[go: up one dir, main page]

Follow
Jérémy JEAN
Jérémy JEAN
ANSSI
Verified email at ssi.gouv.fr - Homepage
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Annual international cryptology conference, 123-153, 2016
10022016
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
J Jean, I Nikolić, T Peyrin
International Conference on the Theory and Application of Cryptology and …, 2014
3562014
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
P Derbez, PA Fouque, J Jean
Annual International Conference on the Theory and Applications of …, 2013
2682013
Optimizing implementations of lightweight building blocks
J Jean, T Peyrin, SM Sim, J Tourteaux
IACR Transactions on Symmetric Cryptology, 130-168, 2017
1532017
Deoxys v1. 41
J Jean, I Nikolic, T Peyrin, Y Seurin
Submitted to CAESAR 124 (2), 2016
124*2016
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolic, K Qiao, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 33-56, 2016
122*2016
TikZ for cryptographers
J Jean
1122016
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
PA Fouque, J Jean, T Peyrin
Annual Cryptology Conference, 183-203, 2013
1102013
Security analysis of PRINCE
J Jean, I Nikolić, T Peyrin, L Wang, S Wu
International Workshop on Fast Software Encryption, 92-111, 2013
852013
The deoxys AEAD family
J Jean, I Nikolić, T Peyrin, Y Seurin
Journal of Cryptology 34 (3), 31, 2021
642021
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives: Applications to AES, PRESENT and SKINNY
J Jean, A Moradi, T Peyrin, P Sasdrich
International Conference on Cryptographic Hardware and Embedded Systems, 687-707, 2017
642017
Improved Rebound Attack on the Finalist Grøstl
J Jean, M Naya-Plasencia, T Peyrin
International Workshop on Fast Software Encryption, 110-126, 2012
632012
Meet-in-the-middle attacks on generic Feistel constructions
J Guo, J Jean, I Nikolić, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2014
602014
Joltik v1. 3
J Jean, I Nikolić, T Peyrin
CAESAR Round 2, 2015
54*2015
Skinny-aead and skinny-hash
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
IACR Transactions on Symmetric Cryptology, 88-131, 2020
522020
Efficient Design Strategies Based on the AES Round Function
J Jean, I Nikolić
International Conference on Fast Software Encryption, 334-353, 2016
472016
Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation
D Goudarzi, J Jean, S Kölbl, T Peyrin, M Rivain, Y Sasaki, SM Sim
IACR transactions on symmetric cryptology, 31-59, 2020
382020
Multiple limited-birthday distinguishers and applications
J Jean, M Naya-Plasencia, T Peyrin
International Conference on Selected Areas in Cryptography, 533-550, 2013
382013
The usage of counter revisited: Second-preimage attack on new russian standardized hash function
J Guo, J Jean, G Leurent, T Peyrin, L Wang
International Conference on Selected Areas in Cryptography, 195-211, 2014
332014
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- Permutation
J Jean, I Nikolić
International Workshop on Fast Software Encryption, 537-556, 2015
312015
The system can't perform the operation now. Try again later.
Articles 1–20