Orr Dunkelman

According to our database1, Orr Dunkelman authored at least 127 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings.
IEEE Trans. Dependable Sec. Comput., 2019

Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications.
J. Cryptology, 2019

Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs.
IACR Cryptology ePrint Archive, 2019

The Retracing Boomerang Attack.
IACR Cryptology ePrint Archive, 2019

A Practical Forgery Attack on Lilliput-AE.
IACR Cryptology ePrint Archive, 2019

New Slide Attacks on Almost Self-Similar Ciphers.
IACR Cryptology ePrint Archive, 2019

DLCT: A New Tool for Differential-Linear Cryptanalysis.
IACR Cryptology ePrint Archive, 2019

DNS-Morph: UDP-Based Bootstrapping Protocol For Tor.
CoRR, 2019

A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019

Linear Cryptanalysis Reduced Round of Piccolo-80.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Efficient Slide Attacks.
J. Cryptology, 2018

Reconstructing an S-box from its Difference Distribution Table.
IACR Cryptology ePrint Archive, 2018

Efficient Construction of the Boomerang Connection Table.
IACR Cryptology ePrint Archive, 2018

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
IACR Cryptology ePrint Archive, 2018

Tight Bounds on Online Checkpointing Algorithms.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

Why Are Repeated Auctions in RaaS Clouds Risky?
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2018

Efficient Construction of the Kite Generator Revisited.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
IEEE Trans. Information Forensics and Security, 2017

Boosting Authenticated Encryption Robustness With Minimal Modifications.
IACR Cryptology ePrint Archive, 2017

Linear Cryptanalysis Using Low-bias Linear Approximations.
IACR Cryptology ePrint Archive, 2017

Optimal Backup Strategies Against Cyber Attacks.
CoRR, 2017

Efficient Construction of Diamond Structures.
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

GenFace: Improving Cyber Security Using Realistic Synthetic Face Generation.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2016
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
J. Cryptology, 2016

New Second-Preimage Attacks on Hash Functions.
J. Cryptology, 2016

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.
IACR Cryptology ePrint Archive, 2016

Memory-Efficient Algorithms for Finding Needles in Haystacks.
IACR Cryptology ePrint Archive, 2016

Hybrid WBC: Secure and Efficient White-Box Encryption Schemes.
IACR Cryptology ePrint Archive, 2016

Cryptanalysis of GOST2.
IACR Cryptology ePrint Archive, 2016

HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images.
CoRR, 2016

Breaching the Privacy of Israel's Paper Ballot Voting System.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
J. Cryptology, 2015

Slidex Attacks on the Even-Mansour Encryption Scheme.
J. Cryptology, 2015

New Attacks on IDEA with at Least 6 Rounds.
J. Cryptology, 2015

New Attacks on Feistel Structures with Improved Memory Complexities.
IACR Cryptology ePrint Archive, 2015

Decomposing the ASASA Block Cipher Construction.
IACR Cryptology ePrint Archive, 2015

Improved Top-Down Techniques in Differential Cryptanalysis.
IACR Cryptology ePrint Archive, 2015

Almost universal forgery attacks on AES-based MAC's.
Des. Codes Cryptogr., 2015

Practical-time attacks against reduced variants of MISTY1.
Des. Codes Cryptogr., 2015

Reflections on slide with a twist attacks.
Des. Codes Cryptogr., 2015

Cryptanalysis of SP Networks with Partial Non-Linear Layers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
J. Cryptology, 2014

Improved Practical Attacks on Round-Reduced Keccak.
J. Cryptology, 2014

Improved Analysis of Zorro-Like Ciphers.
IACR Cryptology ePrint Archive, 2014

Dissection: a new paradigm for solving bicomposite search problems.
Commun. ACM, 2014

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.
IACR Cryptology ePrint Archive, 2013

Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
IACR Cryptology ePrint Archive, 2013

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
IACR Cryptology ePrint Archive, 2013

A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher.
IACR Cryptology ePrint Archive, 2013

Cryptanalysis of the Stream Cipher LEX.
Des. Codes Cryptogr., 2013

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Secure authentication from facial attributeswith no privacy loss.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

On the anonymity of Israel's general elections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis.
IEEE Trans. Information Theory, 2012

Low-Data Complexity Attacks on AES.
IEEE Trans. Information Theory, 2012

A Practical Attack on KeeLoq.
J. Cryptology, 2012

Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3.
IACR Cryptology ePrint Archive, 2012

Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
IACR Cryptology ePrint Archive, 2012

From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems.
Proceedings of the Progress in Cryptology, 2012

2011
Minimalism in Cryptography: The Even-Mansour Scheme Revisited.
IACR Cryptology ePrint Archive, 2011

ALRED Blues: New Attacks on AES-Based MAC's.
IACR Cryptology ePrint Archive, 2011

New attacks on Keccak-224 and Keccak-256.
IACR Cryptology ePrint Archive, 2011

Improved Attacks on Full GOST.
IACR Cryptology ePrint Archive, 2011

New Data-Efficient Attacks on Reduced-Round IDEA.
IACR Cryptology ePrint Archive, 2011

New Insights on Impossible Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

2010
The effects of the omission of last round's MixColumns on AES.
Inf. Process. Lett., 2010

Related-Key Boomerang and Rectangle Attacks.
IACR Cryptology ePrint Archive, 2010

Improved Single-Key Attacks on 8-round AES.
IACR Cryptology ePrint Archive, 2010

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony.
IACR Cryptology ePrint Archive, 2010

ABC - A New Framework for Block Ciphers.
IACR Cryptology ePrint Archive, 2010

Linear Analysis of Reduced-Round CubeHash.
IACR Cryptology ePrint Archive, 2010

Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Another Look at Complementation Properties.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Practical Attacks on NESHA-256.
IACR Cryptology ePrint Archive, 2009

Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3512.
IACR Cryptology ePrint Archive, 2009

On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.
IACR Cryptology ePrint Archive, 2009

Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds.
IACR Cryptology ePrint Archive, 2009

Cryptanalysis of Dynamic SHA(2).
IACR Cryptology ePrint Archive, 2009

Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode.
Proceedings of the Progress in Cryptology, 2009

The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

The SHAvite-3 - A New Hash Function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Cryptanalysis of CTC2.
Proceedings of the Topics in Cryptology, 2009

KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Cryptanalysis of Vortex.
Proceedings of the Progress in Cryptology, 2009

2008
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers.
Inf. Process. Lett., 2008

New Impossible Differential Attacks on AES.
IACR Cryptology ePrint Archive, 2008

A Differential-Linear Attack on 12-Round Serpent.
Proceedings of the Progress in Cryptology, 2008

Analysis of Two Attacks on Reduced-Round Versions of the SMS4.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

A Unified Approach to Related-Key Attacks.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

A Practical Attack on KeeLoq.
Proceedings of the Advances in Cryptology, 2008

Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
Proceedings of the Topics in Cryptology, 2008

A New Attack on the LEX Stream Cipher.
Proceedings of the Advances in Cryptology, 2008

An Improved Impossible Differential Attack on MISTY1.
Proceedings of the Advances in Cryptology, 2008

2007
A New Criterion for Nonlinearity of Block Ciphers.
IEEE Trans. Information Theory, 2007

A Framework for Iterative Hash Functions - HAIFA.
IACR Cryptology ePrint Archive, 2007

Differential Cryptanalysis in Stream Ciphers.
IACR Cryptology ePrint Archive, 2007

The Delicate Issues of Addition with Respect to XOR Differences.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Improved Meet-in-the-Middle Attacks on Reduced-Round DES.
Proceedings of the Progress in Cryptology, 2007

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Proceedings of the Information Hiding, 9th International Workshop, 2007

A New Attack on 6-Round IDEA.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Improved Slide Attacks.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

A Simple Related-Key Attack on the Full SHACAL-1.
Proceedings of the Topics in Cryptology, 2007

2006
Linear Cryptanalysis of CTC.
IACR Cryptology ePrint Archive, 2006

Related-Key Rectangle Attack on the Full SHACAL-1.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Related-Key Rectangle Attack on 42-Round SHACAL-2.
Proceedings of the Information Security, 9th International Conference, 2006

Differential and Rectangle Attacks on Reduced-Round SHACAL-1.
Proceedings of the Progress in Cryptology, 2006

Related-Key Impossible Differential Attacks on 8-Round AES-192.
Proceedings of the Topics in Cryptology, 2006

New Cryptanalytic Results on IDEA.
Proceedings of the Advances in Cryptology, 2006

2005
New Combined Attacks on Block Ciphers.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Related-Key Boomerang and Rectangle Attacks.
Proceedings of the Advances in Cryptology, 2005

A Related-Key Rectangle Attack on the Full KASUMI.
Proceedings of the Advances in Cryptology, 2005

2003
Rectangle Attacks on 49-Round SHACAL-1.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Differential-Linear Cryptanalysis of Serpent.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
New Results on Boomerang and Rectangle Attack.
IACR Cryptology ePrint Archive, 2002

Differential and Linear Cryptanalysis of a Reduced-Round SC2000.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

New Results on Boomerang and Rectangle Attacks.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Enhancing Differential-Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2002

2001
The Rectangle Attack - Rectangling the Serpent.
IACR Cryptology ePrint Archive, 2001

Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Cryptanalysis of the A5/1 GSM Stream Cipher.
Proceedings of the Progress in Cryptology, 2000

1998
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Proceedings of the Selected Areas in Cryptography '98, 1998


  Loading...