Dunkelman, Orr; Keller, Nathan; Weizmann, Ariel Practical-time related-key attack on GOST with secret S-boxes. (English) Zbl 07799256 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 177-208 (2023). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., Lect. Notes Comput. Sci. 14083, 177--208 (2023; Zbl 07799256) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation. (English) Zbl 1528.94044 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 98-127 (2023). MSC: 94A60 65T50 PDFBibTeX XMLCite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 14007, 98--127 (2023; Zbl 1528.94044) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi Key recovery attacks on iterated Even-Mansour encryption schemes. (English) Zbl 1365.94422 J. Cryptology 29, No. 4, 697-728 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Dinur} et al., J. Cryptology 29, No. 4, 697--728 (2016; Zbl 1365.94422) Full Text: DOI
Dunkelman, Orr; Keller, Nathan; Shamir, Adi Almost universal forgery attacks on AES-based MAC’s. (English) Zbl 1359.94589 Des. Codes Cryptography 76, No. 3, 431-449 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., Des. Codes Cryptography 76, No. 3, 431--449 (2015; Zbl 1359.94589) Full Text: DOI
Dunkelman, Orr; Keller, Nathan; Shamir, Adi Improved single-key attacks on 8-round AES-192 and AES-256. (English) Zbl 1321.94055 J. Cryptology 28, No. 3, 397-422 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., J. Cryptology 28, No. 3, 397--422 (2015; Zbl 1321.94055) Full Text: DOI
Dunkelman, Orr; Keller, Nathan; Shamir, Adi A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. (English) Zbl 1301.94113 J. Cryptology 27, No. 4, 824-849 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Dunkelman} et al., J. Cryptology 27, No. 4, 824--849 (2014; Zbl 1301.94113) Full Text: DOI
Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Leurent, Gaëtan New insights on impossible differential cryptanalysis. (English) Zbl 1292.94037 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 243-259 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Bouillaguet} et al., Lect. Notes Comput. Sci. 7118, 243--259 (2012; Zbl 1292.94037) Full Text: DOI
Dunkelman, Orr; Keller, Nathan The effects of the omission of last round’s MixColumns on AES. (English) Zbl 1209.68216 Inf. Process. Lett. 110, No. 8-9, 304-308 (2010). MSC: 68P25 PDFBibTeX XMLCite \textit{O. Dunkelman} and \textit{N. Keller}, Inf. Process. Lett. 110, No. 8--9, 304--308 (2010; Zbl 1209.68216) Full Text: DOI
Dunkelman, Orr; Keller, Nathan An improved impossible differential attack on MISTY1. (English) Zbl 1206.94064 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 441-454 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Dunkelman} and \textit{N. Keller}, Lect. Notes Comput. Sci. 5350, 441--454 (2008; Zbl 1206.94064) Full Text: DOI
Lu, Jiqiang; Dunkelman, Orr; Keller, Nathan; Kim, Jongsung New impossible differential attacks on AES. (English) Zbl 1203.94113 Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 279-293 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 5365, 279--293 (2008; Zbl 1203.94113) Full Text: DOI
Biham, Eli; Dunkelman, Orr; Keller, Nathan A unified approach to related-key attacks. (English) Zbl 1154.68382 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 73-96 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{E. Biham} et al., Lect. Notes Comput. Sci. 5086, 73--96 (2008; Zbl 1154.68382) Full Text: DOI
Wang, Gaoli; Keller, Nathan; Dunkelman, Orr The delicate issues of addition with respect to XOR differences. (English) Zbl 1154.94438 Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 212-231 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Wang} et al., Lect. Notes Comput. Sci. 4876, 212--231 (2007; Zbl 1154.94438) Full Text: DOI