Itai Dinur
Orcid: 0000-0002-2864-5121
According to our database1,
Itai Dinur
authored at least 72 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense <i>k</i>-SUM and <i>k</i>-XOR.
J. ACM, June, 2024
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting.
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020
Cryptanalytic Time-Memory-Data Trade-offs for FX-Constructions and the Affine Equivalence Problem.
J. Cryptol., 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
J. Cryptol., 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Commun. ACM, 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Cryptogr. Commun., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
2009
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009