The following pages link to Orr Dunkelman (Q321298):
Displayed 50 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- A practical attack on KeeLoq (Q421044) (← links)
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333) (← links)
- Almost universal forgery attacks on AES-based MAC's (Q494579) (← links)
- Practical-time attacks against reduced variants of~MISTY1 (Q494594) (← links)
- Improved practical attacks on round-reduced Keccak (Q744599) (← links)
- Techniques for cryptanalysis of block ciphers. (to appear) (Q764863) (← links)
- Reflections on slide with a twist attacks (Q887444) (← links)
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers (Q963420) (← links)
- The effects of the omission of last round's MixColumns on AES (Q991791) (← links)
- Boosting authenticated encryption robustness with minimal modifications (Q1675191) (← links)
- New second preimage attacks on dithered hash functions with low memory complexity (Q1698640) (← links)
- Efficient construction of diamond structures (Q1746836) (← links)
- Cryptanalysis of the stream cipher LEX (Q1949239) (← links)
- Efficient dissection of bicomposite problems with cryptanalytic applications (Q2010595) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} (Q2051820) (← links)
- New slide attacks on almost self-similar ciphers (Q2055611) (← links)
- The retracing boomerang attack (Q2055612) (← links)
- Three third generation attacks on the format preserving encryption scheme FF3 (Q2056726) (← links)
- Practical key recovery attacks on FlexAEAD (Q2119949) (← links)
- Automatic search for bit-based division property (Q2146095) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- A practical forgery attack on Lilliput-AE (Q2188961) (← links)
- DLCT: a new tool for differential-linear cryptanalysis (Q2292649) (← links)
- New attacks on IDEA with at least 6 rounds (Q2344046) (← links)
- Efficient slide attacks (Q2413611) (← links)
- Improved single-key attacks on 8-round AES-192 and AES-256 (Q2516521) (← links)
- (Q2707591) (← links)
- (Q2778856) (← links)
- Memory-Efficient Algorithms for Finding Needles in Haystacks (Q2829215) (← links)
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 (Q2867226) (← links)
- From Multiple Encryption to Knapsacks – Efficient Dissection of Composite Problems (Q2876920) (← links)
- New Insights on Impossible Differential Cryptanalysis (Q2889875) (← links)
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited (Q2894417) (← links)
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems (Q2914297) (← links)
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys (Q2938858) (← links)
- Improved Top-Down Techniques in Differential Cryptanalysis (Q2946446) (← links)
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials (Q2946880) (← links)
- Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 (Q2946920) (← links)
- Cryptanalysis of SP Networks with Partial Non-Linear Layers (Q2948333) (← links)
- WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction (Q2975812) (← links)
- Low-Data Complexity Attacks on AES (Q2989725) (← links)
- Linear Analysis of Reduced-Round CubeHash (Q3011313) (← links)
- (Q3046332) (← links)
- (Q3046336) (← links)
- Linear Cryptanalysis of Reduced Round Serpent (Q3046584) (← links)
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 (Q3058655) (← links)
- Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 (Q3084241) (← links)