Остановите войну!
for scientists:
default search action
Avishai Wool
- > Home > Persons > Avishai Wool
Publications
- 2022
- [j46]Liron David, Avishai Wool:
Rank estimation with bounded error via exponential sampling. J. Cryptogr. Eng. 12(2): 151-168 (2022) - [j45]Liron David, Avishai Wool:
PESrank: An Explainable online password strength estimator. J. Comput. Secur. 30(6): 877-901 (2022) - [c64]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. USENIX Security Symposium 2022: 251-268 - [i32]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. IACR Cryptol. ePrint Arch. 2022: 208 (2022) - 2021
- [c60]Liron David, Avishai Wool:
An Explainable Online Password Strength Estimator. ESORICS (1) 2021: 285-304 - [i29]Liron David, Avishai Wool:
Rank Estimation with Bounded Error via Exponential Sampling. IACR Cryptol. ePrint Arch. 2021: 313 (2021) - 2019
- [c57]Liron David, Avishai Wool:
Fast Analytical Rank Estimation. COSADE 2019: 168-190 - [c56]Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. CT-RSA 2019: 330-349 - [i27]Liron David, Avishai Wool:
Context Aware Password Guessability via Multi-Dimensional Rank Estimation. CoRR abs/1912.02551 (2019) - 2018
- [i24]Liron David, Avishai Wool:
PRank: Fast Analytical Rank Estimation via Pareto Distributions. IACR Cryptol. ePrint Arch. 2018: 550 (2018) - [i22]Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. IACR Cryptol. ePrint Arch. 2018: 867 (2018) - 2017
- [c50]Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks. CT-RSA 2017: 311-327 - 2016
- [j41]Yossef Oren, Avishai Wool:
Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints An Int. J. 21(4): 616-645 (2016) - 2015
- [j39]Alex Arbit, Yoel Livne, Yossef Oren, Avishai Wool:
Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1): 85-99 (2015) - [i15]Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 1236 (2015) - 2014
- [j36]Alex Arbit, Yossef Oren, Avishai Wool:
A Secure Supply-Chain RFID System that Respects Your Privacy. IEEE Pervasive Comput. 13(2): 52-60 (2014) - [c42]Yossef Oren, Ofir Weisse, Avishai Wool:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. CHES 2014: 17-34 - 2013
- [c41]Yossef Oren, Dvir Schirman, Avishai Wool:
Range Extension Attacks on Contactless Smart Cards. ESORICS 2013: 646-663 - [c40]Yossef Oren, Ofir Weisse, Avishai Wool:
Practical template-algebraic side channel attacks with extremely low data complexity. HASP@ISCA 2013: 7 - [c39]Ory Samorodnitzky, Eran Tromer, Avishai Wool:
Analyzing Unique-Bid Auction Sites for Fun and Profit. NDSS 2013 - 2012
- [c38]Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool:
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. CHES 2012: 140-154 - [i14]Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. IACR Cryptol. ePrint Arch. 2012: 92 (2012) - 2010
- [c37]Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool:
Algebraic Side-Channel Analysis in the Presence of Errors. CHES 2010: 428-442 - 2009
- [i11]Yossef Oren, Avishai Wool:
Attacks on RFID-Based Electronic Voting Systems. IACR Cryptol. ePrint Arch. 2009: 422 (2009) - 2008
- [j30]Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool:
Finding a dense-core in Jellyfish graphs. Comput. Networks 52(15): 2831-2841 (2008) - [j29]Reuven Cohen, Mira Gonen, Avishai Wool:
Bounding the bias of tree-like sampling in IP topologies. Networks Heterog. Media 3(2): 323-332 (2008) - 2007
- [j28]Sagy Bar, Mira Gonen, Avishai Wool:
A geographic directed preferential internet topology model. Comput. Networks 51(14): 4174-4188 (2007) - [c33]Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool:
Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40 - 2006
- [j27]Alain J. Mayer, Avishai Wool, Elisha Ziskind:
Offline firewall analysis. Int. J. Inf. Sec. 5(3): 125-144 (2006) - [j25]Noam Kogan, Yuval Shavitt, Avishai Wool:
A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006) - [i9]Reuven Cohen, Mira Gonen, Avishai Wool:
Bounding the Bias of Tree-Like Sampling in IP Topologies. CoRR abs/cs/0611157 (2006) - 2005
- [c29]Sagy Bar, Mira Gonen, Avishai Wool:
A Geographic Directed Preferential Internet Topology Model. MASCOTS 2005: 325-328 - [c25]Dalit Naor, Amir Shenhav, Avishai Wool:
Toward securing untrusted storage without public-key operations. StorageSS 2005: 51-56 - [i6]Sagy Bar, Mira Gonen, Avishai Wool:
A Geographic Directed Preferential Internet Topology Model. CoRR abs/cs/0502061 (2005) - [i3]Dalit Naor, Amir Shenhav, Avishai Wool:
One-Time Signatures Revisited: Have They Become Practical? IACR Cryptol. ePrint Arch. 2005: 442 (2005) - 2004
- [j21]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the unmeasured: an algebraic approach to Internet mapping. IEEE J. Sel. Areas Commun. 22(1): 67-78 (2004) - [j20]Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool:
Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4): 381-420 (2004) - [c24]Sagy Bar, Mira Gonen, Avishai Wool:
An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. PAM 2004: 53-62 - 2003
- [j18]Yueyue Song, Avishai Wool, Bülent Yener:
Combinatorial design of multi-ring networks with combined routing and flow control. Comput. Networks 41(2): 247-267 (2003) - [c22]Noam Kogan, Yuval Shavitt, Avishai Wool:
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. S&P 2003: 225-235 - 2002
- [j16]David Peleg, Avishai Wool:
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. SIAM J. Discret. Math. 15(3): 416-433 (2002) - 2001
- [j14]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) - [c21]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654 - 2000
- [j13]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) - [j11]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) - [c18]Juan A. Garay, Jessica Staddon, Avishai Wool:
Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352 - [c17]Alain J. Mayer, Avishai Wool, Elisha Ziskind:
Fang: A Firewall Analysis Engine. S&P 2000: 177-187 - 1999
- [j10]Eran Gabber, Avishai Wool:
On location-restricted services. IEEE Netw. 13(6): 44-52 (1999) - [c16]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 - [c15]Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool:
Firmato: A Novel Firewall Management Toolkit. S&P 1999: 17-31 - [i2]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. CoRR cs.DC/9908011 (1999) - 1998
- [j9]Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks:
Optimal layouts on a chain ATM network. Discret. Appl. Math. 83(1-3): 157-178 (1998) - [j7]Yair Amir, Avishai Wool:
Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998) - [j6]Moni Naor, Avishai Wool:
The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998) - [j5]Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distributed Syst. 9(9): 909-922 (1998) - [c13]Eran Gabber, Avishai Wool:
How to Prove Where You Are: Tracking the Location of Customer Equipment. CCS 1998: 142-149 - [c11]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems. PODC 1998: 321 - [c10]Todd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool:
Replication, Consistency, and Practicality: Are These Mutually Exclusive? SIGMOD Conference 1998: 484-495 - 1997
- [j4]David Peleg, Gideon Schechtman, Avishai Wool:
Randomized Approximation of Bounded Multicovering Problems. Algorithmica 18(1): 44-66 (1997) - [j3]David Peleg, Avishai Wool:
The Availability of Crumbling Wall Quorum Systems. Discret. Appl. Math. 74(1): 69-83 (1997) - [j2]David Peleg, Avishai Wool:
Crumbling Walls: A Class of Practical and Efficient Quorum Systems. Distributed Comput. 10(2): 87-97 (1997) - [c9]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257 - 1996
- [c8]Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. CCS 1996: 157-168 - [c7]Yair Amir, Avishai Wool:
Evaluating Quorum Systems over the Internet. FTCS 1996: 26-35 - [c6]David Peleg, Avishai Wool:
How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). PODC 1996: 290-299 - [c5]Yair Amir, Avishai Wool:
Evaluating Quorum Systems Over the Internet (Abstract). PODC 1996: 344 - [i1]Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. IACR Cryptol. ePrint Arch. 1996: 8 (1996) - 1995
- [j1]David Peleg, Avishai Wool:
The Availability of Quorum Systems. Inf. Comput. 123(2): 210-223 (1995) - [c4]Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks:
Optimal Layouts on a Chain ATM Network (Extended Abstract). ESA 1995: 508-522 - [c3]David Peleg, Avishai Wool:
Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). PODC 1995: 120-129 - 1994
- [c2]Moni Naor, Avishai Wool:
The Load, Capacity and Availability of Quorum Systems. FOCS 1994: 214-225 - 1993
- [c1]David Peleg, Gideon Schechtman, Avishai Wool:
Approximating Bounded 0-1 Integer Linear Programs. ISTCS 1993: 69-77
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint