Nathan Keller
Orcid: 0000-0002-1591-9840
According to our database1,
Nathan Keller
authored at least 111 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Non-Adaptive Cryptanalytic Time-Space Lower Bounds via a Shearer-like Inequality for Permutations.
IACR Cryptol. ePrint Arch., 2025
2024
J. Cryptol., September, 2024
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense <i>k</i>-SUM and <i>k</i>-XOR.
J. ACM, June, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
2021
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
J. Cryptol., 2019
J. Comb. Theory A, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Electron. Notes Discret. Math., 2017
Biased halfspaces, noise sensitivity, and relative Chernoff inequalities (extended version).
CoRR, 2017
CoRR, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
Random Struct. Algorithms, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Commun. ACM, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IEEE Trans. Inf. Theory, 2012
A simple reduction from a biased measure on the discrete cube to the uniform measure.
Eur. J. Comb., 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
SIAM J. Comput., 2011
Comb. Probab. Comput., 2011
2010
On the probability of a rational outcome for generalized social welfare functions on three alternatives.
J. Comb. Theory A, 2010
Inf. Process. Lett., 2010
Inf. Process. Lett., 2010
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony.
IACR Cryptol. ePrint Arch., 2010
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Discret. Math., 2009
Adv. Appl. Math., 2009
2008
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers.
Inf. Process. Lett., 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Topics in Cryptology, 2007
2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Topics in Cryptology, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001