default search action
Orr Dunkelman
אור דונקלמן
Person information
- unicode name: אור דונקלמן
- affiliation: University of Haifa, Department of Computer Science, Haifa, Israel
- affiliation (former): Technion - Israel Institute of Technology, Haifa, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j37]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum time/memory/data tradeoff attacks. Des. Codes Cryptogr. 92(1): 159-177 (2024) - [j36]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack, with Application to Reduced-Round AES. J. Cryptol. 37(3): 32 (2024) - [c90]Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. EUROCRYPT (1) 2024: 128-157 - [i79]Augustin Bariant, Orr Dunkelman, Nathan Keller, Gaëtan Leurent, Victor Mollimard:
Improved Boomerang Attacks on 6-Round AES. IACR Cryptol. ePrint Arch. 2024: 977 (2024) - [i78]Roberto Avanzi, Orr Dunkelman, Kazuhiko Minematsu:
MATTER: A Wide-Block Tweakable Block Cipher. IACR Cryptol. ePrint Arch. 2024: 1186 (2024) - [i77]Roberto Avanzi, Orr Dunkelman, Shibam Ghosh:
A Note on ARADI and LLAMA. IACR Cryptol. ePrint Arch. 2024: 1328 (2024) - 2023
- [j35]Zhenzhen Guo, Gaoli Wang, Orr Dunkelman, Yinxue Pan, Shengyuan Liu:
Tweakable SM4: How to tweak SM4 into tweakable block ciphers? J. Inf. Secur. Appl. 72: 103406 (2023) - [j34]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. IACR Trans. Symmetric Cryptol. 2023(1): 41-66 (2023) - [j33]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256. IACR Trans. Symmetric Cryptol. 2023(2): 176-188 (2023) - [j32]Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni:
The QARMAv2 Family of Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2023(3): 25-73 (2023) - [c89]Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-Boxes. CRYPTO (3) 2023: 177-208 - [c88]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [c87]Danielle Movsowitz-Davidow, Orna Agmon Ben-Yehuda, Orr Dunkelman:
Deconstructing Alibaba Cloud's Preemptible Instance Pricing. HPDC 2023: 253-265 - [i76]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. IACR Cryptol. ePrint Arch. 2023: 230 (2023) - [i75]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i74]Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-boxes. IACR Cryptol. ePrint Arch. 2023: 374 (2023) - [i73]Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni:
The tweakable block cipher family QARMAv2. IACR Cryptol. ePrint Arch. 2023: 929 (2023) - [i72]Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard:
Partial Sums Meet FFT: Improved Attack on 6-Round AES. IACR Cryptol. ePrint Arch. 2023: 1659 (2023) - [i71]Orr Dunkelman, Ariel Weizman:
Another Look at Differential-Linear Attacks. IACR Cryptol. ePrint Arch. 2023: 1675 (2023) - 2022
- [j31]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical key recovery attacks on FlexAEAD. Des. Codes Cryptogr. 90(4): 983-1007 (2022) - [j30]Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-Round SHA-3-384 in Practical Time. IACR Trans. Symmetric Cryptol. 2022(3): 239-270 (2022) - [c86]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-Permutation in the Known-Key Setting. INDOCRYPT 2022: 349-372 - [c85]Orr Dunkelman, Ariel Weizman:
Another Look at Differential-Linear Attacks. SAC 2022: 116-136 - [c84]Danielle Movsowitz-Davidow, Orna Agmon Ben-Yehuda, Orr Dunkelman:
Sharp behavioral changes in preemptible instance pricing. SYSTOR 2022: 145 - [e9]Orr Dunkelman, Stefan Dziembowski:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13275, Springer 2022, ISBN 978-3-031-06943-7 [contents] - [e8]Orr Dunkelman, Stefan Dziembowski:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13276, Springer 2022, ISBN 978-3-031-07084-6 [contents] - [e7]Orr Dunkelman, Stefan Dziembowski:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13277, Springer 2022, ISBN 978-3-031-07081-5 [contents] - [i70]Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-round SHA3-384 in Practical Time. IACR Cryptol. ePrint Arch. 2022: 194 (2022) - [i69]Orr Dunkelman, Eran Lambooij, Shibam Ghosh:
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256. IACR Cryptol. ePrint Arch. 2022: 1122 (2022) - [i68]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting. IACR Cryptol. ePrint Arch. 2022: 1567 (2022) - 2021
- [j29]Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY. Inf. Comput. 281: 104796 (2021) - [j28]Danny Keller, Margarita Osadchy, Orr Dunkelman:
Inverting Binarizations of Facial Templates Produced by Deep Learning (and Its Implications). IEEE Trans. Inf. Forensics Secur. 16: 4184-4196 (2021) - [c83]Rami Ailabouni, Orr Dunkelman, Sara Bitan:
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor. CSCML 2021: 244-265 - [c82]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c81]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [c80]Shibam Ghosh, Orr Dunkelman:
Automatic Search for Bit-Based Division Property. LATINCRYPT 2021: 254-274 - [e6]Orr Dunkelman, Michael J. Jacobson Jr., Colin O'Flynn:
Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12804, Springer 2021, ISBN 978-3-030-81651-3 [contents] - [i67]Mor Peleg, Amnon Reichman, Sivan Shachar, Tamir Gadot, Meytal Avgil Tsadok, Maya Azaria, Orr Dunkelman, Shiri Hassid, Daniella Partem, Maya Shmailov, Elad Yom-Tov, Roy Cohen:
COVID-19 Datathon Based on Deidentified Governmental Data as an Approach for Solving Policy Challenges, Increasing Trust, and Building a Community: Case Study. CoRR abs/2108.13068 (2021) - [i66]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i65]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical Key Recovery Attacks on FlexAEAD. IACR Cryptol. ePrint Arch. 2021: 931 (2021) - [i64]Shibam Ghosh, Orr Dunkelman:
Automatic Search for Bit-based Division Property. IACR Cryptol. ePrint Arch. 2021: 965 (2021) - [i63]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j27]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. J. Cryptol. 33(3): 910-916 (2020) - [j26]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j25]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c79]Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. CSCML 2020: 1-17 - [c78]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-similar Ciphers. EUROCRYPT (1) 2020: 250-279 - [c77]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [c76]Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya:
Counting Active S-Boxes is not Enough. INDOCRYPT 2020: 332-344 - [i62]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i61]Danny Keller, Margarita Osadchy, Orr Dunkelman:
Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning. CoRR abs/2012.13293 (2020) - [i60]Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. IACR Cryptol. ePrint Arch. 2020: 689 (2020) - [i59]Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya:
Cryptanalysis of Feistel-Based Format-Preserving Encryption. IACR Cryptol. ePrint Arch. 2020: 1311 (2020)
2010 – 2019
- 2019
- [j24]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [j23]Margarita Osadchy, Orr Dunkelman:
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings. IEEE Trans. Dependable Secur. Comput. 16(5): 796-804 (2019) - [j22]Orr Dunkelman, Senyang Huang:
Reconstructing an S-box from its Difference Distribution Table. IACR Trans. Symmetric Cryptol. 2019(2): 193-217 (2019) - [c75]Tomer Ashur, Orr Dunkelman, Nael Masalha:
Linear Cryptanalysis Reduced Round of Piccolo-80. CSCML 2019: 16-32 - [c74]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. EUROCRYPT (1) 2019: 313-342 - [c73]Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. SSR 2019: 69-80 - [e5]Tanja Lange, Orr Dunkelman:
Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11368, Springer 2019, ISBN 978-3-030-25282-3 [contents] - [i58]Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman:
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance. CoRR abs/1901.10861 (2019) - [i57]Rami Ailabouni, Orr Dunkelman, Sara Bitan:
DNS-Morph: UDP-Based Bootstrapping Protocol For Tor. CoRR abs/1904.01240 (2019) - [i56]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2019: 256 (2019) - [i55]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. IACR Cryptol. ePrint Arch. 2019: 509 (2019) - [i54]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. IACR Cryptol. ePrint Arch. 2019: 867 (2019) - [i53]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - [i52]Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. IACR Cryptol. ePrint Arch. 2019: 1187 (2019) - 2018
- [j21]Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. J. Cryptol. 31(3): 641-670 (2018) - [c72]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c71]Orr Dunkelman, Ariel Weizman:
Efficient Construction of the Kite Generator Revisited. CSCML 2018: 6-19 - [c70]Danielle Movsowitz, Liran Funaro, Shunit Agmon, Orna Agmon Ben-Yehuda, Orr Dunkelman:
Why Are Repeated Auctions in RaaS Clouds Risky? GECON 2018: 39-51 - [c69]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i51]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i50]Orr Dunkelman:
Efficient Construction of the Boomerang Connection Table. IACR Cryptol. ePrint Arch. 2018: 631 (2018) - [i49]Orr Dunkelman, Senyang Huang:
Reconstructing an S-box from its Difference Distribution Table. IACR Cryptol. ePrint Arch. 2018: 811 (2018) - 2017
- [j20]Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. IEEE Trans. Inf. Forensics Secur. 12(11): 2640-2653 (2017) - [j19]Tomer Ashur, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. IACR Trans. Symmetric Cryptol. 2017(1): 203-214 (2017) - [c68]Tomer Ashur, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness with Minimal Modifications. CRYPTO (3) 2017: 3-33 - [c67]Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon:
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. CSCML 2017: 19-33 - [c66]Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg:
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. CT-RSA 2017: 293-308 - [c65]Ariel Weizman, Orr Dunkelman, Simi Haber:
Efficient Construction of Diamond Structures. INDOCRYPT 2017: 166-185 - [i48]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - [i47]Tomer Ashur, Daniël Bodden, Orr Dunkelman:
Linear Cryptanalysis Using Low-bias Linear Approximations. IACR Cryptol. ePrint Arch. 2017: 204 (2017) - [i46]Tomer Ashur, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness With Minimal Modifications. IACR Cryptol. ePrint Arch. 2017: 239 (2017) - 2016
- [j18]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - [j17]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [c64]Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. CANS 2016: 749-754 - [c63]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c62]Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens:
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. SAC 2016: 247-263 - [c61]Tomer Ashur, Orr Dunkelman, Nimrod Talmon:
Breaching the Privacy of Israel's Paper Ballot Voting System. E-VOTE-ID 2016: 108-124 - [e4]Orr Dunkelman, Somitra Kumar Sanadhya:
Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Lecture Notes in Computer Science 10095, 2016, ISBN 978-3-319-49889-8 [contents] - [e3]Orr Dunkelman, Liam Keliher:
Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9566, Springer 2016, ISBN 978-3-319-31300-9 [contents] - [i45]Tomer Ashur, Orr Dunkelman, Nimrod Talmon:
Breaching the Privacy of Israel's Paper Ballot Voting System. CoRR abs/1608.08020 (2016) - [i44]Mor Ohana, Orr Dunkelman, Stuart J. Gibson, Margarita Osadchy:
HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images. CoRR abs/1611.03811 (2016) - [i43]Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA. IACR Cryptol. ePrint Arch. 2016: 336 (2016) - [i42]Tomer Ashur, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. IACR Cryptol. ePrint Arch. 2016: 532 (2016) - [i41]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - [i40]Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. IACR Cryptol. ePrint Arch. 2016: 679 (2016) - [i39]Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. IACR Cryptol. ePrint Arch. 2016: 1177 (2016) - 2015
- [j16]Orr Dunkelman, Nathan Keller, Adi Shamir:
Almost universal forgery attacks on AES-based MAC's. Des. Codes Cryptogr. 76(3): 431-449 (2015) - [j15]Orr Dunkelman, Nathan Keller:
Practical-time attacks against reduced variants of MISTY1. Des. Codes Cryptogr. 76(3): 601-627 (2015) - [j14]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [j13]Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. J. Cryptol. 28(1): 1-28 (2015) - [j12]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. J. Cryptol. 28(2): 209-239 (2015) - [j11]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. J. Cryptol. 28(3): 397-422 (2015) - [c60]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c59]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban:
Cryptanalysis of SP Networks with Partial Non-Linear Layers. EUROCRYPT (1) 2015: 315-342 - [c58]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. LATINCRYPT 2015: 139-156 - [i38]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - [i37]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 268 (2015) - [i36]Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. IACR Cryptol. ePrint Arch. 2015: 507 (2015) - 2014
- [j10]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j9]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. J. Cryptol. 27(2): 183-209 (2014) - [j8]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. J. Cryptol. 27(4): 824-849 (2014) - [c57]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c56]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [i35]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand,