Nathan Keller

From MaRDI portal
(Redirected from Person:312257)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Partial sums meet FFT: improved attack on 6-round AES2024-11-12Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity
Forum of Mathematics, Sigma
2024-11-06Paper
The retracing boomerang attack, with application to reduced-round AES
Journal of Cryptology
2024-08-30Paper
scientific article; zbMATH DE number 7829259 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
Practical-time related-key attack on GOST with secret S-boxes
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Quantum time/memory/data tradeoff attacks
Designs, Codes and Cryptography
2024-01-15Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Local concentration inequalities and Tomaszewski’s conjecture
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity2023-10-27Paper
Sharp Hypercontractivity for Global Functions2023-07-03Paper
On $t$-Intersecting Families of Permutations2023-03-28Paper
Proof of Tomaszewski's conjecture on randomly signed sums
Advances in Mathematics
2022-08-24Paper
Practical key recovery attacks on FlexAEAD
Designs, Codes and Cryptography
2022-03-31Paper
Three third generation attacks on the format preserving encryption scheme FF32021-12-08Paper
Mind the middle layer: the HADES design strategy revisited2021-12-08Paper
New slide attacks on almost self-similar ciphers2021-12-01Paper
The retracing boomerang attack2021-12-01Paper
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture
Advances in Mathematics
2021-10-27Paper
Tight bounds on online checkpointing algorithms
(available as arXiv preprint)
2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms
ACM Transactions on Algorithms
2021-05-03Paper
A structure theorem for almost low-degree functions on the slice
Israel Journal of Mathematics
2021-01-18Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Lecture Notes in Computer Science
2020-06-30Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Journal of Cryptology
2020-06-15Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Journal of Cryptology
2020-06-15Paper
A practical forgery attack on Lilliput-AE
Journal of Cryptology
2020-06-15Paper
DLCT: a new tool for differential-linear cryptanalysis2020-02-04Paper
Biased halfspaces, noise sensitivity, and local Chernoff inequalities
discrete Analysis
2020-01-17Paper
Stability versions of Erdős-Ko-Rado type theorems via isoperimetry
Journal of the European Mathematical Society (JEMS)
2019-12-12Paper
Efficient dissection of bicomposite problems with cryptanalytic applications
Journal of Cryptology
2019-11-27Paper
Quantum speedups need structure2019-11-09Paper
A note on large \(H\)-intersecting families
SIAM Journal on Discrete Mathematics
2019-03-11Paper
On a biased edge isoperimetric inequality for the discrete cube
Journal of Combinatorial Theory. Series A
2019-01-25Paper
On the structure of subsets of the discrete cube with small edge boundary
Discrete Analysis
2019-01-09Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Lecture Notes in Computer Science
2018-09-26Paper
Efficient slide attacks
Journal of Cryptology
2018-09-14Paper
Approximation of biased Boolean functions of small total influence by DNFs
Bulletin of the London Mathematical Society
2018-08-31Paper
Chvátal's conjecture and correlation inequalities
Journal of Combinatorial Theory. Series A
2018-03-02Paper
The junta method in extremal hypergraph theory and Chvátal's conjecture
(available as arXiv preprint)
2018-01-18Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Low-Data Complexity Attacks on AES
IEEE Transactions on Information Theory
2017-06-08Paper
WEM: a new family of white-box block ciphers based on the Even-Mansour construction
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
A \(2^{70}\) attack on the full MISTY1
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes
Journal of Cryptology
2016-10-13Paper
On the sum of the \(L_1\) influences of bounded functions
Israel Journal of Mathematics
2016-09-15Paper
Juntas in the \(\ell_{1}\)-grid and Lipschitz maps between discrete tori
Random Structures & Algorithms
2016-09-15Paper
On the correlation of increasing families
Journal of Combinatorial Theory. Series A
2016-08-18Paper
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os2016-04-20Paper
New attacks on Feistel structures with improved memory complexities
Lecture Notes in Computer Science
2015-12-10Paper
Reflections on slide with a twist attacks
Designs, Codes and Cryptography
2015-10-26Paper
Cryptanalysis of SP networks with partial non-linear layers
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Improved linear sieving techniques with applications to step-reduced LED-64
Fast Software Encryption
2015-09-18Paper
Almost universal forgery attacks on AES-based MAC's
Designs, Codes and Cryptography
2015-09-01Paper
Practical-time attacks against reduced variants of~MISTY1
Designs, Codes and Cryptography
2015-09-01Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Journal of Cryptology
2015-08-03Paper
New attacks on IDEA with at least 6 rounds
Journal of Cryptology
2015-05-12Paper
Slidex attacks on the Even-Mansour encryption scheme
Journal of Cryptology
2015-03-25Paper
Cryptanalysis of iterated Even-Mansour schemes with two keys
Lecture Notes in Computer Science
2015-01-16Paper
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
Journal of Cryptology
2015-01-07Paper
Geometric influences. II: Correlation inequalities and noise sensitivity
Annales de l'Institut Henri Poincaré. Probabilités et Statistiques
2014-12-05Paper
Geometric influences. II: Correlation inequalities and noise sensitivity
Annales de l'Institut Henri Poincaré. Probabilités et Statistiques
2014-12-05Paper
Quantitative relation between noise sensitivity and influences
Combinatorica
2014-05-05Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of the stream cipher LEX
Designs, Codes and Cryptography
2013-05-06Paper
A note on the entropy/influence conjecture
Discrete Mathematics
2012-10-26Paper
A tight quantitative version of Arrow's impossibility theorem
Journal of the European Mathematical Society (JEMS)
2012-10-19Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Lecture Notes in Computer Science
2012-09-25Paper
A simple reduction from a biased measure on the discrete cube to the uniform measure
European Journal of Combinatorics
2012-09-12Paper
Minimalism in cryptography: the Even-Mansour scheme revisited
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Geometric influences
The Annals of Probability
2012-06-19Paper
Geometric influences
The Annals of Probability
2012-06-19Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives
SIAM Journal on Computing
2011-10-18Paper
On the influences of variables on Boolean functions in product spaces
Combinatorics, Probability and Computing
2011-01-17Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
The effects of the omission of last round's MixColumns on AES
Information Processing Letters
2010-09-07Paper
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
Information Processing Letters
2010-09-02Paper
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
On the probability of a rational outcome for generalized social welfare functions on three alternatives
Journal of Combinatorial Theory. Series A
2010-04-21Paper
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers
Information Processing Letters
2010-04-19Paper
Rectangle attacks on 49-round SHACAL-1.
Lecture Notes in Computer Science
2010-01-05Paper
Differential-linear cryptanalysis of Serpent.
Lecture Notes in Computer Science
2010-01-05Paper
Linear transformations of monotone functions on the discrete cube
Discrete Mathematics
2009-12-09Paper
Lower bound on the correlation between monotone families in the average case
Advances in Applied Mathematics
2009-06-11Paper
Instant ciphertext-only cryptanalysis of GSM encrypted communication
Journal of Cryptology
2009-06-08Paper
Cryptanalysis of CTC2
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
An Improved Impossible Differential Attack on MISTY1
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
A New Attack on the LEX Stream Cipher
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
New Impossible Differential Attacks on AES
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A Differential-Linear Attack on 12-Round Serpent
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A New Criterion for Nonlinearity of Block Ciphers
IEEE Transactions on Information Theory
2008-12-21Paper
A Unified Approach to Related-Key Attacks
Fast Software Encryption
2008-09-18Paper
Improved Slide Attacks
Fast Software Encryption
2008-09-16Paper
A New Attack on 6-Round IDEA
Fast Software Encryption
2008-09-16Paper
Related-Key Rectangle Attack on 42-Round SHACAL-2
Lecture Notes in Computer Science
2008-06-17Paper
Related-Key Boomerang and Rectangle Attacks
Lecture Notes in Computer Science
2008-05-06Paper
New Cryptanalytic Results on IDEA
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
A Simple Related-Key Attack on the Full SHACAL-1
Lecture Notes in Computer Science
2008-04-17Paper
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
Lecture Notes in Computer Science
2008-04-17Paper
A Practical Attack on KeeLoq
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-1
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
The Delicate Issues of Addition with Respect to XOR Differences
Selected Areas in Cryptography
2008-03-25Paper
A Related-Key Rectangle Attack on the Full KASUMI
Lecture Notes in Computer Science
2008-03-18Paper
Related-Key Rectangle Attack on the Full SHACAL-1
Selected Areas in Cryptography
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Spectral properties of sign symmetric matrices
The Electronic Journal of Linear Algebra
2006-05-18Paper
Spectral properties of sign symmetric matrices
The Electronic Journal of Linear Algebra
2006-05-18Paper
Spectral properties of sign symmetric matrices
The Electronic Journal of Linear Algebra
2006-05-18Paper
scientific article; zbMATH DE number 2089123 (Why is no real title available?)2004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent
Fast Software Encryption
2004-08-12Paper
Enhancing Differential-Linear Cryptanalysis
Lecture Notes in Computer Science
2003-07-16Paper
Positivity of principal minors, sign symmetry and stability.
Linear Algebra and its Applications
2003-05-04Paper
scientific article; zbMATH DE number 1722685 (Why is no real title available?)2002-03-21Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
(available as arXiv preprint)
N/APaper


Research outcomes over time


This page was built for person: Nathan Keller