Παρακολούθηση
Orr Dunkelman
Orr Dunkelman
Computer Science Dept., University of Haifa, Israel
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.haifa.ac.il - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers
CD Cannière, O Dunkelman, M Knežević
International Workshop on Cryptographic Hardware and Embedded Systems, 272-288, 2009
8342009
The rectangle attack—rectangling the Serpent
E Biham, O Dunkelman, N Keller
International Conference on the Theory and Applications of Cryptographic …, 2001
3052001
A Framework for Iterative Hash Functions---HAIFA
E Biham, O Dunkelman
Computer Science Department, Technion, 2007
3022007
Related-key boomerang and rectangle attacks
E Biham, O Dunkelman, N Keller
Annual International Conference on the Theory and Applications of …, 2005
2742005
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Annual International Conference on the Theory and Applications of …, 2010
2462010
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
O Dunkelman, N Keller, A Shamir
Advances in Cryptology–CRYPTO 2010, 393-410, 2010
227*2010
Cryptanalysis of the A5/1 GSM stream cipher
E Biham, O Dunkelman
International Conference on Cryptology in India, 43-51, 2000
2212000
Improved single-key attacks on 8-round AES-192 and AES-256
O Dunkelman, N Keller, A Shamir
Advances in Cryptology-ASIACRYPT 2010, 158-176, 2010
196*2010
New impossible differential attacks on AES
J Lu, O Dunkelman, N Keller, J Kim
International Conference on Cryptology in India, 279-293, 2008
1832008
Minimalism in cryptography: The Even-Mansour scheme revisited
O Dunkelman, N Keller, A Shamir
Annual International Conference on the Theory and Applications of …, 2012
1542012
A practical attack on KeeLoq
S Indesteege, N Keller, O Dunkelman, E Biham, B Preneel
Annual International Conference on the Theory and Applications of …, 2008
1502008
A related-key rectangle attack on the full KASUMI
E Biham, O Dunkelman, N Keller
International Conference on the Theory and Application of Cryptology and …, 2005
1432005
No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation
M Osadchy, J Hernandez-Castro, S Gibson, O Dunkelman, D Pérez-Cabo
IEEE Transactions on Information Forensics and Security 12 (11), 2640-2653, 2017
1272017
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
J Lu, J Kim, N Keller, O Dunkelman
Cryptographers’ Track at the RSA Conference, 370-386, 2008
1272008
Enhancing differential-linear cryptanalysis
E Biham, O Dunkelman, N Keller
International Conference on the Theory and Application of Cryptology and …, 2002
1262002
New results on boomerang and rectangle attacks
E Biham, O Dunkelman, N Keller
International Workshop on Fast Software Encryption, 1-16, 2002
1152002
Related-key impossible differential attacks on 8-round AES-192
E Biham, O Dunkelman, N Keller
Cryptographers’ Track at the RSA Conference, 21-33, 2006
1012006
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
942006
New attacks on Keccak-224 and Keccak-256
I Dinur, O Dunkelman, A Shamir
International Workshop on Fast Software Encryption, 442-461, 2012
932012
Improved attacks on full GOST
I Dinur, O Dunkelman, A Shamir
International Workshop on Fast Software Encryption, 9-28, 2012
842012
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20