Liron David

Orcid: 0000-0002-1502-5257

According to our database1, Liron David authored at least 20 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
The Battery Insertion Attack: Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
Proc. Priv. Enhancing Technol., 2025

2024
Are Your Keys Protected? Time will Tell.
IACR Cryptol. ePrint Arch., 2024

Is Periodic Pseudo-randomization Sufficient for Beacon Privacy?
IACR Cryptol. ePrint Arch., 2024

Cryptiny: Compacting Cryptography for Space-Restricted Channels and its Use-case for IoT-E2EE.
IACR Cryptol. ePrint Arch., 2024

Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System.
CoRR, 2024

2023
BGP Typo: A Longitudinal Study and Remedies.
CoRR, 2023

Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes.
Proceedings of the 4th Symposium on Foundations of Responsible Computing, 2023

2022
Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons.
IEEE Trans. Inf. Forensics Secur., 2022

PESrank: An Explainable online password strength estimator.
J. Comput. Secur., 2022

Rank estimation with bounded error via exponential sampling.
J. Cryptogr. Eng., 2022

Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
An Explainable Online Password Strength Estimator.
Proceedings of the Computer Security - ESORICS 2021, 2021

2019
Context Aware Password Guessability via Multi-Dimensional Rank Estimation.
CoRR, 2019

Fast Analytical Rank Estimation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

2018
Explicit Rateless Codes for Memoryless Binary-Input Output-Symmetric Channels.
Theory Comput., 2018

Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling.
IACR Cryptol. ePrint Arch., 2018

PRank: Fast Analytical Rank Estimation via Pareto Distributions.
IACR Cryptol. ePrint Arch., 2018

2017
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2015
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

Deterministic Rateless Codes for BSC.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015


  Loading...