BibTeX records: Jérémy Jean

download as .bib file

@inproceedings{DBLP:conf/asiacrypt/GilbertBJR23,
  author       = {Henri Gilbert and
                  Rachelle Heim Boissier and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Cryptanalysis of Elisabeth-4},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14440},
  pages        = {256--284},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8727-6\_9},
  doi          = {10.1007/978-981-99-8727-6\_9},
  timestamp    = {Sun, 07 Jan 2024 14:24:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GilbertBJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertBJR23,
  author       = {Henri Gilbert and
                  Rachelle Heim Boissier and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of Elisabeth-4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1436},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1436},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertBJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiJPS22,
  author       = {Beno{\^{\i}}t Cogliati and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {A Long Tweak Goes a Long Way: High Multi-user Security Authenticated
                  Encryption from Tweakable Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {846},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/846},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiJPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JeanNPS21,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {The Deoxys {AEAD} Family},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {31},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09397-w},
  doi          = {10.1007/S00145-021-09397-W},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/JeanNPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GoudarziJKPRSS20,
  author       = {Dahmun Goudarzi and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Thomas Peyrin and
                  Matthieu Rivain and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient
                  Masked Implementation},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {31--59},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.31-59},
  doi          = {10.13154/TOSC.V2020.IS1.31-59},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GoudarziJKPRSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BeierleJKLMPSSS20,
  author       = {Christof Beierle and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Amir Moradi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Pascal Sasdrich and
                  Siang Meng Sim},
  title        = {{SKINNY-AEAD} and SKINNY-Hash},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {88--131},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.88-131},
  doi          = {10.13154/TOSC.V2020.IS1.88-131},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BeierleJKLMPSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BouraCJS19,
  author       = {Christina Boura and
                  Anne Canteaut and
                  J{\'{e}}r{\'{e}}my Jean and
                  Valentin Suder},
  title        = {Two notions of differential equivalence on Sboxes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {185--202},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0496-z},
  doi          = {10.1007/S10623-018-0496-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BouraCJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Chaigneau0GJR19,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1423--1447},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9297-9},
  doi          = {10.1007/S00145-018-9297-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezFJL19,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean and
                  Baptiste Lambin},
  title        = {Variants of the {AES} Key Schedule for Better Truncated Differential
                  Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezFJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGGJRS18,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Ling Song},
  title        = {Key-Recovery Attacks on Full Kravatte},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {5--28},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.5-28},
  doi          = {10.13154/TOSC.V2018.I1.5-28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DerbezFJL18,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean and
                  Baptiste Lambin},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Variants of the {AES} Key Schedule for Better Truncated Differential
                  Bounds},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {27--49},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_2},
  doi          = {10.1007/978-3-030-10970-7\_2},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DerbezFJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCJS18,
  author       = {Christina Boura and
                  Anne Canteaut and
                  J{\'{e}}r{\'{e}}my Jean and
                  Valentin Suder},
  title        = {Two Notions of Differential Equivalence on Sboxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChaigneauFGJR17,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {156--174},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.156-174},
  doi          = {10.13154/TOSC.V2017.I1.156-174},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/JeanPST17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Siang Meng Sim and
                  Jade Tourteaux},
  title        = {Optimizing Implementations of Lightweight Building Blocks},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {130--168},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i4.130-168},
  doi          = {10.13154/TOSC.V2017.I4.130-168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/JeanPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JeanMPS17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Amir Moradi and
                  Thomas Peyrin and
                  Pascal Sasdrich},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations
                  of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {687--707},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_33},
  doi          = {10.1007/978-3-319-66787-4\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JeanMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanPS17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Siang Meng Sim},
  title        = {Optimizing Implementations of Lightweight Building Blocks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanMPS17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Amir Moradi and
                  Thomas Peyrin and
                  Pascal Sasdrich},
  title        = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations
                  of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Extended meet-in-the-middle attacks on some Feistel constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {587--618},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0120-4},
  doi          = {10.1007/S10623-015-0120-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/JeanNS016,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Lei Wang},
  title        = {Practical Forgeries and Distinguishers against {PAES}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {1},
  pages        = {39--48},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.39},
  doi          = {10.1587/TRANSFUN.E99.A.39},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/JeanNS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Jean16,
  author       = {J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of Haraka},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.1-12},
  doi          = {10.13154/TOSC.V2016.I1.1-12},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Jean16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNQSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {33--56},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.33-56},
  doi          = {10.13154/TOSC.V2016.I1.33-56},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {2},
  pages        = {307--337},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i2.307-337},
  doi          = {10.13154/TOSC.V2016.I2.307-337},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16,
  author       = {Christof Beierle and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Amir Moradi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Pascal Sasdrich and
                  Siang Meng Sim},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {123--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_5},
  doi          = {10.1007/978-3-662-53008-5\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeierleJKL0PSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanN16,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  editor       = {Thomas Peyrin},
  title        = {Efficient Design Strategies Based on the {AES} Round Function},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {334--353},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_17},
  doi          = {10.1007/978-3-662-52993-5\_17},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JeanN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanN16,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  title        = {Efficient Design Strategies Based on the {AES} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jean16,
  author       = {J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of Haraka},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jean16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleJKL0PSSS16,
  author       = {Christof Beierle and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Amir Moradi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Pascal Sasdrich and
                  Siang Meng Sim},
  title        = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleJKL0PSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JNSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JNSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanN15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  editor       = {Gregor Leander},
  title        = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced
                  Keccak- f f Permutation},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {537--556},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_26},
  doi          = {10.1007/978-3-662-48116-5\_26},
  timestamp    = {Sat, 19 Oct 2019 20:27:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JeanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanS015,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Analysis of the {CAESAR} Candidate Silver},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {493--509},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_28},
  doi          = {10.1007/978-3-319-31301-6\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JeanS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanN15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  title        = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced
                  Keccak-f Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNP15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Improved Cryptanalysis of AES-like Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNPWW15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Lei Wang and
                  Shuang Wu},
  title        = {Security Analysis of {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JMN15,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Nicky Mouha and
                  Ivica Nikolic},
  title        = {More Rounds, Less Security?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JNQSS15,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Full Midori64},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JNQSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JeanNP14,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Improved Cryptanalysis of AES-like Permutations},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {4},
  pages        = {772--798},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9156-7},
  doi          = {10.1007/S00145-013-9156-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JeanNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JeanNP14,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Tweaks and Keys for Block Ciphers: The {TWEAKEY} Framework},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {274--288},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_15},
  doi          = {10.1007/978-3-662-45608-8\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JeanNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001JNS14,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Meet-in-the-Middle Attacks on Generic Feistel Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {458--477},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_24},
  doi          = {10.1007/978-3-662-45611-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001JNS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurJ14,
  author       = {Itai Dinur and
                  J{\'{e}}r{\'{e}}my Jean},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Cryptanalysis of {FIDES}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {224--240},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_12},
  doi          = {10.1007/978-3-662-46706-0\_12},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/0001JLPW14,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian
                  Standardized Hash Function},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_12},
  doi          = {10.1007/978-3-319-13051-4\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/0001JLPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNSW14,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Lei Wang},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Practical Cryptanalysis of {PAES}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_14},
  doi          = {10.1007/978-3-319-13051-4\_14},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JeanNSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurJ14,
  author       = {Itai Dinur and
                  J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of {FIDES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JP014,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {Breaking {POET} Authentication with a Single Query},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JP014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JLPW14a,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ga{\"{e}}tan Leurent and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian
                  Standardized Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JLPW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNP14,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin},
  title        = {Tweaks and Keys for Block Ciphers: the {TWEAKEY} Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/831},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Jean13,
  author       = {J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of Symmetric-Key Primitives Based on the {AES} Block
                  Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement
                  {AES)}},
  school       = {{\'{E}}cole Normale Sup{\'{e}}rieure, Paris, France},
  year         = {2013},
  url          = {https://tel.archives-ouvertes.fr/tel-00911049},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Jean13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FouqueJP13,
  author       = {Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Structural Evaluation of {AES} and Chosen-Key Distinguisher of 9-Round
                  {AES-128}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {183--203},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_11},
  doi          = {10.1007/978-3-642-40041-4\_11},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/FouqueJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DerbezFJ13,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key
                  Setting},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {371--387},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_23},
  doi          = {10.1007/978-3-642-38348-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DerbezFJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanNPWW13,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Lei Wang and
                  Shuang Wu},
  editor       = {Shiho Moriai},
  title        = {Security Analysis of {PRINCE}},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_6},
  doi          = {10.1007/978-3-662-43933-3\_6},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JeanNPWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNP13,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Multiple Limited-Birthday Distinguishers and Applications},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {533--550},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_27},
  doi          = {10.1007/978-3-662-43414-7\_27},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JeanNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueJP13,
  author       = {Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean and
                  Thomas Peyrin},
  title        = {Structural Evaluation of {AES} and Chosen-Key Distinguisher of 9-round
                  {AES-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNP13,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Multiple Limited-Birthday Distinguishers and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanNP12,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Anne Canteaut},
  title        = {Improved Rebound Attack on the Finalist Gr{\o}stl},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {110--126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_7},
  doi          = {10.1007/978-3-642-34047-5\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/JeanNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DerbezFJ12,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Faster Chosen-Key Distinguishers on Reduced-Round {AES}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {225--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_14},
  doi          = {10.1007/978-3-642-34931-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DerbezFJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezFJ12,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezFJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/JeanF11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Pierre{-}Alain Fouque},
  editor       = {Antoine Joux},
  title        = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256}
                  Compression Function},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {107--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_7},
  doi          = {10.1007/978-3-642-21702-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/JeanF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNS11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Martin Schl{\"{a}}ffer},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Improved Analysis of {ECHO-256}},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_2},
  doi          = {10.1007/978-3-642-28496-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/JeanNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNS11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Martin Schl{\"{a}}ffer},
  title        = {Improved Analysis of {ECHO-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/synasc/JeanG10,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Stef Graillat},
  editor       = {Tetsuo Ida and
                  Viorel Negru and
                  Tudor Jebelean and
                  Dana Petcu and
                  Stephen M. Watt and
                  Daniela Zaharie},
  title        = {A Parallel Algorithm for Dot Product over Word-Size Finite Field Using
                  Floating-Point Arithmetic},
  booktitle    = {12th International Symposium on Symbolic and Numeric Algorithms for
                  Scientific Computing, {SYNASC} 2010, Timisoara, Romania, 23-26 September
                  2010},
  pages        = {80--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SYNASC.2010.10},
  doi          = {10.1109/SYNASC.2010.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/synasc/JeanG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanF10,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Pierre{-}Alain Fouque},
  title        = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256}
                  Compression Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics