default search action
Nathan Keller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j42]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum time/memory/data tradeoff attacks. Des. Codes Cryptogr. 92(1): 159-177 (2024) - [j41]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. J. ACM 71(3): 23 (2024) - [j40]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack, with Application to Reduced-Round AES. J. Cryptol. 37(3): 32 (2024) - [c58]Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. EUROCRYPT (1) 2024: 128-157 - [i53]Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, Victor Mollimard:
Improved Boomerang Attacks on 6-Round AES. IACR Cryptol. ePrint Arch. 2024: 977 (2024) - 2023
- [c57]Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-Boxes. CRYPTO (3) 2023: 177-208 - [c56]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [i52]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i51]Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-boxes. IACR Cryptol. ePrint Arch. 2023: 374 (2023) - [i50]Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. IACR Cryptol. ePrint Arch. 2023: 1659 (2023) - 2022
- [j39]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical key recovery attacks on FlexAEAD. Des. Codes Cryptogr. 90(4): 983-1007 (2022) - [c55]Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. ITCS 2022: 27:1-27:24 - [i49]Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. CoRR abs/2201.03041 (2022) - [i48]Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein:
Locality-Preserving Hashing for Shifts with Connections to Cryptography. IACR Cryptol. ePrint Arch. 2022: 28 (2022) - 2021
- [c54]Nathan Keller, Asaf Rosemarin:
Mind the Middle Layer: The HADES Design Strategy Revisited. EUROCRYPT (2) 2021: 35-63 - [c53]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c52]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. FOCS 2021: 80-91 - [c51]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [c50]Nathan Keller, Ohad Klein:
Local concentration inequalities and Tomaszewski's conjecture. STOC 2021: 1656-1669 - [i47]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. CoRR abs/2111.00486 (2021) - [i46]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i45]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical Key Recovery Attacks on FlexAEAD. IACR Cryptol. ePrint Arch. 2021: 931 (2021) - [i44]Itai Dinur, Nathan Keller, Ohad Klein:
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR. IACR Cryptol. ePrint Arch. 2021: 1460 (2021) - [i43]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j38]Itai Dinur, Nathan Keller, Ohad Klein:
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. J. Cryptol. 33(3): 824-873 (2020) - [j37]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. J. Cryptol. 33(3): 910-916 (2020) - [j36]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j35]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c49]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-similar Ciphers. EUROCRYPT (1) 2020: 250-279 - [c48]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [i42]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i41]Nathan Keller, Asaf Rosemarin:
Mind the Middle Layer: The HADES Design Strategy Revisited. IACR Cryptol. ePrint Arch. 2020: 179 (2020)
2010 – 2019
- 2019
- [j34]David Ellis, Nathan Keller, Noam Lifshitz:
On a biased edge isoperimetric inequality for the discrete cube. J. Comb. Theory A 163: 118-162 (2019) - [j33]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [j32]Nathan Keller, Noam Lifshitz:
A Note on Large H-Intersecting Families. SIAM J. Discret. Math. 33(1): 398-401 (2019) - [c47]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. EUROCRYPT (1) 2019: 313-342 - [i40]Nathan Keller, Ohad Klein:
A structure theorem for almost low-degree functions on the slice. CoRR abs/1901.08839 (2019) - [i39]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2019: 256 (2019) - [i38]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. IACR Cryptol. ePrint Arch. 2019: 509 (2019) - [i37]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. IACR Cryptol. ePrint Arch. 2019: 867 (2019) - [i36]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - 2018
- [j31]Ehud Friedgut, Jeff Kahn, Gil Kalai, Nathan Keller:
Chvátal's conjecture and correlation inequalities. J. Comb. Theory A 156: 22-43 (2018) - [j30]Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. J. Cryptol. 31(3): 641-670 (2018) - [c46]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c45]Itai Dinur, Nathan Keller, Ohad Klein:
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. CRYPTO (3) 2018: 213-242 - [c44]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i35]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i34]Itai Dinur, Nathan Keller, Ohad Klein:
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 731 (2018) - 2017
- [j29]Nathan Keller, Noam Lifshitz:
The Junta Method in Extremal Hypergraph Theory and Chvátal's Conjecture. Electron. Notes Discret. Math. 61: 711-717 (2017) - [c43]Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg:
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. CT-RSA 2017: 293-308 - [i33]Nathan Keller, Noam Lifshitz:
Approximation of biased Boolean functions of small total influence by DNF's. CoRR abs/1703.10116 (2017) - [i32]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - [i31]Nathan Keller, Ohad Klein:
Biased halfspaces, noise sensitivity, and relative Chernoff inequalities (extended version). CoRR abs/1710.07429 (2017) - 2016
- [j28]Gil Kalai, Nathan Keller, Elchanan Mossel:
On the correlation of increasing families. J. Comb. Theory A 144: 250-276 (2016) - [j27]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [j26]Itai Benjamini, David Ellis, Ehud Friedgut, Nathan Keller, Arnab Sen:
Juntas in the ℓ1-grid and Lipschitz maps between discrete tori. Random Struct. Algorithms 49(2): 253-279 (2016) - [c42]Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. CANS 2016: 749-754 - [c41]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c40]Achiya Bar-On, Nathan Keller:
A 2^70 Attack on the Full MISTY1. CRYPTO (1) 2016: 435-456 - [i30]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - [i29]Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. IACR Cryptol. ePrint Arch. 2016: 679 (2016) - [i28]Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. IACR Cryptol. ePrint Arch. 2016: 1177 (2016) - 2015
- [j25]Orr Dunkelman, Nathan Keller, Adi Shamir:
Almost universal forgery attacks on AES-based MAC's. Des. Codes Cryptogr. 76(3): 431-449 (2015) - [j24]Orr Dunkelman, Nathan Keller:
Practical-time attacks against reduced variants of MISTY1. Des. Codes Cryptogr. 76(3): 601-627 (2015) - [j23]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [j22]Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. J. Cryptol. 28(1): 1-28 (2015) - [j21]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. J. Cryptol. 28(2): 209-239 (2015) - [j20]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. J. Cryptol. 28(3): 397-422 (2015) - [c39]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c38]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban:
Cryptanalysis of SP Networks with Partial Non-Linear Layers. EUROCRYPT (1) 2015: 315-342 - [i27]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - 2014
- [j19]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j18]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. J. Cryptol. 27(4): 824-849 (2014) - [c37]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c36]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [i26]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on Slide with a Twist Attacks. IACR Cryptol. ePrint Arch. 2014: 847 (2014) - 2013
- [j17]Nathan Keller, Guy Kindler:
Quantitative relation between noise sensitivity and influences. Comb. 33(1): 45-71 (2013) - [j16]Orr Dunkelman, Nathan Keller:
Cryptanalysis of the Stream Cipher LEX. Des. Codes Cryptogr. 67(3): 357-373 (2013) - [c35]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. ASIACRYPT (1) 2013: 337-356 - [i25]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. IACR Cryptol. ePrint Arch. 2013: 391 (2013) - [i24]Orr Dunkelman, Nathan Keller:
Practical-Time Attacks Against Reduced Variants of MISTY1. IACR Cryptol. ePrint Arch. 2013: 431 (2013) - [i23]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. IACR Cryptol. ePrint Arch. 2013: 634 (2013) - [i22]Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. IACR Cryptol. ePrint Arch. 2013: 674 (2013) - 2012
- [j15]Nathan Keller, Elchanan Mossel, Tomer Schlank:
A note on the Entropy/Influence conjecture. Discret. Math. 312(22): 3364-3372 (2012) - [j14]Nathan Keller:
A simple reduction from a biased measure on the discrete cube to the uniform measure. Eur. J. Comb. 33(8): 1943-1957 (2012) - [j13]Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede:
A Practical Attack on KeeLoq. J. Cryptol. 25(1): 136-157 (2012) - [j12]Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis. IEEE Trans. Inf. Theory 58(7): 4948-4966 (2012) - [j11]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, Vincent Rijmen:
Low-Data Complexity Attacks on AES. IEEE Trans. Inf. Theory 58(11): 7002-7017 (2012) - [c34]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. CRYPTO 2012: 719-740 - [c33]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. EUROCRYPT 2012: 336-354 - [i21]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. IACR Cryptol. ePrint Arch. 2012: 217 (2012) - 2011
- [j10]Nathan Keller:
On the Influences of Variables on Boolean Functions in Product Spaces. Comb. Probab. Comput. 20(1): 83-102 (2011) - [j9]Ehud Friedgut, Gil Kalai, Nathan Keller, Noam Nisan:
A Quantitative Version of the Gibbard-Satterthwaite Theorem for Three Alternatives. SIAM J. Comput. 40(3): 934-952 (2011) - [i20]Nathan Keller, Elchanan Mossel, Tomer Schlank:
A Note on the Entropy/Influence Conjecture. CoRR abs/1105.2651 (2011) - [i19]Ehud Friedgut, Gil Kalai, Nathan Keller, Noam Nisan:
A Quantitative Version of the Gibbard-Satterthwaite Theorem for Three Alternatives. CoRR abs/1105.5129 (2011) - [i18]Orr Dunkelman, Nathan Keller, Adi Shamir:
ALRED Blues: New Attacks on AES-Based MAC's. IACR Cryptol. ePrint Arch. 2011: 95 (2011) - [i17]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Data-Efficient Attacks on Reduced-Round IDEA. IACR Cryptol. ePrint Arch. 2011: 417 (2011) - [i16]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. IACR Cryptol. ePrint Arch. 2011: 541 (2011) - 2010
- [j8]Nathan Keller, Stephen D. Miller:
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words. Inf. Process. Lett. 110(4): 129-132 (2010) - [j7]Orr Dunkelman, Nathan Keller:
The effects of the omission of last round's MixColumns on AES. Inf. Process. Lett. 110(8-9): 304-308 (2010) - [j6]Nathan Keller:
On the probability of a rational outcome for generalized social welfare functions on three alternatives. J. Comb. Theory A 117(4): 389-410 (2010) - [c32]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. ASIACRYPT 2010: 158-176 - [c31]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. CRYPTO 2010: 393-410 - [c30]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [i15]Nathan Keller:
A tight quantitative version of Arrow's impossibility theorem. CoRR abs/1003.3956 (2010) - [i14]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. IACR Cryptol. ePrint Arch. 2010: 13 (2010) - [i13]Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks. IACR Cryptol. ePrint Arch. 2010: 19 (2010) - [i12]Orr Dunkelman, Nathan Keller:
The Effects of the Omission of Last Round's MixColumns on AES. IACR Cryptol. ePrint Arch. 2010: 41 (2010) - [i11]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-round AES. IACR Cryptol. ePrint Arch. 2010: 322 (2010) - [i10]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque:
Low Data Complexity Attacks on AES. IACR Cryptol. ePrint Arch. 2010: 633 (2010)
2000 – 2009
- 2009
- [j5]Nathan Keller:
Lower bound on the correlation between monotone families in the average case. Adv. Appl. Math. 43(1): 31-45 (2009) - [j4]Nathan Keller, Haran Pilpel:
Linear transformations of monotone functions on the discrete cube. Discret. Math. 309(12): 4210-4214 (2009) - [c29]Orr Dunkelman, Nathan Keller:
Cryptanalysis of CTC2. CT-RSA 2009: 226-239 - [i9]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds. IACR Cryptol. ePrint Arch. 2009: 374 (2009) - [i8]Nathan Keller, Stephen D. Miller:
Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words. IACR Cryptol. ePrint Arch. 2009: 412 (2009) - 2008
- [j3]Orr Dunkelman, Nathan Keller:
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers. Inf. Process. Lett. 107(5): 133-137 (2008) - [j2]Elad Barkan, Eli Biham, Nathan Keller:
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptol. 21(3): 392-429 (2008) - [c28]Orr Dunkelman, Nathan Keller:
An Improved Impossible Differential Attack on MISTY1. ASIACRYPT 2008: 441-454 - [c27]Orr Dunkelman, Nathan Keller:
A New Attack on the LEX Stream Cipher. ASIACRYPT 2008: 539-556