BibTeX records: Orr Dunkelman

download as .bib file

@article{DBLP:journals/dcc/DunkelmanKRS24,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Quantum time/memory/data tradeoff attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {159--177},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01300-x},
  doi          = {10.1007/S10623-023-01300-X},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanKRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GuoWDPL23,
  author       = {Zhenzhen Guo and
                  Gaoli Wang and
                  Orr Dunkelman and
                  Yinxue Pan and
                  Shengyuan Liu},
  title        = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103406},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103406},
  doi          = {10.1016/J.JISA.2022.103406},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DunkelmanGL23,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  title        = {Attacking the {IETF/ISO} Standard for Internal Re-keying {CTR-ACPKM}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {1},
  pages        = {41--66},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i1.41-66},
  doi          = {10.46586/TOSC.V2023.I1.41-66},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DunkelmanGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DunkelmanGL23a,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  title        = {Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {176--188},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.176-188},
  doi          = {10.46586/TOSC.V2023.I2.176-188},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DunkelmanGL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AvanziBDEGNR23,
  author       = {Roberto Avanzi and
                  Subhadeep Banik and
                  Orr Dunkelman and
                  Maria Eichlseder and
                  Shibam Ghosh and
                  Marcel Nageler and
                  Francesco Regazzoni},
  title        = {The QARMAv2 Family of Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {25--73},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.25-73},
  doi          = {10.46586/TOSC.V2023.I3.25-73},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AvanziBDEGNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DunkelmanKW23,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Ariel Weizman},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Practical-Time Related-Key Attack on {GOST} with Secret S-Boxes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {177--208},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_7},
  doi          = {10.1007/978-3-031-38548-3\_7},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DunkelmanKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DinurDKRS23,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Efficient Detection of High Probability Statistical Properties of
                  Cryptosystems via Surrogate Differentiation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {98--127},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_4},
  doi          = {10.1007/978-3-031-30634-1\_4},
  timestamp    = {Thu, 20 Apr 2023 11:35:02 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DinurDKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpdc/Movsowitz-Davidow23,
  author       = {Danielle Movsowitz{-}Davidow and
                  Orna Agmon Ben{-}Yehuda and
                  Orr Dunkelman},
  editor       = {Ali Raza Butt and
                  Ningfang Mi and
                  Kyle Chard},
  title        = {Deconstructing Alibaba Cloud's Preemptible Instance Pricing},
  booktitle    = {Proceedings of the 32nd International Symposium on High-Performance
                  Parallel and Distributed Computing, {HPDC} 2023, Orlando, FL, USA,
                  June 16-23, 2023},
  pages        = {253--265},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3588195.3593001},
  doi          = {10.1145/3588195.3593001},
  timestamp    = {Fri, 18 Aug 2023 10:01:36 +0200},
  biburl       = {https://dblp.org/rec/conf/hpdc/Movsowitz-Davidow23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanGL23,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  title        = {Attacking the {IETF/ISO} Standard for Internal Re-keying {CTR-ACPKM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/230},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKRS23,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Efficient Detection of High Probability Statistical Properties of
                  Cryptosystems via Surrogate Differentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/288},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKW23,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Ariel Weizman},
  title        = {Practical-Time Related-Key Attack on {GOST} with Secret S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/374},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziBDEGNR23,
  author       = {Roberto Avanzi and
                  Subhadeep Banik and
                  Orr Dunkelman and
                  Maria Eichlseder and
                  Shibam Ghosh and
                  Marcel Nageler and
                  Francesco Regazzoni},
  title        = {The tweakable block cipher family QARMAv2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/929},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziBDEGNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanGKLMM23,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Avichai Marmor and
                  Victor Mollimard},
  title        = {Partial Sums Meet {FFT:} Improved Attack on 6-Round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1659},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1659},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanGKLMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanW23,
  author       = {Orr Dunkelman and
                  Ariel Weizman},
  title        = {Another Look at Differential-Linear Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1675},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1675},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanEKKLS22,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical key recovery attacks on FlexAEAD},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {983--1007},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01023-5},
  doi          = {10.1007/S10623-022-01023-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuangBDM22,
  author       = {Senyang Huang and
                  Orna Agmon Ben{-}Yehuda and
                  Orr Dunkelman and
                  Alexander Maximov},
  title        = {Finding Collisions against 4-Round {SHA-3-384} in Practical Time},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {239--270},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.239-270},
  doi          = {10.46586/TOSC.V2022.I3.239-270},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HuangBDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DunkelmanGL22,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192
                  Keyed-Permutation in the Known-Key Setting},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {349--372},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_16},
  doi          = {10.1007/978-3-031-22912-1\_16},
  timestamp    = {Mon, 09 Jan 2023 17:58:33 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DunkelmanGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/systor/Movsowitz-Davidow22,
  author       = {Danielle Movsowitz{-}Davidow and
                  Orna Agmon Ben{-}Yehuda and
                  Orr Dunkelman},
  editor       = {Michal Malka and
                  Hillel Kolodner and
                  Frank Bellosa and
                  Moshe Gabel},
  title        = {Sharp behavioral changes in preemptible instance pricing},
  booktitle    = {{SYSTOR} '22: The 15th {ACM} International Systems and Storage Conference,
                  Haifa, Israel, June 13 - 15, 2022},
  pages        = {145},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3534056.3535001},
  doi          = {10.1145/3534056.3535001},
  timestamp    = {Mon, 13 Jun 2022 17:06:26 +0200},
  biburl       = {https://dblp.org/rec/conf/systor/Movsowitz-Davidow22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2022-1,
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4},
  doi          = {10.1007/978-3-031-06944-4},
  isbn         = {978-3-031-06943-7},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2022-2,
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3},
  doi          = {10.1007/978-3-031-07085-3},
  isbn         = {978-3-031-07084-6},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2022-3,
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2},
  doi          = {10.1007/978-3-031-07082-2},
  isbn         = {978-3-031-07081-5},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangBDM22,
  author       = {Senyang Huang and
                  Orna Agmon Ben{-}Yehuda and
                  Orr Dunkelman and
                  Alexander Maximov},
  title        = {Finding Collisions against 4-round {SHA3-384} in Practical Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/194},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangBDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanLG22,
  author       = {Orr Dunkelman and
                  Eran Lambooij and
                  Shibam Ghosh},
  title        = {Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1122},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1122},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanGL22,
  author       = {Orr Dunkelman and
                  Shibam Ghosh and
                  Eran Lambooij},
  title        = {Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192
                  Keyed-permutation in the Known-key setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1567},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1567},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/DunkelmanHLP21,
  author       = {Orr Dunkelman and
                  Senyang Huang and
                  Eran Lambooij and
                  Stav Perle},
  title        = {Biased differential distinguisher - Cryptanalysis of reduced-round
                  {SKINNY}},
  journal      = {Inf. Comput.},
  volume       = {281},
  pages        = {104796},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ic.2021.104796},
  doi          = {10.1016/J.IC.2021.104796},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/DunkelmanHLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KellerOD21,
  author       = {Danny Keller and
                  Margarita Osadchy and
                  Orr Dunkelman},
  title        = {Inverting Binarizations of Facial Templates Produced by Deep Learning
                  (and Its Implications)},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4184--4196},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3103056},
  doi          = {10.1109/TIFS.2021.3103056},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KellerOD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/AilabouniDB21,
  author       = {Rami Ailabouni and
                  Orr Dunkelman and
                  Sara Bitan},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {DNS-Morph: UDP-Based Bootstrapping Protocol for Tor},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {244--265},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_19},
  doi          = {10.1007/978-3-030-78086-9\_19},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/AilabouniDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AmonDKRS21,
  author       = {Ohad Amon and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Three Third Generation Attacks on the Format Preserving Encryption
                  Scheme {FF3}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {127--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_5},
  doi          = {10.1007/978-3-030-77886-6\_5},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AmonDKRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DunkelmanGKKRST21,
  author       = {Orr Dunkelman and
                  Zeev Geyzel and
                  Chaya Keller and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir and
                  Ran J. Tessler},
  editor       = {Nikhil Bansal and
                  Emanuela Merelli and
                  James Worrell},
  title        = {Error Resilient Space Partitioning (Invited Talk)},
  booktitle    = {48th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference)},
  series       = {LIPIcs},
  volume       = {198},
  pages        = {4:1--4:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2021.4},
  doi          = {10.4230/LIPICS.ICALP.2021.4},
  timestamp    = {Tue, 15 Feb 2022 07:54:27 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/DunkelmanGKKRST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GhoshD21,
  author       = {Shibam Ghosh and
                  Orr Dunkelman},
  editor       = {Patrick Longa and
                  Carla R{\`{a}}fols},
  title        = {Automatic Search for Bit-Based Division Property},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference
                  on Cryptology and Information Security in Latin America, Bogot{\'{a}},
                  Colombia, October 6-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12912},
  pages        = {254--274},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88238-9\_13},
  doi          = {10.1007/978-3-030-88238-9\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GhoshD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2020,
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81652-0},
  doi          = {10.1007/978-3-030-81652-0},
  isbn         = {978-3-030-81651-3},
  timestamp    = {Thu, 22 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-13068,
  author       = {Mor Peleg and
                  Amnon Reichman and
                  Sivan Shachar and
                  Tamir Gadot and
                  Meytal Avgil Tsadok and
                  Maya Azaria and
                  Orr Dunkelman and
                  Shiri Hassid and
                  Daniella Partem and
                  Maya Shmailov and
                  Elad Yom{-}Tov and
                  Roy Cohen},
  title        = {{COVID-19} Datathon Based on Deidentified Governmental Data as an
                  Approach for Solving Policy Challenges, Increasing Trust, and Building
                  a Community: Case Study},
  journal      = {CoRR},
  volume       = {abs/2108.13068},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.13068},
  eprinttype    = {arXiv},
  eprint       = {2108.13068},
  timestamp    = {Thu, 02 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-13068.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmonDKRS21,
  author       = {Ohad Amon and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Three Third Generation Attacks on the Format Preserving Encryption
                  Scheme {FF3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/335},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmonDKRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanEKKLS21,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical Key Recovery Attacks on FlexAEAD},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/931},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanEKKLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshD21,
  author       = {Shibam Ghosh and
                  Orr Dunkelman},
  title        = {Automatic Search for Bit-based Division Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {965},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/965},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKRS21,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Quantum Time/Memory/Data Tradeoff Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1561},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1561},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKLS20,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eran Lambooij and
                  Yu Sasaki},
  title        = {A Practical Forgery Attack on Lilliput-AE},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {910--916},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09333-z},
  doi          = {10.1007/S00145-019-09333-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DunkelmanKLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bar-OnDKRS20,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
                  Data and Memory Complexities},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {1003--1043},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09336-w},
  doi          = {10.1007/S00145-019-09336-W},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Bar-OnDKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/Bar-OnDDHKRS20,
  author       = {Achiya Bar{-}On and
                  Itai Dinur and
                  Orr Dunkelman and
                  Rani Hod and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Tight Bounds on Online Checkpointing Algorithms},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {16},
  number       = {3},
  pages        = {31:1--31:22},
  year         = {2020},
  url          = {https://doi.org/10.1145/3379543},
  doi          = {10.1145/3379543},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/talg/Bar-OnDDHKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/DunkelmanHLP20,
  author       = {Orr Dunkelman and
                  Senyang Huang and
                  Eran Lambooij and
                  Stav Perle},
  editor       = {Shlomi Dolev and
                  Vladimir Kolesnikov and
                  Sachin Lodha and
                  Gera Weiss},
  title        = {Single Tweakey Cryptanalysis of Reduced-Round {SKINNY-64}},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Fourth International
                  Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12161},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49785-9\_1},
  doi          = {10.1007/978-3-030-49785-9\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/DunkelmanHLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKLS20,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Noam Lasry and
                  Adi Shamir},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {New Slide Attacks on Almost Self-similar Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {250--279},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_10},
  doi          = {10.1007/978-3-030-45721-1\_10},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {The Retracing Boomerang Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {280--309},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_11},
  doi          = {10.1007/978-3-030-45721-1\_11},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Dunkelman0LS20,
  author       = {Orr Dunkelman and
                  Abhishek Kumar and
                  Eran Lambooij and
                  Somitra Kumar Sanadhya},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Counting Active S-Boxes is not Enough},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {332--344},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_15},
  doi          = {10.1007/978-3-030-65277-7\_15},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Dunkelman0LS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-03675,
  author       = {Orr Dunkelman and
                  Zeev Geyzel and
                  Chaya Keller and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir and
                  Ran J. Tessler},
  title        = {Consistent High Dimensional Rounding with Side Information},
  journal      = {CoRR},
  volume       = {abs/2008.03675},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.03675},
  eprinttype    = {arXiv},
  eprint       = {2008.03675},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-03675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13293,
  author       = {Danny Keller and
                  Margarita Osadchy and
                  Orr Dunkelman},
  title        = {Fuzzy Commitments Offer Insufficient Protection to Biometric Templates
                  Produced by Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2012.13293},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13293},
  eprinttype    = {arXiv},
  eprint       = {2012.13293},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanHLP20,
  author       = {Orr Dunkelman and
                  Senyang Huang and
                  Eran Lambooij and
                  Stav Perle},
  title        = {Single Tweakey Cryptanalysis of Reduced-Round {SKINNY-64}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/689},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanHLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKLS20,
  author       = {Orr Dunkelman and
                  Abhishek Kumar and
                  Eran Lambooij and
                  Somitra Kumar Sanadhya},
  title        = {Cryptanalysis of Feistel-Based Format-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1311},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1311},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DinurDKS19,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1448--1490},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9303-2},
  doi          = {10.1007/S00145-018-9303-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DinurDKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OsadchyD19,
  author       = {Margarita Osadchy and
                  Orr Dunkelman},
  title        = {It is All in the System's Parameters: Privacy and Security Issues
                  in Transforming Biometric Raw Data into Binary Strings},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {796--804},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2018.2804949},
  doi          = {10.1109/TDSC.2018.2804949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OsadchyD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DunkelmanH19,
  author       = {Orr Dunkelman and
                  Senyang Huang},
  title        = {Reconstructing an S-box from its Difference Distribution Table},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {193--217},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.193-217},
  doi          = {10.13154/TOSC.V2019.I2.193-217},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DunkelmanH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/AshurDM19,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Nael Masalha},
  editor       = {Shlomi Dolev and
                  Danny Hendler and
                  Sachin Lodha and
                  Moti Yung},
  title        = {Linear Cryptanalysis Reduced Round of Piccolo-80},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Third International
                  Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11527},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20951-3\_2},
  doi          = {10.1007/978-3-030-20951-3\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/AshurDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Bar-OnDKW19,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Ariel Weizman},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {{DLCT:} {A} New Tool for Differential-Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {313--342},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_11},
  doi          = {10.1007/978-3-030-17653-2\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Bar-OnDKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/DunkelmanP19,
  author       = {Orr Dunkelman and
                  L{\'{e}}o Perrin},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving"
                  Designs},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360335},
  doi          = {10.1145/3338500.3360335},
  timestamp    = {Wed, 11 Aug 2021 15:12:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/DunkelmanP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2017,
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25283-0},
  doi          = {10.1007/978-3-030-25283-0},
  isbn         = {978-3-030-25282-3},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-10861,
  author       = {Adi Shamir and
                  Itay Safran and
                  Eyal Ronen and
                  Orr Dunkelman},
  title        = {A Simple Explanation for the Existence of Adversarial Examples with
                  Small Hamming Distance},
  journal      = {CoRR},
  volume       = {abs/1901.10861},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.10861},
  eprinttype    = {arXiv},
  eprint       = {1901.10861},
  timestamp    = {Sun, 03 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-10861.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-01240,
  author       = {Rami Ailabouni and
                  Orr Dunkelman and
                  Sara Bitan},
  title        = {DNS-Morph: UDP-Based Bootstrapping Protocol For Tor},
  journal      = {CoRR},
  volume       = {abs/1904.01240},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.01240},
  eprinttype    = {arXiv},
  eprint       = {1904.01240},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-01240.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDKW19,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Ariel Weizman},
  title        = {{DLCT:} {A} New Tool for Differential-Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnDKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKLS19,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Noam Lasry and
                  Adi Shamir},
  title        = {New Slide Attacks on Almost Self-Similar Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKLS19a,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eran Lambooij and
                  Yu Sasaki},
  title        = {A Practical Forgery Attack on Lilliput-AE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKLS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKRS19,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {The Retracing Boomerang Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1154},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanP19,
  author       = {Orr Dunkelman and
                  L{\'{e}}o Perrin},
  title        = {Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving"
                  Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bar-OnBDK18,
  author       = {Achiya Bar{-}On and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Efficient Slide Attacks},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {3},
  pages        = {641--670},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9266-8},
  doi          = {10.1007/S00145-017-9266-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Bar-OnBDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
                  Data and Memory Complexities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {185--212},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_7},
  doi          = {10.1007/978-3-319-96881-0\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/DunkelmanW18,
  author       = {Orr Dunkelman and
                  Ariel Weizman},
  editor       = {Itai Dinur and
                  Shlomi Dolev and
                  Sachin Lodha},
  title        = {Efficient Construction of the Kite Generator Revisited},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Second International
                  Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10879},
  pages        = {6--19},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94147-9\_2},
  doi          = {10.1007/978-3-319-94147-9\_2},
  timestamp    = {Sat, 19 Oct 2019 20:25:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/DunkelmanW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecon/MovsowitzFABD18,
  author       = {Danielle Movsowitz and
                  Liran Funaro and
                  Shunit Agmon and
                  Orna Agmon Ben{-}Yehuda and
                  Orr Dunkelman},
  editor       = {Massimo Coppola and
                  Emanuele Carlini and
                  Daniele D'Agostino and
                  J{\"{o}}rn Altmann and
                  Jos{\'{e}} {\'{A}}ngel Ba{\~{n}}ares},
  title        = {Why Are Repeated Auctions in RaaS Clouds Risky?},
  booktitle    = {Economics of Grids, Clouds, Systems, and Services - 15th International
                  Conference, {GECON} 2018, Pisa, Italy, September 18-20, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11113},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-13342-9\_4},
  doi          = {10.1007/978-3-030-13342-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/gecon/MovsowitzFABD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18,
  author       = {Achiya Bar{-}On and
                  Itai Dinur and
                  Orr Dunkelman and
                  Rani Hod and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  editor       = {Ioannis Chatzigiannakis and
                  Christos Kaklamanis and
                  D{\'{a}}niel Marx and
                  Donald Sannella},
  title        = {Tight Bounds on Online Checkpointing Algorithms},
  booktitle    = {45th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic},
  series       = {LIPIcs},
  volume       = {107},
  pages        = {13:1--13:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2018.13},
  doi          = {10.4230/LIPICS.ICALP.2018.13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Bar-OnDDHKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDKRS18,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
                  Data and Memory Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dunkelman18,
  author       = {Orr Dunkelman},
  title        = {Efficient Construction of the Boomerang Connection Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dunkelman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanH18,
  author       = {Orr Dunkelman and
                  Senyang Huang},
  title        = {Reconstructing an S-box from its Difference Distribution Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {811},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/811},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/OsadchyHGDP17,
  author       = {Margarita Osadchy and
                  Julio C. Hernandez{-}Castro and
                  Stuart J. Gibson and
                  Orr Dunkelman and
                  Daniel P{\'{e}}rez{-}Cabo},
  title        = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial
                  Examples, With Applications to {CAPTCHA} Generation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2640--2653},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2718479},
  doi          = {10.1109/TIFS.2017.2718479},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/OsadchyHGDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/AshurBD17,
  author       = {Tomer Ashur and
                  Achiya Bar{-}On and
                  Orr Dunkelman},
  title        = {Cryptanalysis of {GOST2}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {203--214},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.203-214},
  doi          = {10.13154/TOSC.V2017.I1.203-214},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/AshurBD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AshurDL17,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Atul Luykx},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Boosting Authenticated Encryption Robustness with Minimal Modifications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_1},
  doi          = {10.1007/978-3-319-63697-9\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AshurDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/OsadchyWDGHS17,
  author       = {Margarita Osadchy and
                  Yan Wang and
                  Orr Dunkelman and
                  Stuart J. Gibson and
                  Julio C. Hernandez{-}Castro and
                  Christopher J. Solomon},
  editor       = {Shlomi Dolev and
                  Sachin Lodha},
  title        = {GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation},
  booktitle    = {Cyber Security Cryptography and Machine Learning - First International
                  Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10332},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60080-2\_2},
  doi          = {10.1007/978-3-319-60080-2\_2},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/OsadchyWDGHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChoCDDKMV17,
  author       = {Jihoon Cho and
                  Kyu Young Choi and
                  Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Dukjae Moon and
                  Aviya Veidberg},
  editor       = {Helena Handschuh},
  title        = {{WEM:} {A} New Family of White-Box Block Ciphers Based on the Even-Mansour
                  Construction},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_17},
  doi          = {10.1007/978-3-319-52153-4\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChoCDDKMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WeizmannDH17,
  author       = {Ariel Weizman and
                  Orr Dunkelman and
                  Simi Haber},
  editor       = {Arpita Patra and
                  Nigel P. Smart},
  title        = {Efficient Construction of Diamond Structures},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
                  on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10698},
  pages        = {166--185},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71667-1\_9},
  doi          = {10.1007/978-3-319-71667-1\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WeizmannDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Bar-OnDDHKRS17,
  author       = {Achiya Bar{-}On and
                  Itai Dinur and
                  Orr Dunkelman and
                  Rani Hod and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Optimal Backup Strategies Against Cyber Attacks},
  journal      = {CoRR},
  volume       = {abs/1704.02659},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02659},
  eprinttype    = {arXiv},
  eprint       = {1704.02659},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Bar-OnDDHKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurBD17,
  author       = {Tomer Ashur and
                  Dani{\"{e}}l Bodden and
                  Orr Dunkelman},
  title        = {Linear Cryptanalysis Using Low-bias Linear Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurBD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurDL17,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Atul Luykx},
  title        = {Boosting Authenticated Encryption Robustness With Minimal Modifications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurDL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/0001BDFHKSZ16,
  author       = {Elena Andreeva and
                  Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Jonathan J. Hoch and
                  John Kelsey and
                  Adi Shamir and
                  S{\'{e}}bastien Zimmer},
  title        = {New Second-Preimage Attacks on Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {4},
  pages        = {657--696},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9206-4},
  doi          = {10.1007/S00145-015-9206-4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/0001BDFHKSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DinurDKS16,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {4},
  pages        = {697--728},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9207-3},
  doi          = {10.1007/S00145-015-9207-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DinurDKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ChoCDKMV16,
  author       = {Jihoon Cho and
                  Kyu Young Choi and
                  Orr Dunkelman and
                  Nathan Keller and
                  Dukjae Moon and
                  Aviya Vaidberg},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Hybrid {WBC:} Secure and Efficient White-Box Encryption Schemes},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {749--754},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_55},
  doi          = {10.1007/978-3-319-48965-0\_55},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ChoCDKMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS16,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Memory-Efficient Algorithms for Finding Needles in Haystacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_7},
  doi          = {10.1007/978-3-662-53008-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurDKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BarhamDLS16,
  author       = {Muhammad Barham and
                  Orr Dunkelman and
                  Stefan Lucks and
                  Marc Stevens},
  editor       = {Roberto Avanzi and
                  Howard M. Heys},
  title        = {New Second Preimage Attacks on Dithered Hash Functions with Low Memory
                  Complexity},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
                  St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10532},
  pages        = {247--263},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-69453-5\_14},
  doi          = {10.1007/978-3-319-69453-5\_14},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BarhamDLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/AshurDT16,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Nimrod Talmon},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Jordi Barrat and
                  Josh Benaloh and
                  Nicole J. Goodman and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  title        = {Breaching the Privacy of Israel's Paper Ballot Voting System},
  booktitle    = {Electronic Voting - First International Joint Conference, E-Vote-ID
                  2016, Bregenz, Austria, October 18-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10141},
  pages        = {108--124},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-52240-1\_7},
  doi          = {10.1007/978-3-319-52240-1\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/AshurDT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2016,
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4},
  doi          = {10.1007/978-3-319-49890-4},
  isbn         = {978-3-319-49889-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2015,
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31301-6},
  doi          = {10.1007/978-3-319-31301-6},
  isbn         = {978-3-319-31300-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AshurDT16,
  author       = {Tomer Ashur and
                  Orr Dunkelman and
                  Nimrod Talmon},
  title        = {Breaching the Privacy of Israel's Paper Ballot Voting System},
  journal      = {CoRR},
  volume       = {abs/1608.08020},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.08020},
  eprinttype    = {arXiv},
  eprint       = {1608.08020},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AshurDT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/OhanaDGO16,
  author       = {Mor Ohana and
                  Orr Dunkelman and
                  Stuart J. Gibson and
                  Margarita Osadchy},
  title        = {HoneyFaces: Increasing the Security and Privacy of Authentication
                  Using Synthetic Facial Images},
  journal      = {CoRR},
  volume       = {abs/1611.03811},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.03811},
  eprinttype    = {arXiv},
  eprint       = {1611.03811},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/OhanaDGO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OsadchyHGDe16,
  author       = {Margarita Osadchy and
                  Julio C. Hernandez{-}Castro and
                  Stuart J. Gibson and
                  Orr Dunkelman and
                  Daniel P{\'{e}}rez{-}Cabo},
  title        = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial
                  Examples with Applications to {CAPTCHA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/336},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OsadchyHGDe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurBD16,
  author       = {Tomer Ashur and
                  Achiya Bar{-}On and
                  Orr Dunkelman},
  title        = {Cryptanalysis of {GOST2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS16,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Memory-Efficient Algorithms for Finding Needles in Haystacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoCDKMV16,
  author       = {Jihoon Cho and
                  Kyu Young Choi and
                  Orr Dunkelman and
                  Nathan Keller and
                  Dukjae Moon and
                  Aviya Vaidberg},
  title        = {Hybrid {WBC:} Secure and Efficient White-Box Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/679},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoCDKMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnBDK16,
  author       = {Achiya Bar{-}On and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Efficient Slide Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnBDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanKS15,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Almost universal forgery attacks on AES-based MAC's},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {3},
  pages        = {431--449},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9969-x},
  doi          = {10.1007/S10623-014-9969-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanK15,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Practical-time attacks against reduced variants of {MISTY1}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {3},
  pages        = {601--627},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9980-2},
  doi          = {10.1007/S10623-014-9980-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DinurDKS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Reflections on slide with a twist attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {633--651},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0098-y},
  doi          = {10.1007/S10623-015-0098-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DinurDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKS15,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Slidex Attacks on the Even-Mansour Encryption Scheme},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {1},
  pages        = {1--28},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9164-7},
  doi          = {10.1007/S00145-013-9164-7},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DunkelmanKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamDKS15,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Attacks on {IDEA} with at Least 6 Rounds},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {209--239},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9162-9},
  doi          = {10.1007/S00145-013-9162-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKS15a,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Improved Single-Key Attacks on 8-Round {AES-192} and {AES-256}},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {3},
  pages        = {397--422},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9159-4},
  doi          = {10.1007/S00145-013-9159-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DunkelmanKS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {New Attacks on Feistel Structures with Improved Memory Complexities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {433--454},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_21},
  doi          = {10.1007/978-3-662-47989-6\_21},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Bar-OnDDLKT15,
  author       = {Achiya Bar{-}On and
                  Itai Dinur and
                  Orr Dunkelman and
                  Virginie Lallemand and
                  Nathan Keller and
                  Boaz Tsaban},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Cryptanalysis of {SP} Networks with Partial Non-Linear Layers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {315--342},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_13},
  doi          = {10.1007/978-3-662-46800-5\_13},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Bar-OnDDLKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/DinurDGS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Masha Gutman and
                  Adi Shamir},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Improved Top-Down Techniques in Differential Cryptanalysis},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {139--156},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_8},
  doi          = {10.1007/978-3-319-22174-8\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/DinurDGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Attacks on Feistel Structures with Improved Memory Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDGS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Masha Gutman and
                  Adi Shamir},
  title        = {Improved Top-Down Techniques in Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKL15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Thorsten Kranz and
                  Gregor Leander},
  title        = {Decomposing the {ASASA} Block Cipher Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/DinurDKS14,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Dissection: a new paradigm for solving bicomposite search problems},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {10},
  pages        = {98--105},
  year         = {2014},
  url          = {https://doi.org/10.1145/2661434},
  doi          = {10.1145/2661434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/DinurDKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DinurDS14,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {Improved Practical Attacks on Round-Reduced Keccak},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {2},
  pages        = {183--209},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-012-9142-5},
  doi          = {10.1007/S00145-012-9142-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DinurDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DunkelmanKS14,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used
                  in {GSM} and 3G Telephony},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {4},
  pages        = {824--849},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9154-9},
  doi          = {10.1007/S00145-013-9154-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DunkelmanKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurDKS14,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {439--457},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_23},
  doi          = {10.1007/978-3-662-45611-8\_23},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DinurDKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDKS14,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Improved Linear Sieving Techniques with Applications to Step-Reduced
                  {LED-64}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {390--410},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_20},
  doi          = {10.1007/978-3-662-46706-0\_20},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDDLT14,
  author       = {Achiya Bar{-}On and
                  Itai Dinur and
                  Orr Dunkelman and
                  Virginie Lallemand and
                  Boaz Tsaban},
  title        = {Improved Analysis of Zorro-Like Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnDDLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS14,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Reflections on Slide with a Twist Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanK13,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Cryptanalysis of the Stream Cipher {LEX}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {67},
  number       = {3},
  pages        = {357--373},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10623-012-9612-7},
  doi          = {10.1007/S10623-012-9612-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DinurDKS13,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and
                  Full {AES2}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {337--356},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_18},
  doi          = {10.1007/978-3-642-42033-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DinurDKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AshurD13,
  author       = {Tomer Ashur and
                  Orr Dunkelman},
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {A Practical Related-Key Boomerang Attack for the Full {MMB} Block
                  Cipher},
  booktitle    = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5\_15},
  doi          = {10.1007/978-3-319-02937-5\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/AshurD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AshurD13,
  author       = {Tomer Ashur and
                  Orr Dunkelman},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {On the anonymity of Israel's general elections},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1399--1402},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512510},
  doi          = {10.1145/2508859.2512510},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AshurD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DunkelmanOS13,
  author       = {Orr Dunkelman and
                  Margarita Osadchy and
                  Mahmood Sharif},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Secure authentication from facial attributeswith no privacy loss},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1403--1406},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512511},
  doi          = {10.1145/2508859.2512511},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DunkelmanOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS13,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  editor       = {Shiho Moriai},
  title        = {Collision Attacks on Up to 5 Rounds of {SHA-3} Using Generalized Internal
                  Differentials},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {219--240},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_12},
  doi          = {10.1007/978-3-662-43933-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS13,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and
                  Full AES\({}^{\mbox{2}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK13,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Practical-Time Attacks Against Reduced Variants of {MISTY1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS13a,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Improved Linear Sieving Techniques with Applications to Step-Reduced
                  {LED-64}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamCDDKS13,
  author       = {Eli Biham and
                  Yaniv Carmeli and
                  Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamCDDKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurD13,
  author       = {Tomer Ashur and
                  Orr Dunkelman},
  title        = {A Practical Related-Key Boomerang Attack for the Full {MMB} Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AertsBMMDIKPVV12,
  author       = {Wim Aerts and
                  Eli Biham and
                  Dieter De Moitie and
                  Elke De Mulder and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Nathan Keller and
                  Bart Preneel and
                  Guy A. E. Vandenbosch and
                  Ingrid Verbauwhede},
  title        = {A Practical Attack on KeeLoq},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {136--157},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9091-9},
  doi          = {10.1007/S00145-010-9091-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KimHPBDK12,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {7},
  pages        = {4948--4966},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2191655},
  doi          = {10.1109/TIT.2012.2191655},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KimHPBDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BouillaguetDDFKR12,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Nathan Keller and
                  Vincent Rijmen},
  title        = {Low-Data Complexity Attacks on {AES}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {11},
  pages        = {7002--7017},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2207880},
  doi          = {10.1109/TIT.2012.2207880},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BouillaguetDDFKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DinurDKS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis,
                  Knapsacks, and Combinatorial Search Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {719--740},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_42},
  doi          = {10.1007/978-3-642-32009-5\_42},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DinurDKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKS12,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {336--354},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_21},
  doi          = {10.1007/978-3-642-29011-4\_21},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  editor       = {Anne Canteaut},
  title        = {Improved Attacks on Full {GOST}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {9--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_2},
  doi          = {10.1007/978-3-642-34047-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DinurDS12a,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  editor       = {Anne Canteaut},
  title        = {New Attacks on Keccak-224 and Keccak-256},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {442--461},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_25},
  doi          = {10.1007/978-3-642-34047-5\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DinurDS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Dunkelman12,
  author       = {Orr Dunkelman},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {From Multiple Encryption to Knapsacks - Efficient Dissection of Composite
                  Problems},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_2},
  doi          = {10.1007/978-3-642-34931-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Dunkelman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2012,
  editor       = {Orr Dunkelman},
  title        = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6},
  doi          = {10.1007/978-3-642-27954-6},
  isbn         = {978-3-642-27953-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis,
                  Knapsacks, and Combinatorial Search Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {Self-Differential Cryptanalysis of Up to 5 Rounds of {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/672},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AshurD11,
  author       = {Tomer Ashur and
                  Orr Dunkelman},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Linear Analysis of Reduced-Round CubeHash},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {462--478},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_27},
  doi          = {10.1007/978-3-642-21554-4\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AshurD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetDFL11,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {New Insights on Impossible Differential Cryptanalysis},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_15},
  doi          = {10.1007/978-3-642-28496-0\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetDFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS11,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {{ALRED} Blues: New Attacks on AES-Based MAC's},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDKS11,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Data-Efficient Attacks on Reduced-Round {IDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS11a,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS11,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {Improved Attacks on Full {GOST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS11a,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {New attacks on Keccak-224 and Keccak-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DunkelmanK10,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {The effects of the omission of last round's MixColumns on {AES}},
  journal      = {Inf. Process. Lett.},
  volume       = {110},
  number       = {8-9},
  pages        = {304--308},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ipl.2010.02.007},
  doi          = {10.1016/J.IPL.2010.02.007},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DunkelmanK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DunkelmanKS10,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Masayuki Abe},
  title        = {Improved Single-Key Attacks on 8-Round {AES-192} and {AES-256}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_10},
  doi          = {10.1007/978-3-642-17373-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DunkelmanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DunkelmanKS10,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  editor       = {Tal Rabin},
  title        = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used
                  in {GSM} and 3G Telephony},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {393--410},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_21},
  doi          = {10.1007/978-3-642-14623-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DunkelmanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BiryukovDKKS10,
  author       = {Alex Biryukov and
                  Orr Dunkelman and
                  Nathan Keller and
                  Dmitry Khovratovich and
                  Adi Shamir},
  editor       = {Henri Gilbert},
  title        = {Key Recovery Attacks of Practical Complexity on {AES-256} Variants
                  with up to 10 Rounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_15},
  doi          = {10.1007/978-3-642-13190-5\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BiryukovDKKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Another Look at Complementation Properties},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {347--364},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_20},
  doi          = {10.1007/978-3-642-13858-4\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Attacks on Hash Functions Based on Generalized Feistel: Application
                  to Reduced-Round \emph{Lesamnta} and \emph{SHAvite-3}\({}_{\mbox{512}}\)},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_2},
  doi          = {10.1007/978-3-642-19574-7\_2},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS10,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {A Practical-Time Attack on the {A5/3} Cryptosystem Used in Third Generation
                  {GSM} Telephony},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimHPBDK10,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK10,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {The Effects of the Omission of Last Round's MixColumns on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS10a,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Improved Single-Key Attacks on 8-round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurD10,
  author       = {Tomer Ashur and
                  Orr Dunkelman},
  title        = {Linear Analysis of Reduced-Round CubeHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDDKRF10,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Nathan Keller and
                  Vincent Rijmen and
                  Pierre{-}Alain Fouque},
  title        = {Low Data Complexity Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvrahamBD10,
  author       = {Uri Avraham and
                  Eli Biham and
                  Orr Dunkelman},
  title        = {{ABC} - {A} New Framework for Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvrahamBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AumassonDMRT09,
  author       = {Jean{-}Philippe Aumasson and
                  Orr Dunkelman and
                  Florian Mendel and
                  Christian Rechberger and
                  S{\o}ren S. Thomsen},
  editor       = {Bart Preneel},
  title        = {Cryptanalysis of Vortex},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_2},
  doi          = {10.1007/978-3-642-02384-2\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AumassonDMRT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CanniereDK09,
  author       = {Christophe De Canni{\`{e}}re and
                  Orr Dunkelman and
                  Miroslav Knezevic},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {{KATAN} and {KTANTAN} - {A} Family of Small and Efficient Hardware-Oriented
                  Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {272--288},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_20},
  doi          = {10.1007/978-3-642-04138-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CanniereDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DunkelmanK09,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  editor       = {Marc Fischlin},
  title        = {Cryptanalysis of {CTC2}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {226--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_15},
  doi          = {10.1007/978-3-642-00862-7\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DunkelmanK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DunkelmanFGL09,
  author       = {Orr Dunkelman and
                  Ewan Fleischmann and
                  Michael Gorski and
                  Stefan Lucks},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Related-Key Rectangle Attack of the Full {HAS-160} Encryption Mode},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {157--168},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_11},
  doi          = {10.1007/978-3-642-10628-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DunkelmanFGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AndreevaBDK09,
  author       = {Elena Andreeva and
                  Charles Bouillaguet and
                  Orr Dunkelman and
                  John Kelsey},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damg{\aa}rd},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {393--414},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_25},
  doi          = {10.1007/978-3-642-05445-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AndreevaBDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AumassonDIP09,
  author       = {Jean{-}Philippe Aumasson and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Cryptanalysis of Dynamic {SHA(2)}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {415--432},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_26},
  doi          = {10.1007/978-3-642-05445-7\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AumassonDIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2009,
  editor       = {Orr Dunkelman},
  title        = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9},
  doi          = {10.1007/978-3-642-03317-9},
  isbn         = {978-3-642-03316-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DunkelmanB09,
  author       = {Orr Dunkelman and
                  Eli Biham},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The SHAvite-3 - {A} New Hash Function},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1947/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DunkelmanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/IndesteegeACDKN09,
  author       = {Sebastiaan Indesteege and
                  Elena Andreeva and
                  Christophe De Canni{\`{e}}re and
                  Orr Dunkelman and
                  Emilia K{\"{a}}sper and
                  Svetla Nikova and
                  Bart Preneel and
                  Elmar Tischhauser},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The Lane hash function},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1952/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/IndesteegeACDKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDFJ09,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Antoine Joux},
  title        = {On the Security of Iterated Hashing based on Forgery-resistant Compression
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonDIP09,
  author       = {Jean{-}Philippe Aumasson and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Bart Preneel},
  title        = {Cryptanalysis of Dynamic {SHA(2)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonDIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovDKKS09,
  author       = {Alex Biryukov and
                  Orr Dunkelman and
                  Nathan Keller and
                  Dmitry Khovratovich and
                  Adi Shamir},
  title        = {Key Recovery Attacks of Practical Complexity on {AES} Variants With
                  Up To 10 Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovDKKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanB09,
  author       = {Orr Dunkelman and
                  Tor E. Bj{\o}rstad},
  title        = {Practical Attacks on {NESHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDLF09,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  title        = {Attacks on Hash Functions based on Generalized Feistel - Application
                  to Reduced-Round Lesamnta and SHAvite-3\({}_{\mbox{512}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDLF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DunkelmanK08,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Treatment of the initial value in Time-Memory-Data Tradeoff attacks
                  on stream ciphers},
  journal      = {Inf. Process. Lett.},
  volume       = {107},
  number       = {5},
  pages        = {133--137},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ipl.2008.01.011},
  doi          = {10.1016/J.IPL.2008.01.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DunkelmanK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DunkelmanK08,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  editor       = {Josef Pieprzyk},
  title        = {An Improved Impossible Differential Attack on {MISTY1}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_27},
  doi          = {10.1007/978-3-540-89255-7\_27},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DunkelmanK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DunkelmanK08a,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  editor       = {Josef Pieprzyk},
  title        = {A New Attack on the {LEX} Stream Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {539--556},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_33},
  doi          = {10.1007/978-3-540-89255-7\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DunkelmanK08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LuKKD08,
  author       = {Jiqiang Lu and
                  Jongsung Kim and
                  Nathan Keller and
                  Orr Dunkelman},
  editor       = {Tal Malkin},
  title        = {Improving the Efficiency of Impossible Differential Cryptanalysis
                  of Reduced Camellia and {MISTY1}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {370--386},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_24},
  doi          = {10.1007/978-3-540-79263-5\_24},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LuKKD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IndesteegeKDBP08,
  author       = {Sebastiaan Indesteege and
                  Nathan Keller and
                  Orr Dunkelman and
                  Eli Biham and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {A Practical Attack on KeeLoq},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_1},
  doi          = {10.1007/978-3-540-78967-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK08,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Kaisa Nyberg},
  title        = {A Unified Approach to Related-Key Attacks},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_5},
  doi          = {10.1007/978-3-540-71039-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TozD08,
  author       = {Deniz Toz and
                  Orr Dunkelman},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Analysis of Two Attacks on Reduced-Round Versions of the {SMS4}},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_10},
  doi          = {10.1007/978-3-540-88625-9\_10},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TozD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LuDKK08,
  author       = {Jiqiang Lu and
                  Orr Dunkelman and
                  Nathan Keller and
                  Jongsung Kim},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {New Impossible Differential Attacks on {AES}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {279--293},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_22},
  doi          = {10.1007/978-3-540-89754-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LuDKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DunkelmanIK08,
  author       = {Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Nathan Keller},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {A Differential-Linear Attack on 12-Round Serpent},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {308--321},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_24},
  doi          = {10.1007/978-3-540-89754-5\_24},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DunkelmanIK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK08,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks
                  on Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuDKK08,
  author       = {Jiqiang Lu and
                  Orr Dunkelman and
                  Nathan Keller and
                  Jongsung Kim},
  title        = {New Impossible Differential Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuDKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DunkelmanK07,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {A New Criterion for Nonlinearity of Block Ciphers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {11},
  pages        = {3944--3957},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.907341},
  doi          = {10.1109/TIT.2007.907341},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DunkelmanK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BihamDK07,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Masayuki Abe},
  title        = {A Simple Related-Key Attack on the Full {SHACAL-1}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {20--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_2},
  doi          = {10.1007/11967668\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BihamDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK07,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Alex Biryukov},
  title        = {Improved Slide Attacks},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {153--166},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_10},
  doi          = {10.1007/978-3-540-74619-5\_10},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK07a,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Alex Biryukov},
  title        = {A New Attack on 6-Round {IDEA}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_14},
  doi          = {10.1007/978-3-540-74619-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TroncosoDDP07,
  author       = {Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Orr Dunkelman and
                  Bart Preneel},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Traffic Analysis Attacks on a Continuously-Observable Steganographic
                  File System},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_15},
  doi          = {10.1007/978-3-540-77370-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DunkelmanSP07,
  author       = {Orr Dunkelman and
                  Gautham Sekar and
                  Bart Preneel},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Improved Meet-in-the-Middle Attacks on Reduced-Round {DES}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_8},
  doi          = {10.1007/978-3-540-77026-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DunkelmanSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WangKD07,
  author       = {Gaoli Wang and
                  Nathan Keller and
                  Orr Dunkelman},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {The Delicate Issues of Addition with Respect to {XOR} Differences},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {212--231},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_14},
  doi          = {10.1007/978-3-540-77360-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WangKD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamD07,
  author       = {Eli Biham and
                  Orr Dunkelman},
  title        = {Differential Cryptanalysis in Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamD07a,
  author       = {Eli Biham and
                  Orr Dunkelman},
  title        = {A Framework for Iterative Hash Functions - {HAIFA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamD07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/il/Dunkelman06,
  author       = {Orr Dunkelman},
  title        = {Techniques for cryptanalysis of block ciphers},
  school       = {Technion - Israel Institute of Technology, Israel},
  year         = {2006},
  url          = {https://technion.primo.exlibrisgroup.com/permalink/972TEC\_INST/q1jq5o/alma990022790690203971},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/il/Dunkelman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamDK06,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {New Cryptanalytic Results on {IDEA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {412--427},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_27},
  doi          = {10.1007/11935230\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BihamDK06,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {David Pointcheval},
  title        = {Related-Key Impossible Differential Attacks on 8-Round {AES-192}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {21--33},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_2},
  doi          = {10.1007/11605805\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BihamDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DunkelmanK06,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  editor       = {David Pointcheval},
  title        = {A New Criterion for Nonlinearity of Block Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_19},
  doi          = {10.1007/11605805\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DunkelmanK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LuKKD06,
  author       = {Jiqiang Lu and
                  Jongsung Kim and
                  Nathan Keller and
                  Orr Dunkelman},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Differential and Rectangle Attacks on Reduced-Round {SHACAL-1}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_3},
  doi          = {10.1007/11941378\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LuKKD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuKKD06,
  author       = {Jiqiang Lu and
                  Jongsung Kim and
                  Nathan Keller and
                  Orr Dunkelman},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Related-Key Rectangle Attack on 42-Round {SHACAL-2}},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_7},
  doi          = {10.1007/11836810\_7},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LuKKD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DunkelmanKK06,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Jongsung Kim},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Related-Key Rectangle Attack on the Full {SHACAL-1}},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {28--44},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_3},
  doi          = {10.1007/978-3-540-74462-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DunkelmanKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK06,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Linear Cryptanalysis of {CTC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Bimal K. Roy},
  title        = {A Related-Key Rectangle Attack on the Full {KASUMI}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {443--461},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_24},
  doi          = {10.1007/11593447\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Ronald Cramer},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {507--525},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_30},
  doi          = {10.1007/11426639\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {New Combined Attacks on Block Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {126--144},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_9},
  doi          = {10.1007/11502760\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK03,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Thomas Johansson},
  title        = {Differential-Linear Cryptanalysis of Serpent},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {9--21},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_2},
  doi          = {10.1007/978-3-540-39887-5\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK03a,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Thomas Johansson},
  title        = {Rectangle Attacks on 49-Round {SHACAL-1}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_3},
  doi          = {10.1007/978-3-540-39887-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Yuliang Zheng},
  title        = {Enhancing Differential-Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {254--266},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_16},
  doi          = {10.1007/3-540-36178-2\_16},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {New Results on Boomerang and Rectangle Attacks},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_1},
  doi          = {10.1007/3-540-45661-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/YanamiSD02,
  author       = {Hitoshi Yanami and
                  Takeshi Shimoyama and
                  Orr Dunkelman},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Differential and Linear Cryptanalysis of a Reduced-Round {SC2000}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_3},
  doi          = {10.1007/3-540-45661-9\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/YanamiSD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {New Results on Boomerang and Rectangle Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Birgit Pfitzmann},
  title        = {The Rectangle Attack - Rectangling the Serpent},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {340--357},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_21},
  doi          = {10.1007/3-540-44987-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Mitsuru Matsui},
  title        = {Linear Cryptanalysis of Reduced Round Serpent},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_2},
  doi          = {10.1007/3-540-45473-X\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {The Rectangle Attack - Rectangling the Serpent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BihamD00,
  author       = {Eli Biham and
                  Orr Dunkelman},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Cryptanalysis of the {A5/1} {GSM} Stream Cipher},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {43--51},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_5},
  doi          = {10.1007/3-540-44495-5\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BihamD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BihamBDRS98,
  author       = {Eli Biham and
                  Alex Biryukov and
                  Orr Dunkelman and
                  Eran Richardson and
                  Adi Shamir},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {362--376},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_27},
  doi          = {10.1007/3-540-48892-8\_27},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BihamBDRS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics