BibTeX records: Eyal Ronen

download as .bib file

@article{DBLP:journals/ieeesp/RonenSWO18,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {16},
  number    = {1},
  pages     = {54--62},
  year      = {2018},
  url       = {https://doi.org/10.1109/MSP.2018.1331033},
  doi       = {10.1109/MSP.2018.1331033},
  timestamp = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/RonenSWO18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {1397--1414},
  year      = {2018},
  crossref  = {DBLP:conf/ccs/2018},
  url       = {https://doi.org/10.1145/3243734.3243775},
  doi       = {10.1145/3243734.3243775},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/RonenPS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  pages     = {185--212},
  year      = {2018},
  crossref  = {DBLP:conf/crypto/2018-2},
  url       = {https://doi.org/10.1007/978-3-319-96881-0\_7},
  doi       = {10.1007/978-3-319-96881-0\_7},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/Bar-OnDKRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Tight Bounds on Online Checkpointing Algorithms},
  booktitle = {45th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic},
  pages     = {13:1--13:13},
  year      = {2018},
  crossref  = {DBLP:conf/icalp/2018},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2018.13},
  doi       = {10.4230/LIPIcs.ICALP.2018.13},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/Bar-OnDDHKRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR18,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  title     = {How to (not) share a password: Privacy preserving protocols for finding
               heavy hitters with adversarial behavior},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {3},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/003},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NaorPR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {527},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/527},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Bar-OnDKRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {747},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/747},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RonenPS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenGGSWY18,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1173},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1173},
  timestamp = {Tue, 11 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RonenGGSWY18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenSWO17,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {195--212},
  year      = {2017},
  crossref  = {DBLP:conf/sp/2017},
  url       = {https://doi.org/10.1109/SP.2017.14},
  doi       = {10.1109/SP.2017.14},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/RonenSWO17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Bar-OnDDHKRS17,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Optimal Backup Strategies Against Cyber Attacks},
  journal   = {CoRR},
  volume    = {abs/1704.02659},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02659},
  archivePrefix = {arXiv},
  eprint    = {1704.02659},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/Bar-OnDDHKRS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RonenS16,
  author    = {Eyal Ronen and
               Adi Shamir},
  title     = {Extended Functionality Attacks on IoT Devices: The Case of Smart Lights},
  booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages     = {3--12},
  year      = {2016},
  crossref  = {DBLP:conf/eurosp/2016},
  url       = {https://doi.org/10.1109/EuroSP.2016.13},
  doi       = {10.1109/EuroSP.2016.13},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/RonenS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenOSW16,
  author    = {Eyal Ronen and
               Colin O'Flynn and
               Adi Shamir and
               Achi{-}Or Weingarten},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1047},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1047},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/RonenOSW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018,
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3243734},
  isbn      = {978-1-4503-5693-0},
  timestamp = {Wed, 31 Oct 2018 17:23:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2018-2,
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10992},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96881-0},
  doi       = {10.1007/978-3-319-96881-0},
  isbn      = {978-3-319-96880-3},
  timestamp = {Mon, 13 Aug 2018 14:03:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2018-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2018,
  editor    = {Ioannis Chatzigiannakis and
               Christos Kaklamanis and
               D{\'{a}}niel Marx and
               Donald Sannella},
  title     = {45th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic},
  series    = {LIPIcs},
  volume    = {107},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2018},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-076-7},
  isbn      = {978-3-95977-076-7},
  timestamp = {Sat, 28 Jul 2018 14:39:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2017,
  title     = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7957740},
  isbn      = {978-1-5090-5533-3},
  timestamp = {Tue, 27 Jun 2017 13:01:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2016,
  title     = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7467055},
  isbn      = {978-1-5090-1751-5},
  timestamp = {Sun, 05 Jun 2016 10:00:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier