19992022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    Sharp behavioral changes in preemptible instance pricing

    Davidow, D. M., Ben-Yehuda, O. A. & Dunkelman, O., 6 Jun 2022, SYSTOR 2022 - Proceedings of the 15th ACM International Conference on Systems and Storage Conference. Association for Computing Machinery, Inc, p. 145 1 p. (SYSTOR 2022 - Proceedings of the 15th ACM International Conference on Systems and Storage Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Automatic Search for Bit-Based Division Property

    Ghosh, S. & Dunkelman, O., 2021, Progress in Cryptology – LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Proceedings. Longa, P. & Ràfols, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 254-274 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12912 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • DNS-Morph: UDP-Based Bootstrapping Protocol for Tor

    Ailabouni, R., Dunkelman, O. & Bitan, S., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 244-265 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Error resilient space partitioning

    Dunkelman, O., Geyzel, Z., Keller, C., Keller, N., Ronen, E., Shamir, A. & Tessler, R. J., 1 Jul 2021, 48th International Colloquium on Automata, Languages, and Programming, ICALP 2021. Bansal, N., Merelli, E. & Worrell, J. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 4. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 198).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3

    Amon, O., Dunkelman, O., Keller, N., Ronen, E. & Shamir, A., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 127-154 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12697 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Counting active S-boxes is not enough

    Dunkelman, O., Kumar, A., Lambooij, E. & Sanadhya, S. K., 2020, Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 332-344 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • New slide attacks on almost self-similar ciphers

    Dunkelman, O., Keller, N., Lasry, N. & Shamir, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 250-279 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64

    Dunkelman, O., Huang, S., Lambooij, E. & Perle, S., 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The retracing boomerang attack

    Dunkelman, O., Keller, N., Ronen, E. & Shamir, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 280-309 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Adapting rigidity to symmetric cryptography: Towards “unswerving” designs

    Dunkelman, O. & Perrin, L., 11 Nov 2019, SSR 2019 - Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop. Association for Computing Machinery, p. 69-80 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • DLCT: A new tool for differential-linear cryptanalysis

    Bar-On, A., Dunkelman, O., Keller, N. & Weizman, A., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 313-342 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Linear cryptanalysis reduced round of piccolo-80

    Ashur, T., Dunkelman, O. & Masalha, N., 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 16-32 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Why are repeated auctions in RaaS clouds risky?

    Movsowitz, D., Funaro, L., Agmon, S., Agmon Ben-Yehuda, O. & Dunkelman, O., 2019, Economics of Grids, Clouds, Systems, and Services - 15th International Conference, GECON 2018, Proceedings. D’Agostino, D., Bañares, J. Á., Coppola, M., Carlini, E. & Altmann, J. (eds.). Springer Verlag, p. 39-51 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11113 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Efficient Construction of the Kite Generator Revisited

    Dunkelman, O. & Weizman, A., 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 6-19 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved key recovery attacks on reduced-round aes with practical data and memory complexities

    Bar-On, A., Dunkelman, O., Keller, N., Ronen, E. & Shamir, A., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 185-212 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Tight bounds on online checkpointing algorithms

    Bar-On, A., Dinur, I., Hod, R., Dunkelman, O., Keller, N., Ronen, E. & Shamir, A., 1 Jul 2018, 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018. Kaklamanis, C., Marx, D., Chatzigiannakis, I. & Sannella, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 13. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 107).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    Boosting authenticated encryption robustness with minimal modifications

    Ashur, T., Dunkelman, O. & Luykx, A., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Breaching the privacy of Israel’s paper ballot voting system

    Ashur, T., Dunkelman, O. & Talmon, N., 2017, Electronic Voting - 1st International Joint Conference, E-Vote-ID 2016, Proceedings. Teague, V., Volkamer, M., Benaloh, J., Ryan, P. Y. A., Barrat, J., Goodman, N. & Krimmer, R. (eds.). Springer Verlag, p. 108-124 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10141 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient construction of diamond structures

    Weizmann, A., Dunkelman, O. & Haber, S., 2017, Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Patra, A. & Smart, N. P. (eds.). Springer Verlag, p. 166-185 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Genface: Improving cyber security using realistic synthetic face generation

    Osadchy, M., Wang, Y., Dunkelman, O., Gibson, S., Hernandez-Castro, J. & Solomon, C., 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 19-33 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity

    Barham, M., Dunkelman, O., Lucks, S. & Stevens, M., 2017, Selected Areas in Cryptography – SAC 2016 - 23rd International Conference, Revised Selected Papers. Avanzi, R. & Heys, H. (eds.). Springer Verlag, p. 247-263 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10532 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    Hybrid WBC: Secure and efficient white-box encryption schemes

    Cho, J., Choi, K. Y., Dunkelman, O., Keller, N., Moon, D. & Vaidberg, A., 2016, Cryptology and Network Security - 15th International Conference, CANS 2016, Proceedings. Persiano, G. & Foresti, S. (eds.). Springer Verlag, p. 749-754 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Memory-efficient algorithms for finding needles in haystacks

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 185-206 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2015

    Cryptanalysis of SP networks with partial non-linear layers

    Bar-On, A., Dinur, I., Dunkelman, O., Lallemand, V., Keller, N. & Tsaban, B., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 315-342 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved linear sieving techniques with applications to step-reduced LED-64

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2015, Fast Software Encryption - 21st International Workshop, FSE 2014, Revised Selected Papers. Cid, C. & Rechberger, C. (eds.). Springer Verlag, p. 390-410 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Improved top-down techniques in differential cryptanalysis

    Dinur, I., Dunkelman, O., Gutman, M. & Shamir, A., 2015, Progress in Cryptology – LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Proceedings. Rodríguez-Henríquez, F. & Lauter, K. (eds.). Springer Verlag, p. 139-156 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • New attacks on Feistel structures with improved memory complexities

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 433-454 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials

    Dinur, I., Dunkelman, O. & Shamir, A., 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Springer Verlag, p. 219-240 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Cryptanalysis of iterated Even-Mansour schemes with two keys

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer Verlag, p. 439-457 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    A practical related-key boomerang attack for the full MMB block cipher

    Ashur, T. & Dunkelman, O., 2013, Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings. Springer Verlag, p. 271-290 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8257 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full AES2

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 337-356 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Poster: On the anonymity of Israel's general elections

    Ashur, T. & Dunkelman, O., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1399-1401 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poster: Secure authentication from facial attributes with no privacy loss

    Dunkelman, O., Osadchy, M. & Sharif, M., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 1403-1405 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 719-740 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Improved attacks on full GOST

    Dinur, I., Dunkelman, O. & Shamir, A., 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 9-28 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Minimalism in cryptography: The Even-Mansour scheme revisited

    Dunkelman, O., Keller, N. & Shamir, A., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 336-354 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • New attacks on Keccak-224 and Keccak-256

    Dinur, I., Dunkelman, O. & Shamir, A., 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 442-461 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • New insights on impossible differential cryptanalysis

    Bouillaguet, C., Dunkelman, O., Fouque, P. A. & Leurent, G., 2012, Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Revised Selected Papers. p. 243-259 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7118 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2011

    Attacks on hash functions based on generalized feistel: Application to reduced-round lesamnta and SHAvite-3 512

    Bouillaguet, C., Dunkelman, O., Leurent, G. & Fouque, P. A., 2011, Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Revised Selected Papers. p. 18-35 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6544 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Linear analysis of reduced-round CubeHash

    Ashur, T. & Dunkelman, O., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Proceedings. p. 462-478 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6715 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2010

    Another look at complementation properties

    Bouillaguet, C., Dunkelman, O., Leurent, G. & Fouque, P. A., 2010, Fast Software Encryption - 17th International Workshop, FSE 2010, Revised Selected Papers. p. 347-364 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6147 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • A practical-time related-key attack on the KASUMI cryptosystem used in gsm and 3G telephony

    Dunkelman, O., Keller, N. & Shamir, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 393-410 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Improved single-key attacks on 8-round AES-192 and AES-256

    Dunkelman, O., Keller, N. & Shamir, A., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 158-176 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds

    Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D. & Shamir, A., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 299-319 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2009

    Cryptanalysis of CTC2

    Dunkelman, O. & Keller, N., 2009, Topics in Cryptology - CT-RSA 2009 - The Cryptographers' Track at the RSA Conference 2009, Proceedings. p. 226-239 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5473).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptanalysis of dynamic SHA(2)

    Aumasson, J. P., Dunkelman, O., Indesteege, S. & Preneel, B., 2009, Selected Areas in Cryptography - 16th Annual International Workshop, SAC 2009, Revised Selected Papers. p. 415-432 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5867 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Cryptanalysis of vortex

    Aumasson, J. P., Dunkelman, O., Mendel, F., Rechberger, C. & Thomsen, S. S., 2009, Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings. p. 14-28 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5580 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Herding, second preimage and trojan message attacks beyond merkle-damgård

    Andreeva, E., Bouillaguet, C., Dunkelman, O. & Kelsey, J., 2009, Selected Areas in Cryptography - 16th Annual International Workshop, SAC 2009, Revised Selected Papers. p. 393-414 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5867 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers

    De Cannière, C., Dunkelman, O. & Knežević, M., 2009, Cryptographic Hardware and Embedded Systems - CHES 2009 - 11th International Workshop, Proceedings. p. 272-288 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5747 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Related-key rectangle attack of the full HAS-160 encryption mode

    Dunkelman, O., Fleischmann, E., Gorski, M. & Lucks, S., 2009, Progress in Cryptology - INDOCRYPT 2009 - 10th International Conference on Cryptology in India, Proceedings. p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review