Publications
                      
                      Journal
                      
                        - 
                            Two Notions of Differential Equivalence on Sboxes
 
                            Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder 
                          Designs, Codes and Cryptography, to appear
                           
                         
                        - 
                          
                            Key-Recovery Attacks on Full Kravatte
 
                            Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song 
                          ToSC/FSE 2018 (Best Paper Award)
                           
                         
                        - 
                          
                            Optimizing Implementations of Lightweight Building Blocks
 
                            Jérémy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux 
                          ToSC/FSE 2018
                           [Source code]
                           
                         
                        - 
                          
                            Cryptanalysis of NORX v2.0
 
                            Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard 
                          ToSC/FSE 2017 (Best Paper Award)
                           
                         
                        - 
                          
                            Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
 
                            Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki 
                          ToSC/FSE 2017
                           
                         
                        - 
                          
                            Cryptanalysis of Haraka
 
                            Jérémy Jean 
                          ToSC/FSE 2017
                           
                         
                        - 
                          
                            Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box
 
                            Jian Guo, Jérémy jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim 
                          ToSC/FSE 2017
                           
                         
                        - 
                            Extended meet-in-the-middle attacks on some Feistel constructions
                            
 
                            Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki 
                          Designs, Codes and Cryptography, 80(3) 587-618 (2016)
                         
                        - 
                          
                            Practical Forgeries and Distinguishers against PAES
                            
 
                          Jérémy Jean, Ivica Nikolic, Yu Sasaki and Lei Wang 
                          IEICE Transactions 99-A(1), 39-48 (2016)
                         
                        - 
                          
                            Improved Cryptanalysis of AES-like Permutations,
                            
 
                          Jérémy Jean, María Naya-Plasencia, Thomas Peyrin 
                          Journal of Cryptology 27(4), 772-798 (2014)
                         
                       
                    
                      Conferences
                      
                        - 
                          
                            Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY
 
                          Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich 
                          CHES 2017, LNCS 10529, pp. 687-707
                           
                         
                        - 
                          
                            Two Notions of Differential Equivalence on Sboxes
 
                          Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder 
                          WCC 2017
                           
                         
                        - 
                          
                            The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
 
                          Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim 
                          CRYPTO 2016, LNCS 9815, pp. 123-153
                           
                         
                        - 
                          
                            Efficient Design Strategies Based on the AES Round Function
 
                          Jérémy Jean and Ivica Nikolic 
                          FSE 2016, LNCS 9783, pp. 334-353
                           
                         
                        - 
                          
                            Analysis of the CAESAR Candidate Silver
 
                          Jérémy Jean, Yu Sasaki and Lei Wang 
                          SAC 2015, LNCS 9566, pp. 493-509
                           
                         
                        - 
                          
                            Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
 
                          Jérémy Jean and Ivica Nikolic 
                          FSE 2015, LNCS 9054, pp. 537-556
                           
                         
                        - 
                          
                            Meet-in-the-Middle Attacks on Generic Feistel Constructions
 
                          Jian Guo, Jérémy Jean, Ivica Nikolic and Yu Sasaki 
                          ASIACRYPT 2014, LNCS 8873, pp. 458-477
                           
                         
                        - 
                          
                            Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
 
                          Jérémy Jean, Ivica Nikolic and Thomas Peyrin 
                          ASIACRYPT 2014, LNCS 8874, pp. 274-288
                           
                         
                        - 
                          
                            Practical Cryptanalysis of PAES
 
                          Jérémy Jean, Ivica Nikolic, Yu Sasaki and Lei Wang 
                          SAC 2014, LNCS 8781, pp. 228-242
                           
                         
                        - 
                          
                            The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
 
                          Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin and Lei Wang 
                          SAC 2014, LNCS 8424, pp. 195-211
                           
                         
                        - 
                          
                            Cryptanalysis of FIDES
 
                          Itai Dinur and Jérémy Jean 
                          FSE 2014, LNCS 8424, pp. 92-111
                           
                         
                        - 
                          
                            Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
 
                          Pierre-Alain Fouque, Jérémy Jean and Thomas Peyrin 
                          CRYPTO 2013, Part I, LNCS 8042, pp. 183--203
                          [extended version]
                           
                         
                        - 
                          
                            Multiple Limited-Birthday Distinguishers and Applications
 
                          Jérémy Jean, María Naya-Plasencia and Thomas Peyrin 
                          SAC 2013, LNCS 8282, pp. 533-550
                          [extended version]
                           
                         
                        - 
                          
                             Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
 
                          Patrick Derbez, Pierre-Alain Fouque and Jérémy Jean 
                          EUROCRYPT 2013, LNCS 7881, pp. 371--387
                           
                         
                        - 
                          
                            Security Analysis of PRINCE
 
                          Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang and Shuang Wu 
                          FSE 2013, LNCS 8424, pp. 92-111 
                           
                         
                        - 
                          
                            Faster Chosen-Key Distinguishers on Reduced-Round AES
 
                          Patrick Derbez, Pierre-Alain Fouque and Jérémy Jean 
                          INDOCRYPT 2012, LNCS 7668, pp. 225--243. Springer, Heidelberg (2012)
                           
                         
                        - 
                          
                            Improved Rebound Attack on the Finalist Grostl
 
                          Jérémy Jean, María Naya-Plasencia and Thomas Peyrin 
                          FSE 2012 (Best Paper Award), LNCS 7549, pp. 110-126, Springer, Heidelberg, 2012.
                           
                         
                        - 
                          
                            Improved Analysis of ECHO-256
 
                          Jérémy Jean, María Naya-Plasencia and Martin Schläffer 
                          SAC 2011, LNCS 7118, pp. 19-36,
                          Springer-Verlag, 2012.
                           
                         
                        - 
                          
                            Practical Near-Collisions and Collisions on
                            Round-Reduced ECHO-256 Compression
                            Function
 
                          Jérémy Jean and Pierre-Alain Fouque 
                          FSE 2011, LNCS 6733, pp. 107-127,
                          Springer-Verlag,
                          2011. 
                         
                         
                        - 
                          
                            A Parallel Algorithm for Dot Product over
                            Word-Size Finite Field using Floating-Point
                            Arithmetic 
 
                          Jérémy Jean and Stef Graillat 
                          SYNASC 2010,
                          IEEE Computer Society 2010, pp. 80-87.
                         
                       
          
                      
                      Talks
                      
                        - 
                          
                            Calcul du produit scalaire dans un grand corps fini en arithmétique
                            flottante,
                          RAIM 2009, ENS Lyon, France
                        
 
                        - 
                          
                            Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function,
                          FSE 2011, Copenhagen, Danemark
                        
 
                        - 
                          
                            Improved Analysis of ECHO-256,
                          SAC 2011, Toronto, Canada
                        
 
                        - 
                          
                            Improved Rebound Attack on the Finalist Grostl,
                          FSE 2012, Washington DC, United-States
                        
 
                        - 
                          
                            Une Attaque sur la Fonction de Hachage Grostl,
                          RAIM 2012, Dijon, France
                        
 
                        - 
                          
                            Improved Key Recovery Attacks on Reduced-Round AES,
                          CRYPTO 2012 Rump Session, Santa Barbara, California, United States
                        
 
                        - 
                          
                            Faster Chosen-Key Distinguishers on Reduced-Round AES,
                          INDOCRYPT 2012, Kolkata, India
                        
 
                        - 
                          
                            Multiple Limited-Birthday Distinguishers and Applications,
                          SAC 2013, Vancouver, Canada
                        
 
                        - 
                          
                            Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128,
                          CRYPTO 2013, Santa Barbara, California, Unites States
                        
 
                        - 
                          
                            Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128,
                          Crypto Seminar in Versailles, November 27, 2013
                        
 
                        - 
                          
                            Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128,
                          Crypto Seminar in Luxembourg, December 17, 2013
                        
 
                        - 
                          
                            Cryptanalysis of FIDES,
                          FSE 2014, March 3, 2014
                        
 
                        - 
                          
                            The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function,
                          SAC 2014, 14 August 2014
                        
 
                        - 
                          
                            CAESAR Candidates Joltik and Deoxys,
                          DIAC 2014, 23 August 2014
                        
 
                        - 
                          
                            Cryptanalysis of Streebog, the new Russian hash function standard,
                          ASK 2014, 21 Decembre 2014
                        
 
                        - 
                          
                            Efficient Design Strategies Based on the AES Round Function,
                          FSE 2016, 22 March 2016
                        
 
                        - 
                          
                            The SKINNY Family of Lightweight Tweakable Block Ciphers,
                          Crypto Seminar in Rennes, 3 June 2016
                        
 
                        - 
                          
                            The SKINNY Family of Lightweight Tweakable Block Ciphers,
                          CRYPTO 2016, 6 March 2017
                        
 
                        - 
                          
                            Cryptanalysis of Haraka,
                          FSE 2017, 6 March 2017
                        
 
                        - 
                          
                            Authenticated Encryption Schemes and Cryptanalysis,
                          Journées Codage & Cryptographie (Invited Talk), 26 April 2017
                        
 
                        - 
                          (not up to date)
                        
 
                       
                      
                        Designs
                        
                          - Kiasu:  Submission to the CAESAR competition. [pdf, SyLLaB]
 
                          - Deoxys:  Submission to the CAESAR competition. [pdf, SyLLaB]
 
                          - Joltik:  Submission to the CAESAR competition. [pdf, SyLLaB]
 
                          - Skinny:  very lightweight family of tweakable block ciphers. [ePrint, website]
 
                                               
                     
                      PhD
                      
                        - 
                          
                            Cryptanalyse de primitives symétriques basées sur le chiffrement AES
 
                            PhD Advisor: Pierre-Alain Fouque 
                           Public defense at the Ecole Normale Supérieure, on September 24, 2013. 
                            Download the 
                            slides. 
                          More informationshere.
                         
                       
                      
                      Reports
                      
                        - 
                          
                            Fast dot product over finite field
 
                            Master Thesis, February 2010, supervised by Stef
                            Graillat (LIP6), Johan Håstad (KTH) and
                            Jean-Louis Roch (ENSIMAG)
                         
                        - 
                          
                            Mise en oeuvre d'attaques de cryptanalyse basées
                            sur les unités de prédiction de branches
 
                          Verimag, Mai 2008, dirigé par Yassine Lakhnech 
                         
                        - 
                          Power analysis on a DES cryptographic device 
 
                          Tiempo, Juin 2008
                         
                       
                      
                      Reviews
                      
                        - 
                          Program Committees: ASIACRYPT 2017, ASIACRYPT 2018, ToSC/FSE 2018, ToSC/FSE 2019
                        
 
                        - 
                          Subreviewer for: Journal of Cryptology, EUROCRYPT 2016, CRYPTO 2015, ASIACRYPT 2015, FSE 2015, ACNS 2015, ACNS 2014, Asiacrypt 2014, Indocrypt 2014, SCN 2014, CR-RSA 2013, SCN 2012, Asiacrypt 2011, SAC 2011, IWSEC 2011.
                        
 
                       
                      
		      						 
			     | 
			   
			
	       
	     |