


Остановите войну!
for scientists:


default search action
Orr Dunkelman
אור דונקלמן
Person information

- unicode name: אור דונקלמן
- affiliation: University of Haifa, Department of Computer Science, Haifa, Israel
- affiliation (former): Technion - Israel Institute of Technology, Haifa, Israel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j33]Zhenzhen Guo, Gaoli Wang
, Orr Dunkelman, Yinxue Pan, Shengyuan Liu
:
Tweakable SM4: How to tweak SM4 into tweakable block ciphers? J. Inf. Secur. Appl. 72: 103406 (2023) - [j32]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. IACR Trans. Symmetric Cryptol. 2023(1): 41-66 (2023) - [c86]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [i73]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. IACR Cryptol. ePrint Arch. 2023: 230 (2023) - [i72]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i71]Orr Dunkelman, Nathan Keller, Ariel Weizman:
Practical-Time Related-Key Attack on GOST with Secret S-boxes. IACR Cryptol. ePrint Arch. 2023: 374 (2023) - 2022
- [j31]Orr Dunkelman
, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical key recovery attacks on FlexAEAD. Des. Codes Cryptogr. 90(4): 983-1007 (2022) - [j30]Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-Round SHA-3-384 in Practical Time. IACR Trans. Symmetric Cryptol. 2022(3): 239-270 (2022) - [c85]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-Permutation in the Known-Key Setting. INDOCRYPT 2022: 349-372 - [c84]Danielle Movsowitz-Davidow, Orna Agmon Ben-Yehuda, Orr Dunkelman:
Sharp behavioral changes in preemptible instance pricing. SYSTOR 2022: 145 - [e9]Orr Dunkelman
, Stefan Dziembowski
:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13275, Springer 2022, ISBN 978-3-031-06943-7 [contents] - [e8]Orr Dunkelman
, Stefan Dziembowski
:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13276, Springer 2022, ISBN 978-3-031-07084-6 [contents] - [e7]Orr Dunkelman
, Stefan Dziembowski
:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13277, Springer 2022, ISBN 978-3-031-07081-5 [contents] - [i70]Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-round SHA3-384 in Practical Time. IACR Cryptol. ePrint Arch. 2022: 194 (2022) - [i69]Orr Dunkelman, Eran Lambooij, Shibam Ghosh:
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256. IACR Cryptol. ePrint Arch. 2022: 1122 (2022) - [i68]Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting. IACR Cryptol. ePrint Arch. 2022: 1567 (2022) - 2021
- [j29]Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY. Inf. Comput. 281: 104796 (2021) - [j28]Danny Keller, Margarita Osadchy
, Orr Dunkelman
:
Inverting Binarizations of Facial Templates Produced by Deep Learning (and Its Implications). IEEE Trans. Inf. Forensics Secur. 16: 4184-4196 (2021) - [c83]Rami Ailabouni, Orr Dunkelman, Sara Bitan:
DNS-Morph: UDP-Based Bootstrapping Protocol for Tor. CSCML 2021: 244-265 - [c82]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c81]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [c80]Shibam Ghosh
, Orr Dunkelman:
Automatic Search for Bit-Based Division Property. LATINCRYPT 2021: 254-274 - [e6]Orr Dunkelman
, Michael J. Jacobson Jr.
, Colin O'Flynn
:
Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12804, Springer 2021, ISBN 978-3-030-81651-3 [contents] - [i67]Mor Peleg, Amnon Reichman, Sivan Shachar, Tamir Gadot, Meytal Avgil Tsadok, Maya Azaria, Orr Dunkelman, Shiri Hassid, Daniella Partem, Maya Shmailov, Elad Yom-Tov, Roy Cohen:
COVID-19 Datathon Based on Deidentified Governmental Data as an Approach for Solving Policy Challenges, Increasing Trust, and Building a Community: Case Study. CoRR abs/2108.13068 (2021) - [i66]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i65]Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical Key Recovery Attacks on FlexAEAD. IACR Cryptol. ePrint Arch. 2021: 931 (2021) - [i64]Shibam Ghosh, Orr Dunkelman:
Automatic Search for Bit-based Division Property. IACR Cryptol. ePrint Arch. 2021: 965 (2021) - [i63]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j27]Orr Dunkelman
, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. J. Cryptol. 33(3): 910-916 (2020) - [j26]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j25]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod
, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c79]Orr Dunkelman
, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. CSCML 2020: 1-17 - [c78]Orr Dunkelman
, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-similar Ciphers. EUROCRYPT (1) 2020: 250-279 - [c77]Orr Dunkelman
, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [c76]Orr Dunkelman
, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya
:
Counting Active S-Boxes is not Enough. INDOCRYPT 2020: 332-344 - [i62]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i61]Danny Keller, Margarita Osadchy, Orr Dunkelman:
Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning. CoRR abs/2012.13293 (2020) - [i60]Orr Dunkelman, Senyang Huang, Eran Lambooij, Stav Perle:
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64. IACR Cryptol. ePrint Arch. 2020: 689 (2020) - [i59]Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya:
Cryptanalysis of Feistel-Based Format-Preserving Encryption. IACR Cryptol. ePrint Arch. 2020: 1311 (2020)
2010 – 2019
- 2019
- [j24]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [j23]Margarita Osadchy
, Orr Dunkelman
:
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings. IEEE Trans. Dependable Secur. Comput. 16(5): 796-804 (2019) - [j22]Orr Dunkelman, Senyang Huang
:
Reconstructing an S-box from its Difference Distribution Table. IACR Trans. Symmetric Cryptol. 2019(2): 193-217 (2019) - [c75]Tomer Ashur
, Orr Dunkelman
, Nael Masalha:
Linear Cryptanalysis Reduced Round of Piccolo-80. CSCML 2019: 16-32 - [c74]Achiya Bar-On, Orr Dunkelman
, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. EUROCRYPT (1) 2019: 313-342 - [c73]Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. SSR 2019: 69-80 - [e5]Tanja Lange, Orr Dunkelman:
Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11368, Springer 2019, ISBN 978-3-030-25282-3 [contents] - [i58]Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman:
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance. CoRR abs/1901.10861 (2019) - [i57]Rami Ailabouni, Orr Dunkelman, Sara Bitan:
DNS-Morph: UDP-Based Bootstrapping Protocol For Tor. CoRR abs/1904.01240 (2019) - [i56]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman:
DLCT: A New Tool for Differential-Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2019: 256 (2019) - [i55]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. IACR Cryptol. ePrint Arch. 2019: 509 (2019) - [i54]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. IACR Cryptol. ePrint Arch. 2019: 867 (2019) - [i53]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - [i52]Orr Dunkelman, Léo Perrin:
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. IACR Cryptol. ePrint Arch. 2019: 1187 (2019) - 2018
- [j21]Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. J. Cryptol. 31(3): 641-670 (2018) - [c72]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c71]Orr Dunkelman
, Ariel Weizman
:
Efficient Construction of the Kite Generator Revisited. CSCML 2018: 6-19 - [c70]Danielle Movsowitz, Liran Funaro, Shunit Agmon, Orna Agmon Ben-Yehuda, Orr Dunkelman:
Why Are Repeated Auctions in RaaS Clouds Risky? GECON 2018: 39-51 - [c69]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod
, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i51]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i50]Orr Dunkelman:
Efficient Construction of the Boomerang Connection Table. IACR Cryptol. ePrint Arch. 2018: 631 (2018) - [i49]Orr Dunkelman, Senyang Huang:
Reconstructing an S-box from its Difference Distribution Table. IACR Cryptol. ePrint Arch. 2018: 811 (2018) - 2017
- [j20]Margarita Osadchy
, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation. IEEE Trans. Inf. Forensics Secur. 12(11): 2640-2653 (2017) - [j19]Tomer Ashur
, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. IACR Trans. Symmetric Cryptol. 2017(1): 203-214 (2017) - [c68]Tomer Ashur
, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness with Minimal Modifications. CRYPTO (3) 2017: 3-33 - [c67]Margarita Osadchy, Yan Wang, Orr Dunkelman, Stuart J. Gibson, Julio C. Hernandez-Castro, Christopher J. Solomon:
GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation. CSCML 2017: 19-33 - [c66]Jihoon Cho, Kyu Young Choi
, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg:
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction. CT-RSA 2017: 293-308 - [c65]Ariel Weizman
, Orr Dunkelman
, Simi Haber
:
Efficient Construction of Diamond Structures. INDOCRYPT 2017: 166-185 - [i48]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - [i47]Tomer Ashur, Daniël Bodden, Orr Dunkelman:
Linear Cryptanalysis Using Low-bias Linear Approximations. IACR Cryptol. ePrint Arch. 2017: 204 (2017) - [i46]Tomer Ashur, Orr Dunkelman, Atul Luykx:
Boosting Authenticated Encryption Robustness With Minimal Modifications. IACR Cryptol. ePrint Arch. 2017: 239 (2017) - 2016
- [j18]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey
, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - [j17]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [c64]Jihoon Cho, Kyu Young Choi
, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. CANS 2016: 749-754 - [c63]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c62]Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens
:
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. SAC 2016: 247-263 - [c61]Tomer Ashur
, Orr Dunkelman, Nimrod Talmon
:
Breaching the Privacy of Israel's Paper Ballot Voting System. E-VOTE-ID 2016: 108-124 - [e4]Orr Dunkelman, Somitra Kumar Sanadhya:
Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Lecture Notes in Computer Science 10095, 2016, ISBN 978-3-319-49889-8 [contents] - [e3]Orr Dunkelman, Liam Keliher:
Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9566, Springer 2016, ISBN 978-3-319-31300-9 [contents] - [i45]Tomer Ashur, Orr Dunkelman, Nimrod Talmon:
Breaching the Privacy of Israel's Paper Ballot Voting System. CoRR abs/1608.08020 (2016) - [i44]Mor Ohana, Orr Dunkelman, Stuart J. Gibson, Margarita Osadchy:
HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images. CoRR abs/1611.03811 (2016) - [i43]Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA. IACR Cryptol. ePrint Arch. 2016: 336 (2016) - [i42]Tomer Ashur, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. IACR Cryptol. ePrint Arch. 2016: 532 (2016) - [i41]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - [i40]Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. IACR Cryptol. ePrint Arch. 2016: 679 (2016) - [i39]Achiya Bar-On, Eli Biham, Orr Dunkelman, Nathan Keller:
Efficient Slide Attacks. IACR Cryptol. ePrint Arch. 2016: 1177 (2016) - 2015
- [j16]Orr Dunkelman, Nathan Keller, Adi Shamir:
Almost universal forgery attacks on AES-based MAC's. Des. Codes Cryptogr. 76(3): 431-449 (2015) - [j15]Orr Dunkelman, Nathan Keller:
Practical-time attacks against reduced variants of MISTY1. Des. Codes Cryptogr. 76(3): 601-627 (2015) - [j14]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [j13]Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. J. Cryptol. 28(1): 1-28 (2015) - [j12]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. J. Cryptol. 28(2): 209-239 (2015) - [j11]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. J. Cryptol. 28(3): 397-422 (2015) - [c60]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c59]Achiya Bar-On, Itai Dinur, Orr Dunkelman
, Virginie Lallemand, Nathan Keller, Boaz Tsaban:
Cryptanalysis of SP Networks with Partial Non-Linear Layers. EUROCRYPT (1) 2015: 315-342 - [c58]Itai Dinur, Orr Dunkelman
, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. LATINCRYPT 2015: 139-156 - [i38]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - [i37]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 268 (2015) - [i36]Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:
Decomposing the ASASA Block Cipher Construction. IACR Cryptol. ePrint Arch. 2015: 507 (2015) - 2014
- [j10]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j9]Itai Dinur, Orr Dunkelman
, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. J. Cryptol. 27(2): 183-209 (2014) - [j8]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. J. Cryptol. 27(4): 824-849 (2014) - [c57]Itai Dinur, Orr Dunkelman
, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c56]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [i35]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Boaz Tsaban:
Improved Analysis of Zorro-Like Ciphers. IACR Cryptol. ePrint Arch. 2014: 228 (2014) - [i34]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on Slide with a Twist Attacks. IACR Cryptol. ePrint Arch. 2014: 847 (2014) - 2013
- [j7]Orr Dunkelman
, Nathan Keller:
Cryptanalysis of the Stream Cipher LEX. Des. Codes Cryptogr. 67(3): 357-373 (2013) - [c55]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. ASIACRYPT (1) 2013: 337-356 - [c54]Tomer Ashur
, Orr Dunkelman:
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. CANS 2013: 271-290 - [c53]Tomer Ashur
, Orr Dunkelman:
On the anonymity of Israel's general elections. CCS 2013: 1399-1402 - [c52]Orr Dunkelman, Margarita Osadchy, Mahmood Sharif:
Secure authentication from facial attributeswith no privacy loss. CCS 2013: 1403-1406 - [c51]Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013: 219-240 - [i33]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. IACR Cryptol. ePrint Arch. 2013: 391 (2013) - [i32]Orr Dunkelman, Nathan Keller:
Practical-Time Attacks Against Reduced Variants of MISTY1. IACR Cryptol. ePrint Arch. 2013: 431 (2013) - [i31]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. IACR Cryptol. ePrint Arch. 2013: 634 (2013) - [i30]Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. IACR Cryptol. ePrint Arch. 2013: 674 (2013) - [i29]Tomer Ashur, Orr Dunkelman:
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. IACR Cryptol. ePrint Arch. 2013: 675 (2013) - 2012
- [j6]Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel
, Guy A. E. Vandenbosch, Ingrid Verbauwhede
:
A Practical Attack on KeeLoq. J. Cryptol. 25(1): 136-157 (2012) - [j5]Jongsung Kim, Seokhie Hong, Bart Preneel
, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis. IEEE Trans. Inf. Theory 58(7): 4948-4966 (2012) - [j4]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, Vincent Rijmen
:
Low-Data Complexity Attacks on AES. IEEE Trans. Inf. Theory 58(11): 7002-7017 (2012) - [c50]Itai Dinur, Orr Dunkelman
, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. CRYPTO 2012: 719-740 - [c49]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. EUROCRYPT 2012: 336-354 - [c48]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. FSE 2012: 9-28 - [c47]Itai Dinur, Orr Dunkelman, Adi Shamir:
New Attacks on Keccak-224 and Keccak-256. FSE 2012: 442-461 - [c46]Orr Dunkelman:
From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems. INDOCRYPT 2012: 16 - [e2]