Eyal Ronen
Home
Publications
Talks
Projects
Contact
Adi Shamir
Latest
Quantum Time/Memory/Data Tradeoff Attacks
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation
Error Resilient Space Partitioning
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
The Retracing Boomerang Attack
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
Tight Bounds on Online Checkpointing Algorithms
IoT Goes Nuclear: Creating a Zigbee Chain Reaction
IoT Goes Nuclear: Creating a ZigBee Chain Reaction
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights
Cite
×