Search

Your search keyword '"Orr Dunkelman"' showing total 30 results

Search Constraints

Start Over You searched for: Author "Orr Dunkelman" Remove constraint Author: "Orr Dunkelman" Language english Remove constraint Language: english
30 results on '"Orr Dunkelman"'

Search Results

1. The QARMAv2 Family of Tweakable Block Ciphers

2. Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256

3. Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM

4. Finding Collisions against 4-Round SHA-3-384 in Practical Time

5. Collaboration between Government and Research Community to Respond to COVID-19: Israel’s Case

6. Cryptanalysis of GOST2

7. Reconstructing an S-box from its Difference Distribution Table

8. Advances in Cryptology – EUROCRYPT 2022 : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 – June 3, 2022, Proceedings, Part II

9. Selected Areas in Cryptography : 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers

10. Progress in Cryptology – LATINCRYPT 2017 : 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers

11. No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, with Applications to CAPTCHA Generation

12. Selected Areas in Cryptography - SAC 2015 : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers

13. Progress in Cryptology – INDOCRYPT 2016 : 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings

14. Cryptanalysis of SP Networks with Partial Non-Linear Layers

15. New Attacks on Feistel Structures with Improved Memory Complexities

16. Improved Top-Down Techniques in Differential Cryptanalysis

17. Reflections on slide with a twist attacks

18. Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64

19. Topics in Cryptology - CT-RSA 2012 : The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings

20. Low-Data Complexity Attacks on AES

21. A Practical Attack on KeeLoq

22. Another Look at Complementation Properties

23. A Practical Attack on KeeLoq

24. A New Attack on the LEX Stream Cipher

25. A Differential-Linear Attack on 12-Round Serpent

26. Analysis of two Attacks on Reduced-Round Versions of the SMS4

27. Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers

28. Memory-Efficient Algorithms for Finding Needles in Haystacks

29. On the Joint Security of Encryption and Signature in EMV

30. Plaintext-Checkable Encryption

Catalog

Books, media, physical & digital resources