Nathan Keller

From MaRDI portal
Revision as of 10:31, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:312257

Available identifiers

zbMath Open keller.nathanMaRDI QIDQ312257

List of research outcomes





PublicationDate of PublicationType
Partial sums meet FFT: improved attack on 6-round AES2024-11-12Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity2024-11-06Paper
The retracing boomerang attack, with application to reduced-round AES2024-08-30Paper
https://portal.mardi4nfdi.de/entity/Q61262532024-04-09Paper
Practical-time related-key attack on GOST with secret S-boxes2024-02-02Paper
Quantum time/memory/data tradeoff attacks2024-01-15Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation2023-12-08Paper
Local concentration inequalities and Tomaszewski’s conjecture2023-11-14Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity2023-10-27Paper
Sharp Hypercontractivity for Global Functions2023-07-03Paper
On $t$-Intersecting Families of Permutations2023-03-28Paper
Proof of Tomaszewski's conjecture on randomly signed sums2022-08-24Paper
Practical key recovery attacks on FlexAEAD2022-03-31Paper
Mind the middle layer: the HADES design strategy revisited2021-12-08Paper
Three third generation attacks on the format preserving encryption scheme FF32021-12-08Paper
New slide attacks on almost self-similar ciphers2021-12-01Paper
The retracing boomerang attack2021-12-01Paper
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture2021-10-27Paper
Tight Bounds on Online Checkpointing Algorithms2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms2021-05-03Paper
A structure theorem for almost low-degree functions on the slice2021-01-18Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-30Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities2020-06-15Paper
A practical forgery attack on Lilliput-AE2020-06-15Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-15Paper
DLCT: a new tool for differential-linear cryptanalysis2020-02-04Paper
Biased halfspaces, noise sensitivity, and local Chernoff inequalities2020-01-17Paper
Stability versions of Erdős-Ko-Rado type theorems via isoperimetry2019-12-12Paper
Efficient dissection of bicomposite problems with cryptanalytic applications2019-11-27Paper
Quantum speedups need structure2019-11-09Paper
A Note on Large H-Intersecting Families2019-03-11Paper
On a biased edge isoperimetric inequality for the discrete cube2019-01-25Paper
On the structure of subsets of the discrete cube with small edge boundary2019-01-09Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities2018-09-26Paper
Efficient slide attacks2018-09-14Paper
Approximation of biased Boolean functions of small total influence by DNFs2018-08-31Paper
Chvátal's conjecture and correlation inequalities2018-03-02Paper
The junta method in extremal hypergraph theory and Chvátal's conjecture2018-01-18Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis2017-07-12Paper
Low-Data Complexity Attacks on AES2017-06-08Paper
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction2017-04-12Paper
A $$2^{70}$$ Attack on the Full MISTY12016-11-30Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes2016-10-13Paper
On the sum of the \(L_1\) influences of bounded functions2016-09-15Paper
Juntas in the1-grid and Lipschitz maps between discrete tori2016-09-15Paper
On the correlation of increasing families2016-08-18Paper
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os2016-04-20Paper
New Attacks on Feistel Structures with Improved Memory Complexities2015-12-10Paper
Reflections on slide with a twist attacks2015-10-26Paper
Cryptanalysis of SP Networks with Partial Non-Linear Layers2015-09-30Paper
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-642015-09-18Paper
Almost universal forgery attacks on AES-based MAC's2015-09-01Paper
Practical-time attacks against reduced variants of~MISTY12015-09-01Paper
Improved single-key attacks on 8-round AES-192 and AES-2562015-08-03Paper
New attacks on IDEA with at least 6 rounds2015-05-12Paper
Slidex attacks on the Even-Mansour encryption scheme2015-03-25Paper
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys2015-01-16Paper
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony2015-01-07Paper
Geometric influences. II: Correlation inequalities and noise sensitivity2014-12-05Paper
Quantitative relation between noise sensitivity and influences2014-05-05Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES22013-12-10Paper
Cryptanalysis of the stream cipher LEX2013-05-06Paper
A note on the entropy/influence conjecture2012-10-26Paper
A tight quantitative version of Arrow's impossibility theorem2012-10-19Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems2012-09-25Paper
A simple reduction from a biased measure on the discrete cube to the uniform measure2012-09-12Paper
Minimalism in Cryptography: The Even-Mansour Scheme Revisited2012-06-29Paper
Geometric influences2012-06-19Paper
A practical attack on KeeLoq2012-05-23Paper
A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives2011-10-18Paper
On the Influences of Variables on Boolean Functions in Product Spaces2011-01-17Paper
Improved Single-Key Attacks on 8-Round AES-192 and AES-2562010-12-07Paper
The effects of the omission of last round's MixColumns on AES2010-09-07Paper
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words2010-09-02Paper
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony2010-08-24Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds2010-06-01Paper
On the probability of a rational outcome for generalized social welfare functions on three alternatives2010-04-21Paper
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers2010-04-19Paper
Fast Software Encryption2010-01-05Paper
Fast Software Encryption2010-01-05Paper
Linear transformations of monotone functions on the discrete cube2009-12-09Paper
Lower bound on the correlation between monotone families in the average case2009-06-11Paper
Instant ciphertext-only cryptanalysis of GSM encrypted communication2009-06-08Paper
Cryptanalysis of CTC22009-04-29Paper
An Improved Impossible Differential Attack on MISTY12009-02-10Paper
A New Attack on the LEX Stream Cipher2009-02-10Paper
New Impossible Differential Attacks on AES2009-01-22Paper
A Differential-Linear Attack on 12-Round Serpent2009-01-22Paper
A New Criterion for Nonlinearity of Block Ciphers2008-12-21Paper
A Unified Approach to Related-Key Attacks2008-09-18Paper
Improved Slide Attacks2008-09-16Paper
A New Attack on 6-Round IDEA2008-09-16Paper
Related-Key Rectangle Attack on 42-Round SHACAL-22008-06-17Paper
Related-Key Boomerang and Rectangle Attacks2008-05-06Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY12008-04-24Paper
New Cryptanalytic Results on IDEA2008-04-24Paper
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers2008-04-17Paper
A Simple Related-Key Attack on the Full SHACAL-12008-04-17Paper
A Practical Attack on KeeLoq2008-04-15Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-12008-04-11Paper
The Delicate Issues of Addition with Respect to XOR Differences2008-03-25Paper
A Related-Key Rectangle Attack on the Full KASUMI2008-03-18Paper
Related-Key Rectangle Attack on the Full SHACAL-12007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Fast Software Encryption2006-06-22Paper
Spectral properties of sign symmetric matrices2006-05-18Paper
https://portal.mardi4nfdi.de/entity/Q30463322004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent2004-08-12Paper
Enhancing Differential-Linear Cryptanalysis2003-07-16Paper
Positivity of principal minors, sign symmetry and stability.2003-05-04Paper
https://portal.mardi4nfdi.de/entity/Q27788562002-03-21Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XORN/APaper

Research outcomes over time

This page was built for person: Nathan Keller