The following pages link to Orr Dunkelman (Q321298):
Displayed 47 items.
- New Attacks on Feistel Structures with Improved Memory Complexities (Q3457122) (← links)
- Related-Key Rectangle Attack on 42-Round SHACAL-2 (Q3506881) (← links)
- Improved Slide Attacks (Q3524887) (← links)
- A New Attack on 6-Round IDEA (Q3524892) (← links)
- A Unified Approach to Related-Key Attacks (Q3525662) (← links)
- A New Criterion for Nonlinearity of Block Ciphers (Q3549100) (← links)
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds (Q3563841) (← links)
- Another Look at Complementation Properties (Q3577970) (← links)
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony (Q3582766) (← links)
- An Improved Impossible Differential Attack on MISTY1 (Q3600390) (← links)
- A New Attack on the LEX Stream Cipher (Q3600396) (← links)
- Cryptanalysis of CTC2 (Q3623047) (← links)
- Cryptanalysis of Vortex (Q3637129) (← links)
- KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers (Q3642944) (← links)
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård (Q3651273) (← links)
- Cryptanalysis of Dynamic SHA(2) (Q3651274) (← links)
- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode (Q3652318) (← links)
- (Q4250830) (← links)
- Enhancing Differential-Linear Cryptanalysis (Q4412802) (← links)
- Improved Attacks on Full GOST (Q4899694) (← links)
- New Attacks on Keccak-224 and Keccak-256 (Q4899719) (← links)
- Tight Bounds on Online Checkpointing Algorithms (Q4987449) (← links)
- Tight Bounds on Online Checkpointing Algorithms (Q5002679) (← links)
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis (Q5271860) (← links)
- Related-Key Boomerang and Rectangle Attacks (Q5385748) (← links)
- A Simple Related-Key Attack on the Full SHACAL-1 (Q5385940) (← links)
- Related-Key Rectangle Attack on the Full SHACAL-1 (Q5429149) (← links)
- A Related-Key Rectangle Attack on the Full KASUMI (Q5451084) (← links)
- The Delicate Issues of Addition with Respect to XOR Differences (Q5452258) (← links)
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES (Q5458203) (← links)
- Differential and Rectangle Attacks on Reduced-Round SHACAL-1 (Q5458263) (← links)
- A Practical Attack on KeeLoq (Q5458582) (← links)
- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 (Q5458952) (← links)
- New Cryptanalytic Results on IDEA (Q5459093) (← links)
- Fast Software Encryption (Q5473584) (← links)
- New Impossible Differential Attacks on AES (Q5504630) (← links)
- A Differential-Linear Attack on 12-Round Serpent (Q5504632) (← links)
- Topics in Cryptology – CT-RSA 2006 (Q5898553) (← links)
- Topics in Cryptology – CT-RSA 2006 (Q5898570) (← links)
- Fast Software Encryption (Q5902474) (← links)
- Fast Software Encryption (Q5902475) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5916236) (← links)
- Improved key recovery attacks on reduced-round AES with practical data and memory complexities (Q5918865) (← links)
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation (Q6083125) (← links)
- Practical-time related-key attack on GOST with secret S-boxes (Q6145945) (← links)
- Quantum time/memory/data tradeoff attacks (Q6146595) (← links)
- Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting (Q6169473) (← links)