Search results

  • 2015

    The power of linear algebra: Breaking block ciphers using linearization

    Dinur, I., 1 Jan 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Biryukov, A. & Goyal, V. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Jan 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Springer Verlag, p. 219-240 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    47 Scopus citations
  • Cryptanalysis of iterated Even-Mansour schemes with two keys

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Jan 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer Verlag, p. 439-457 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • Dissection: A new paradigm for solving bicomposite search problems

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 23 Sep 2014, In: Communications of the ACM. 57, 10, p. 98-105 8 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Improved differential cryptanalysis of round-reduced speck

    Dinur, I., 1 Jan 2014, Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Revised Selected Papers. Joux, A. & Youssef, A. (eds.). Springer Verlag, p. 147-164 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8781).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    55 Scopus citations
  • Improved generic attacks against hash-based MACs and HAIFA

    Dinur, I. & Leurent, G., 1 Jan 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 149-168 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • Improved practical attacks on round-reduced Keccak

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Jan 2014, In: Journal of Cryptology. 27, 2, p. 183-209 27 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    23 Scopus citations
  • Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function

    Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 2014, IACR Cryptology ePrint Archive, p. 259, 1 p. (IACR Cryptology ePrint Archive).

    Research output: Working paper/PreprintPreprint

  • 2013

    Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full AES2

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Dec 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 337-356 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • 2012

    Applying cube attacks to stream ciphers in realistic scenarios

    Dinur, I. & Shamir, A., 1 Dec 2012, In: Cryptography and Communications. 4, 3-4, p. 217-232 16 p.

    Research output: Contribution to journalArticlepeer-review

    19 Scopus citations
  • Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 3 Sep 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 719-740 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    57 Scopus citations
  • Improved attacks on full GOST

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Oct 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 9-28 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    55 Scopus citations
  • New attacks on Keccak-224 and Keccak-256

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Oct 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 442-461 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • Side Channel Cube Attacks on Block Ciphers

    Dinur, I. & Shamir, A., 12 Apr 2012, IACR Cryptology ePrint Archive, (IACR Cryptology ePrint Archive).

    Research output: Working paper/PreprintPreprint

  • 2011

    An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware

    Dinur, I., Güneysu, T., Paar, C., Shamir, A. & Zimmermann, R., 12 Dec 2011, Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 327-343 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    56 Scopus citations
  • An improved algebraic attack on Hamsi-256

    Dinur, I. & Shamir, A., 11 Jul 2011, Fast Software Encryption - 18th International Workshop, FSE 2011, Revised Selected Papers. p. 88-106 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6733 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Breaking grain-128 with dynamic cube attacks

    Dinur, I. & Shamir, A., 11 Jul 2011, Fast Software Encryption - 18th International Workshop, FSE 2011, Revised Selected Papers. p. 167-187 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6733 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    140 Scopus citations
  • 2010

    Generic analysis of small cryptographic leaks

    Dinur, I. & Shamir, A., 26 Oct 2010, Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, FDTC 2010. p. 39-48 10 p. 5577361. (Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, FDTC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2009

    Cube attacks on tweakable black boxp Polynomials

    Dinur, I. & Shamir, A., 23 Jul 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 278-299 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    357 Scopus citations
  • Cube testers and key recovery attacks on reduced-round MD6 and trivium

    Aumasson, J. P., Dinur, I., Meier, W. & Shamir, A., 2 Nov 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    134 Scopus citations
  • Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium

    Aumasson, J. P., Dinur, I., Meier, W. & Shamir, A., 1 Jan 2009, In: Dagstuhl Seminar Proceedings. 9031

    Research output: Contribution to journalConference articlepeer-review

    3 Scopus citations
  • Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128

    Aumasson, J.-P., Dinur, I., Henzen, L., Meier, W. & Shamir, A., 2009, p. 147-158.

    Research output: Contribution to conferencePaper