Orr Dunkelman

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Partial sums meet FFT: improved attack on 6-round AES
 
2024-11-12Paper
Another look at differential-linear attacks
 
2024-10-16Paper
The retracing boomerang attack, with application to reduced-round AES
Journal of Cryptology
2024-08-30Paper
Practical-time related-key attack on GOST with secret S-boxes
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Quantum time/memory/data tradeoff attacks
Designs, Codes and Cryptography
2024-01-15Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting
Lecture Notes in Computer Science
2023-08-14Paper
Counting active S-boxes is not enough
 
2022-07-06Paper
Automatic search for bit-based division property
 
2022-06-15Paper
Practical key recovery attacks on FlexAEAD
Designs, Codes and Cryptography
2022-03-31Paper
Three third generation attacks on the format preserving encryption scheme FF3
 
2021-12-08Paper
New slide attacks on almost self-similar ciphers
 
2021-12-01Paper
The retracing boomerang attack
 
2021-12-01Paper
Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY}
Information and Computation
2021-11-25Paper
Tight bounds on online checkpointing algorithms
 
2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms
ACM Transactions on Algorithms
2021-05-03Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Journal of Cryptology
2020-06-15Paper
A practical forgery attack on Lilliput-AE
Journal of Cryptology
2020-06-15Paper
DLCT: a new tool for differential-linear cryptanalysis
 
2020-02-04Paper
Efficient dissection of bicomposite problems with cryptanalytic applications
Journal of Cryptology
2019-11-27Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Lecture Notes in Computer Science
2018-09-26Paper
Efficient slide attacks
Journal of Cryptology
2018-09-14Paper
Efficient construction of diamond structures
 
2018-04-26Paper
New second preimage attacks on dithered hash functions with low memory complexity
 
2018-02-16Paper
Boosting authenticated encryption robustness with minimal modifications
 
2017-10-27Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory
2017-06-08Paper
WEM: a new family of white-box block ciphers based on the Even-Mansour construction
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes
Journal of Cryptology
2016-10-13Paper
New second-preimage attacks on hash functions
Journal of Cryptology
2016-10-13Paper
New attacks on Feistel structures with improved memory complexities
Lecture Notes in Computer Science
2015-12-10Paper
Reflections on slide with a twist attacks
Designs, Codes and Cryptography
2015-10-26Paper
Cryptanalysis of SP networks with partial non-linear layers
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Improved linear sieving techniques with applications to step-reduced LED-64
Fast Software Encryption
2015-09-18Paper
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
Fast Software Encryption
2015-09-18Paper
Improved top-down techniques in differential cryptanalysis
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Almost universal forgery attacks on AES-based MAC's
Designs, Codes and Cryptography
2015-09-01Paper
Practical-time attacks against reduced variants of~MISTY1
Designs, Codes and Cryptography
2015-09-01Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Journal of Cryptology
2015-08-03Paper
New attacks on IDEA with at least 6 rounds
Journal of Cryptology
2015-05-12Paper
Slidex attacks on the Even-Mansour encryption scheme
Journal of Cryptology
2015-03-25Paper
Cryptanalysis of iterated Even-Mansour schemes with two keys
Lecture Notes in Computer Science
2015-01-16Paper
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
Journal of Cryptology
2015-01-07Paper
Improved practical attacks on round-reduced Keccak
Journal of Cryptology
2014-09-25Paper
From multiple encryption to knapsacks -- efficient dissection of composite problems
Lecture Notes in Computer Science
2014-08-20Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of the stream cipher LEX
Designs, Codes and Cryptography
2013-05-06Paper
New attacks on Keccak-224 and Keccak-256
Fast Software Encryption
2013-01-08Paper
Improved Attacks on Full GOST
Fast Software Encryption
2013-01-08Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Lecture Notes in Computer Science
2012-09-25Paper
Minimalism in cryptography: the Even-Mansour scheme revisited
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
New insights on impossible differential cryptanalysis
Selected Areas in Cryptography
2012-06-08Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
Techniques for cryptanalysis of block ciphers. (to appear)
Information Security and Cryptography
2012-03-16Paper
Linear analysis of reduced-round CubeHash
Applied Cryptography and Network Security
2011-06-28Paper
Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\)
Selected Areas in Cryptography
2011-03-15Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
The effects of the omission of last round's MixColumns on AES
Information Processing Letters
2010-09-07Paper
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Another look at complementation properties
Fast Software Encryption
2010-07-13Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
Information Processing Letters
2010-04-19Paper
Differential-linear cryptanalysis of Serpent.
Lecture Notes in Computer Science
2010-01-05Paper
Rectangle attacks on 49-round SHACAL-1.
Lecture Notes in Computer Science
2010-01-05Paper
Related-key rectangle attack of the full HAS-160 encryption mode
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Herding, second preimage and Trojan message attacks beyond Merkle-Damgård
Selected Areas in Cryptography
2009-12-09Paper
Cryptanalysis of dynamic SHA(2)
Selected Areas in Cryptography
2009-12-09Paper
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers
Lecture Notes in Computer Science
2009-11-10Paper
Cryptanalysis of Vortex
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Cryptanalysis of CTC2
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
An Improved Impossible Differential Attack on MISTY1
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
A New Attack on the LEX Stream Cipher
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
New Impossible Differential Attacks on AES
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A Differential-Linear Attack on 12-Round Serpent
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A New Criterion for Nonlinearity of Block Ciphers
IEEE Transactions on Information Theory
2008-12-21Paper
A Unified Approach to Related-Key Attacks
Fast Software Encryption
2008-09-18Paper
Improved Slide Attacks
Fast Software Encryption
2008-09-16Paper
A New Attack on 6-Round IDEA
Fast Software Encryption
2008-09-16Paper
Related-Key Rectangle Attack on 42-Round SHACAL-2
Lecture Notes in Computer Science
2008-06-17Paper
Related-Key Boomerang and Rectangle Attacks
Lecture Notes in Computer Science
2008-05-06Paper
New Cryptanalytic Results on IDEA
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
A Simple Related-Key Attack on the Full SHACAL-1
Lecture Notes in Computer Science
2008-04-17Paper
A Practical Attack on KeeLoq
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Improved Meet-in-the-Middle Attacks on Reduced-Round DES
Lecture Notes in Computer Science
2008-04-11Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-1
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
The Delicate Issues of Addition with Respect to XOR Differences
Selected Areas in Cryptography
2008-03-25Paper
A Related-Key Rectangle Attack on the Full KASUMI
Lecture Notes in Computer Science
2008-03-18Paper
Related-Key Rectangle Attack on the Full SHACAL-1
Selected Areas in Cryptography
2007-11-29Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
scientific article; zbMATH DE number 2089123 (Why is no real title available?)
 
2004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2089125 (Why is no real title available?)
 
2004-08-12Paper
Enhancing Differential-Linear Cryptanalysis
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1722685 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583933 (Why is no real title available?)
 
2001-07-08Paper
scientific article; zbMATH DE number 1304130 (Why is no real title available?)
 
2000-02-01Paper


Research outcomes over time


This page was built for person: Orr Dunkelman