BibTeX records: Eyal Ronen

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  editor    = {Anne Canteaut and
               Yuval Ishai},
  title     = {The Retracing Boomerang Attack},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12105},
  pages     = {280--309},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-45721-1\_11},
  doi       = {10.1007/978-3-030-45721-1\_11},
  timestamp = {Fri, 22 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR20,
  author    = {Moni Naor and
               Shahar Paz and
               Eyal Ronen},
  title     = {{CRISP:} Compromise Resilient Identity-based Symmetric {PAKE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2020},
  pages     = {529},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/529},
  timestamp = {Wed, 27 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/NaorPR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorPR19,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  editor    = {Lorenzo Cavallaro and
               Johannes Kinder and
               XiaoFeng Wang and
               Jonathan Katz},
  title     = {How to (not) Share a Password: Privacy Preserving Protocols for Finding
               Heavy Hitters with Adversarial Behavior},
  booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages     = {1369--1386},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3319535.3363204},
  doi       = {10.1145/3319535.3363204},
  timestamp = {Fri, 06 Mar 2020 13:19:56 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/NaorPR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenGGSWY19,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
               CA, USA, May 19-23, 2019},
  pages     = {435--452},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/SP.2019.00062},
  doi       = {10.1109/SP.2019.00062},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/RonenGGSWY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-10861,
  author    = {Adi Shamir and
               Itay Safran and
               Eyal Ronen and
               Orr Dunkelman},
  title     = {A Simple Explanation for the Existence of Adversarial Examples with
               Small Hamming Distance},
  journal   = {CoRR},
  volume    = {abs/1901.10861},
  year      = {2019},
  url       = {http://arxiv.org/abs/1901.10861},
  archivePrefix = {arXiv},
  eprint    = {1901.10861},
  timestamp = {Sun, 03 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1901-10861.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VanhoefR19,
  author    = {Mathy Vanhoef and
               Eyal Ronen},
  title     = {Dragonblood: {A} Security Analysis of WPA3's {SAE} Handshake},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {383},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/383},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/VanhoefR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohneyKPGHRY19,
  author    = {Shaanan Cohney and
               Andrew Kwong and
               Shachar Paz and
               Daniel Genkin and
               Nadia Heninger and
               Eyal Ronen and
               Yuval Yarom},
  title     = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {996},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/996},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKRS19,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {The Retracing Boomerang Attack},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1154},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1154},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/DunkelmanKRS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RonenSWO18,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction},
  journal   = {{IEEE} Secur. Priv.},
  volume    = {16},
  number    = {1},
  pages     = {54--62},
  year      = {2018},
  url       = {https://doi.org/10.1109/MSP.2018.1331033},
  doi       = {10.1109/MSP.2018.1331033},
  timestamp = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ieeesp/RonenSWO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  editor    = {David Lie and
               Mohammad Mannan and
               Michael Backes and
               XiaoFeng Wang},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2018, Toronto, ON, Canada, October
               15-19, 2018},
  pages     = {1397--1414},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3243734.3243775},
  doi       = {10.1145/3243734.3243775},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/RonenPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10992},
  pages     = {185--212},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96881-0\_7},
  doi       = {10.1007/978-3-319-96881-0\_7},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  editor    = {Ioannis Chatzigiannakis and
               Christos Kaklamanis and
               D{\'{a}}niel Marx and
               Donald Sannella},
  title     = {Tight Bounds on Online Checkpointing Algorithms},
  booktitle = {45th International Colloquium on Automata, Languages, and Programming,
               {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic},
  series    = {LIPIcs},
  volume    = {107},
  pages     = {13:1--13:13},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year      = {2018},
  url       = {https://doi.org/10.4230/LIPIcs.ICALP.2018.13},
  doi       = {10.4230/LIPIcs.ICALP.2018.13},
  timestamp = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl    = {https://dblp.org/rec/conf/icalp/Bar-OnDDHKRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR18,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  title     = {How to (not) share a password: Privacy preserving protocols for finding
               heavy hitters with adversarial behavior},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {3},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/003},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/NaorPR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {527},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/527},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {747},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/747},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RonenPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenGGSWY18,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {1173},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1173},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RonenGGSWY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RonenSWO17,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {195--212},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/SP.2017.14},
  doi       = {10.1109/SP.2017.14},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/RonenSWO17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Bar-OnDDHKRS17,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Optimal Backup Strategies Against Cyber Attacks},
  journal   = {CoRR},
  volume    = {abs/1704.02659},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.02659},
  archivePrefix = {arXiv},
  eprint    = {1704.02659},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/Bar-OnDDHKRS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RonenS16,
  author    = {Eyal Ronen and
               Adi Shamir},
  title     = {Extended Functionality Attacks on IoT Devices: The Case of Smart Lights},
  booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages     = {3--12},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/EuroSP.2016.13},
  doi       = {10.1109/EuroSP.2016.13},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/eurosp/RonenS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenOSW16,
  author    = {Eyal Ronen and
               Colin O'Flynn and
               Adi Shamir and
               Achi{-}Or Weingarten},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {1047},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1047},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RonenOSW16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics