BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Dinur I, Dunkelman O, Keller N, et al. (2019) Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications Journal of Cryptology. 32: 1448-1490 |
Dinur I, Dunkelman O, Keller N, et al. (2015) Reflections on slide with a twist attacks Designs, Codes, and Cryptography |
Dinur I, Dunkelman O, Keller N, et al. (2015) Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes Journal of Cryptology |
Andreeva E, Bouillaguet C, Dunkelman O, et al. (2015) New Second-Preimage Attacks on Hash Functions Journal of Cryptology |
Biham E, Dunkelman O, Keller N, et al. (2015) New Attacks on IDEA with at Least 6 Rounds Journal of Cryptology. 28: 209-239 |
Dunkelman O, Keller N, Shamir A. (2015) Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Journal of Cryptology. 28: 397-422 |
Dinur I, Dunkelman O, Keller N, et al. (2014) Dissection: A new paradigm for solving bicomposite search problems Communications of the Acm. 57: 98-105 |
Dunkelman O, Keller N, Shamir A. (2014) Almost universal forgery attacks on AES-based MAC’s Designs, Codes, and Cryptography. 76: 431-449 |
Dodis Y, Shamir A, Stephens-Davidowitz N, et al. (2014) How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54 |
Dunkelman O, Keller N, Shamir A. (2014) A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony Journal of Cryptology. 27: 824-849 |