Nathan Keller

From MaRDI portal
Revision as of 10:31, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:312257

Available identifiers

zbMath Open keller.nathanMaRDI QIDQ312257

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61262532024-04-09Paper
Practical-time related-key attack on GOST with secret S-boxes2024-02-02Paper
Quantum time/memory/data tradeoff attacks2024-01-15Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation2023-12-08Paper
Local concentration inequalities and Tomaszewski’s conjecture2023-11-14Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity2023-10-27Paper
Sharp Hypercontractivity for Global Functions2023-07-03Paper
On $t$-Intersecting Families of Permutations2023-03-28Paper
Proof of Tomaszewski's conjecture on randomly signed sums2022-08-24Paper
Practical key recovery attacks on FlexAEAD2022-03-31Paper
Mind the middle layer: the HADES design strategy revisited2021-12-08Paper
Three third generation attacks on the format preserving encryption scheme FF32021-12-08Paper
New slide attacks on almost self-similar ciphers2021-12-01Paper
The retracing boomerang attack2021-12-01Paper
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture2021-10-27Paper
Tight Bounds on Online Checkpointing Algorithms2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms2021-05-03Paper
A structure theorem for almost low-degree functions on the slice2021-01-18Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-30Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities2020-06-15Paper
A practical forgery attack on Lilliput-AE2020-06-15Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-15Paper
DLCT: a new tool for differential-linear cryptanalysis2020-02-04Paper
Biased halfspaces, noise sensitivity, and local Chernoff inequalities2020-01-17Paper
Stability versions of Erdős-Ko-Rado type theorems via isoperimetry2019-12-12Paper
Efficient dissection of bicomposite problems with cryptanalytic applications2019-11-27Paper
Quantum speedups need structure2019-11-09Paper
A Note on Large H-Intersecting Families2019-03-11Paper
On a biased edge isoperimetric inequality for the discrete cube2019-01-25Paper
On the structure of subsets of the discrete cube with small edge boundary2019-01-09Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities2018-09-26Paper
Efficient slide attacks2018-09-14Paper
Approximation of biased Boolean functions of small total influence by DNFs2018-08-31Paper
Chvátal's conjecture and correlation inequalities2018-03-02Paper
The junta method in extremal hypergraph theory and Chvátal's conjecture2018-01-18Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis2017-07-12Paper
Low-Data Complexity Attacks on AES2017-06-08Paper
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction2017-04-12Paper
A $$2^{70}$$ Attack on the Full MISTY12016-11-30Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes2016-10-13Paper
On the sum of the \(L_1\) influences of bounded functions2016-09-15Paper
Juntas in the1-grid and Lipschitz maps between discrete tori2016-09-15Paper
On the correlation of increasing families2016-08-18Paper
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os2016-04-20Paper
New Attacks on Feistel Structures with Improved Memory Complexities2015-12-10Paper
Reflections on slide with a twist attacks2015-10-26Paper
Cryptanalysis of SP Networks with Partial Non-Linear Layers2015-09-30Paper
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-642015-09-18Paper
Almost universal forgery attacks on AES-based MAC's2015-09-01Paper
Practical-time attacks against reduced variants of~MISTY12015-09-01Paper
Improved single-key attacks on 8-round AES-192 and AES-2562015-08-03Paper
New attacks on IDEA with at least 6 rounds2015-05-12Paper
Slidex attacks on the Even-Mansour encryption scheme2015-03-25Paper
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys2015-01-16Paper
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony2015-01-07Paper
Geometric influences. II: Correlation inequalities and noise sensitivity2014-12-05Paper
Quantitative relation between noise sensitivity and influences2014-05-05Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES22013-12-10Paper
Cryptanalysis of the stream cipher LEX2013-05-06Paper
A note on the entropy/influence conjecture2012-10-26Paper
A tight quantitative version of Arrow's impossibility theorem2012-10-19Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems2012-09-25Paper
A simple reduction from a biased measure on the discrete cube to the uniform measure2012-09-12Paper
Minimalism in Cryptography: The Even-Mansour Scheme Revisited2012-06-29Paper
Geometric influences2012-06-19Paper
A practical attack on KeeLoq2012-05-23Paper
A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives2011-10-18Paper
On the Influences of Variables on Boolean Functions in Product Spaces2011-01-17Paper
Improved Single-Key Attacks on 8-Round AES-192 and AES-2562010-12-07Paper
The effects of the omission of last round's MixColumns on AES2010-09-07Paper
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words2010-09-02Paper
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony2010-08-24Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds2010-06-01Paper
On the probability of a rational outcome for generalized social welfare functions on three alternatives2010-04-21Paper
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers2010-04-19Paper
Fast Software Encryption2010-01-05Paper
Fast Software Encryption2010-01-05Paper
Linear transformations of monotone functions on the discrete cube2009-12-09Paper
Lower bound on the correlation between monotone families in the average case2009-06-11Paper
Instant ciphertext-only cryptanalysis of GSM encrypted communication2009-06-08Paper
Cryptanalysis of CTC22009-04-29Paper
An Improved Impossible Differential Attack on MISTY12009-02-10Paper
A New Attack on the LEX Stream Cipher2009-02-10Paper
New Impossible Differential Attacks on AES2009-01-22Paper
A Differential-Linear Attack on 12-Round Serpent2009-01-22Paper
A New Criterion for Nonlinearity of Block Ciphers2008-12-21Paper
A Unified Approach to Related-Key Attacks2008-09-18Paper
Improved Slide Attacks2008-09-16Paper
A New Attack on 6-Round IDEA2008-09-16Paper
Related-Key Rectangle Attack on 42-Round SHACAL-22008-06-17Paper
Related-Key Boomerang and Rectangle Attacks2008-05-06Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY12008-04-24Paper
New Cryptanalytic Results on IDEA2008-04-24Paper
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers2008-04-17Paper
A Simple Related-Key Attack on the Full SHACAL-12008-04-17Paper
A Practical Attack on KeeLoq2008-04-15Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-12008-04-11Paper
The Delicate Issues of Addition with Respect to XOR Differences2008-03-25Paper
A Related-Key Rectangle Attack on the Full KASUMI2008-03-18Paper
Related-Key Rectangle Attack on the Full SHACAL-12007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Fast Software Encryption2006-06-22Paper
Spectral properties of sign symmetric matrices2006-05-18Paper
https://portal.mardi4nfdi.de/entity/Q30463322004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent2004-08-12Paper
Enhancing Differential-Linear Cryptanalysis2003-07-16Paper
Positivity of principal minors, sign symmetry and stability.2003-05-04Paper
https://portal.mardi4nfdi.de/entity/Q27788562002-03-21Paper
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os0001-01-03Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR0001-01-03Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Nathan Keller