Filter
Conference contribution

Search results

  • 2024

    Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis

    Dinur, I., 1 Jan 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. Joye, M. & Leander, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 33-62 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14651 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation

    Dinur, I., Dunkelman, O., Keller, N., Ronen, E. & Shamir, A., 1 Jan 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 98-127 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14007 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • On Differential Privacy and Adaptive Data Analysis with Bounded Space

    Dinur, I., Stemmer, U., Woodruff, D. P. & Zhou, S., 1 Jan 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 35-65 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2022

    Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR

    Dinur, I., Keller, N. & Klein, O., 1 Jan 2022, Proceedings - 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science, FOCS 2021. Institute of Electrical and Electronics Engineers, p. 80-91 12 p. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2022-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Locality-Preserving Hashing for Shifts with Connections to Cryptography

    Boyle, E., Dinur, I., Gilboa, N., Ishai, Y., Keller, N. & Klein, O., 25 Jan 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 27:1-27:24 (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2

    Amzaleg, D. & Dinur, I., 1 Jan 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 57-85 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2021

    Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)

    Dinur, I., 1 Jan 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 374-403 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12696 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Distributed Merkle’s Puzzles

    Dinur, I. & Hasson, B., 1 Jan 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 310-332 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Improved algorithms for solving polynomial systems over GF(2) by multiple parity-counting

    Dinur, I., 1 Jan 2021, ACM-SIAM Symposium on Discrete Algorithms, SODA 2021. Marx, D. (ed.). Association for Computing Machinery, p. 2550-2564 15 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications

    Dinur, I., Goldfeder, S., Halevi, T., Ishai, Y., Kelkar, M., Sharma, V. & Zaverucha, G., 1 Jan 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 517-547 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2020

    On the Streaming Indistinguishability of a Random Permutation and a Random Function

    Dinur, I., 1 Jan 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 433-460 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems

    Beyne, T., Canteaut, A., Dinur, I., Eichlseder, M., Leander, G., Leurent, G., Naya-Plasencia, M., Perrin, L., Sasaki, Y., Todo, Y. & Wiemer, F., 1 Jan 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 299-328 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Scopus citations
  • Tight time-space lower bounds for finding multiple collision pairs and their applications

    Dinur, I., 1 Jan 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 405-434 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2019

    A relay attack on a tamper detection system

    Dinur, I. & Elul, N., 1 Jan 2019, Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings. Dolev, S., Hendler, D., Lodha, S. & Yung, M. (eds.). Springer Verlag, p. 198-201 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11527 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Linear equivalence of block ciphers with partial non-linear layers: Application to LowMC

    Dinur, I., Kales, D., Promitzer, A., Ramacher, S. & Rechberger, C., 1 Jan 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 343-372 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Multi-target attacks on the picnic signature scheme and related protocols

    Dinur, I. & Nadler, N., 1 Jan 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 699-727 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2018

    An Improved affine equivalence algorithm for random permutations

    Dinur, I., 1 Jan 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 413-442 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • An optimal distributed discrete log protocol with applications to homomorphic secret sharing

    Dinur, I., Keller, N. & Klein, O., 1 Jan 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 213-242 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Tight bounds on online checkpointing algorithms

    Bar-On, A., Dinur, I., Hod, R., Dunkelman, O., Keller, N., Ronen, E. & Shamir, A., 1 Jul 2018, 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018. Kaklamanis, C., Marx, D., Chatzigiannakis, I. & Sannella, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 13. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 107).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2017

    Time-memory tradeoff attacks on the MTP proof-of-work scheme

    Dinur, I. & Nadler, N., 1 Jan 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 375-403 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2016

    Memory-efficient algorithms for finding needles in haystacks

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Jan 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 185-206 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • New attacks on the concatenation and XOR hash combiners

    Dinur, I., 1 Jan 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer Verlag, p. 484-508 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • 2015

    Cryptanalysis of FIDES

    Dinur, I. & Jean, J., 1 Jan 2015, Fast Software Encryption - 21st International Workshop, FSE 2014, Revised Selected Papers. Cid, C. & Rechberger, C. (eds.). Springer Verlag, p. 224-240 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • Cryptanalysis of SP networks with partial non-linear layers

    Bar-On, A., Dinur, I., Dunkelman, O., Lallemand, V., Keller, N. & Tsaban, B., 1 Jan 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 315-342 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE

    Dinur, I., 1 Jan 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 231-253 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function

    Dinur, I., Morawiecki, P., Pieprzyk, J., Srebrny, M. & Straus, M., 1 Jan 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 733-761 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    55 Scopus citations
  • Improved linear sieving techniques with applications to step-reduced LED-64

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Jan 2015, Fast Software Encryption - 21st International Workshop, FSE 2014, Revised Selected Papers. Cid, C. & Rechberger, C. (eds.). Springer Verlag, p. 390-410 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Improved top-down techniques in differential cryptanalysis

    Dinur, I., Dunkelman, O., Gutman, M. & Shamir, A., 1 Jan 2015, Progress in Cryptology – LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Proceedings. Rodríguez-Henríquez, F. & Lauter, K. (eds.). Springer Verlag, p. 139-156 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • New attacks on Feistel structures with improved memory complexities

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Jan 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 433-454 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Optimized interpolation attacks on LowMC

    Dinur, I., Liu, Y., Meier, W. & Wang, Q., 1 Jan 2015, Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Iwata, T. & Cheon, J. H. (eds.). Springer Verlag, p. 535-560 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    41 Scopus citations
  • The power of linear algebra: Breaking block ciphers using linearization

    Dinur, I., 1 Jan 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Biryukov, A. & Goyal, V. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Jan 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Springer Verlag, p. 219-240 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    45 Scopus citations
  • Cryptanalysis of iterated Even-Mansour schemes with two keys

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Jan 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer Verlag, p. 439-457 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • Improved differential cryptanalysis of round-reduced speck

    Dinur, I., 1 Jan 2014, Selected Areas in Cryptography - SAC 2014 - 21st International Conference, Revised Selected Papers. Joux, A. & Youssef, A. (eds.). Springer Verlag, p. 147-164 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8781).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    52 Scopus citations
  • Improved generic attacks against hash-based MACs and HAIFA

    Dinur, I. & Leurent, G., 1 Jan 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 149-168 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • 2013

    Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full AES2

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 1 Dec 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 1 ed. p. 337-356 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8269 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    31 Scopus citations
  • 2012

    Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems

    Dinur, I., Dunkelman, O., Keller, N. & Shamir, A., 3 Sep 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 719-740 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    54 Scopus citations
  • Improved attacks on full GOST

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Oct 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 9-28 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    53 Scopus citations
  • New attacks on Keccak-224 and Keccak-256

    Dinur, I., Dunkelman, O. & Shamir, A., 1 Oct 2012, Fast Software Encryption - 19th International Workshop, FSE 2012, Revised Selected Papers. p. 442-461 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7549 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    53 Scopus citations
  • 2011

    An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware

    Dinur, I., Güneysu, T., Paar, C., Shamir, A. & Zimmermann, R., 12 Dec 2011, Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 327-343 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    54 Scopus citations
  • An improved algebraic attack on Hamsi-256

    Dinur, I. & Shamir, A., 11 Jul 2011, Fast Software Encryption - 18th International Workshop, FSE 2011, Revised Selected Papers. p. 88-106 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6733 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Breaking grain-128 with dynamic cube attacks

    Dinur, I. & Shamir, A., 11 Jul 2011, Fast Software Encryption - 18th International Workshop, FSE 2011, Revised Selected Papers. p. 167-187 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6733 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    136 Scopus citations
  • 2010

    Generic analysis of small cryptographic leaks

    Dinur, I. & Shamir, A., 26 Oct 2010, Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, FDTC 2010. p. 39-48 10 p. 5577361. (Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, FDTC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2009

    Cube attacks on tweakable black boxp Polynomials

    Dinur, I. & Shamir, A., 23 Jul 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 278-299 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    338 Scopus citations
  • Cube testers and key recovery attacks on reduced-round MD6 and trivium

    Aumasson, J. P., Dinur, I., Meier, W. & Shamir, A., 2 Nov 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    131 Scopus citations