Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jérémy Jean
@inproceedings{DBLP:conf/asiacrypt/GilbertBJR23, author = {Henri Gilbert and Rachelle Heim Boissier and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, editor = {Jian Guo and Ron Steinfeld}, title = {Cryptanalysis of Elisabeth-4}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14440}, pages = {256--284}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8727-6\_9}, doi = {10.1007/978-981-99-8727-6\_9}, timestamp = {Sun, 07 Jan 2024 14:24:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GilbertBJR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilbertBJR23, author = {Henri Gilbert and Rachelle Heim Boissier and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of Elisabeth-4}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1436}, year = {2023}, url = {https://eprint.iacr.org/2023/1436}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilbertBJR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiJPS22, author = {Beno{\^{\i}}t Cogliati and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Yannick Seurin}, title = {A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {846}, year = {2022}, url = {https://eprint.iacr.org/2022/846}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiJPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JeanNPS21, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin and Yannick Seurin}, title = {The Deoxys {AEAD} Family}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {31}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09397-w}, doi = {10.1007/S00145-021-09397-W}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/JeanNPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GoudarziJKPRSS20, author = {Dahmun Goudarzi and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Thomas Peyrin and Matthieu Rivain and Yu Sasaki and Siang Meng Sim}, title = {Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {31--59}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.31-59}, doi = {10.13154/TOSC.V2020.IS1.31-59}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GoudarziJKPRSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BeierleJKLMPSSS20, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {{SKINNY-AEAD} and SKINNY-Hash}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {88--131}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.88-131}, doi = {10.13154/TOSC.V2020.IS1.88-131}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BeierleJKLMPSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BouraCJS19, author = {Christina Boura and Anne Canteaut and J{\'{e}}r{\'{e}}my Jean and Valentin Suder}, title = {Two notions of differential equivalence on Sboxes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {185--202}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0496-z}, doi = {10.1007/S10623-018-0496-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BouraCJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Chaigneau0GJR19, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of {NORX} v2.0}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1423--1447}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9297-9}, doi = {10.1007/S00145-018-9297-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezFJL19, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean and Baptiste Lambin}, title = {Variants of the {AES} Key Schedule for Better Truncated Differential Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2019}, url = {https://eprint.iacr.org/2019/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezFJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGGJRS18, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and Jian Guo and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard and Ling Song}, title = {Key-Recovery Attacks on Full Kravatte}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {5--28}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.5-28}, doi = {10.13154/TOSC.V2018.I1.5-28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGGJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DerbezFJL18, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean and Baptiste Lambin}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Variants of the {AES} Key Schedule for Better Truncated Differential Bounds}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {27--49}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_2}, doi = {10.1007/978-3-030-10970-7\_2}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/DerbezFJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCJS18, author = {Christina Boura and Anne Canteaut and J{\'{e}}r{\'{e}}my Jean and Valentin Suder}, title = {Two Notions of Differential Equivalence on Sboxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2018}, url = {https://eprint.iacr.org/2018/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChaigneauFGJR17, author = {Colin Chaigneau and Thomas Fuhr and Henri Gilbert and J{\'{e}}r{\'{e}}my Jean and Jean{-}Ren{\'{e}} Reinhard}, title = {Cryptanalysis of {NORX} v2.0}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {156--174}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.156-174}, doi = {10.13154/TOSC.V2017.I1.156-174}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChaigneauFGJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/JeanPST17, author = {J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Siang Meng Sim and Jade Tourteaux}, title = {Optimizing Implementations of Lightweight Building Blocks}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {130--168}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i4.130-168}, doi = {10.13154/TOSC.V2017.I4.130-168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/JeanPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JeanMPS17, author = {J{\'{e}}r{\'{e}}my Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, editor = {Wieland Fischer and Naofumi Homma}, title = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {687--707}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_33}, doi = {10.1007/978-3-319-66787-4\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JeanMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanPS17, author = {J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Siang Meng Sim}, title = {Optimizing Implementations of Lightweight Building Blocks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2017}, url = {http://eprint.iacr.org/2017/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanMPS17, author = {J{\'{e}}r{\'{e}}my Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, title = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2017}, url = {http://eprint.iacr.org/2017/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Extended meet-in-the-middle attacks on some Feistel constructions}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {587--618}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0120-4}, doi = {10.1007/S10623-015-0120-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/JeanNS016, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki and Lei Wang}, title = {Practical Forgeries and Distinguishers against {PAES}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {1}, pages = {39--48}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.39}, doi = {10.1587/TRANSFUN.E99.A.39}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/JeanNS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Jean16, author = {J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of Haraka}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.1-12}, doi = {10.13154/TOSC.V2016.I1.1-12}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Jean16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNQSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {33--56}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.33-56}, doi = {10.13154/TOSC.V2016.I1.33-56}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNQSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {2}, pages = {307--337}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i2.307-337}, doi = {10.13154/TOSC.V2016.I2.307-337}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, editor = {Matthew Robshaw and Jonathan Katz}, title = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {123--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_5}, doi = {10.1007/978-3-662-53008-5\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeierleJKL0PSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanN16, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, editor = {Thomas Peyrin}, title = {Efficient Design Strategies Based on the {AES} Round Function}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {334--353}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_17}, doi = {10.1007/978-3-662-52993-5\_17}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/JeanN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanN16, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, title = {Efficient Design Strategies Based on the {AES} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2016}, url = {http://eprint.iacr.org/2016/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jean16, author = {J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of Haraka}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2016}, url = {http://eprint.iacr.org/2016/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jean16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleJKL0PSSS16, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2016}, url = {http://eprint.iacr.org/2016/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleJKL0PSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JNSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2016}, url = {http://eprint.iacr.org/2016/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2016}, url = {http://eprint.iacr.org/2016/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanN15, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, editor = {Gregor Leander}, title = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {537--556}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_26}, doi = {10.1007/978-3-662-48116-5\_26}, timestamp = {Sat, 19 Oct 2019 20:27:47 +0200}, biburl = {https://dblp.org/rec/conf/fse/JeanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanS015, author = {J{\'{e}}r{\'{e}}my Jean and Yu Sasaki and Lei Wang}, editor = {Orr Dunkelman and Liam Keliher}, title = {Analysis of the {CAESAR} Candidate Silver}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {493--509}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_28}, doi = {10.1007/978-3-319-31301-6\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanN15, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, title = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2015}, url = {http://eprint.iacr.org/2015/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNP15, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Improved Cryptanalysis of AES-like Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2015}, url = {http://eprint.iacr.org/2015/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNPWW15, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu}, title = {Security Analysis of {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2015}, url = {http://eprint.iacr.org/2015/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JMN15, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Nicky Mouha and Ivica Nikolic}, title = {More Rounds, Less Security?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2015}, url = {http://eprint.iacr.org/2015/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JNQSS15, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Full Midori64}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2015}, url = {http://eprint.iacr.org/2015/1189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JNQSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JeanNP14, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Improved Cryptanalysis of AES-like Permutations}, journal = {J. Cryptol.}, volume = {27}, number = {4}, pages = {772--798}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9156-7}, doi = {10.1007/S00145-013-9156-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JeanNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JeanNP14, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Tweaks and Keys for Block Ciphers: The {TWEAKEY} Framework}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {274--288}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_15}, doi = {10.1007/978-3-662-45608-8\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JeanNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001JNS14, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Meet-in-the-Middle Attacks on Generic Feistel Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {458--477}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_24}, doi = {10.1007/978-3-662-45611-8\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001JNS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurJ14, author = {Itai Dinur and J{\'{e}}r{\'{e}}my Jean}, editor = {Carlos Cid and Christian Rechberger}, title = {Cryptanalysis of {FIDES}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {224--240}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_12}, doi = {10.1007/978-3-662-46706-0\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/0001JLPW14, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, editor = {Antoine Joux and Amr M. Youssef}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {195--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_12}, doi = {10.1007/978-3-319-13051-4\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/0001JLPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanNSW14, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki and Lei Wang}, editor = {Antoine Joux and Amr M. Youssef}, title = {Practical Cryptanalysis of {PAES}}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {228--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_14}, doi = {10.1007/978-3-319-13051-4\_14}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanNSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurJ14, author = {Itai Dinur and J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of {FIDES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2014}, url = {http://eprint.iacr.org/2014/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JP014, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin and Lei Wang}, title = {Breaking {POET} Authentication with a Single Query}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2014}, url = {http://eprint.iacr.org/2014/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JP014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JLPW14a, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ga{\"{e}}tan Leurent and Thomas Peyrin and Lei Wang}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2014}, url = {http://eprint.iacr.org/2014/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JLPW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNP14, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin}, title = {Tweaks and Keys for Block Ciphers: the {TWEAKEY} Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2014}, url = {http://eprint.iacr.org/2014/831}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Jean13, author = {J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of Symmetric-Key Primitives Based on the {AES} Block Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement {AES)}}, school = {{\'{E}}cole Normale Sup{\'{e}}rieure, Paris, France}, year = {2013}, url = {https://tel.archives-ouvertes.fr/tel-00911049}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Jean13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FouqueJP13, author = {Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin}, editor = {Ran Canetti and Juan A. Garay}, title = {Structural Evaluation of {AES} and Chosen-Key Distinguisher of 9-Round {AES-128}}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {183--203}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_11}, doi = {10.1007/978-3-642-40041-4\_11}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/FouqueJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DerbezFJ13, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key Setting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {371--387}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_23}, doi = {10.1007/978-3-642-38348-9\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DerbezFJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanNPWW13, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu}, editor = {Shiho Moriai}, title = {Security Analysis of {PRINCE}}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {92--111}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_6}, doi = {10.1007/978-3-662-43933-3\_6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/JeanNPWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanNP13, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Multiple Limited-Birthday Distinguishers and Applications}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {533--550}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_27}, doi = {10.1007/978-3-662-43414-7\_27}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueJP13, author = {Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean and Thomas Peyrin}, title = {Structural Evaluation of {AES} and Chosen-Key Distinguisher of 9-round {AES-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2013}, url = {http://eprint.iacr.org/2013/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNP13, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Multiple Limited-Birthday Distinguishers and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2013}, url = {http://eprint.iacr.org/2013/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanNP12, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, editor = {Anne Canteaut}, title = {Improved Rebound Attack on the Finalist Gr{\o}stl}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {110--126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_7}, doi = {10.1007/978-3-642-34047-5\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/JeanNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DerbezFJ12, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Faster Chosen-Key Distinguishers on Reduced-Round {AES}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {225--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_14}, doi = {10.1007/978-3-642-34931-7\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DerbezFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezFJ12, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2012}, url = {http://eprint.iacr.org/2012/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/JeanF11, author = {J{\'{e}}r{\'{e}}my Jean and Pierre{-}Alain Fouque}, editor = {Antoine Joux}, title = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256} Compression Function}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {107--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_7}, doi = {10.1007/978-3-642-21702-9\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/JeanF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/JeanNS11, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Martin Schl{\"{a}}ffer}, editor = {Ali Miri and Serge Vaudenay}, title = {Improved Analysis of {ECHO-256}}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {19--36}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_2}, doi = {10.1007/978-3-642-28496-0\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/JeanNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNS11, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Martin Schl{\"{a}}ffer}, title = {Improved Analysis of {ECHO-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2011}, url = {http://eprint.iacr.org/2011/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/synasc/JeanG10, author = {J{\'{e}}r{\'{e}}my Jean and Stef Graillat}, editor = {Tetsuo Ida and Viorel Negru and Tudor Jebelean and Dana Petcu and Stephen M. Watt and Daniela Zaharie}, title = {A Parallel Algorithm for Dot Product over Word-Size Finite Field Using Floating-Point Arithmetic}, booktitle = {12th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, {SYNASC} 2010, Timisoara, Romania, 23-26 September 2010}, pages = {80--87}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SYNASC.2010.10}, doi = {10.1109/SYNASC.2010.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/synasc/JeanG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanF10, author = {J{\'{e}}r{\'{e}}my Jean and Pierre{-}Alain Fouque}, title = {Practical Near-Collisions and Collisions on Round-Reduced {ECHO-256} Compression Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2010}, url = {http://eprint.iacr.org/2010/569}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.