Publications


Journal

  1. Two Notions of Differential Equivalence on Sboxes
    Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
    Designs, Codes and Cryptography, to appear
  2. Key-Recovery Attacks on Full Kravatte
    Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song
    ToSC/FSE 2018 (Best Paper Award)
  3. Optimizing Implementations of Lightweight Building Blocks
    Jérémy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
    ToSC/FSE 2018
    [Source code]
  4. Cryptanalysis of NORX v2.0
    Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
    ToSC/FSE 2017 (Best Paper Award)
  5. Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
    Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
    ToSC/FSE 2017
  6. Cryptanalysis of Haraka
    Jérémy Jean
    ToSC/FSE 2017
  7. Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box
    Jian Guo, Jérémy jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
    ToSC/FSE 2017
  8. Extended meet-in-the-middle attacks on some Feistel constructions
    Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
    Designs, Codes and Cryptography, 80(3) 587-618 (2016)
  9. Practical Forgeries and Distinguishers against PAES
    Jérémy Jean, Ivica Nikolic, Yu Sasaki and Lei Wang
    IEICE Transactions 99-A(1), 39-48 (2016)
  10. Improved Cryptanalysis of AES-like Permutations,
    Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
    Journal of Cryptology 27(4), 772-798 (2014)

Conferences

  1. Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY
    Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
    CHES 2017, LNCS 10529, pp. 687-707
  2. Two Notions of Differential Equivalence on Sboxes
    Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
    WCC 2017
  3. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
    Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
    CRYPTO 2016, LNCS 9815, pp. 123-153
  4. Efficient Design Strategies Based on the AES Round Function
    Jérémy Jean and Ivica Nikolic
    FSE 2016, LNCS 9783, pp. 334-353
  5. Analysis of the CAESAR Candidate Silver
    Jérémy Jean, Yu Sasaki and Lei Wang
    SAC 2015, LNCS 9566, pp. 493-509
  6. Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
    Jérémy Jean and Ivica Nikolic
    FSE 2015, LNCS 9054, pp. 537-556
  7. Meet-in-the-Middle Attacks on Generic Feistel Constructions
    Jian Guo, Jérémy Jean, Ivica Nikolic and Yu Sasaki
    ASIACRYPT 2014, LNCS 8873, pp. 458-477
  8. Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
    Jérémy Jean, Ivica Nikolic and Thomas Peyrin
    ASIACRYPT 2014, LNCS 8874, pp. 274-288
  9. Practical Cryptanalysis of PAES
    Jérémy Jean, Ivica Nikolic, Yu Sasaki and Lei Wang
    SAC 2014, LNCS 8781, pp. 228-242
  10. The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
    Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin and Lei Wang
    SAC 2014, LNCS 8424, pp. 195-211
  11. Cryptanalysis of FIDES
    Itai Dinur and Jérémy Jean
    FSE 2014, LNCS 8424, pp. 92-111
  12. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
    Pierre-Alain Fouque, Jérémy Jean and Thomas Peyrin
    CRYPTO 2013, Part I, LNCS 8042, pp. 183--203 [extended version]
  13. Multiple Limited-Birthday Distinguishers and Applications
    Jérémy Jean, María Naya-Plasencia and Thomas Peyrin
    SAC 2013, LNCS 8282, pp. 533-550 [extended version]
  14. Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
    Patrick Derbez, Pierre-Alain Fouque and Jérémy Jean
    EUROCRYPT 2013, LNCS 7881, pp. 371--387
  15. Security Analysis of PRINCE
    Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang and Shuang Wu
    FSE 2013, LNCS 8424, pp. 92-111
  16. Faster Chosen-Key Distinguishers on Reduced-Round AES
    Patrick Derbez, Pierre-Alain Fouque and Jérémy Jean
    INDOCRYPT 2012, LNCS 7668, pp. 225--243. Springer, Heidelberg (2012)
  17. Improved Rebound Attack on the Finalist Grostl
    Jérémy Jean, María Naya-Plasencia and Thomas Peyrin
    FSE 2012 (Best Paper Award), LNCS 7549, pp. 110-126, Springer, Heidelberg, 2012.
  18. Improved Analysis of ECHO-256
    Jérémy Jean, María Naya-Plasencia and Martin Schläffer
    SAC 2011, LNCS 7118, pp. 19-36, Springer-Verlag, 2012.
  19. Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
    Jérémy Jean and Pierre-Alain Fouque
    FSE 2011, LNCS 6733, pp. 107-127, Springer-Verlag, 2011.
  20. A Parallel Algorithm for Dot Product over Word-Size Finite Field using Floating-Point Arithmetic
    Jérémy Jean and Stef Graillat
    SYNASC 2010, IEEE Computer Society 2010, pp. 80-87.

Talks

  1. Calcul du produit scalaire dans un grand corps fini en arithmétique flottante, RAIM 2009, ENS Lyon, France
  2. Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function, FSE 2011, Copenhagen, Danemark
  3. Improved Analysis of ECHO-256, SAC 2011, Toronto, Canada
  4. Improved Rebound Attack on the Finalist Grostl, FSE 2012, Washington DC, United-States
  5. Une Attaque sur la Fonction de Hachage Grostl, RAIM 2012, Dijon, France
  6. Improved Key Recovery Attacks on Reduced-Round AES, CRYPTO 2012 Rump Session, Santa Barbara, California, United States
  7. Faster Chosen-Key Distinguishers on Reduced-Round AES, INDOCRYPT 2012, Kolkata, India
  8. Multiple Limited-Birthday Distinguishers and Applications, SAC 2013, Vancouver, Canada
  9. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128, CRYPTO 2013, Santa Barbara, California, Unites States
  10. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128, Crypto Seminar in Versailles, November 27, 2013
  11. Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128, Crypto Seminar in Luxembourg, December 17, 2013
  12. Cryptanalysis of FIDES, FSE 2014, March 3, 2014
  13. The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function, SAC 2014, 14 August 2014
  14. CAESAR Candidates Joltik and Deoxys, DIAC 2014, 23 August 2014
  15. Cryptanalysis of Streebog, the new Russian hash function standard, ASK 2014, 21 Decembre 2014
  16. Efficient Design Strategies Based on the AES Round Function, FSE 2016, 22 March 2016
  17. The SKINNY Family of Lightweight Tweakable Block Ciphers, Crypto Seminar in Rennes, 3 June 2016
  18. The SKINNY Family of Lightweight Tweakable Block Ciphers, CRYPTO 2016, 6 March 2017
  19. Cryptanalysis of Haraka, FSE 2017, 6 March 2017
  20. Authenticated Encryption Schemes and Cryptanalysis, Journées Codage & Cryptographie (Invited Talk), 26 April 2017
  21. (not up to date)

Designs

  1. Kiasu: Submission to the CAESAR competition. [pdf, SyLLaB]
  2. Deoxys: Submission to the CAESAR competition. [pdf, SyLLaB]
  3. Joltik: Submission to the CAESAR competition. [pdf, SyLLaB]
  4. Skinny: very lightweight family of tweakable block ciphers. [ePrint, website]

PhD

  1. Cryptanalyse de primitives symétriques basées sur le chiffrement AES
    PhD Advisor: Pierre-Alain Fouque
    Public defense at the Ecole Normale Supérieure, on September 24, 2013.
    Download the slides.
    More informationshere.

Reports

  1. Fast dot product over finite field
    Master Thesis, February 2010, supervised by Stef Graillat (LIP6), Johan Håstad (KTH) and Jean-Louis Roch (ENSIMAG)
  2. Mise en oeuvre d'attaques de cryptanalyse basées sur les unités de prédiction de branches
    Verimag, Mai 2008, dirigé par Yassine Lakhnech
  3. Power analysis on a DES cryptographic device
    Tiempo, Juin 2008

Reviews

  1. Program Committees: ASIACRYPT 2017, ASIACRYPT 2018, ToSC/FSE 2018, ToSC/FSE 2019
  2. Subreviewer for: Journal of Cryptology, EUROCRYPT 2016, CRYPTO 2015, ASIACRYPT 2015, FSE 2015, ACNS 2015, ACNS 2014, Asiacrypt 2014, Indocrypt 2014, SCN 2014, CR-RSA 2013, SCN 2012, Asiacrypt 2011, SAC 2011, IWSEC 2011.