Publications
Journal
-
Two Notions of Differential Equivalence on Sboxes
Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
Designs, Codes and Cryptography, to appear
-
Key-Recovery Attacks on Full Kravatte
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song
ToSC/FSE 2018 (Best Paper Award)
-
Optimizing Implementations of Lightweight Building Blocks
Jérémy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
ToSC/FSE 2018
[Source code]
-
Cryptanalysis of NORX v2.0
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
ToSC/FSE 2017 (Best Paper Award)
-
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
ToSC/FSE 2017
-
Cryptanalysis of Haraka
Jérémy Jean
ToSC/FSE 2017
-
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box
Jian Guo, Jérémy jean, Ivica Nikolić, Kexin Qiao, Yu Sasaki, Siang Meng Sim
ToSC/FSE 2017
-
Extended meet-in-the-middle attacks on some Feistel constructions
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
Designs, Codes and Cryptography, 80(3) 587-618 (2016)
-
Practical Forgeries and Distinguishers against PAES
Jérémy Jean, Ivica Nikolic, Yu Sasaki and Lei Wang
IEICE Transactions 99-A(1), 39-48 (2016)
-
Improved Cryptanalysis of AES-like Permutations,
Jérémy Jean, María Naya-Plasencia, Thomas Peyrin
Journal of Cryptology 27(4), 772-798 (2014)
Conferences
-
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY
Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich
CHES 2017, LNCS 10529, pp. 687-707
-
Two Notions of Differential Equivalence on Sboxes
Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder
WCC 2017
-
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
CRYPTO 2016, LNCS 9815, pp. 123-153
-
Efficient Design Strategies Based on the AES Round Function
Jérémy Jean and Ivica Nikolic
FSE 2016, LNCS 9783, pp. 334-353
-
Analysis of the CAESAR Candidate Silver
Jérémy Jean, Yu Sasaki and Lei Wang
SAC 2015, LNCS 9566, pp. 493-509
-
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation
Jérémy Jean and Ivica Nikolic
FSE 2015, LNCS 9054, pp. 537-556
-
Meet-in-the-Middle Attacks on Generic Feistel Constructions
Jian Guo, Jérémy Jean, Ivica Nikolic and Yu Sasaki
ASIACRYPT 2014, LNCS 8873, pp. 458-477
-
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean, Ivica Nikolic and Thomas Peyrin
ASIACRYPT 2014, LNCS 8874, pp. 274-288
-
Practical Cryptanalysis of PAES
Jérémy Jean, Ivica Nikolic, Yu Sasaki and Lei Wang
SAC 2014, LNCS 8781, pp. 228-242
-
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
Jian Guo, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin and Lei Wang
SAC 2014, LNCS 8424, pp. 195-211
-
Cryptanalysis of FIDES
Itai Dinur and Jérémy Jean
FSE 2014, LNCS 8424, pp. 92-111
-
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128
Pierre-Alain Fouque, Jérémy Jean and Thomas Peyrin
CRYPTO 2013, Part I, LNCS 8042, pp. 183--203
[extended version]
-
Multiple Limited-Birthday Distinguishers and Applications
Jérémy Jean, María Naya-Plasencia and Thomas Peyrin
SAC 2013, LNCS 8282, pp. 533-550
[extended version]
-
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
Patrick Derbez, Pierre-Alain Fouque and Jérémy Jean
EUROCRYPT 2013, LNCS 7881, pp. 371--387
-
Security Analysis of PRINCE
Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang and Shuang Wu
FSE 2013, LNCS 8424, pp. 92-111
-
Faster Chosen-Key Distinguishers on Reduced-Round AES
Patrick Derbez, Pierre-Alain Fouque and Jérémy Jean
INDOCRYPT 2012, LNCS 7668, pp. 225--243. Springer, Heidelberg (2012)
-
Improved Rebound Attack on the Finalist Grostl
Jérémy Jean, María Naya-Plasencia and Thomas Peyrin
FSE 2012 (Best Paper Award), LNCS 7549, pp. 110-126, Springer, Heidelberg, 2012.
-
Improved Analysis of ECHO-256
Jérémy Jean, María Naya-Plasencia and Martin Schläffer
SAC 2011, LNCS 7118, pp. 19-36,
Springer-Verlag, 2012.
-
Practical Near-Collisions and Collisions on
Round-Reduced ECHO-256 Compression
Function
Jérémy Jean and Pierre-Alain Fouque
FSE 2011, LNCS 6733, pp. 107-127,
Springer-Verlag,
2011.
-
A Parallel Algorithm for Dot Product over
Word-Size Finite Field using Floating-Point
Arithmetic
Jérémy Jean and Stef Graillat
SYNASC 2010,
IEEE Computer Society 2010, pp. 80-87.
Talks
-
Calcul du produit scalaire dans un grand corps fini en arithmétique
flottante,
RAIM 2009, ENS Lyon, France
-
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function,
FSE 2011, Copenhagen, Danemark
-
Improved Analysis of ECHO-256,
SAC 2011, Toronto, Canada
-
Improved Rebound Attack on the Finalist Grostl,
FSE 2012, Washington DC, United-States
-
Une Attaque sur la Fonction de Hachage Grostl,
RAIM 2012, Dijon, France
-
Improved Key Recovery Attacks on Reduced-Round AES,
CRYPTO 2012 Rump Session, Santa Barbara, California, United States
-
Faster Chosen-Key Distinguishers on Reduced-Round AES,
INDOCRYPT 2012, Kolkata, India
-
Multiple Limited-Birthday Distinguishers and Applications,
SAC 2013, Vancouver, Canada
-
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128,
CRYPTO 2013, Santa Barbara, California, Unites States
-
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128,
Crypto Seminar in Versailles, November 27, 2013
-
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128,
Crypto Seminar in Luxembourg, December 17, 2013
-
Cryptanalysis of FIDES,
FSE 2014, March 3, 2014
-
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function,
SAC 2014, 14 August 2014
-
CAESAR Candidates Joltik and Deoxys,
DIAC 2014, 23 August 2014
-
Cryptanalysis of Streebog, the new Russian hash function standard,
ASK 2014, 21 Decembre 2014
-
Efficient Design Strategies Based on the AES Round Function,
FSE 2016, 22 March 2016
-
The SKINNY Family of Lightweight Tweakable Block Ciphers,
Crypto Seminar in Rennes, 3 June 2016
-
The SKINNY Family of Lightweight Tweakable Block Ciphers,
CRYPTO 2016, 6 March 2017
-
Cryptanalysis of Haraka,
FSE 2017, 6 March 2017
-
Authenticated Encryption Schemes and Cryptanalysis,
Journées Codage & Cryptographie (Invited Talk), 26 April 2017
-
(not up to date)
Designs
- Kiasu: Submission to the CAESAR competition. [pdf, SyLLaB]
- Deoxys: Submission to the CAESAR competition. [pdf, SyLLaB]
- Joltik: Submission to the CAESAR competition. [pdf, SyLLaB]
- Skinny: very lightweight family of tweakable block ciphers. [ePrint, website]
PhD
-
Cryptanalyse de primitives symétriques basées sur le chiffrement AES
PhD Advisor: Pierre-Alain Fouque
Public defense at the Ecole Normale Supérieure, on September 24, 2013.
Download the
slides.
More informationshere.
Reports
-
Fast dot product over finite field
Master Thesis, February 2010, supervised by Stef
Graillat (LIP6), Johan Håstad (KTH) and
Jean-Louis Roch (ENSIMAG)
-
Mise en oeuvre d'attaques de cryptanalyse basées
sur les unités de prédiction de branches
Verimag, Mai 2008, dirigé par Yassine Lakhnech
-
Power analysis on a DES cryptographic device
Tiempo, Juin 2008
Reviews
-
Program Committees: ASIACRYPT 2017, ASIACRYPT 2018, ToSC/FSE 2018, ToSC/FSE 2019
-
Subreviewer for: Journal of Cryptology, EUROCRYPT 2016, CRYPTO 2015, ASIACRYPT 2015, FSE 2015, ACNS 2015, ACNS 2014, Asiacrypt 2014, Indocrypt 2014, SCN 2014, CR-RSA 2013, SCN 2012, Asiacrypt 2011, SAC 2011, IWSEC 2011.
|
|