Tomer Ashur

Orcid: 0000-0001-6091-4857

Affiliations:
  • KU Leuven, Belgium


According to our database1, Tomer Ashur authored at least 55 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs.
IACR Cryptol. ePrint Arch., 2024

Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields.
IACR Cryptol. ePrint Arch., 2024

On the Feasibility of Sliced Garbling.
IACR Cryptol. ePrint Arch., 2024

Generalized Indifferentiable Sponge and its Application to Polygon Miden VM.
IACR Cryptol. ePrint Arch., 2024

Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk.
Comput. J., June, 2023

Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword.
Comput. J., June, 2023

Cryptanalysis of Strong Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2023

A New Linear Distinguisher for Four-Round AES.
IACR Cryptol. ePrint Arch., 2023

XHash8 and XHash12: Efficient STARK-friendly Hash Functions.
IACR Cryptol. ePrint Arch., 2023

Arithmetization Oriented Encryption.
IACR Cryptol. ePrint Arch., 2023

Algebraic cryptanalysis of POSEIDON.
IACR Cryptol. ePrint Arch., 2023

A New Approach to Garbled Circuits.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.
IEEE Trans. Inf. Theory, 2022

Improved rotational-XOR cryptanalysis of Simon-like block ciphers.
IET Inf. Secur., 2022

Differential Cryptanalysis of K-Cipher.
IACR Cryptol. ePrint Arch., 2022

Chaghri - an FHE-friendly Block Cipher.
IACR Cryptol. ePrint Arch., 2022

Rescue-Prime Optimized.
IACR Cryptol. ePrint Arch., 2022

On the Effect of the Key-Expansion Algorithm in Simon-like Ciphers.
Comput. J., 2022

Chaghri - A FHE-friendly Block Cipher.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols.
IEEE Trans. Aerosp. Electron. Syst., 2021

How to Backdoor a Cipher.
IACR Cryptol. ePrint Arch., 2021

A New Framework for Garbled Circuits.
IACR Cryptol. ePrint Arch., 2021

An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols.
IACR Trans. Symmetric Cryptol., 2020

Revisiting the Wrong-Key-Randomization Hypothesis.
J. Cryptol., 2020

Rescue-Prime: a Standard Specification (SoK).
IACR Cryptol. ePrint Arch., 2020

An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

Rotational-XOR Cryptanalysis of Simon-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

Rotational Cryptanalysis on MAC Algorithm Chaskey.
IACR Cryptol. ePrint Arch., 2020

The Strictly Zero-Correlation Attack with Application to the Full DES.
IACR Cryptol. ePrint Arch., 2020

Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy).
IACR Cryptol. ePrint Arch., 2020

Generalized Matsui Algorithm 1 with Application for the Full DES.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

2019
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
IACR Cryptol. ePrint Arch., 2019

Linear Cryptanalysis Reduced Round of Piccolo-80.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

2018
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property.
IACR Cryptol. ePrint Arch., 2018

On linear hulls in one round of DES.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of MORUS.
IACR Cryptol. ePrint Arch., 2018

MARVELlous: a STARK-Friendly Family of Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2018

2017
Rotational-XOR Cryptanalysis of Reduced-round SPECK.
IACR Trans. Symmetric Cryptol., 2017

Cryptanalysis of GOST2.
IACR Trans. Symmetric Cryptol., 2017

Boosting Authenticated Encryption Robustness With Minimal Modifications.
IACR Cryptol. ePrint Arch., 2017

Linear Cryptanalysis Using Low-bias Linear Approximations.
IACR Cryptol. ePrint Arch., 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Rotational Cryptanalysis in the Presence of Constants.
IACR Trans. Symmetric Cryptol., 2016

On Linear Hulls and Trails in Simon.
IACR Cryptol. ePrint Arch., 2016

Damaging, Simplifying, and Salvaging p-OMD.
IACR Cryptol. ePrint Arch., 2016

Breaching the Privacy of Israel's Paper Ballot Voting System.
Proceedings of the Electronic Voting - First International Joint Conference, 2016

On Linear Hulls and Trails.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2015
Trivial Nonce-Misusing Attack on Pure OMD.
IACR Cryptol. ePrint Arch., 2015

Improved Linear Trails for the Block Cipher Simon.
IACR Cryptol. ePrint Arch., 2015

2013
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher.
IACR Cryptol. ePrint Arch., 2013

On the anonymity of Israel's general elections.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2010
Linear Analysis of Reduced-Round CubeHash.
IACR Cryptol. ePrint Arch., 2010


  Loading...