Itai Dinur


Ontology type: schema:Person     


Person Info

NAME

Itai

SURNAME

Dinur

Publications in SciGraph latest 50 shown

  • 2021-11-04 Distributed Merkle’s Puzzles in THEORY OF CRYPTOGRAPHY
  • 2021-08-11 MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications in ADVANCES IN CRYPTOLOGY – CRYPTO 2021
  • 2021-06-16 Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2) in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2021
  • 2020-08-10 Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems in ADVANCES IN CRYPTOLOGY – CRYPTO 2020
  • 2020-05-01 On the Streaming Indistinguishability of a Random Permutation and a Random Function in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2020-05-01 Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2020
  • 2019-09-26 An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing in JOURNAL OF CRYPTOLOGY
  • 2019-09-13 Cryptanalytic Time–Memory–Data Trade-offs for FX-Constructions and the Affine Equivalence Problem in JOURNAL OF CRYPTOLOGY
  • 2019-07-12 Generic Attacks on Hash Combiners in JOURNAL OF CRYPTOLOGY
  • 2019-05-19 A Relay Attack on a Tamper Detection System (Brief Announcement) in CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING
  • 2019-04-24 Multi-target Attacks on the Picnic Signature Scheme and Related Protocols in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2019
  • 2019-04-18 Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2019
  • 2018-12-17 An algorithmic framework for the generalized birthday problem in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2018-08-21 Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications in JOURNAL OF CRYPTOLOGY
  • 2018-07-24 An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2018-03-31 An Improved Affine Equivalence Algorithm for Random Permutations in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2017-07-29 Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme in ADVANCES IN CRYPTOLOGY – CRYPTO 2017
  • 2017-01-10 WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction in TOPICS IN CRYPTOLOGY – CT-RSA 2017
  • 2016-11-02 Improved Generic Attacks Against Hash-Based MACs and HAIFA in ALGORITHMICA
  • 2016-07-21 Memory-Efficient Algorithms for Finding Needles in Haystacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2016-04-28 New Attacks on the Concatenation and XOR Hash Combiners in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2015-12-30 Optimized Interpolation Attacks on LowMC in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2015-08-15 Improved Top-Down Techniques in Differential Cryptanalysis in PROGRESS IN CRYPTOLOGY -- LATINCRYPT 2015
  • 2015-08-01 New Attacks on Feistel Structures with Improved Memory Complexities in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-06-10 Reflections on slide with a twist attacks in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-04-19 Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 in FAST SOFTWARE ENCRYPTION
  • 2015-04-19 Cryptanalysis of FIDES in FAST SOFTWARE ENCRYPTION
  • 2015-04-14 Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2015-04-14 Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2015-04-14 Cryptanalysis of SP Networks with Partial Non-Linear Layers in ADVANCES IN CRYPTOLOGY -- EUROCRYPT 2015
  • 2014-11-29 Improved Differential Cryptanalysis of Round-Reduced Speck in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2014-07-08 Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials in FAST SOFTWARE ENCRYPTION
  • 2014 Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2014 Improved Generic Attacks against Hash-Based MACs and HAIFA in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2013 Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2012-12-29 Improved Practical Attacks on Round-Reduced Keccak in JOURNAL OF CRYPTOLOGY
  • 2012-08-19 Applying cube attacks to stream ciphers in realistic scenarios in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2012 Improved Attacks on Full GOST in FAST SOFTWARE ENCRYPTION
  • 2012 Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems in ADVANCES IN CRYPTOLOGY – CRYPTO 2012
  • 2012 New Attacks on Keccak-224 and Keccak-256 in FAST SOFTWARE ENCRYPTION
  • 2011 An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 An Improved Algebraic Attack on Hamsi-256 in FAST SOFTWARE ENCRYPTION
  • 2011 Breaking Grain-128 with Dynamic Cube Attacks in FAST SOFTWARE ENCRYPTION
  • 2009 Cube Attacks on Tweakable Black Box Polynomials in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2009 Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium in FAST SOFTWARE ENCRYPTION
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.7489.2", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.15140.31", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.13992.30", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.5607.4", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.503141.2", 
            "type": "Organization"
          }
        ], 
        "familyName": "Dinur", 
        "givenName": "Itai", 
        "id": "sg:person.012046016703.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012046016703.69"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-05-10T11:31", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/person/person_921.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.012046016703.69'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.012046016703.69'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.012046016703.69'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.012046016703.69'


     




    Preview window. Press ESC to close (or click here)


    ...