BibTeX records: Eyal Ronen

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/AmonDKRS21,
  author    = {Ohad Amon and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Three Third Generation Attacks on the Format Preserving Encryption
               Scheme {FF3}},
  booktitle = {{EUROCRYPT} {(2)}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12697},
  pages     = {127--154},
  publisher = {Springer},
  year      = {2021}
}
@inproceedings{DBLP:conf/icalp/DunkelmanGKKRST21,
  author    = {Orr Dunkelman and
               Zeev Geyzel and
               Chaya Keller and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir and
               Ran J. Tessler},
  title     = {Error Resilient Space Partitioning (Invited Talk)},
  booktitle = {{ICALP}},
  series    = {LIPIcs},
  volume    = {198},
  pages     = {4:1--4:22},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year      = {2021}
}
@article{DBLP:journals/iacr/AmonDKRS21,
  author    = {Ohad Amon and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Three Third Generation Attacks on the Format Preserving Encryption
               Scheme {FF3}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {335},
  year      = {2021}
}
@article{DBLP:journals/iacr/Chuengsatiansup21a,
  author    = {Chitchanok Chuengsatiansup and
               Eyal Ronen and
               Gregory G. Rose and
               Yuval Yarom},
  title     = {Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {828},
  year      = {2021}
}
@article{DBLP:journals/joc/Bar-OnDKRS20,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  journal   = {J. Cryptol.},
  volume    = {33},
  number    = {3},
  pages     = {1003--1043},
  year      = {2020}
}
@article{DBLP:journals/talg/Bar-OnDDHKRS20,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Tight Bounds on Online Checkpointing Algorithms},
  journal   = {{ACM} Trans. Algorithms},
  volume    = {16},
  number    = {3},
  pages     = {31:1--31:22},
  year      = {2020}
}
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {The Retracing Boomerang Attack},
  booktitle = {{EUROCRYPT} {(1)}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12105},
  pages     = {280--309},
  publisher = {Springer},
  year      = {2020}
}
@inproceedings{DBLP:conf/sp/VanhoefR20,
  author    = {Mathy Vanhoef and
               Eyal Ronen},
  title     = {Dragonblood: Analyzing the Dragonfly Handshake of {WPA3} and EAP-pwd},
  booktitle = {{IEEE} Symposium on Security and Privacy},
  pages     = {517--533},
  publisher = {{IEEE}},
  year      = {2020}
}
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20,
  author    = {Shaanan Cohney and
               Andrew Kwong and
               Shahar Paz and
               Daniel Genkin and
               Nadia Heninger and
               Eyal Ronen and
               Yuval Yarom},
  title     = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  booktitle = {{IEEE} Symposium on Security and Privacy},
  pages     = {1241--1258},
  publisher = {{IEEE}},
  year      = {2020}
}
@article{DBLP:journals/corr/abs-2008-03675,
  author    = {Orr Dunkelman and
               Zeev Geyzel and
               Chaya Keller and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir and
               Ran J. Tessler},
  title     = {Consistent High Dimensional Rounding with Side Information},
  journal   = {CoRR},
  volume    = {abs/2008.03675},
  year      = {2020}
}
@article{DBLP:journals/iacr/NaorPR20,
  author    = {Moni Naor and
               Shahar Paz and
               Eyal Ronen},
  title     = {{CRISP:} Compromise Resilient Identity-based Symmetric {PAKE}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {529},
  year      = {2020}
}
@inproceedings{DBLP:conf/ccs/NaorPR19,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  title     = {How to (not) Share a Password: Privacy Preserving Protocols for Finding
               Heavy Hitters with Adversarial Behavior},
  booktitle = {{CCS}},
  pages     = {1369--1386},
  publisher = {{ACM}},
  year      = {2019}
}
@inproceedings{DBLP:conf/sp/RonenGGSWY19,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  booktitle = {{IEEE} Symposium on Security and Privacy},
  pages     = {435--452},
  publisher = {{IEEE}},
  year      = {2019}
}
@article{DBLP:journals/corr/abs-1901-10861,
  author    = {Adi Shamir and
               Itay Safran and
               Eyal Ronen and
               Orr Dunkelman},
  title     = {A Simple Explanation for the Existence of Adversarial Examples with
               Small Hamming Distance},
  journal   = {CoRR},
  volume    = {abs/1901.10861},
  year      = {2019}
}
@article{DBLP:journals/iacr/VanhoefR19,
  author    = {Mathy Vanhoef and
               Eyal Ronen},
  title     = {Dragonblood: {A} Security Analysis of WPA3's {SAE} Handshake},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {383},
  year      = {2019}
}
@article{DBLP:journals/iacr/CohneyKPGHRY19,
  author    = {Shaanan Cohney and
               Andrew Kwong and
               Shahar Paz and
               Daniel Genkin and
               Nadia Heninger and
               Eyal Ronen and
               Yuval Yarom},
  title     = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {996},
  year      = {2019}
}
@article{DBLP:journals/iacr/DunkelmanKRS19,
  author    = {Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {The Retracing Boomerang Attack},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1154},
  year      = {2019}
}
@article{DBLP:journals/ieeesp/RonenSWO18,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction},
  journal   = {{IEEE} Secur. Priv.},
  volume    = {16},
  number    = {1},
  pages     = {54--62},
  year      = {2018}
}
@inproceedings{DBLP:conf/ccs/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  booktitle = {{CCS}},
  pages     = {1397--1414},
  publisher = {{ACM}},
  year      = {2018}
}
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  booktitle = {{CRYPTO} {(2)}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10992},
  pages     = {185--212},
  publisher = {Springer},
  year      = {2018}
}
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Tight Bounds on Online Checkpointing Algorithms},
  booktitle = {{ICALP}},
  series    = {LIPIcs},
  volume    = {107},
  pages     = {13:1--13:13},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year      = {2018}
}
@article{DBLP:journals/iacr/NaorPR18,
  author    = {Moni Naor and
               Benny Pinkas and
               Eyal Ronen},
  title     = {How to (not) share a password: Privacy preserving protocols for finding
               heavy hitters with adversarial behavior},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {3},
  year      = {2018}
}
@article{DBLP:journals/iacr/Bar-OnDKRS18,
  author    = {Achiya Bar{-}On and
               Orr Dunkelman and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
               Data and Memory Complexities},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {527},
  year      = {2018}
}
@article{DBLP:journals/iacr/RonenPS18,
  author    = {Eyal Ronen and
               Kenneth G. Paterson and
               Adi Shamir},
  title     = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {747},
  year      = {2018}
}
@article{DBLP:journals/iacr/RonenGGSWY18,
  author    = {Eyal Ronen and
               Robert Gillham and
               Daniel Genkin and
               Adi Shamir and
               David Wong and
               Yuval Yarom},
  title     = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS}
               Implementations},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1173},
  year      = {2018}
}
@inproceedings{DBLP:conf/sp/RonenSWO17,
  author    = {Eyal Ronen and
               Adi Shamir and
               Achi{-}Or Weingarten and
               Colin O'Flynn},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  booktitle = {{IEEE} Symposium on Security and Privacy},
  pages     = {195--212},
  publisher = {{IEEE} Computer Society},
  year      = {2017}
}
@article{DBLP:journals/corr/Bar-OnDDHKRS17,
  author    = {Achiya Bar{-}On and
               Itai Dinur and
               Orr Dunkelman and
               Rani Hod and
               Nathan Keller and
               Eyal Ronen and
               Adi Shamir},
  title     = {Optimal Backup Strategies Against Cyber Attacks},
  journal   = {CoRR},
  volume    = {abs/1704.02659},
  year      = {2017}
}
@inproceedings{DBLP:conf/eurosp/RonenS16,
  author    = {Eyal Ronen and
               Adi Shamir},
  title     = {Extended Functionality Attacks on IoT Devices: The Case of Smart Lights},
  booktitle = {EuroS{\&}P},
  pages     = {3--12},
  publisher = {{IEEE}},
  year      = {2016}
}
@article{DBLP:journals/iacr/RonenOSW16,
  author    = {Eyal Ronen and
               Colin O'Flynn and
               Adi Shamir and
               Achi{-}Or Weingarten},
  title     = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1047},
  year      = {2016}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics