The following pages link to Nathan Keller (Q312257):
Displaying 50 items.
- On the sum of the \(L_1\) influences of bounded functions (Q312259) (← links)
- Key recovery attacks on iterated Even-Mansour encryption schemes (Q321305) (← links)
- A practical attack on KeeLoq (Q421044) (← links)
- Geometric influences (Q428146) (← links)
- A simple reduction from a biased measure on the discrete cube to the uniform measure (Q449220) (← links)
- Geometric influences. II: Correlation inequalities and noise sensitivity (Q479700) (← links)
- A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony (Q484333) (← links)
- Almost universal forgery attacks on AES-based MAC's (Q494579) (← links)
- Practical-time attacks against reduced variants of~MISTY1 (Q494594) (← links)
- A note on the entropy/influence conjecture (Q713162) (← links)
- A tight quantitative version of Arrow's impossibility theorem (Q713951) (← links)
- On the correlation of increasing families (Q739391) (← links)
- Reflections on slide with a twist attacks (Q887444) (← links)
- Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers (Q963420) (← links)
- On the probability of a rational outcome for generalized social welfare functions on three alternatives (Q965219) (← links)
- Distinguishing attacks on stream ciphers based on arrays of pseudo-random words (Q990129) (← links)
- The effects of the omission of last round's MixColumns on AES (Q991791) (← links)
- Instant ciphertext-only cryptanalysis of GSM encrypted communication (Q1021231) (← links)
- Lower bound on the correlation between monotone families in the average case (Q1023393) (← links)
- Linear transformations of monotone functions on the discrete cube (Q1043603) (← links)
- The junta method in extremal hypergraph theory and Chvátal's conjecture (Q1689997) (← links)
- Chvátal's conjecture and correlation inequalities (Q1703446) (← links)
- On a biased edge isoperimetric inequality for the discrete cube (Q1713503) (← links)
- Positivity of principal minors, sign symmetry and stability. (Q1870066) (← links)
- Cryptanalysis of the stream cipher LEX (Q1949239) (← links)
- Efficient dissection of bicomposite problems with cryptanalytic applications (Q2010595) (← links)
- Slidex attacks on the Even-Mansour encryption scheme (Q2018815) (← links)
- New slide attacks on almost self-similar ciphers (Q2055611) (← links)
- The retracing boomerang attack (Q2055612) (← links)
- Mind the middle layer: the HADES design strategy revisited (Q2056722) (← links)
- Three third generation attacks on the format preserving encryption scheme FF3 (Q2056726) (← links)
- Practical key recovery attacks on FlexAEAD (Q2119949) (← links)
- Proof of Tomaszewski's conjecture on randomly signed sums (Q2166335) (← links)
- A practical forgery attack on Lilliput-AE (Q2188961) (← links)
- A structure theorem for almost low-degree functions on the slice (Q2218715) (← links)
- The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture (Q2237385) (← links)
- Stability versions of Erdős-Ko-Rado type theorems via isoperimetry (Q2279508) (← links)
- DLCT: a new tool for differential-linear cryptanalysis (Q2292649) (← links)
- New attacks on IDEA with at least 6 rounds (Q2344046) (← links)
- Efficient slide attacks (Q2413611) (← links)
- Quantitative relation between noise sensitivity and influences (Q2448963) (← links)
- Improved single-key attacks on 8-round AES-192 and AES-256 (Q2516521) (← links)
- (Q2778856) (← links)
- Juntas in the<i>ℓ</i><sub>1</sub>-grid and Lipschitz maps between discrete tori (Q2820270) (← links)
- Memory-Efficient Algorithms for Finding Needles in Haystacks (Q2829215) (← links)
- A $$2^{70}$$ Attack on the Full MISTY1 (Q2835596) (← links)
- Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 (Q2867226) (← links)
- Minimalism in Cryptography: The Even-Mansour Scheme Revisited (Q2894417) (← links)
- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems (Q2914297) (← links)
- Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys (Q2938858) (← links)