Follow
Tomer Ashur
Tomer Ashur
3MI Labs
Verified email at 3milabs.tech
Title
Cited by
Cited by
Year
Design of symmetric-key primitives for advanced cryptographic protocols
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Transactions on Symmetric Cryptology, 1-45, 2020
211*2020
Boosting authenticated encryption robustness with minimal modifications
T Ashur, O Dunkelman, A Luykx
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
712017
Fast, furious and insecure: Passive keyless entry and start systems in modern supercars
L Wouters, E Marin, T Ashur, B Gierlichs, B Preneel
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (3), 66-85, 2019
602019
Rotational cryptanalysis in the presence of constants
T Ashur, Y Liu
IACR Transactions on Symmetric Cryptology, 57-70, 2016
522016
Rotational-XOR cryptanalysis of reduced-round SPECK
Y Liu, G De Witte, A Ranea, T Ashur
IACR Transactions on Symmetric Cryptology 2017 (3), 24-36, 2017
412017
Rescue-prime: a standard specification (SoK)
A Szepieniec, T Ashur, S Dhooghe
Cryptology ePrint Archive, 2020
342020
Chaghri-a FHE-friendly block cipher
T Ashur, M Mahzoun, D Toprakhisar
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
292022
Toward an operational navigation message authentication service: Proposal and justification of additional OSNMA protocol features
IF Hernández, T Ashur, V Rijmen, C Sarto, S Cancela, D Calle
2019 European Navigation Conference (ENC), 1-6, 2019
262019
Improved linear trails for the block cipher simon
T Ashur
Cryptology ePrint Archive, 2015
252015
Rotational-XOR cryptanalysis of Simon-like block ciphers
J Lu, Y Liu, T Ashur, B Sun, C Li
Australasian Conference on Information Security and Privacy, 105-124, 2020
242020
Analysis and recommendations for MAC and key lengths in delayed disclosure GNSS authentication protocols
I Fernández-Hernández, T Ashur, V Rijmen
IEEE Transactions on Aerospace and Electronic Systems 57 (3), 1827-1839, 2021
222021
GALILEO navigation message authentication specification for signal-in-space testing–V1. 0
I Fernández, V Rijmen, T Ashur, P Walker, G Seco, J Simón, C Sarto, ...
European Commission 11, 2016
222016
Cryptanalysis of MORUS
T Ashur, M Eichlseder, MM Lauridsen, G Leurent, B Minaud, Y Rotella, ...
International Conference on the Theory and Application of Cryptology and …, 2018
182018
Revisiting the Wrong-Key-Randomization Hypothesis
T Ashur, T Beyne, V Rijmen
IACR Cryptology ePrint Archive 2016, 990, 2016
18*2016
On linear hulls and trails
T Ashur, V Rijmen
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
18*2016
An easy-to-use tool for rotational-xor cryptanalysis of ARX block ciphers
A Ranea, Y Liu, T Ashur
Cryptology ePrint Archive, 2020
152020
Linear cryptanalysis of reduced-round speck
T Ashur, D Bodden
Proceedings of the 37th Symposium on Information Theory in the Benelux, 2016
142016
An automated tool for rotational-xor cryptanalysis of arx-based primitives
T Ashur, G De Witte, Y Liu
2017 Symposium on Information Theory and Signal Processing in the Benelux …, 2017
12*2017
An account of the ISO/IEC standardization of the Simon and Speck block cipher families
T Ashur, A Luykx
Security of Ubiquitous Computing Systems: Selected Topics, 63-78, 2021
112021
Rotational cryptanalysis on MAC algorithm Chaskey
L Kraleva, T Ashur, V Rijmen
International Conference on Applied Cryptography and Network Security, 153-168, 2020
112020
The system can't perform the operation now. Try again later.
Articles 1–20