Orr Dunkelman
Orcid: 0000-0001-5799-2635Affiliations:
- University of Haifa, Department of Computer Science, Haifa, Israel
- Technion - Israel Institute of Technology, Haifa, Israel (former)
According to our database1,
Orr Dunkelman
authored at least 160 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
J. Cryptol., September, 2024
2023
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Symmetric Cryptol., 2023
J. Inf. Secur. Appl., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd International Symposium on High-Performance Parallel and Distributed Computing, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the SYSTOR '22: The 15th ACM International Systems and Storage Conference, Haifa, Israel, June 13, 2022
2021
Inverting Binarizations of Facial Templates Produced by Deep Learning (and Its Implications).
IEEE Trans. Inf. Forensics Secur., 2021
Inf. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
COVID-19 Datathon Based on Deidentified Governmental Data as an Approach for Solving Policy Challenges, Increasing Trust, and Building a Community: Case Study.
CoRR, 2021
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning.
CoRR, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings.
IEEE Trans. Dependable Secur. Comput., 2019
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2018
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.
IEEE Trans. Inf. Forensics Secur., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
2016
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images.
CoRR, 2016
Proceedings of the Electronic Voting - First International Joint Conference, 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
J. Cryptol., 2014
Commun. ACM, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IEEE Trans. Inf. Theory, 2012
IACR Cryptol. ePrint Arch., 2012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Progress in Cryptology, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
2010
Inf. Process. Lett., 2010
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony.
IACR Cryptol. ePrint Arch., 2010
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round <i>Lesamnta</i> and <i>SHAvite-3</i><sub>512</sub>.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
2009
Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3<sub>512</sub>.
IACR Cryptol. ePrint Arch., 2009
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers.
Inf. Process. Lett., 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Topics in Cryptology, 2007
2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Topics in Cryptology, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
Proceedings of the Progress in Cryptology, 2000
1998
Proceedings of the Selected Areas in Cryptography '98, 1998