No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation
Osadchy, Margarita, Hernandez-Castro, Julio, Gibson, Stuart, Dunkelman, Orr, Perez-Cabo, Daniel
Published in IEEE transactions on information forensics and security (01.11.2017)
Published in IEEE transactions on information forensics and security (01.11.2017)
Get full text
Journal Article
The Retracing Boomerang Attack, with Application to Reduced-Round AES
Dunkelman, Orr, Keller, Nathan, Ronen, Eyal, Shamir, Adi
Published in Journal of cryptology (01.07.2024)
Published in Journal of cryptology (01.07.2024)
Get full text
Journal Article
Quantum time/memory/data tradeoff attacks
Dunkelman, Orr, Keller, Nathan, Ronen, Eyal, Shamir, Adi
Published in Designs, codes, and cryptography (2024)
Published in Designs, codes, and cryptography (2024)
Get full text
Journal Article
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
Bar-On, Achiya, Dunkelman, Orr, Keller, Nathan, Ronen, Eyal, Shamir, Adi
Published in Journal of cryptology (01.07.2020)
Published in Journal of cryptology (01.07.2020)
Get full text
Journal Article
Efficient Slide Attacks
Bar-On, Achiya, Biham, Eli, Dunkelman, Orr, Keller, Nathan
Published in Journal of cryptology (01.07.2018)
Published in Journal of cryptology (01.07.2018)
Get full text
Journal Article
A Practical Forgery Attack on Lilliput-AE
Dunkelman, Orr, Keller, Nathan, Lambooij, Eran, Sasaki, Yu
Published in Journal of cryptology (01.07.2020)
Published in Journal of cryptology (01.07.2020)
Get full text
Journal Article
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
Dinur, Itai, Dunkelman, Orr, Keller, Nathan, Shamir, Adi
Published in Journal of cryptology (01.10.2019)
Published in Journal of cryptology (01.10.2019)
Get full text
Journal Article
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes
Dinur, Itai, Dunkelman, Orr, Keller, Nathan, Shamir, Adi
Published in Journal of cryptology (01.10.2016)
Published in Journal of cryptology (01.10.2016)
Get full text
Journal Article
Practical key recovery attacks on FlexAEAD
Dunkelman, Orr, Eichlseder, Maria, Kales, Daniel, Keller, Nathan, Leurent, Gaëtan, Schofnegger, Markus
Published in Designs, codes, and cryptography (2022)
Published in Designs, codes, and cryptography (2022)
Get full text
Journal Article
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
Dunkelman, Orr, Ghosh, Shibam, Lambooij, Eran
Published in IACR Transactions on Symmetric Cryptology (10.03.2023)
Published in IACR Transactions on Symmetric Cryptology (10.03.2023)
Get full text
Journal Article
Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256
Dunkelman, Orr, Ghosh, Shibam, Lambooij, Eran
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Get full text
Journal Article
Finding Collisions against 4-Round SHA-3-384 in Practical Time
Huang, Senyang, Ben-Yehuda, Orna Agmon, Dunkelman, Orr, Maximov, Alexander
Published in IACR Transactions on Symmetric Cryptology (09.09.2022)
Published in IACR Transactions on Symmetric Cryptology (09.09.2022)
Get full text
Journal Article