Itai Dinur

From MaRDI portal
(Redirected from Person:321304)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Time-space lower bounds for bounded-error computation in the random-query model2024-11-28Paper
Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis2024-11-12Paper
scientific article; zbMATH DE number 7829259 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
scientific article; zbMATH DE number 7788489 (Why is no real title available?)
(available as arXiv preprint)
2024-01-15Paper
On differential privacy and adaptive data analysis with bounded space
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Distributed Merkle's puzzles2023-04-13Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-22022-08-30Paper
On the streaming indistinguishability of a random permutation and a random function2022-03-23Paper
Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)2021-12-08Paper
Tight time-space lower bounds for finding multiple collision pairs and their applications2021-12-01Paper
Tight bounds on online checkpointing algorithms
(available as arXiv preprint)
2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms
ACM Transactions on Algorithms
2021-05-03Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Lecture Notes in Computer Science
2020-06-30Paper
Generic attacks on hash combiners
Journal of Cryptology
2020-06-15Paper
Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem
Journal of Cryptology
2020-06-15Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing
Journal of Cryptology
2020-06-15Paper
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC2020-02-04Paper
Multi-target attacks on the Picnic signature scheme and related protocols2020-02-04Paper
Efficient dissection of bicomposite problems with cryptanalytic applications
Journal of Cryptology
2019-11-27Paper
An algorithmic framework for the generalized birthday problem
Designs, Codes and Cryptography
2019-06-27Paper
An improved affine equivalence algorithm for random permutations2018-07-09Paper
Improved generic attacks against hash-based MACs and HAIFA
Algorithmica
2018-01-05Paper
Time-memory tradeoff attacks on the MTP proof-of-work scheme2017-11-15Paper
WEM: a new family of white-box block ciphers based on the Even-Mansour construction
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes
Journal of Cryptology
2016-10-13Paper
New attacks on the concatenation and XOR hash combiners
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Improved Differential Cryptanalysis of Round-Reduced Speck
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Optimized interpolation attacks on lowMC
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
New attacks on Feistel structures with improved memory complexities
Lecture Notes in Computer Science
2015-12-10Paper
Reflections on slide with a twist attacks
Designs, Codes and Cryptography
2015-10-26Paper
Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Cryptanalysis of SP networks with partial non-linear layers
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Improved linear sieving techniques with applications to step-reduced LED-64
Fast Software Encryption
2015-09-18Paper
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
Fast Software Encryption
2015-09-18Paper
Cryptanalysis of FIDES
Fast Software Encryption
2015-09-18Paper
Improved top-down techniques in differential cryptanalysis
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Cryptanalysis of iterated Even-Mansour schemes with two keys
Lecture Notes in Computer Science
2015-01-16Paper
Improved practical attacks on round-reduced Keccak
Journal of Cryptology
2014-09-25Paper
Improved generic attacks against hash-based MACs and HAIFA
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Applying cube attacks to stream ciphers in realistic scenarios
Cryptography and Communications
2013-06-24Paper
New attacks on Keccak-224 and Keccak-256
Fast Software Encryption
2013-01-08Paper
Improved Attacks on Full GOST
Fast Software Encryption
2013-01-08Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Lecture Notes in Computer Science
2012-09-25Paper
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
Lecture Notes in Computer Science
2011-12-02Paper
An improved algebraic attack on Hamsi-256
Fast Software Encryption
2011-07-07Paper
Breaking Grain-128 with dynamic cube attacks
Fast Software Encryption
2011-07-07Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Fast Software Encryption
2009-08-11Paper
Cube Attacks on Tweakable Black Box Polynomials
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
(available as arXiv preprint)
N/APaper


Research outcomes over time


This page was built for person: Itai Dinur