Eyal Ronen
Orcid: 0000-0002-6013-7426
According to our database1,
Eyal Ronen
authored at least 44 papers
between 2016 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
CoRR, October, 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
J. Cryptol., September, 2024
Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024
2023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016