Eran Lambooij

According to our database1, Eran Lambooij authored at least 17 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Meet-in-the-Middle Attacks on Full ChiLow-32.
IACR Cryptol. ePrint Arch., 2025

Note: Full-round distinguisher for Synergy.
IACR Cryptol. ePrint Arch., 2025

Cryptanalysis of Full SCARF.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2023
Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256.
IACR Trans. Symmetric Cryptol., 2023

Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM.
IACR Cryptol. ePrint Arch., 2023

2022
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256.
IACR Cryptol. ePrint Arch., 2022

Symmetric Cryptography (Dagstuhl Seminar 22141).
Dagstuhl Reports, 2022

Full Round Zero-Sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-Permutation in the Known-Key Setting.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Biased differential distinguisher - Cryptanalysis of reduced-round SKINNY.
Inf. Comput., 2021

2020
Cryptanalysis of Feistel-Based Format-Preserving Encryption.
IACR Cryptol. ePrint Arch., 2020

Counting Active S-Boxes is not Enough.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
A Practical Forgery Attack on Lilliput-AE.
IACR Cryptol. ePrint Arch., 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptol. ePrint Arch., 2019

How to Build Pseudorandom Functions from Public Random Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2017
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Cryptol. ePrint Arch., 2017

2015
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
Proceedings of the Security Standardisation Research - Second International Conference, 2015


  Loading...