Nathan Keller
Nathan Keller
Department of Mathematics, Bar Ilan University, Israel
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα macs.biu.ac.il - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Instant ciphertext-only cryptanalysis of GSM encrypted communication
E Barkan, E Biham, N Keller
Annual international cryptology conference, 600-616, 2003
568*2003
The rectangle attack—rectangling the Serpent
E Biham, O Dunkelman, N Keller
International Conference on the Theory and Applications of Cryptographic …, 2001
2862001
Related-key boomerang and rectangle attacks: theory and experimental analysis
J Kim, S Hong, B Preneel, E Biham, O Dunkelman, N Keller
IEEE Transactions on Information Theory 58 (7), 4948-4966, 2012
270*2012
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
O Dunkelman, N Keller, A Shamir
Annual cryptology conference, 393-410, 2010
238*2010
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
A Biryukov, O Dunkelman, N Keller, D Khovratovich, A Shamir
Annual International Conference on the Theory and Applications of …, 2010
2362010
Improved single-key attacks on 8-round AES-192 and AES-256
O Dunkelman, N Keller, A Shamir
International Conference on the Theory and Application of Cryptology and …, 2010
185*2010
Cryptanalysis of reduced variants of Rijndael
E Biham, N Keller
3rd AES Conference 230, 2000
1772000
New impossible differential attacks on AES
J Lu, O Dunkelman, N Keller, J Kim
International Conference on Cryptology in India, 279-293, 2008
1692008
A practical attack on KeeLoq
S Indesteege, N Keller, O Dunkelman, E Biham, B Preneel
Annual International Conference on the Theory and Applications of …, 2008
162*2008
Minimalism in cryptography: The Even-Mansour scheme revisited
O Dunkelman, N Keller, A Shamir
Annual International Conference on the Theory and Applications of …, 2012
155*2012
A related-key rectangle attack on the full KASUMI
E Biham, O Dunkelman, N Keller
International Conference on the Theory and Application of Cryptology and …, 2005
1372005
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
J Lu, J Kim, N Keller, O Dunkelman
Cryptographers’ Track at the RSA Conference, 370-386, 2008
1192008
Enhancing differential-linear cryptanalysis
E Biham, O Dunkelman, N Keller
International Conference on the Theory and Application of Cryptology and …, 2002
1132002
New results on boomerang and rectangle attacks
E Biham, O Dunkelman, N Keller
International Workshop on Fast Software Encryption, 1-16, 2002
1042002
Related-key impossible differential attacks on 8-round AES-192
E Biham, O Dunkelman, N Keller
Cryptographers’ Track at the RSA Conference, 21-33, 2006
992006
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
I Dinur, O Dunkelman, N Keller, A Shamir
International Conference on the Theory and Application of Cryptology and …, 2013
70*2013
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems
I Dinur, O Dunkelman, N Keller, A Shamir
Annual Cryptology Conference, 719-740, 2012
692012
Low-data complexity attacks on AES
C Bouillaguet, P Derbez, O Dunkelman, PA Fouque, N Keller, V Rijmen
IEEE transactions on information theory 58 (11), 7002-7017, 2012
652012
Differential-linear cryptanalysis of Serpent
E Biham, O Dunkelman, N Keller
International Workshop on Fast Software Encryption, 9-21, 2003
582003
A new attack on 6-round IDEA
E Biham, O Dunkelman, N Keller
Fast Software Encryption, 211-224, 2007
572007
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20