Skip to main content

New Directions in Lightweight Cryptanalysis

Deliverables

Data Management Plan

"As part of the “open research data pilot”, I confirm that I will: 1. Make my peer-review publications arising from the ERC project open to the public via a public repository (""eprint"" for publications in cryptography, and ""arxiv.cs"", ""arxim.math"" for publications in general computer science and mathematics, respectively). 2. Do my best to share data that is not planned to be published, such as the raw data of experiments that have been initiated as part of the ERC project, open to the public through public repository. I would like to state that data which has an applicative aspect would not be shared with the public until it is patented. I remark that in general, I do not intend to use the ""open-access"" option provided by journal publishers, as I believe this option does not contribute to the dissemination of knowledge, given the fact that the papers are publicly available through the public repositories. "

Publications

Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3

Author(s): Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: 2021
Publisher: IACR

Consistent High Dimensional Rounding with Side Information

Author(s): Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler
Published in: 2021
Publisher: EATCS

Mind the Middle Layer: The HADES Design Strategy Revisited

Author(s): Nathan Keller, Asaf Rosemarin
Published in: 2021
Publisher: IACR

Locality-Preserving Hashing for Shifts with Connections to Cryptography

Author(s): Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
Published in: 2022
Publisher: ITCS

Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR

Author(s): Itai Dinur, Nathan Keller, Ohad Klein
Published in: 2021
Publisher: IEEE

DLCT: A New Tool for Differential-Linear Cryptanalysis

Author(s): Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
Published in: 2019
Publisher: Springer

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Author(s): Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
Published in: 2019
Publisher: Springer

Tight Bounds on Online Checkpointing Algorithms

Author(s): Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: 2018
Publisher: LIPICS

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols

Author(s): Itai Dinur, Niv Nadler
Published in: 2019
Publisher: Springer

Cryptanalysis via Algebraic Spans

Author(s): Adi Ben-Zvi, Arkadius G. Kalka, Boaz Tsaban
Published in: 2018
Publisher: Springer

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

Author(s): Itai Dinur, Nathan Keller, Ohad Klein
Published in: 2018
Publisher: Springer

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

Author(s): Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: 2018
Publisher: Springer

The Retracing Boomerang Attack

Author(s): Orr Dunkelman, Nathan Keller
Published in: 2019
Publisher: Springer

New Slide Attacks on Almost Self-similar Ciphers

Author(s): Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
Published in: 2019
Publisher: Springer

On the Streaming Indistinguishability of a Random Permutation and a Random Function

Author(s): Itai Dinur
Published in: 2019
Publisher: Springer

Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications

Author(s): Itai Dinur
Published in: 2020
Publisher: Spriner

Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

Author(s): Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
Published in: 2020
Publisher: Springer

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications

Author(s): Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
Published in: 2021
Publisher: IACR

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)

Author(s): Itai Dinur
Published in: 2021
Publisher: IACR

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2

Author(s): Dor Amzaleg, Itai Dinur
Published in: 2022
Publisher: IACR

Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications

Author(s): Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Published in: Journal of Cryptology, 2018, ISSN 1420-3049
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)

A Practical Forgery Attack on Lilliput-AE

Author(s): Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
Published in: Journal of Cryptology, 2019, ISSN 0933-2790
Publisher: Springer Verlag

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

Author(s): Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Published in: Journal of Cryptology, 2018, ISSN 1420-3049
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

Author(s): Itai Dinur, Nathan Keller, Ohad Klein
Published in: Journal of Cryptology, 2018, ISSN 1420-3049
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)

Tight Bounds on Online Checkpointing Algorithms

Author(s): Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Published in: ACM Transactions on Algorithms, 2018, ISSN 1549-6325
Publisher: Association for Computing Machinary, Inc.