Itai Dinur

From MaRDI portal
Person:321304

Available identifiers

zbMath Open dinur.itaiMaRDI QIDQ321304

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61262532024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61474082024-01-15Paper
On differential privacy and adaptive data analysis with bounded space2023-12-12Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation2023-12-08Paper
Distributed Merkle's puzzles2023-04-13Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-22022-08-30Paper
On the streaming indistinguishability of a random permutation and a random function2022-03-23Paper
Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\)2021-12-08Paper
Tight time-space lower bounds for finding multiple collision pairs and their applications2021-12-01Paper
Tight Bounds on Online Checkpointing Algorithms2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms2021-05-03Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-30Paper
Generic attacks on hash combiners2020-06-15Paper
Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem2020-06-15Paper
An optimal distributed discrete log protocol with applications to homomorphic secret sharing2020-06-15Paper
Linear equivalence of block ciphers with partial non-linear layers: application to LowMC2020-02-04Paper
Multi-target attacks on the picnic signature scheme and related protocols2020-02-04Paper
Efficient dissection of bicomposite problems with cryptanalytic applications2019-11-27Paper
An algorithmic framework for the generalized birthday problem2019-06-27Paper
An improved affine equivalence algorithm for random permutations2018-07-09Paper
Improved generic attacks against hash-based MACs and HAIFA2018-01-05Paper
Time-memory tradeoff attacks on the MTP proof-of-work scheme2017-11-15Paper
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction2017-04-12Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes2016-10-13Paper
New Attacks on the Concatenation and XOR Hash Combiners2016-09-09Paper
Improved Differential Cryptanalysis of Round-Reduced Speck2016-04-13Paper
Optimized Interpolation Attacks on LowMC2016-03-23Paper
New Attacks on Feistel Structures with Improved Memory Complexities2015-12-10Paper
Reflections on slide with a twist attacks2015-10-26Paper
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE2015-09-30Paper
Cryptanalysis of SP Networks with Partial Non-Linear Layers2015-09-30Paper
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function2015-09-30Paper
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials2015-09-18Paper
Cryptanalysis of FIDES2015-09-18Paper
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-642015-09-18Paper
Improved Top-Down Techniques in Differential Cryptanalysis2015-09-17Paper
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys2015-01-16Paper
Improved practical attacks on round-reduced Keccak2014-09-25Paper
Improved Generic Attacks against Hash-Based MACs and HAIFA2014-08-07Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES22013-12-10Paper
Applying cube attacks to stream ciphers in realistic scenarios2013-06-24Paper
Improved Attacks on Full GOST2013-01-08Paper
New Attacks on Keccak-224 and Keccak-2562013-01-08Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems2012-09-25Paper
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware2011-12-02Paper
An Improved Algebraic Attack on Hamsi-2562011-07-07Paper
Breaking Grain-128 with Dynamic Cube Attacks2011-07-07Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium2009-08-11Paper
Cube Attacks on Tweakable Black Box Polynomials2009-05-12Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Itai Dinur