Search Results - "Dinur, Itai"
-
1
Cryptanalytic Time–Memory–Data Trade-offs for FX-Constructions and the Affine Equivalence Problem
Published in Journal of cryptology (01-07-2020)“…The FX-construction was proposed in 1996 by Kilian and Rogaway as a generalization of the DESX scheme. The construction increases the security of an n -bit…”
Get full text
Journal Article -
2
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing
Published in Journal of cryptology (01-07-2020)“…The distributed discrete logarithm (DDL) problem was introduced by Boyle, Gilboa and Ishai at CRYPTO 2016. A protocol solving this problem was the main tool…”
Get full text
Journal Article -
3
Preface to Volume 2022, Issue 1
Published in IACR Transactions on Symmetric Cryptology (11-03-2022)Get full text
Journal Article -
4
Generic Attacks on Hash Combiners
Published in Journal of cryptology (01-07-2020)“…Hash combiners are a practical way to make cryptographic hash functions more tolerant to future attacks and compatible with existing infrastructure. A combiner…”
Get full text
Journal Article -
5
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
Published in Journal of cryptology (01-10-2019)“…In this paper, we show that a large class of diverse problems have a bicomposite structure which makes it possible to solve them with a new type of algorithm…”
Get full text
Journal Article -
6
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
Published in Journal of cryptology (01-10-2016)“…Iterated Even–Mansour (EM) encryption schemes (also named “key-alternating ciphers”) were extensively studied in recent years as an abstraction of commonly…”
Get full text
Journal Article -
7
Preface to Volume 2021, Issue 1
Published in IACR Transactions on Symmetric Cryptology (19-03-2021)Get full text
Journal Article -
8
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process
Published in IACR Transactions on Symmetric Cryptology (22-06-2020)Get full text
Journal Article -
9
Improved Practical Attacks on Round-Reduced Keccak
Published in Journal of cryptology (2014)“…The Keccak hash function is the winner of NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks:…”
Get full text
Journal Article -
10
An algorithmic framework for the generalized birthday problem
Published in Designs, codes, and cryptography (15-08-2019)“…The generalized birthday problem (GBP) was introduced by Wagner in 2002 and has shown to have many applications in cryptanalysis. In its typical variant, we…”
Get full text
Journal Article -
11
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process
Published in IACR Transactions on Symmetric Cryptology (22-06-2020)Get full text
Journal Article -
12
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
Published in 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS) (01-02-2022)“…An average-case variant of the k -SUM conjecture asserts that finding k numbers that sum to 0 in a list of r random numbers, each of the order r^{k} , cannot…”
Get full text
Conference Proceeding -
13
Improved Generic Attacks Against Hash-Based MACs and HAIFA
Published in Algorithmica (01-12-2017)“…The security of HMAC (and more general hash-based MACs) against state-recovery and universal forgery attacks was shown to be suboptimal, following a series of…”
Get full text
Journal Article -
14
Applying cube attacks to stream ciphers in realistic scenarios
Published in Cryptography and communications (01-12-2012)“…Cube attacks were introduced in Dinur and Shamir ( 2009 ) as a cryptanalytic technique that requires only black box access to the underlying cryptosystem. The…”
Get full text
Journal Article -
15
Reflections on slide with a twist attacks
Published in Designs, codes, and cryptography (01-12-2015)“…Slide attacks use pairs of encryption operations which are slid against each other. Slide with a twist attacks are more sophisticated variants of slide attacks…”
Get full text
Journal Article -
16
Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting
Published 10-05-2020“…We consider the problem of finding a solution to a multivariate polynomial equation system of degree $d$ in $n$ variables over $\mathbb{F}_2$. For $d=2$, the…”
Get full text
Journal Article -
17
New Methods in Cryptanalysis of Secret Key Algorithms
Published 01-01-2013“…Secret key cryptographic primitives (block ciphers, stream ciphers, MACs and hash functions) play a crucial role in secure communication. For example, block…”
Get full text
Dissertation -
18
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR
Published 31-10-2021“…An average-case variant of the $k$-SUM conjecture asserts that finding $k$ numbers that sum to 0 in a list of $r$ random numbers, each of the order $r^k$,…”
Get full text
Journal Article -
19
On Differential Privacy and Adaptive Data Analysis with Bounded Space
Published 11-02-2023“…We study the space complexity of the two related fields of differential privacy and adaptive data analysis. Specifically, (1) Under standard cryptographic…”
Get full text
Journal Article -
20
IACR Transactions on Symmetric Cryptology: Volume 2021, Issue 1
Published in IACR Transactions on Symmetric Cryptology (19-03-2021)Get full text
Publication