Skip to main content

New Directions in Lightweight Cryptanalysis

Deliverables

Data Management Plan

"As part of the “open research data pilot”, I confirm that I will: 1. Make my peer-review publications arising from the ERC project open to the public via a public repository (""eprint"" for publications in cryptography, and ""arxiv.cs"", ""arxim.math"" for publications in general computer science and mathematics, respectively). 2. Do my best to share data that is not planned to be published, such as the raw data of experiments that have been initiated as part of the ERC project, open to the public through public repository. I would like to state that data which has an applicative aspect would not be shared with the public until it is patented. I remark that in general, I do not intend to use the ""open-access"" option provided by journal publishers, as I believe this option does not contribute to the dissemination of knowledge, given the fact that the papers are publicly available through the public repositories. "

Searching for OpenAIRE data...

Publications

DLCT: A New Tool for Differential-Linear Cryptanalysis

Author(s): Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
Published in: 2019

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Author(s): Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
Published in: 2019

Tight Bounds on Online Checkpointing Algorithms

Author(s): Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: 2018

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols

Author(s): Itai Dinur, Niv Nadler
Published in: 2019

Cryptanalysis via Algebraic Spans

Author(s): Adi Ben-Zvi, Arkadius G. Kalka, Boaz Tsaban
Published in: 2018

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

Author(s): Itai Dinur, Nathan Keller, Ohad Klein
Published in: 2018

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

Author(s): Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: 2018

The Retracing Boomerang Attack

Author(s): Orr Dunkelman, Nathan Keller
Published in: 2019

New Slide Attacks on Almost Self-similar Ciphers

Author(s): Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
Published in: 2019

On the Streaming Indistinguishability of a Random Permutation and a Random Function

Author(s): Itai Dinur
Published in: 2019

Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications

Author(s): Itai Dinur
Published in: 2020

Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

Author(s): Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
Published in: 2020

Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications

Author(s): Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Published in: Journal of Cryptology, 2018, ISSN 1420-3049

A Practical Forgery Attack on Lilliput-AE

Author(s): Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
Published in: Journal of Cryptology, 2019, ISSN 0933-2790

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

Author(s): Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Published in: Journal of Cryptology, 2018, ISSN 1420-3049

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

Author(s): Itai Dinur, Nathan Keller, Ohad Klein
Published in: Journal of Cryptology, 2018, ISSN 1420-3049

Tight Bounds on Online Checkpointing Algorithms

Author(s): Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: ACM Transactions on Algorithms, 2018, ISSN 1549-6325