Itai Dinur

From MaRDI portal
Person:321304

Available identifiers

zbMath Open dinur.itaiMaRDI QIDQ321304

List of research outcomes





PublicationDate of PublicationType
Time-space lower bounds for bounded-error computation in the random-query model2024-11-28Paper
Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis2024-11-12Paper
https://portal.mardi4nfdi.de/entity/Q61262532024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61474082024-01-15Paper
On differential privacy and adaptive data analysis with bounded space2023-12-12Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation2023-12-08Paper
Distributed Merkle's puzzles2023-04-13Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-22022-08-30Paper
On the streaming indistinguishability of a random permutation and a random function2022-03-23Paper
Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)2021-12-08Paper
Tight time-space lower bounds for finding multiple collision pairs and their applications2021-12-01Paper
Tight Bounds on Online Checkpointing Algorithms2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms2021-05-03Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-30Paper
Generic attacks on hash combiners2020-06-15Paper
Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem2020-06-15Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-15Paper
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC2020-02-04Paper
Multi-target attacks on the picnic signature scheme and related protocols2020-02-04Paper
Efficient dissection of bicomposite problems with cryptanalytic applications2019-11-27Paper
An algorithmic framework for the generalized birthday problem2019-06-27Paper
An improved affine equivalence algorithm for random permutations2018-07-09Paper
Improved generic attacks against hash-based MACs and HAIFA2018-01-05Paper
Time-memory tradeoff attacks on the MTP proof-of-work scheme2017-11-15Paper
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction2017-04-12Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes2016-10-13Paper
New Attacks on the Concatenation and XOR Hash Combiners2016-09-09Paper
Improved Differential Cryptanalysis of Round-Reduced Speck2016-04-13Paper
Optimized Interpolation Attacks on LowMC2016-03-23Paper
New Attacks on Feistel Structures with Improved Memory Complexities2015-12-10Paper
Reflections on slide with a twist attacks2015-10-26Paper
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE2015-09-30Paper
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function2015-09-30Paper
Cryptanalysis of SP Networks with Partial Non-Linear Layers2015-09-30Paper
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-642015-09-18Paper
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials2015-09-18Paper
Cryptanalysis of FIDES2015-09-18Paper
Improved Top-Down Techniques in Differential Cryptanalysis2015-09-17Paper
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys2015-01-16Paper
Improved practical attacks on round-reduced Keccak2014-09-25Paper
Improved Generic Attacks against Hash-Based MACs and HAIFA2014-08-07Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES22013-12-10Paper
Applying cube attacks to stream ciphers in realistic scenarios2013-06-24Paper
New Attacks on Keccak-224 and Keccak-2562013-01-08Paper
Improved Attacks on Full GOST2013-01-08Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems2012-09-25Paper
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware2011-12-02Paper
An Improved Algebraic Attack on Hamsi-2562011-07-07Paper
Breaking Grain-128 with Dynamic Cube Attacks2011-07-07Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium2009-08-11Paper
Cube Attacks on Tweakable Black Box Polynomials2009-05-12Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XORN/APaper

Research outcomes over time

This page was built for person: Itai Dinur