Itai Dinur

Orcid: 0000-0002-2864-5121

According to our database1, Itai Dinur authored at least 72 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Quantum Advantage via Solving Multivariate Polynomials.
CoRR, September, 2025

Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations.
IACR Cryptol. ePrint Arch., 2025

New Techniques for Analyzing Differentials with Application to AES.
IACR Cryptol. ePrint Arch., 2025

Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense <i>k</i>-SUM and <i>k</i>-XOR.
J. ACM, June, 2024

Time-Space Lower Bounds for Bounded-Error Computation in the Random-Query Model.
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024

Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
On Differential Privacy and Adaptive Data Analysis with Bounded Space.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Preface to Volume 2022, Issue 1.
IACR Trans. Symmetric Cryptol., 2022

Locality-Preserving Hashing for Shifts with Connections to Cryptography.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Distributed Merkle's Puzzles.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting.
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020

Cryptanalytic Time-Memory-Data Trade-offs for FX-Constructions and the Affine Equivalence Problem.
J. Cryptol., 2020

On the Streaming Indistinguishability of a Random Permutation and a Random Function.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications.
J. Cryptol., 2019

Generic Attacks on Hash Combiners.
IACR Cryptol. ePrint Arch., 2019

Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

A Relay Attack on a Tamper Detection System (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
IACR Cryptol. ePrint Arch., 2018

An Algorithmic Framework for the Generalized Birthday Problem.
IACR Cryptol. ePrint Arch., 2018

Tight Bounds on Online Checkpointing Algorithms.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

An Improved Affine Equivalence Algorithm for Random Permutations.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Optimal Backup Strategies Against Cyber Attacks.
CoRR, 2017

WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
J. Cryptol., 2016

New Attacks on the Concatenation and XOR Hash Combiners.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Memory-Efficient Algorithms for Finding Needles in Haystacks.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Decomposing the ASASA Block Cipher Construction.
IACR Cryptol. ePrint Arch., 2015

Improved Top-Down Techniques in Differential Cryptanalysis.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Cryptanalysis of SP Networks with Partial Non-Linear Layers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

New Attacks on Feistel Structures with Improved Memory Complexities.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Optimized Interpolation Attacks on LowMC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Improved Practical Attacks on Round-Reduced Keccak.
J. Cryptol., 2014

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

Reflections on Slide with a Twist Attacks.
IACR Cryptol. ePrint Arch., 2014

Improved Analysis of Zorro-Like Ciphers.
IACR Cryptol. ePrint Arch., 2014

Dissection: a new paradigm for solving bicomposite search problems.
Commun. ACM, 2014

Improved Differential Cryptanalysis of Round-Reduced Speck.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Cryptanalysis of FIDES.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Improved Generic Attacks against Hash-Based MACs and HAIFA.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
IACR Cryptol. ePrint Arch., 2013

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3.
IACR Cryptol. ePrint Arch., 2012

Applying cube attacks to stream ciphers in realistic scenarios.
Cryptogr. Commun., 2012

New Attacks on Keccak-224 and Keccak-256.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Improved Attacks on Full GOST.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Breaking Grain-128 with Dynamic Cube Attacks.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

An Improved Algebraic Attack on Hamsi-256.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Generic Analysis of Small Cryptographic Leaks.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

2009
Side Channel Cube Attacks on Block Ciphers.
IACR Cryptol. ePrint Arch., 2009

Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009

Cube Attacks on Tweakable Black Box Polynomials.
Proceedings of the Advances in Cryptology, 2009

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009


  Loading...