Eyal Ronen

Orcid: 0000-0002-6013-7426

According to our database1, Eyal Ronen authored at least 44 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
NoisePrints: Distortion-Free Watermarks for Authorship in Private Diffusion Models.
CoRR, October, 2025

Sy-FAR: Symmetry-based Fair Adversarial Robustness.
CoRR, September, 2025

Breaking RSA with Overclocking-induced GPU Faults.
IACR Cryptol. ePrint Arch., 2025

How to Securely Implement Cryptography in Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2025

Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Analysis of the Telegram Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
The Retracing Boomerang Attack, with Application to Reduced-Round AES.
J. Cryptol., September, 2024

Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: SGX.Fail: How Stuff Gets eXposed.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

That's Not My Signature! Fail-Stop Signatures for a Post-quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Spec-o-Scope: Cache Probing at Cache Speed.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024

2023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Gates of Time: Improving Cache Attacks with Transient Execution.
Proceedings of the 32nd USENIX Security Symposium, 2023

SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

SDitH in the QROM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

To Attest or Not to Attest, This is the Question - Provable Attestation in FIDO2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation.
IACR Cryptol. ePrint Arch., 2022

Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design.
Proceedings of the 31st USENIX Security Symposium, 2022

Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Quantum Time/Memory/Data Tradeoff Attacks.
IACR Cryptol. ePrint Arch., 2021

Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.
IACR Cryptol. ePrint Arch., 2021

Error Resilient Space Partitioning (Invited Talk).
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021

Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
CRISP: Compromise Resilient Identity-based Symmetric PAKE.
IACR Cryptol. ePrint Arch., 2020

Consistent High Dimensional Rounding with Side Information.
CoRR, 2020

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

The Retracing Boomerang Attack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Dragonblood: A Security Analysis of WPA3's SAE Handshake.
IACR Cryptol. ePrint Arch., 2019

A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019

The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Tight Bounds on Online Checkpointing Algorithms.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Optimal Backup Strategies Against Cyber Attacks.
CoRR, 2017

IoT Goes Nuclear: Creating a ZigBee Chain Reaction.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016


  Loading...