Eyal Ronen

Orcid: 0000-0002-6013-7426

According to our database1, Eyal Ronen authored at least 37 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Retracing Boomerang Attack, with Application to Reduced-Round AES.
J. Cryptol., September, 2024

Quantum time/memory/data tradeoff attacks.
Des. Codes Cryptogr., January, 2024

Spec-o-Scope: Cache Probing at Cache Speed.
IACR Cryptol. ePrint Arch., 2024

Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: SGX.Fail: How Stuff Gets eXposed.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations.
Proceedings of the 2024 Workshop on Artificial Intelligence and Security, 2024

2023
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.
Comput. J., June, 2023

SDitH in the QROM.
IACR Cryptol. ePrint Arch., 2023

Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
IACR Cryptol. ePrint Arch., 2023

Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements.
IACR Cryptol. ePrint Arch., 2023

That's not my signature! Fail-stop signatures for a post-quantum world.
IACR Cryptol. ePrint Arch., 2023

To attest or not to attest, this is the question - Provable attestation in FIDO2.
IACR Cryptol. ePrint Arch., 2023

Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Gates of Time: Improving Cache Attacks with Transient Execution.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design.
IACR Cryptol. ePrint Arch., 2022

SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.
IACR Cryptol. ePrint Arch., 2022

TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation.
IACR Cryptol. ePrint Arch., 2022

Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.
IACR Cryptol. ePrint Arch., 2021

Error Resilient Space Partitioning (Invited Talk).
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021

2020
Tight Bounds on Online Checkpointing Algorithms.
ACM Trans. Algorithms, 2020

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
J. Cryptol., 2020

CRISP: Compromise Resilient Identity-based Symmetric PAKE.
IACR Cryptol. ePrint Arch., 2020

Consistent High Dimensional Rounding with Side Information.
CoRR, 2020

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Dragonblood: A Security Analysis of WPA3's SAE Handshake.
IACR Cryptol. ePrint Arch., 2019

The Retracing Boomerang Attack.
IACR Cryptol. ePrint Arch., 2019

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
IACR Cryptol. ePrint Arch., 2019

A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019

2018
IoT Goes Nuclear: Creating a Zigbee Chain Reaction.
IEEE Secur. Priv., 2018

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.
IACR Cryptol. ePrint Arch., 2018

The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
IACR Cryptol. ePrint Arch., 2018

How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior.
IACR Cryptol. ePrint Arch., 2018

2017
Optimal Backup Strategies Against Cyber Attacks.
CoRR, 2017

2016
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016


  Loading...