Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Orr Dunkelman
@article{DBLP:journals/dcc/DunkelmanKRS24, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Quantum time/memory/data tradeoff attacks}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {159--177}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01300-x}, doi = {10.1007/S10623-023-01300-X}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanKRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GuoWDPL23, author = {Zhenzhen Guo and Gaoli Wang and Orr Dunkelman and Yinxue Pan and Shengyuan Liu}, title = {Tweakable {SM4:} How to tweak {SM4} into tweakable block ciphers?}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103406}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103406}, doi = {10.1016/J.JISA.2022.103406}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GuoWDPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DunkelmanGL23, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, title = {Attacking the {IETF/ISO} Standard for Internal Re-keying {CTR-ACPKM}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {1}, pages = {41--66}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i1.41-66}, doi = {10.46586/TOSC.V2023.I1.41-66}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DunkelmanGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DunkelmanGL23a, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, title = {Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {176--188}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.176-188}, doi = {10.46586/TOSC.V2023.I2.176-188}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DunkelmanGL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AvanziBDEGNR23, author = {Roberto Avanzi and Subhadeep Banik and Orr Dunkelman and Maria Eichlseder and Shibam Ghosh and Marcel Nageler and Francesco Regazzoni}, title = {The QARMAv2 Family of Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {25--73}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.25-73}, doi = {10.46586/TOSC.V2023.I3.25-73}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AvanziBDEGNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DunkelmanKW23, author = {Orr Dunkelman and Nathan Keller and Ariel Weizman}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Practical-Time Related-Key Attack on {GOST} with Secret S-Boxes}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {177--208}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_7}, doi = {10.1007/978-3-031-38548-3\_7}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DunkelmanKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DinurDKRS23, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Carmit Hazay and Martijn Stam}, title = {Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {98--127}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_4}, doi = {10.1007/978-3-031-30634-1\_4}, timestamp = {Thu, 20 Apr 2023 11:35:02 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DinurDKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/Movsowitz-Davidow23, author = {Danielle Movsowitz{-}Davidow and Orna Agmon Ben{-}Yehuda and Orr Dunkelman}, editor = {Ali Raza Butt and Ningfang Mi and Kyle Chard}, title = {Deconstructing Alibaba Cloud's Preemptible Instance Pricing}, booktitle = {Proceedings of the 32nd International Symposium on High-Performance Parallel and Distributed Computing, {HPDC} 2023, Orlando, FL, USA, June 16-23, 2023}, pages = {253--265}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3588195.3593001}, doi = {10.1145/3588195.3593001}, timestamp = {Fri, 18 Aug 2023 10:01:36 +0200}, biburl = {https://dblp.org/rec/conf/hpdc/Movsowitz-Davidow23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanGL23, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, title = {Attacking the {IETF/ISO} Standard for Internal Re-keying {CTR-ACPKM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2023}, url = {https://eprint.iacr.org/2023/230}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKRS23, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2023}, url = {https://eprint.iacr.org/2023/288}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKW23, author = {Orr Dunkelman and Nathan Keller and Ariel Weizman}, title = {Practical-Time Related-Key Attack on {GOST} with Secret S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2023}, url = {https://eprint.iacr.org/2023/374}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziBDEGNR23, author = {Roberto Avanzi and Subhadeep Banik and Orr Dunkelman and Maria Eichlseder and Shibam Ghosh and Marcel Nageler and Francesco Regazzoni}, title = {The tweakable block cipher family QARMAv2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2023}, url = {https://eprint.iacr.org/2023/929}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziBDEGNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanGKLMM23, author = {Orr Dunkelman and Shibam Ghosh and Nathan Keller and Ga{\"{e}}tan Leurent and Avichai Marmor and Victor Mollimard}, title = {Partial Sums Meet {FFT:} Improved Attack on 6-Round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1659}, year = {2023}, url = {https://eprint.iacr.org/2023/1659}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanGKLMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanW23, author = {Orr Dunkelman and Ariel Weizman}, title = {Another Look at Differential-Linear Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1675}, year = {2023}, url = {https://eprint.iacr.org/2023/1675}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanEKKLS22, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical key recovery attacks on FlexAEAD}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {983--1007}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01023-5}, doi = {10.1007/S10623-022-01023-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuangBDM22, author = {Senyang Huang and Orna Agmon Ben{-}Yehuda and Orr Dunkelman and Alexander Maximov}, title = {Finding Collisions against 4-Round {SHA-3-384} in Practical Time}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {239--270}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.239-270}, doi = {10.46586/TOSC.V2022.I3.239-270}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HuangBDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DunkelmanGL22, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, editor = {Takanori Isobe and Santanu Sarkar}, title = {Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-Permutation in the Known-Key Setting}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {349--372}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_16}, doi = {10.1007/978-3-031-22912-1\_16}, timestamp = {Mon, 09 Jan 2023 17:58:33 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/DunkelmanGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/systor/Movsowitz-Davidow22, author = {Danielle Movsowitz{-}Davidow and Orna Agmon Ben{-}Yehuda and Orr Dunkelman}, editor = {Michal Malka and Hillel Kolodner and Frank Bellosa and Moshe Gabel}, title = {Sharp behavioral changes in preemptible instance pricing}, booktitle = {{SYSTOR} '22: The 15th {ACM} International Systems and Storage Conference, Haifa, Israel, June 13 - 15, 2022}, pages = {145}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3534056.3535001}, doi = {10.1145/3534056.3535001}, timestamp = {Mon, 13 Jun 2022 17:06:26 +0200}, biburl = {https://dblp.org/rec/conf/systor/Movsowitz-Davidow22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2022-1, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4}, doi = {10.1007/978-3-031-06944-4}, isbn = {978-3-031-06943-7}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2022-2, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3}, doi = {10.1007/978-3-031-07085-3}, isbn = {978-3-031-07084-6}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2022-3, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2}, doi = {10.1007/978-3-031-07082-2}, isbn = {978-3-031-07081-5}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangBDM22, author = {Senyang Huang and Orna Agmon Ben{-}Yehuda and Orr Dunkelman and Alexander Maximov}, title = {Finding Collisions against 4-round {SHA3-384} in Practical Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2022}, url = {https://eprint.iacr.org/2022/194}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangBDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanLG22, author = {Orr Dunkelman and Eran Lambooij and Shibam Ghosh}, title = {Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1122}, year = {2022}, url = {https://eprint.iacr.org/2022/1122}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanGL22, author = {Orr Dunkelman and Shibam Ghosh and Eran Lambooij}, title = {Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1567}, year = {2022}, url = {https://eprint.iacr.org/2022/1567}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/DunkelmanHLP21, author = {Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle}, title = {Biased differential distinguisher - Cryptanalysis of reduced-round {SKINNY}}, journal = {Inf. Comput.}, volume = {281}, pages = {104796}, year = {2021}, url = {https://doi.org/10.1016/j.ic.2021.104796}, doi = {10.1016/J.IC.2021.104796}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/DunkelmanHLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KellerOD21, author = {Danny Keller and Margarita Osadchy and Orr Dunkelman}, title = {Inverting Binarizations of Facial Templates Produced by Deep Learning (and Its Implications)}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4184--4196}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3103056}, doi = {10.1109/TIFS.2021.3103056}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KellerOD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/AilabouniDB21, author = {Rami Ailabouni and Orr Dunkelman and Sara Bitan}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {DNS-Morph: UDP-Based Bootstrapping Protocol for Tor}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {244--265}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_19}, doi = {10.1007/978-3-030-78086-9\_19}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/AilabouniDB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AmonDKRS21, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme {FF3}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {127--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_5}, doi = {10.1007/978-3-030-77886-6\_5}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AmonDKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DunkelmanGKKRST21, author = {Orr Dunkelman and Zeev Geyzel and Chaya Keller and Nathan Keller and Eyal Ronen and Adi Shamir and Ran J. Tessler}, editor = {Nikhil Bansal and Emanuela Merelli and James Worrell}, title = {Error Resilient Space Partitioning (Invited Talk)}, booktitle = {48th International Colloquium on Automata, Languages, and Programming, {ICALP} 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference)}, series = {LIPIcs}, volume = {198}, pages = {4:1--4:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2021.4}, doi = {10.4230/LIPICS.ICALP.2021.4}, timestamp = {Tue, 15 Feb 2022 07:54:27 +0100}, biburl = {https://dblp.org/rec/conf/icalp/DunkelmanGKKRST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GhoshD21, author = {Shibam Ghosh and Orr Dunkelman}, editor = {Patrick Longa and Carla R{\`{a}}fols}, title = {Automatic Search for Bit-Based Division Property}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogot{\'{a}}, Colombia, October 6-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12912}, pages = {254--274}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88238-9\_13}, doi = {10.1007/978-3-030-88238-9\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/GhoshD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2020, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81652-0}, doi = {10.1007/978-3-030-81652-0}, isbn = {978-3-030-81651-3}, timestamp = {Thu, 22 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-13068, author = {Mor Peleg and Amnon Reichman and Sivan Shachar and Tamir Gadot and Meytal Avgil Tsadok and Maya Azaria and Orr Dunkelman and Shiri Hassid and Daniella Partem and Maya Shmailov and Elad Yom{-}Tov and Roy Cohen}, title = {{COVID-19} Datathon Based on Deidentified Governmental Data as an Approach for Solving Policy Challenges, Increasing Trust, and Building a Community: Case Study}, journal = {CoRR}, volume = {abs/2108.13068}, year = {2021}, url = {https://arxiv.org/abs/2108.13068}, eprinttype = {arXiv}, eprint = {2108.13068}, timestamp = {Thu, 02 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-13068.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmonDKRS21, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme {FF3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2021}, url = {https://eprint.iacr.org/2021/335}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmonDKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanEKKLS21, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical Key Recovery Attacks on FlexAEAD}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2021}, url = {https://eprint.iacr.org/2021/931}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanEKKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshD21, author = {Shibam Ghosh and Orr Dunkelman}, title = {Automatic Search for Bit-based Division Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {965}, year = {2021}, url = {https://eprint.iacr.org/2021/965}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKRS21, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Quantum Time/Memory/Data Tradeoff Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1561}, year = {2021}, url = {https://eprint.iacr.org/2021/1561}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DunkelmanKLS20, author = {Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki}, title = {A Practical Forgery Attack on Lilliput-AE}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {910--916}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09333-z}, doi = {10.1007/S00145-019-09333-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DunkelmanKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bar-OnDKRS20, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {1003--1043}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09336-w}, doi = {10.1007/S00145-019-09336-W}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Bar-OnDKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/Bar-OnDDHKRS20, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Rani Hod and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Tight Bounds on Online Checkpointing Algorithms}, journal = {{ACM} Trans. Algorithms}, volume = {16}, number = {3}, pages = {31:1--31:22}, year = {2020}, url = {https://doi.org/10.1145/3379543}, doi = {10.1145/3379543}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/talg/Bar-OnDDHKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/DunkelmanHLP20, author = {Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle}, editor = {Shlomi Dolev and Vladimir Kolesnikov and Sachin Lodha and Gera Weiss}, title = {Single Tweakey Cryptanalysis of Reduced-Round {SKINNY-64}}, booktitle = {Cyber Security Cryptography and Machine Learning - Fourth International Symposium, {CSCML} 2020, Be'er Sheva, Israel, July 2-3, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12161}, pages = {1--17}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49785-9\_1}, doi = {10.1007/978-3-030-49785-9\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/DunkelmanHLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKLS20, author = {Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir}, editor = {Anne Canteaut and Yuval Ishai}, title = {New Slide Attacks on Almost Self-similar Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {250--279}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_10}, doi = {10.1007/978-3-030-45721-1\_10}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Anne Canteaut and Yuval Ishai}, title = {The Retracing Boomerang Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {280--309}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_11}, doi = {10.1007/978-3-030-45721-1\_11}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Dunkelman0LS20, author = {Orr Dunkelman and Abhishek Kumar and Eran Lambooij and Somitra Kumar Sanadhya}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Counting Active S-Boxes is not Enough}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {332--344}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_15}, doi = {10.1007/978-3-030-65277-7\_15}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Dunkelman0LS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-03675, author = {Orr Dunkelman and Zeev Geyzel and Chaya Keller and Nathan Keller and Eyal Ronen and Adi Shamir and Ran J. Tessler}, title = {Consistent High Dimensional Rounding with Side Information}, journal = {CoRR}, volume = {abs/2008.03675}, year = {2020}, url = {https://arxiv.org/abs/2008.03675}, eprinttype = {arXiv}, eprint = {2008.03675}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-03675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13293, author = {Danny Keller and Margarita Osadchy and Orr Dunkelman}, title = {Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning}, journal = {CoRR}, volume = {abs/2012.13293}, year = {2020}, url = {https://arxiv.org/abs/2012.13293}, eprinttype = {arXiv}, eprint = {2012.13293}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanHLP20, author = {Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle}, title = {Single Tweakey Cryptanalysis of Reduced-Round {SKINNY-64}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2020}, url = {https://eprint.iacr.org/2020/689}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanHLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKLS20, author = {Orr Dunkelman and Abhishek Kumar and Eran Lambooij and Somitra Kumar Sanadhya}, title = {Cryptanalysis of Feistel-Based Format-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1311}, year = {2020}, url = {https://eprint.iacr.org/2020/1311}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DinurDKS19, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1448--1490}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9303-2}, doi = {10.1007/S00145-018-9303-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DinurDKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OsadchyD19, author = {Margarita Osadchy and Orr Dunkelman}, title = {It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {796--804}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2804949}, doi = {10.1109/TDSC.2018.2804949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OsadchyD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DunkelmanH19, author = {Orr Dunkelman and Senyang Huang}, title = {Reconstructing an S-box from its Difference Distribution Table}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {193--217}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.193-217}, doi = {10.13154/TOSC.V2019.I2.193-217}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DunkelmanH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/AshurDM19, author = {Tomer Ashur and Orr Dunkelman and Nael Masalha}, editor = {Shlomi Dolev and Danny Hendler and Sachin Lodha and Moti Yung}, title = {Linear Cryptanalysis Reduced Round of Piccolo-80}, booktitle = {Cyber Security Cryptography and Machine Learning - Third International Symposium, {CSCML} 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11527}, pages = {16--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20951-3\_2}, doi = {10.1007/978-3-030-20951-3\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/AshurDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bar-OnDKW19, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Ariel Weizman}, editor = {Yuval Ishai and Vincent Rijmen}, title = {{DLCT:} {A} New Tool for Differential-Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {313--342}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_11}, doi = {10.1007/978-3-030-17653-2\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bar-OnDKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/DunkelmanP19, author = {Orr Dunkelman and L{\'{e}}o Perrin}, editor = {Maryam Mehrnezhad and Thyla van der Merwe and Feng Hao}, title = {Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019}, pages = {69--80}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338500.3360335}, doi = {10.1145/3338500.3360335}, timestamp = {Wed, 11 Aug 2021 15:12:36 +0200}, biburl = {https://dblp.org/rec/conf/secsr/DunkelmanP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/latincrypt/2017, editor = {Tanja Lange and Orr Dunkelman}, title = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11368}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25283-0}, doi = {10.1007/978-3-030-25283-0}, isbn = {978-3-030-25282-3}, timestamp = {Mon, 22 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-10861, author = {Adi Shamir and Itay Safran and Eyal Ronen and Orr Dunkelman}, title = {A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance}, journal = {CoRR}, volume = {abs/1901.10861}, year = {2019}, url = {http://arxiv.org/abs/1901.10861}, eprinttype = {arXiv}, eprint = {1901.10861}, timestamp = {Sun, 03 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-10861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-01240, author = {Rami Ailabouni and Orr Dunkelman and Sara Bitan}, title = {DNS-Morph: UDP-Based Bootstrapping Protocol For Tor}, journal = {CoRR}, volume = {abs/1904.01240}, year = {2019}, url = {http://arxiv.org/abs/1904.01240}, eprinttype = {arXiv}, eprint = {1904.01240}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-01240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnDKW19, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Ariel Weizman}, title = {{DLCT:} {A} New Tool for Differential-Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2019}, url = {https://eprint.iacr.org/2019/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnDKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKLS19, author = {Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir}, title = {New Slide Attacks on Almost Self-Similar Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2019}, url = {https://eprint.iacr.org/2019/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKLS19a, author = {Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki}, title = {A Practical Forgery Attack on Lilliput-AE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2019}, url = {https://eprint.iacr.org/2019/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKLS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKRS19, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {The Retracing Boomerang Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2019}, url = {https://eprint.iacr.org/2019/1154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanP19, author = {Orr Dunkelman and L{\'{e}}o Perrin}, title = {Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2019}, url = {https://eprint.iacr.org/2019/1187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bar-OnBDK18, author = {Achiya Bar{-}On and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Efficient Slide Attacks}, journal = {J. Cryptol.}, volume = {31}, number = {3}, pages = {641--670}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9266-8}, doi = {10.1007/S00145-017-9266-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Bar-OnBDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {185--212}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_7}, doi = {10.1007/978-3-319-96881-0\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/DunkelmanW18, author = {Orr Dunkelman and Ariel Weizman}, editor = {Itai Dinur and Shlomi Dolev and Sachin Lodha}, title = {Efficient Construction of the Kite Generator Revisited}, booktitle = {Cyber Security Cryptography and Machine Learning - Second International Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10879}, pages = {6--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94147-9\_2}, doi = {10.1007/978-3-319-94147-9\_2}, timestamp = {Sat, 19 Oct 2019 20:25:56 +0200}, biburl = {https://dblp.org/rec/conf/cscml/DunkelmanW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecon/MovsowitzFABD18, author = {Danielle Movsowitz and Liran Funaro and Shunit Agmon and Orna Agmon Ben{-}Yehuda and Orr Dunkelman}, editor = {Massimo Coppola and Emanuele Carlini and Daniele D'Agostino and J{\"{o}}rn Altmann and Jos{\'{e}} {\'{A}}ngel Ba{\~{n}}ares}, title = {Why Are Repeated Auctions in RaaS Clouds Risky?}, booktitle = {Economics of Grids, Clouds, Systems, and Services - 15th International Conference, {GECON} 2018, Pisa, Italy, September 18-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11113}, pages = {39--51}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-13342-9\_4}, doi = {10.1007/978-3-030-13342-9\_4}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/gecon/MovsowitzFABD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Rani Hod and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Ioannis Chatzigiannakis and Christos Kaklamanis and D{\'{a}}niel Marx and Donald Sannella}, title = {Tight Bounds on Online Checkpointing Algorithms}, booktitle = {45th International Colloquium on Automata, Languages, and Programming, {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic}, series = {LIPIcs}, volume = {107}, pages = {13:1--13:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2018.13}, doi = {10.4230/LIPICS.ICALP.2018.13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Bar-OnDDHKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnDKRS18, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2018}, url = {https://eprint.iacr.org/2018/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dunkelman18, author = {Orr Dunkelman}, title = {Efficient Construction of the Boomerang Connection Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2018}, url = {https://eprint.iacr.org/2018/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dunkelman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanH18, author = {Orr Dunkelman and Senyang Huang}, title = {Reconstructing an S-box from its Difference Distribution Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {811}, year = {2018}, url = {https://eprint.iacr.org/2018/811}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/OsadchyHGDP17, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to {CAPTCHA} Generation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2640--2653}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2718479}, doi = {10.1109/TIFS.2017.2718479}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/OsadchyHGDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/AshurBD17, author = {Tomer Ashur and Achiya Bar{-}On and Orr Dunkelman}, title = {Cryptanalysis of {GOST2}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {203--214}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.203-214}, doi = {10.13154/TOSC.V2017.I1.203-214}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/AshurBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AshurDL17, author = {Tomer Ashur and Orr Dunkelman and Atul Luykx}, editor = {Jonathan Katz and Hovav Shacham}, title = {Boosting Authenticated Encryption Robustness with Minimal Modifications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {3--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_1}, doi = {10.1007/978-3-319-63697-9\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AshurDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/OsadchyWDGHS17, author = {Margarita Osadchy and Yan Wang and Orr Dunkelman and Stuart J. Gibson and Julio C. Hernandez{-}Castro and Christopher J. Solomon}, editor = {Shlomi Dolev and Sachin Lodha}, title = {GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation}, booktitle = {Cyber Security Cryptography and Machine Learning - First International Conference, {CSCML} 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10332}, pages = {19--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60080-2\_2}, doi = {10.1007/978-3-319-60080-2\_2}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/OsadchyWDGHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChoCDDKMV17, author = {Jihoon Cho and Kyu Young Choi and Itai Dinur and Orr Dunkelman and Nathan Keller and Dukjae Moon and Aviya Veidberg}, editor = {Helena Handschuh}, title = {{WEM:} {A} New Family of White-Box Block Ciphers Based on the Even-Mansour Construction}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {293--308}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_17}, doi = {10.1007/978-3-319-52153-4\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChoCDDKMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WeizmannDH17, author = {Ariel Weizman and Orr Dunkelman and Simi Haber}, editor = {Arpita Patra and Nigel P. Smart}, title = {Efficient Construction of Diamond Structures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10698}, pages = {166--185}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71667-1\_9}, doi = {10.1007/978-3-319-71667-1\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WeizmannDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Bar-OnDDHKRS17, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Rani Hod and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Optimal Backup Strategies Against Cyber Attacks}, journal = {CoRR}, volume = {abs/1704.02659}, year = {2017}, url = {http://arxiv.org/abs/1704.02659}, eprinttype = {arXiv}, eprint = {1704.02659}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Bar-OnDDHKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurBD17, author = {Tomer Ashur and Dani{\"{e}}l Bodden and Orr Dunkelman}, title = {Linear Cryptanalysis Using Low-bias Linear Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2017}, url = {http://eprint.iacr.org/2017/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurBD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurDL17, author = {Tomer Ashur and Orr Dunkelman and Atul Luykx}, title = {Boosting Authenticated Encryption Robustness With Minimal Modifications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2017}, url = {http://eprint.iacr.org/2017/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurDL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/0001BDFHKSZ16, author = {Elena Andreeva and Charles Bouillaguet and Orr Dunkelman and Pierre{-}Alain Fouque and Jonathan J. Hoch and John Kelsey and Adi Shamir and S{\'{e}}bastien Zimmer}, title = {New Second-Preimage Attacks on Hash Functions}, journal = {J. Cryptol.}, volume = {29}, number = {4}, pages = {657--696}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9206-4}, doi = {10.1007/S00145-015-9206-4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/0001BDFHKSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DinurDKS16, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes}, journal = {J. Cryptol.}, volume = {29}, number = {4}, pages = {697--728}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9207-3}, doi = {10.1007/S00145-015-9207-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DinurDKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ChoCDKMV16, author = {Jihoon Cho and Kyu Young Choi and Orr Dunkelman and Nathan Keller and Dukjae Moon and Aviya Vaidberg}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Hybrid {WBC:} Secure and Efficient White-Box Encryption Schemes}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {749--754}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_55}, doi = {10.1007/978-3-319-48965-0\_55}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ChoCDKMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurDKS16, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Memory-Efficient Algorithms for Finding Needles in Haystacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {185--206}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_7}, doi = {10.1007/978-3-662-53008-5\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurDKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BarhamDLS16, author = {Muhammad Barham and Orr Dunkelman and Stefan Lucks and Marc Stevens}, editor = {Roberto Avanzi and Howard M. Heys}, title = {New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity}, booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10532}, pages = {247--263}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69453-5\_14}, doi = {10.1007/978-3-319-69453-5\_14}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BarhamDLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/AshurDT16, author = {Tomer Ashur and Orr Dunkelman and Nimrod Talmon}, editor = {Robert Krimmer and Melanie Volkamer and Jordi Barrat and Josh Benaloh and Nicole J. Goodman and Peter Y. A. Ryan and Vanessa Teague}, title = {Breaching the Privacy of Israel's Paper Ballot Voting System}, booktitle = {Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10141}, pages = {108--124}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-52240-1\_7}, doi = {10.1007/978-3-319-52240-1\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/voteid/AshurDT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2016, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4}, doi = {10.1007/978-3-319-49890-4}, isbn = {978-3-319-49889-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2015, editor = {Orr Dunkelman and Liam Keliher}, title = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31301-6}, doi = {10.1007/978-3-319-31301-6}, isbn = {978-3-319-31300-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AshurDT16, author = {Tomer Ashur and Orr Dunkelman and Nimrod Talmon}, title = {Breaching the Privacy of Israel's Paper Ballot Voting System}, journal = {CoRR}, volume = {abs/1608.08020}, year = {2016}, url = {http://arxiv.org/abs/1608.08020}, eprinttype = {arXiv}, eprint = {1608.08020}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AshurDT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OhanaDGO16, author = {Mor Ohana and Orr Dunkelman and Stuart J. Gibson and Margarita Osadchy}, title = {HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images}, journal = {CoRR}, volume = {abs/1611.03811}, year = {2016}, url = {http://arxiv.org/abs/1611.03811}, eprinttype = {arXiv}, eprint = {1611.03811}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OhanaDGO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OsadchyHGDe16, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to {CAPTCHA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2016}, url = {http://eprint.iacr.org/2016/336}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OsadchyHGDe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurBD16, author = {Tomer Ashur and Achiya Bar{-}On and Orr Dunkelman}, title = {Cryptanalysis of {GOST2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2016}, url = {http://eprint.iacr.org/2016/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS16, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Memory-Efficient Algorithms for Finding Needles in Haystacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2016}, url = {http://eprint.iacr.org/2016/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoCDKMV16, author = {Jihoon Cho and Kyu Young Choi and Orr Dunkelman and Nathan Keller and Dukjae Moon and Aviya Vaidberg}, title = {Hybrid {WBC:} Secure and Efficient White-Box Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2016}, url = {http://eprint.iacr.org/2016/679}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoCDKMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnBDK16, author = {Achiya Bar{-}On and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Efficient Slide Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2016}, url = {http://eprint.iacr.org/2016/1177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnBDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanKS15, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Almost universal forgery attacks on AES-based MAC's}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {3}, pages = {431--449}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9969-x}, doi = {10.1007/S10623-014-9969-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanK15, author = {Orr Dunkelman and Nathan Keller}, title = {Practical-time attacks against reduced variants of {MISTY1}}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {3}, pages = {601--627}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9980-2}, doi = {10.1007/S10623-014-9980-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DinurDKS15, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Reflections on slide with a twist attacks}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {633--651}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0098-y}, doi = {10.1007/S10623-015-0098-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DinurDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DunkelmanKS15, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Slidex Attacks on the Even-Mansour Encryption Scheme}, journal = {J. Cryptol.}, volume = {28}, number = {1}, pages = {1--28}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9164-7}, doi = {10.1007/S00145-013-9164-7}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DunkelmanKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamDKS15, author = {Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Attacks on {IDEA} with at Least 6 Rounds}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {209--239}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9162-9}, doi = {10.1007/S00145-013-9162-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DunkelmanKS15a, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Improved Single-Key Attacks on 8-Round {AES-192} and {AES-256}}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {397--422}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9159-4}, doi = {10.1007/S00145-013-9159-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DunkelmanKS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurDKS15, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {New Attacks on Feistel Structures with Improved Memory Complexities}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {433--454}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_21}, doi = {10.1007/978-3-662-47989-6\_21}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Bar-OnDDLKT15, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptanalysis of {SP} Networks with Partial Non-Linear Layers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {315--342}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_13}, doi = {10.1007/978-3-662-46800-5\_13}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Bar-OnDDLKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/DinurDGS15, author = {Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Improved Top-Down Techniques in Differential Cryptanalysis}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {139--156}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_8}, doi = {10.1007/978-3-319-22174-8\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/DinurDGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS15, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Attacks on Feistel Structures with Improved Memory Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2015}, url = {http://eprint.iacr.org/2015/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDGS15, author = {Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir}, title = {Improved Top-Down Techniques in Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2015}, url = {http://eprint.iacr.org/2015/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKL15, author = {Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander}, title = {Decomposing the {ASASA} Block Cipher Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2015}, url = {http://eprint.iacr.org/2015/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/DinurDKS14, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Dissection: a new paradigm for solving bicomposite search problems}, journal = {Commun. {ACM}}, volume = {57}, number = {10}, pages = {98--105}, year = {2014}, url = {https://doi.org/10.1145/2661434}, doi = {10.1145/2661434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/DinurDKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DinurDS14, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Improved Practical Attacks on Round-Reduced Keccak}, journal = {J. Cryptol.}, volume = {27}, number = {2}, pages = {183--209}, year = {2014}, url = {https://doi.org/10.1007/s00145-012-9142-5}, doi = {10.1007/S00145-012-9142-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DinurDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DunkelmanKS14, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used in {GSM} and 3G Telephony}, journal = {J. Cryptol.}, volume = {27}, number = {4}, pages = {824--849}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9154-9}, doi = {10.1007/S00145-013-9154-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DunkelmanKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DinurDKS14, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {439--457}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_23}, doi = {10.1007/978-3-662-45611-8\_23}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DinurDKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDKS14, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Carlos Cid and Christian Rechberger}, title = {Improved Linear Sieving Techniques with Applications to Step-Reduced {LED-64}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {390--410}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_20}, doi = {10.1007/978-3-662-46706-0\_20}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnDDLT14, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Boaz Tsaban}, title = {Improved Analysis of Zorro-Like Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2014}, url = {http://eprint.iacr.org/2014/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnDDLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS14, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Reflections on Slide with a Twist Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2014}, url = {http://eprint.iacr.org/2014/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanK13, author = {Orr Dunkelman and Nathan Keller}, title = {Cryptanalysis of the Stream Cipher {LEX}}, journal = {Des. Codes Cryptogr.}, volume = {67}, number = {3}, pages = {357--373}, year = {2013}, url = {https://doi.org/10.1007/s10623-012-9612-7}, doi = {10.1007/S10623-012-9612-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DinurDKS13, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Kazue Sako and Palash Sarkar}, title = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full {AES2}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {337--356}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_18}, doi = {10.1007/978-3-642-42033-7\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DinurDKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AshurD13, author = {Tomer Ashur and Orr Dunkelman}, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {A Practical Related-Key Boomerang Attack for the Full {MMB} Block Cipher}, booktitle = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, pages = {271--290}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5\_15}, doi = {10.1007/978-3-319-02937-5\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/AshurD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AshurD13, author = {Tomer Ashur and Orr Dunkelman}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {On the anonymity of Israel's general elections}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1399--1402}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512510}, doi = {10.1145/2508859.2512510}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AshurD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DunkelmanOS13, author = {Orr Dunkelman and Margarita Osadchy and Mahmood Sharif}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Secure authentication from facial attributeswith no privacy loss}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1403--1406}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512511}, doi = {10.1145/2508859.2512511}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DunkelmanOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDS13, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, editor = {Shiho Moriai}, title = {Collision Attacks on Up to 5 Rounds of {SHA-3} Using Generalized Internal Differentials}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {219--240}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_12}, doi = {10.1007/978-3-662-43933-3\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS13, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES\({}^{\mbox{2}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2013}, url = {http://eprint.iacr.org/2013/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanK13, author = {Orr Dunkelman and Nathan Keller}, title = {Practical-Time Attacks Against Reduced Variants of {MISTY1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2013}, url = {http://eprint.iacr.org/2013/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS13a, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Improved Linear Sieving Techniques with Applications to Step-Reduced {LED-64}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2013}, url = {http://eprint.iacr.org/2013/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamCDDKS13, author = {Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2013}, url = {http://eprint.iacr.org/2013/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamCDDKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurD13, author = {Tomer Ashur and Orr Dunkelman}, title = {A Practical Related-Key Boomerang Attack for the Full {MMB} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2013}, url = {http://eprint.iacr.org/2013/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AertsBMMDIKPVV12, author = {Wim Aerts and Eli Biham and Dieter De Moitie and Elke De Mulder and Orr Dunkelman and Sebastiaan Indesteege and Nathan Keller and Bart Preneel and Guy A. E. Vandenbosch and Ingrid Verbauwhede}, title = {A Practical Attack on KeeLoq}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {136--157}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9091-9}, doi = {10.1007/S00145-010-9091-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KimHPBDK12, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {7}, pages = {4948--4966}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2191655}, doi = {10.1109/TIT.2012.2191655}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KimHPBDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BouillaguetDDFKR12, author = {Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Pierre{-}Alain Fouque and Nathan Keller and Vincent Rijmen}, title = {Low-Data Complexity Attacks on {AES}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {11}, pages = {7002--7017}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2207880}, doi = {10.1109/TIT.2012.2207880}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BouillaguetDDFKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DinurDKS12, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {719--740}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_42}, doi = {10.1007/978-3-642-32009-5\_42}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DinurDKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKS12, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {David Pointcheval and Thomas Johansson}, title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {336--354}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_21}, doi = {10.1007/978-3-642-29011-4\_21}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDS12, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, editor = {Anne Canteaut}, title = {Improved Attacks on Full {GOST}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {9--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_2}, doi = {10.1007/978-3-642-34047-5\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DinurDS12a, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, editor = {Anne Canteaut}, title = {New Attacks on Keccak-224 and Keccak-256}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {442--461}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_25}, doi = {10.1007/978-3-642-34047-5\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DinurDS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Dunkelman12, author = {Orr Dunkelman}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_2}, doi = {10.1007/978-3-642-34931-7\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Dunkelman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2012, editor = {Orr Dunkelman}, title = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6}, doi = {10.1007/978-3-642-27954-6}, isbn = {978-3-642-27953-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS12, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2012}, url = {http://eprint.iacr.org/2012/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDS12, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Self-Differential Cryptanalysis of Up to 5 Rounds of {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2012}, url = {http://eprint.iacr.org/2012/672}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AshurD11, author = {Tomer Ashur and Orr Dunkelman}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Linear Analysis of Reduced-Round CubeHash}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {462--478}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_27}, doi = {10.1007/978-3-642-21554-4\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AshurD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetDFL11, author = {Charles Bouillaguet and Orr Dunkelman and Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent}, editor = {Ali Miri and Serge Vaudenay}, title = {New Insights on Impossible Differential Cryptanalysis}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {243--259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_15}, doi = {10.1007/978-3-642-28496-0\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetDFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS11, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {{ALRED} Blues: New Attacks on AES-Based MAC's}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2011}, url = {http://eprint.iacr.org/2011/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDKS11, author = {Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Data-Efficient Attacks on Reduced-Round {IDEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2011}, url = {http://eprint.iacr.org/2011/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS11a, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2011}, url = {http://eprint.iacr.org/2011/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDS11, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Improved Attacks on Full {GOST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2011}, url = {http://eprint.iacr.org/2011/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDS11a, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {New attacks on Keccak-224 and Keccak-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2011}, url = {http://eprint.iacr.org/2011/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DunkelmanK10, author = {Orr Dunkelman and Nathan Keller}, title = {The effects of the omission of last round's MixColumns on {AES}}, journal = {Inf. Process. Lett.}, volume = {110}, number = {8-9}, pages = {304--308}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2010.02.007}, doi = {10.1016/J.IPL.2010.02.007}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DunkelmanK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DunkelmanKS10, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Masayuki Abe}, title = {Improved Single-Key Attacks on 8-Round {AES-192} and {AES-256}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {158--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_10}, doi = {10.1007/978-3-642-17373-8\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DunkelmanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DunkelmanKS10, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, editor = {Tal Rabin}, title = {A Practical-Time Related-Key Attack on the {KASUMI} Cryptosystem Used in {GSM} and 3G Telephony}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {393--410}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_21}, doi = {10.1007/978-3-642-14623-7\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DunkelmanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovDKKS10, author = {Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir}, editor = {Henri Gilbert}, title = {Key Recovery Attacks of Practical Complexity on {AES-256} Variants with up to 10 Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {299--319}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_15}, doi = {10.1007/978-3-642-13190-5\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovDKKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouillaguetDLF10, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Another Look at Complementation Properties}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {347--364}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_20}, doi = {10.1007/978-3-642-13858-4\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetDLF10, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round \emph{Lesamnta} and \emph{SHAvite-3}\({}_{\mbox{512}}\)}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {18--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_2}, doi = {10.1007/978-3-642-19574-7\_2}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetDLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS10, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {A Practical-Time Attack on the {A5/3} Cryptosystem Used in Third Generation {GSM} Telephony}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2010}, url = {http://eprint.iacr.org/2010/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimHPBDK10, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2010}, url = {http://eprint.iacr.org/2010/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanK10, author = {Orr Dunkelman and Nathan Keller}, title = {The Effects of the Omission of Last Round's MixColumns on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2010}, url = {http://eprint.iacr.org/2010/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS10a, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Improved Single-Key Attacks on 8-round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2010}, url = {http://eprint.iacr.org/2010/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurD10, author = {Tomer Ashur and Orr Dunkelman}, title = {Linear Analysis of Reduced-Round CubeHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2010}, url = {http://eprint.iacr.org/2010/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDDKRF10, author = {Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre{-}Alain Fouque}, title = {Low Data Complexity Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2010}, url = {http://eprint.iacr.org/2010/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvrahamBD10, author = {Uri Avraham and Eli Biham and Orr Dunkelman}, title = {{ABC} - {A} New Framework for Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2010}, url = {http://eprint.iacr.org/2010/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvrahamBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AumassonDMRT09, author = {Jean{-}Philippe Aumasson and Orr Dunkelman and Florian Mendel and Christian Rechberger and S{\o}ren S. Thomsen}, editor = {Bart Preneel}, title = {Cryptanalysis of Vortex}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {14--28}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_2}, doi = {10.1007/978-3-642-02384-2\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AumassonDMRT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CanniereDK09, author = {Christophe De Canni{\`{e}}re and Orr Dunkelman and Miroslav Knezevic}, editor = {Christophe Clavier and Kris Gaj}, title = {{KATAN} and {KTANTAN} - {A} Family of Small and Efficient Hardware-Oriented Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {272--288}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_20}, doi = {10.1007/978-3-642-04138-9\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/CanniereDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DunkelmanK09, author = {Orr Dunkelman and Nathan Keller}, editor = {Marc Fischlin}, title = {Cryptanalysis of {CTC2}}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {226--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_15}, doi = {10.1007/978-3-642-00862-7\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DunkelmanK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DunkelmanFGL09, author = {Orr Dunkelman and Ewan Fleischmann and Michael Gorski and Stefan Lucks}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Related-Key Rectangle Attack of the Full {HAS-160} Encryption Mode}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {157--168}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_11}, doi = {10.1007/978-3-642-10628-6\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DunkelmanFGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AndreevaBDK09, author = {Elena Andreeva and Charles Bouillaguet and Orr Dunkelman and John Kelsey}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damg{\aa}rd}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {393--414}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_25}, doi = {10.1007/978-3-642-05445-7\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AndreevaBDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AumassonDIP09, author = {Jean{-}Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Cryptanalysis of Dynamic {SHA(2)}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {415--432}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_26}, doi = {10.1007/978-3-642-05445-7\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AumassonDIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2009, editor = {Orr Dunkelman}, title = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9}, doi = {10.1007/978-3-642-03317-9}, isbn = {978-3-642-03316-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DunkelmanB09, author = {Orr Dunkelman and Eli Biham}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The SHAvite-3 - {A} New Hash Function}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1947/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DunkelmanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/IndesteegeACDKN09, author = {Sebastiaan Indesteege and Elena Andreeva and Christophe De Canni{\`{e}}re and Orr Dunkelman and Emilia K{\"{a}}sper and Svetla Nikova and Bart Preneel and Elmar Tischhauser}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The Lane hash function}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1952/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/IndesteegeACDKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDFJ09, author = {Charles Bouillaguet and Orr Dunkelman and Pierre{-}Alain Fouque and Antoine Joux}, title = {On the Security of Iterated Hashing based on Forgery-resistant Compression Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2009}, url = {http://eprint.iacr.org/2009/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonDIP09, author = {Jean{-}Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel}, title = {Cryptanalysis of Dynamic {SHA(2)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2009}, url = {http://eprint.iacr.org/2009/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonDIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovDKKS09, author = {Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir}, title = {Key Recovery Attacks of Practical Complexity on {AES} Variants With Up To 10 Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2009}, url = {http://eprint.iacr.org/2009/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovDKKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanB09, author = {Orr Dunkelman and Tor E. Bj{\o}rstad}, title = {Practical Attacks on {NESHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2009}, url = {http://eprint.iacr.org/2009/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDLF09, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, title = {Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3\({}_{\mbox{512}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2009}, url = {http://eprint.iacr.org/2009/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDLF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DunkelmanK08, author = {Orr Dunkelman and Nathan Keller}, title = {Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers}, journal = {Inf. Process. Lett.}, volume = {107}, number = {5}, pages = {133--137}, year = {2008}, url = {https://doi.org/10.1016/j.ipl.2008.01.011}, doi = {10.1016/J.IPL.2008.01.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DunkelmanK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DunkelmanK08, author = {Orr Dunkelman and Nathan Keller}, editor = {Josef Pieprzyk}, title = {An Improved Impossible Differential Attack on {MISTY1}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {441--454}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_27}, doi = {10.1007/978-3-540-89255-7\_27}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DunkelmanK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DunkelmanK08a, author = {Orr Dunkelman and Nathan Keller}, editor = {Josef Pieprzyk}, title = {A New Attack on the {LEX} Stream Cipher}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {539--556}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_33}, doi = {10.1007/978-3-540-89255-7\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DunkelmanK08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LuKKD08, author = {Jiqiang Lu and Jongsung Kim and Nathan Keller and Orr Dunkelman}, editor = {Tal Malkin}, title = {Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and {MISTY1}}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {370--386}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_24}, doi = {10.1007/978-3-540-79263-5\_24}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LuKKD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IndesteegeKDBP08, author = {Sebastiaan Indesteege and Nathan Keller and Orr Dunkelman and Eli Biham and Bart Preneel}, editor = {Nigel P. Smart}, title = {A Practical Attack on KeeLoq}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_1}, doi = {10.1007/978-3-540-78967-3\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK08, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Kaisa Nyberg}, title = {A Unified Approach to Related-Key Attacks}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {73--96}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_5}, doi = {10.1007/978-3-540-71039-4\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TozD08, author = {Deniz Toz and Orr Dunkelman}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Analysis of Two Attacks on Reduced-Round Versions of the {SMS4}}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {141--156}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_10}, doi = {10.1007/978-3-540-88625-9\_10}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/TozD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LuDKK08, author = {Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {New Impossible Differential Attacks on {AES}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {279--293}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_22}, doi = {10.1007/978-3-540-89754-5\_22}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LuDKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DunkelmanIK08, author = {Orr Dunkelman and Sebastiaan Indesteege and Nathan Keller}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {A Differential-Linear Attack on 12-Round Serpent}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {308--321}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_24}, doi = {10.1007/978-3-540-89754-5\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DunkelmanIK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanK08, author = {Orr Dunkelman and Nathan Keller}, title = {Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2008}, url = {http://eprint.iacr.org/2008/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuDKK08, author = {Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim}, title = {New Impossible Differential Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2008}, url = {http://eprint.iacr.org/2008/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuDKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DunkelmanK07, author = {Orr Dunkelman and Nathan Keller}, title = {A New Criterion for Nonlinearity of Block Ciphers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {11}, pages = {3944--3957}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.907341}, doi = {10.1109/TIT.2007.907341}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DunkelmanK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BihamDK07, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Masayuki Abe}, title = {A Simple Related-Key Attack on the Full {SHACAL-1}}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {20--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_2}, doi = {10.1007/11967668\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BihamDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK07, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Alex Biryukov}, title = {Improved Slide Attacks}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {153--166}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_10}, doi = {10.1007/978-3-540-74619-5\_10}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/BihamDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK07a, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Alex Biryukov}, title = {A New Attack on 6-Round {IDEA}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {211--224}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_14}, doi = {10.1007/978-3-540-74619-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TroncosoDDP07, author = {Carmela Troncoso and Claudia D{\'{\i}}az and Orr Dunkelman and Bart Preneel}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {220--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_15}, doi = {10.1007/978-3-540-77370-2\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DunkelmanSP07, author = {Orr Dunkelman and Gautham Sekar and Bart Preneel}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Improved Meet-in-the-Middle Attacks on Reduced-Round {DES}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {86--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_8}, doi = {10.1007/978-3-540-77026-8\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DunkelmanSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WangKD07, author = {Gaoli Wang and Nathan Keller and Orr Dunkelman}, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {The Delicate Issues of Addition with Respect to {XOR} Differences}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {212--231}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_14}, doi = {10.1007/978-3-540-77360-3\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WangKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamD07, author = {Eli Biham and Orr Dunkelman}, title = {Differential Cryptanalysis in Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2007}, url = {http://eprint.iacr.org/2007/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamD07a, author = {Eli Biham and Orr Dunkelman}, title = {A Framework for Iterative Hash Functions - {HAIFA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2007}, url = {http://eprint.iacr.org/2007/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamD07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/il/Dunkelman06, author = {Orr Dunkelman}, title = {Techniques for cryptanalysis of block ciphers}, school = {Technion - Israel Institute of Technology, Israel}, year = {2006}, url = {https://technion.primo.exlibrisgroup.com/permalink/972TEC\_INST/q1jq5o/alma990022790690203971}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/il/Dunkelman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamDK06, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Xuejia Lai and Kefei Chen}, title = {New Cryptanalytic Results on {IDEA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {412--427}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_27}, doi = {10.1007/11935230\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamDK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BihamDK06, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {David Pointcheval}, title = {Related-Key Impossible Differential Attacks on 8-Round {AES-192}}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {21--33}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_2}, doi = {10.1007/11605805\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BihamDK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DunkelmanK06, author = {Orr Dunkelman and Nathan Keller}, editor = {David Pointcheval}, title = {A New Criterion for Nonlinearity of Block Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {295--312}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_19}, doi = {10.1007/11605805\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DunkelmanK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LuKKD06, author = {Jiqiang Lu and Jongsung Kim and Nathan Keller and Orr Dunkelman}, editor = {Rana Barua and Tanja Lange}, title = {Differential and Rectangle Attacks on Reduced-Round {SHACAL-1}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {17--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_3}, doi = {10.1007/11941378\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/LuKKD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LuKKD06, author = {Jiqiang Lu and Jongsung Kim and Nathan Keller and Orr Dunkelman}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Related-Key Rectangle Attack on 42-Round {SHACAL-2}}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {85--100}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_7}, doi = {10.1007/11836810\_7}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/LuKKD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DunkelmanKK06, author = {Orr Dunkelman and Nathan Keller and Jongsung Kim}, editor = {Eli Biham and Amr M. Youssef}, title = {Related-Key Rectangle Attack on the Full {SHACAL-1}}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {28--44}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_3}, doi = {10.1007/978-3-540-74462-7\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/DunkelmanKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanK06, author = {Orr Dunkelman and Nathan Keller}, title = {Linear Cryptanalysis of {CTC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2006}, url = {http://eprint.iacr.org/2006/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Bimal K. Roy}, title = {A Related-Key Rectangle Attack on the Full {KASUMI}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {443--461}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_24}, doi = {10.1007/11593447\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Ronald Cramer}, title = {Related-Key Boomerang and Rectangle Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {507--525}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_30}, doi = {10.1007/11426639\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Henri Gilbert and Helena Handschuh}, title = {New Combined Attacks on Block Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {126--144}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_9}, doi = {10.1007/11502760\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK03, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Thomas Johansson}, title = {Differential-Linear Cryptanalysis of Serpent}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {9--21}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_2}, doi = {10.1007/978-3-540-39887-5\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK03a, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Thomas Johansson}, title = {Rectangle Attacks on 49-Round {SHACAL-1}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {22--35}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_3}, doi = {10.1007/978-3-540-39887-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Yuliang Zheng}, title = {Enhancing Differential-Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {254--266}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_16}, doi = {10.1007/3-540-36178-2\_16}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Joan Daemen and Vincent Rijmen}, title = {New Results on Boomerang and Rectangle Attacks}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_1}, doi = {10.1007/3-540-45661-9\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/YanamiSD02, author = {Hitoshi Yanami and Takeshi Shimoyama and Orr Dunkelman}, editor = {Joan Daemen and Vincent Rijmen}, title = {Differential and Linear Cryptanalysis of a Reduced-Round {SC2000}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {34--48}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_3}, doi = {10.1007/3-540-45661-9\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/YanamiSD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {New Results on Boomerang and Rectangle Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2002}, url = {http://eprint.iacr.org/2002/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Birgit Pfitzmann}, title = {The Rectangle Attack - Rectangling the Serpent}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {340--357}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_21}, doi = {10.1007/3-540-44987-6\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Mitsuru Matsui}, title = {Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {16--27}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_2}, doi = {10.1007/3-540-45473-X\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {The Rectangle Attack - Rectangling the Serpent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2001}, url = {http://eprint.iacr.org/2001/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BihamD00, author = {Eli Biham and Orr Dunkelman}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Cryptanalysis of the {A5/1} {GSM} Stream Cipher}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {43--51}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_5}, doi = {10.1007/3-540-44495-5\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BihamD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BihamBDRS98, author = {Eli Biham and Alex Biryukov and Orr Dunkelman and Eran Richardson and Adi Shamir}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {362--376}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_27}, doi = {10.1007/3-540-48892-8\_27}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BihamBDRS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.