Itai Dinur
Orcid: 0000-0002-2864-5121
According to our database1,
Itai Dinur
authored at least 69 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense <i>k</i>-SUM and <i>k</i>-XOR.
J. ACM, June, 2024
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis.
IACR Cryptol. ePrint Arch., 2024
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis.
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
IACR Cryptol. ePrint Arch., 2023
Electron. Colloquium Comput. Complex., 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Cryptol. ePrint Arch., 2021
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
IACR Cryptol. ePrint Arch., 2021
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting.
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021
2020
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
J. Cryptol., 2020
Cryptanalytic Time-Memory-Data Trade-offs for FX-Constructions and the Affine Equivalence Problem.
J. Cryptol., 2020
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.
IACR Cryptol. ePrint Arch., 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020
2019
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Des. Codes Cryptogr., 2019
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Commun. ACM, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
IACR Cryptol. ePrint Arch., 2012
Cryptogr. Commun., 2012
2011
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
2009
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008