Nathan Keller

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Partial sums meet FFT: improved attack on 6-round AES
 
2024-11-12Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity
Forum of Mathematics, Sigma
2024-11-06Paper
The retracing boomerang attack, with application to reduced-round AES
Journal of Cryptology
2024-08-30Paper
scientific article; zbMATH DE number 7829259 (Why is no real title available?)
 
2024-04-09Paper
Practical-time related-key attack on GOST with secret S-boxes
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Quantum time/memory/data tradeoff attacks
Designs, Codes and Cryptography
2024-01-15Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Local concentration inequalities and Tomaszewski’s conjecture
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity
 
2023-10-27Paper
Sharp Hypercontractivity for Global Functions
 
2023-07-03Paper
On $t$-Intersecting Families of Permutations
 
2023-03-28Paper
Proof of Tomaszewski's conjecture on randomly signed sums
Advances in Mathematics
2022-08-24Paper
Practical key recovery attacks on FlexAEAD
Designs, Codes and Cryptography
2022-03-31Paper
Three third generation attacks on the format preserving encryption scheme FF3
 
2021-12-08Paper
Mind the middle layer: the HADES design strategy revisited
 
2021-12-08Paper
New slide attacks on almost self-similar ciphers
 
2021-12-01Paper
The retracing boomerang attack
 
2021-12-01Paper
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture
Advances in Mathematics
2021-10-27Paper
Tight bounds on online checkpointing algorithms
 
2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms
ACM Transactions on Algorithms
2021-05-03Paper
A structure theorem for almost low-degree functions on the slice
Israel Journal of Mathematics
2021-01-18Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Lecture Notes in Computer Science
2020-06-30Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Journal of Cryptology
2020-06-15Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Journal of Cryptology
2020-06-15Paper
A practical forgery attack on Lilliput-AE
Journal of Cryptology
2020-06-15Paper
DLCT: a new tool for differential-linear cryptanalysis
 
2020-02-04Paper
Biased halfspaces, noise sensitivity, and local Chernoff inequalities
discrete Analysis
2020-01-17Paper
Stability versions of Erdős-Ko-Rado type theorems via isoperimetry
Journal of the European Mathematical Society (JEMS)
2019-12-12Paper
Efficient dissection of bicomposite problems with cryptanalytic applications
Journal of Cryptology
2019-11-27Paper
Quantum speedups need structure
 
2019-11-09Paper
A note on large \(H\)-intersecting families
SIAM Journal on Discrete Mathematics
2019-03-11Paper
On a biased edge isoperimetric inequality for the discrete cube
Journal of Combinatorial Theory. Series A
2019-01-25Paper
On the structure of subsets of the discrete cube with small edge boundary
Discrete Analysis
2019-01-09Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Lecture Notes in Computer Science
2018-09-26Paper
Efficient slide attacks
Journal of Cryptology
2018-09-14Paper
Approximation of biased Boolean functions of small total influence by DNFs
Bulletin of the London Mathematical Society
2018-08-31Paper
Chvátal's conjecture and correlation inequalities
Journal of Combinatorial Theory. Series A
2018-03-02Paper
The junta method in extremal hypergraph theory and Chvátal's conjecture
 
2018-01-18Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory
2017-06-08Paper
WEM: a new family of white-box block ciphers based on the Even-Mansour construction
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
A \(2^{70}\) attack on the full MISTY1
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes
Journal of Cryptology
2016-10-13Paper
On the sum of the \(L_1\) influences of bounded functions
Israel Journal of Mathematics
2016-09-15Paper
Juntas in the \(\ell_{1}\)-grid and Lipschitz maps between discrete tori
Random Structures \& Algorithms
2016-09-15Paper
On the correlation of increasing families
Journal of Combinatorial Theory. Series A
2016-08-18Paper
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os
 
2016-04-20Paper
New attacks on Feistel structures with improved memory complexities
Lecture Notes in Computer Science
2015-12-10Paper
Reflections on slide with a twist attacks
Designs, Codes and Cryptography
2015-10-26Paper
Cryptanalysis of SP networks with partial non-linear layers
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Improved linear sieving techniques with applications to step-reduced LED-64
Fast Software Encryption
2015-09-18Paper
Almost universal forgery attacks on AES-based MAC's
Designs, Codes and Cryptography
2015-09-01Paper
Practical-time attacks against reduced variants of~MISTY1
Designs, Codes and Cryptography
2015-09-01Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Journal of Cryptology
2015-08-03Paper
New attacks on IDEA with at least 6 rounds
Journal of Cryptology
2015-05-12Paper
Slidex attacks on the Even-Mansour encryption scheme
Journal of Cryptology
2015-03-25Paper
Cryptanalysis of iterated Even-Mansour schemes with two keys
Lecture Notes in Computer Science
2015-01-16Paper
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
Journal of Cryptology
2015-01-07Paper
Geometric influences. II: Correlation inequalities and noise sensitivity
Annales de l'Institut Henri Poincaré. Probabilités et Statistiques
2014-12-05Paper
Quantitative relation between noise sensitivity and influences
Combinatorica
2014-05-05Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of the stream cipher LEX
Designs, Codes and Cryptography
2013-05-06Paper
A note on the entropy/influence conjecture
Discrete Mathematics
2012-10-26Paper
A tight quantitative version of Arrow's impossibility theorem
Journal of the European Mathematical Society (JEMS)
2012-10-19Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Lecture Notes in Computer Science
2012-09-25Paper
A simple reduction from a biased measure on the discrete cube to the uniform measure
European Journal of Combinatorics
2012-09-12Paper
Minimalism in cryptography: the Even-Mansour scheme revisited
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Geometric influences
The Annals of Probability
2012-06-19Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives
SIAM Journal on Computing
2011-10-18Paper
On the influences of variables on Boolean functions in product spaces
Combinatorics, Probability and Computing
2011-01-17Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
The effects of the omission of last round's MixColumns on AES
Information Processing Letters
2010-09-07Paper
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
Information Processing Letters
2010-09-02Paper
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
On the probability of a rational outcome for generalized social welfare functions on three alternatives
Journal of Combinatorial Theory. Series A
2010-04-21Paper
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
Information Processing Letters
2010-04-19Paper
Differential-linear cryptanalysis of Serpent.
Lecture Notes in Computer Science
2010-01-05Paper
Rectangle attacks on 49-round SHACAL-1.
Lecture Notes in Computer Science
2010-01-05Paper
Linear transformations of monotone functions on the discrete cube
Discrete Mathematics
2009-12-09Paper
Lower bound on the correlation between monotone families in the average case
Advances in Applied Mathematics
2009-06-11Paper
Instant ciphertext-only cryptanalysis of GSM encrypted communication
Journal of Cryptology
2009-06-08Paper
Cryptanalysis of CTC2
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
An Improved Impossible Differential Attack on MISTY1
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
A New Attack on the LEX Stream Cipher
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
New Impossible Differential Attacks on AES
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A Differential-Linear Attack on 12-Round Serpent
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A New Criterion for Nonlinearity of Block Ciphers
IEEE Transactions on Information Theory
2008-12-21Paper
A Unified Approach to Related-Key Attacks
Fast Software Encryption
2008-09-18Paper
Improved Slide Attacks
Fast Software Encryption
2008-09-16Paper
A New Attack on 6-Round IDEA
Fast Software Encryption
2008-09-16Paper
Related-Key Rectangle Attack on 42-Round SHACAL-2
Lecture Notes in Computer Science
2008-06-17Paper
Related-Key Boomerang and Rectangle Attacks
Lecture Notes in Computer Science
2008-05-06Paper
New Cryptanalytic Results on IDEA
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
A Simple Related-Key Attack on the Full SHACAL-1
Lecture Notes in Computer Science
2008-04-17Paper
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
Lecture Notes in Computer Science
2008-04-17Paper
A Practical Attack on KeeLoq
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-1
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
The Delicate Issues of Addition with Respect to XOR Differences
Selected Areas in Cryptography
2008-03-25Paper
A Related-Key Rectangle Attack on the Full KASUMI
Lecture Notes in Computer Science
2008-03-18Paper
Related-Key Rectangle Attack on the Full SHACAL-1
Selected Areas in Cryptography
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Spectral properties of sign symmetric matrices
The Electronic Journal of Linear Algebra
2006-05-18Paper
scientific article; zbMATH DE number 2089123 (Why is no real title available?)
 
2004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent
Fast Software Encryption
2004-08-12Paper
Enhancing Differential-Linear Cryptanalysis
Lecture Notes in Computer Science
2003-07-16Paper
Positivity of principal minors, sign symmetry and stability.
Linear Algebra and its Applications
2003-05-04Paper
scientific article; zbMATH DE number 1722685 (Why is no real title available?)
 
2002-03-21Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
 
N/APaper


Research outcomes over time


This page was built for person: Nathan Keller