Eran Lambooij
Eran Lambooij
Phd Student
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα campus.haifa.ac.il
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
702015
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
R Ankele, C Dobraunig, J Guo, E Lambooij, G Leander, Y Todo
IACR Transactions on Symmetric Cryptology, 192-235, 2019
122019
How to Build Pseudorandom Functions from Public Random Permutations
YL Chen, E Lambooij, B Mennink
Annual International Cryptology Conference, 266-293, 2019
102019
Refined probability of differential characteristics including dependency between multiple rounds
A Canteaut, E Lambooij, S Neves, S Rasoolzadeh, Y Sasaki, M Stevens
IACR Transactions on Symmetric Cryptology, 203-227, 2017
92017
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64
O Dunkelman, S Huang, E Lambooij, S Perle
International Symposium on Cyber Security Cryptography and Machine Learning …, 2020
42020
A Practical Forgery Attack on Lilliput-AE
O Dunkelman, N Keller, E Lambooij, Y Sasaki
Journal of Cryptology, 1-7, 2019
42019
Counting Active S-Boxes is not Enough
O Dunkelman, A Kumar, E Lambooij, SK Sanadhya
International Conference on Cryptology in India, 332-344, 2020
12020
Cryptanalysis of Simon et al.
E Lambooij, O Dunkelman, T Lange
University of Haifa, 2017
12017
Cryptanalysis of Feistel-Based Format-Preserving Encryption
O Dunkelman, A Kumar, E Lambooij, SK Sanadhya
1*
A Related Tweak Differential Attack on Full Lilliput-AE
O Dunkelman, N Keller, E Lambooij, Y Sasaki
2019
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–10