Itai Dinur

From MaRDI portal
Person:321304

Available identifiers

zbMath Open dinur.itaiMaRDI QIDQ321304

List of research outcomes





PublicationDate of PublicationType
Time-space lower bounds for bounded-error computation in the random-query model2024-11-28Paper
Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis2024-11-12Paper
https://portal.mardi4nfdi.de/entity/Q61262532024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61474082024-01-15Paper
On differential privacy and adaptive data analysis with bounded space2023-12-12Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation2023-12-08Paper
Distributed Merkle's puzzles2023-04-13Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-22022-08-30Paper
On the streaming indistinguishability of a random permutation and a random function2022-03-23Paper
Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)2021-12-08Paper
Tight time-space lower bounds for finding multiple collision pairs and their applications2021-12-01Paper
Tight bounds on online checkpointing algorithms2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms2021-05-03Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-30Paper
Generic attacks on hash combiners2020-06-15Paper
Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem2020-06-15Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-15Paper
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC2020-02-04Paper
Multi-target attacks on the Picnic signature scheme and related protocols2020-02-04Paper
Efficient dissection of bicomposite problems with cryptanalytic applications2019-11-27Paper
An algorithmic framework for the generalized birthday problem2019-06-27Paper
An improved affine equivalence algorithm for random permutations2018-07-09Paper
Improved generic attacks against hash-based MACs and HAIFA2018-01-05Paper
Time-memory tradeoff attacks on the MTP proof-of-work scheme2017-11-15Paper
WEM: a new family of white-box block ciphers based on the Even-Mansour construction2017-04-12Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes2016-10-13Paper
New attacks on the concatenation and XOR hash combiners2016-09-09Paper
Improved Differential Cryptanalysis of Round-Reduced Speck2016-04-13Paper
Optimized interpolation attacks on lowMC2016-03-23Paper
New attacks on Feistel structures with improved memory complexities2015-12-10Paper
Reflections on slide with a twist attacks2015-10-26Paper
Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE2015-09-30Paper
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function2015-09-30Paper
Cryptanalysis of SP networks with partial non-linear layers2015-09-30Paper
Improved linear sieving techniques with applications to step-reduced LED-642015-09-18Paper
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials2015-09-18Paper
Cryptanalysis of FIDES2015-09-18Paper
Improved top-down techniques in differential cryptanalysis2015-09-17Paper
Cryptanalysis of iterated Even-Mansour schemes with two keys2015-01-16Paper
Improved practical attacks on round-reduced Keccak2014-09-25Paper
Improved generic attacks against hash-based MACs and HAIFA2014-08-07Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES22013-12-10Paper
Applying cube attacks to stream ciphers in realistic scenarios2013-06-24Paper
New attacks on Keccak-224 and Keccak-2562013-01-08Paper
Improved Attacks on Full GOST2013-01-08Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems2012-09-25Paper
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware2011-12-02Paper
An improved algebraic attack on Hamsi-2562011-07-07Paper
Breaking Grain-128 with dynamic cube attacks2011-07-07Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium2009-08-11Paper
Cube Attacks on Tweakable Black Box Polynomials2009-05-12Paper
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XORN/APaper

Research outcomes over time

This page was built for person: Itai Dinur