Two notions of differential equivalence on Sboxes
Boura, Christina, Canteaut, Anne, Jean, Jérémy, Suder, Valentin
Published in Designs, codes, and cryptography (15.03.2019)
Published in Designs, codes, and cryptography (15.03.2019)
Get full text
Journal Article
SKINNY-AEAD and SKINNY-Hash
Beierle, Christof, Jean, Jérémy, Kölbl, Stefan, Leander, Gregor, Moradi, Amir, Peyrin, Thomas, Sasaki, Yu, Sasdrich, Pascal, Sim, Siang Meng
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Get full text
Journal Article
Optimizing Implementations of Lightweight Building Blocks
Jean, Jérémy, Peyrin, Thomas, Sim, Siang Meng, Tourteaux, Jade
Published in IACR Transactions on Symmetric Cryptology (15.12.2017)
Published in IACR Transactions on Symmetric Cryptology (15.12.2017)
Get full text
Journal Article
The Deoxys AEAD Family
Jean, Jérémy, Nikolić, Ivica, Peyrin, Thomas, Seurin, Yannick
Published in Journal of cryptology (01.07.2021)
Published in Journal of cryptology (01.07.2021)
Get full text
Journal Article
Optimizing Implementations of Lightweight Building Blocks
Jérémy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux
Published in IACR Transactions on Symmetric Cryptology (01.12.2017)
Published in IACR Transactions on Symmetric Cryptology (01.12.2017)
Get full text
Journal Article
Cryptanalysis of NORX v2.0
Chaigneau, Colin, Fuhr, Thomas, Gilbert, Henri, Jean, Jérémy, Reinhard, Jean-René
Published in Journal of cryptology (01.10.2019)
Published in Journal of cryptology (01.10.2019)
Get full text
Journal Article
SKINNY-AEAD and SKINNY-Hash
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Get full text
Journal Article
Extended meet-in-the-middle attacks on some Feistel constructions
Guo, Jian, Jean, Jérémy, Nikolić, Ivica, Sasaki, Yu
Published in Designs, codes, and cryptography (01.09.2016)
Published in Designs, codes, and cryptography (01.09.2016)
Get full text
Journal Article
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki
Published in IACR Transactions on Symmetric Cryptology (01.02.2017)
Published in IACR Transactions on Symmetric Cryptology (01.02.2017)
Get full text
Journal Article
Key-Recovery Attacks on Full Kravatte
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Get full text
Journal Article
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim
Published in IACR Transactions on Symmetric Cryptology (01.12.2016)
Published in IACR Transactions on Symmetric Cryptology (01.12.2016)
Get full text
Journal Article
Cryptanalysis of NORX v2.0
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard
Published in IACR Transactions on Symmetric Cryptology (01.03.2017)
Published in IACR Transactions on Symmetric Cryptology (01.03.2017)
Get full text
Journal Article