Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

New Directions in Lightweight Cryptanalysis

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Data Management Plan (se abrirá en una nueva ventana)

"As part of the “open research data pilot”, I confirm that I will: 1. Make my peer-review publications arising from the ERC project open to the public via a public repository (""eprint"" for publications in cryptography, and ""arxiv.cs"", ""arxim.math"" for publications in general computer science and mathematics, respectively). 2. Do my best to share data that is not planned to be published, such as the raw data of experiments that have been initiated as part of the ERC project, open to the public through public repository. I would like to state that data which has an applicative aspect would not be shared with the public until it is patented. I remark that in general, I do not intend to use the ""open-access"" option provided by journal publishers, as I believe this option does not contribute to the dissemination of knowledge, given the fact that the papers are publicly available through the public repositories. "

Publicaciones

Practical key recovery attacks on FlexAEAD

Autores: Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger
Publicado en: Designs, Codes, and Cryptography, 2022, ISSN 1573-7586
Editor: Springer

Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications

Autores: Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
Publicado en: Journal of Cryptology, 2018, ISSN 1420-3049
Editor: Multidisciplinary Digital Publishing Institute (MDPI)

A Practical Forgery Attack on Lilliput-AE

Autores: Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki
Publicado en: Journal of Cryptology, 2019, ISSN 0933-2790
Editor: Springer Verlag

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

Autores: Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Publicado en: Journal of Cryptology, 2018, ISSN 1420-3049
Editor: Multidisciplinary Digital Publishing Institute (MDPI)

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

Autores: Itai Dinur, Nathan Keller, Ohad Klein
Publicado en: Journal of Cryptology, 2018, ISSN 1420-3049
Editor: Multidisciplinary Digital Publishing Institute (MDPI)

Tight Bounds on Online Checkpointing Algorithms

Autores: Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Publicado en: ACM Transactions on Algorithms, 2018, ISSN 1549-6325
Editor: Association for Computing Machinary, Inc.

On Differential Privacy and Adaptive Data Analysis with Bounded Space

Autores: Itai Dinur, Uri Stemmer, David P. Woodruff, Samson Zhou
Publicado en: 2023
Editor: Springer

Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3

Autores: Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Publicado en: 2021
Editor: IACR

Consistent High Dimensional Rounding with Side Information

Autores: Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler
Publicado en: 2021
Editor: EATCS

Mind the Middle Layer: The HADES Design Strategy Revisited

Autores: Nathan Keller, Asaf Rosemarin
Publicado en: 2021
Editor: IACR

Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation

Autores: Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Publicado en: 2023
Editor: Springer

Locality-Preserving Hashing for Shifts with Connections to Cryptography

Autores: Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein
Publicado en: 2022
Editor: ITCS

Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR

Autores: Itai Dinur, Nathan Keller, Ohad Klein
Publicado en: 2021
Editor: IEEE

DLCT: A New Tool for Differential-Linear Cryptanalysis

Autores: Achiya Bar-On, Orr Dunkelman, Nathan Keller, Ariel Weizman
Publicado en: 2019
Editor: Springer

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Autores: Itai Dinur, Daniel Kales, Angela Promitzer, Sebastian Ramacher, Christian Rechberger
Publicado en: 2019
Editor: Springer

Tight Bounds on Online Checkpointing Algorithms

Autores: Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir
Publicado en: 2018
Editor: LIPICS

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols

Autores: Itai Dinur, Niv Nadler
Publicado en: 2019
Editor: Springer

Cryptanalysis via Algebraic Spans

Autores: Adi Ben-Zvi, Arkadius G. Kalka, Boaz Tsaban
Publicado en: 2018
Editor: Springer

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing

Autores: Itai Dinur, Nathan Keller, Ohad Klein
Publicado en: 2018
Editor: Springer

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities

Autores: Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Publicado en: 2018
Editor: Springer

The Retracing Boomerang Attack

Autores: Orr Dunkelman, Nathan Keller
Publicado en: 2019
Editor: Springer

New Slide Attacks on Almost Self-similar Ciphers

Autores: Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir
Publicado en: 2019
Editor: Springer

On the Streaming Indistinguishability of a Random Permutation and a Random Function

Autores: Itai Dinur
Publicado en: 2019
Editor: Springer

Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications

Autores: Itai Dinur
Publicado en: 2020
Editor: Spriner

Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems

Autores: Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer
Publicado en: 2020
Editor: Springer

Practical-Time Related-Key Attack on GOST with Secret S-Boxes

Autores: Orr Dunkelman, Nathan Keller, Ariel Weizmann
Publicado en: 2023
Editor: Springer

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications

Autores: Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha
Publicado en: 2021
Editor: IACR

Another look at differential-linear attacks

Autores: Orr Dunkelman, Ariel Weizmann
Publicado en: 2022
Editor: ACM

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)

Autores: Itai Dinur
Publicado en: 2021
Editor: IACR

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2

Autores: Dor Amzaleg, Itai Dinur
Publicado en: 2022
Editor: IACR

Quantum time/memory/data tradeoff attacks

Autores: Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir
Publicado en: 2023
Editor: Springer

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0