Itai Dinur

Orcid: 0000-0002-2864-5121

According to our database1, Itai Dinur authored at least 69 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense <i>k</i>-SUM and <i>k</i>-XOR.
J. ACM, June, 2024

Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis.
IACR Cryptol. ePrint Arch., 2024

Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis.
IACR Cryptol. ePrint Arch., 2024

2023
On Differential Privacy and Adaptive Data Analysis with Bounded Space.
IACR Cryptol. ePrint Arch., 2023

Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
IACR Cryptol. ePrint Arch., 2023

Time-Space Lower Bounds for Bounded-Error Computation in the Random-Query Model.
Electron. Colloquium Comput. Complex., 2023

2022
Preface to Volume 2022, Issue 1.
IACR Trans. Symmetric Cryptol., 2022

Locality-Preserving Hashing for Shifts with Connections to Cryptography.
IACR Cryptol. ePrint Arch., 2022

Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.
IACR Cryptol. ePrint Arch., 2022

2021
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR.
IACR Cryptol. ePrint Arch., 2021

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
IACR Cryptol. ePrint Arch., 2021

Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).
IACR Cryptol. ePrint Arch., 2021

Distributed Merkle's Puzzles.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Improved Algorithms for Solving Polynomial Systems over GF(2) by Multiple Parity-Counting.
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

2020
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
IACR Trans. Symmetric Cryptol., 2020

Tight Bounds on Online Checkpointing Algorithms.
ACM Trans. Algorithms, 2020

An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
J. Cryptol., 2020

Cryptanalytic Time-Memory-Data Trade-offs for FX-Constructions and the Affine Equivalence Problem.
J. Cryptol., 2020

Generic Attacks on Hash Combiners.
J. Cryptol., 2020

Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications.
J. Cryptol., 2019

On the Streaming Indistinguishability of a Random Permutation and a Random Function.
IACR Cryptol. ePrint Arch., 2019

An algorithmic framework for the generalized birthday problem.
Des. Codes Cryptogr., 2019

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

A Relay Attack on a Tamper Detection System (Brief Announcement).
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols.
IACR Cryptol. ePrint Arch., 2018

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
IACR Cryptol. ePrint Arch., 2018

An Improved Affine Equivalence Algorithm for Random Permutations.
IACR Cryptol. ePrint Arch., 2018

2017
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme.
IACR Cryptol. ePrint Arch., 2017

Optimal Backup Strategies Against Cyber Attacks.
CoRR, 2017

Improved Generic Attacks Against Hash-Based MACs and HAIFA.
Algorithmica, 2017

WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
J. Cryptol., 2016

Memory-Efficient Algorithms for Finding Needles in Haystacks.
IACR Cryptol. ePrint Arch., 2016

New Attacks on the Concatenation and XOR Hash Combiners.
IACR Cryptol. ePrint Arch., 2016

2015
Optimized Interpolation Attacks on LowMC.
IACR Cryptol. ePrint Arch., 2015

New Attacks on Feistel Structures with Improved Memory Complexities.
IACR Cryptol. ePrint Arch., 2015

Decomposing the ASASA Block Cipher Construction.
IACR Cryptol. ePrint Arch., 2015

Improved Top-Down Techniques in Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015

Reflections on slide with a twist attacks.
Des. Codes Cryptogr., 2015

Cryptanalysis of SP Networks with Partial Non-Linear Layers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Improved Practical Attacks on Round-Reduced Keccak.
J. Cryptol., 2014

Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of FIDES.
IACR Cryptol. ePrint Arch., 2014

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.
IACR Cryptol. ePrint Arch., 2014

Improved Differential Cryptanalysis of Round-Reduced Speck.
IACR Cryptol. ePrint Arch., 2014

Improved Analysis of Zorro-Like Ciphers.
IACR Cryptol. ePrint Arch., 2014

Dissection: a new paradigm for solving bicomposite search problems.
Commun. ACM, 2014

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.
IACR Cryptol. ePrint Arch., 2013

Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
IACR Cryptol. ePrint Arch., 2013

Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3.
IACR Cryptol. ePrint Arch., 2012

Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
IACR Cryptol. ePrint Arch., 2012

Applying cube attacks to stream ciphers in realistic scenarios.
Cryptogr. Commun., 2012

2011
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
IACR Cryptol. ePrint Arch., 2011

New attacks on Keccak-224 and Keccak-256.
IACR Cryptol. ePrint Arch., 2011

Improved Attacks on Full GOST.
IACR Cryptol. ePrint Arch., 2011

2010
An Improved Algebraic Attack on Hamsi-256.
IACR Cryptol. ePrint Arch., 2010

Breaking Grain-128 with Dynamic Cube Attacks.
IACR Cryptol. ePrint Arch., 2010

Generic Analysis of Small Cryptographic Leaks.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

2009
Side Channel Cube Attacks on Block Ciphers.
IACR Cryptol. ePrint Arch., 2009

Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009

Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2008
Cube Attacks on Tweakable Black Box Polynomials.
IACR Cryptol. ePrint Arch., 2008


  Loading...