T Peyrin, L Wang, S Wu
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
722014
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives: Applications to AES, PRESENT and SKINNY
J Jean, A Moradi, T Peyrin, P Sasdrich
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
572017
Improved Rebound Attack on the Finalist Grøstl
J Jean, M Naya-Plasencia, T Peyrin
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
512012
Meet-in-the-middle attacks on generic Feistel constructions
J Guo, J Jean, I Nikolić, Y Sasaki
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
492014
Joltik v1. 3
J Jean, I Nikolić, T Peyrin
CAESAR Round 2, 2015
41*2015
Skinny-aead and skinny-hash
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
IACR Transactions on Symmetric Cryptology, 88-131, 2020
392020
Efficient Design Strategies Based on the AES Round Function
J Jean, I Nikolić
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
282016
Multiple limited-birthday distinguishers and applications
J Jean, M Naya-Plasencia, T Peyrin
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
282014
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- Permutation
J Jean, I Nikolić
Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015
272015
Meet-in-the-middle attacks on classes of contracting and expanding Feistel constructions
J Guo, J Jean, I Nikolic, Y Sasaki
Cryptology ePrint Archive, 2016
252016
Cryptanalysis of FIDES
I Dinur, J Jean
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
242015
Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation
D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 31-59, 2020
232020
The system can't perform the operation now. Try again later.
Articles 1–20