Name
Affiliation
Papers
ORR DUNKELMAN
Katholieke Universiteit Leuven, Dept. of Electrical Engineering ESAT/SCD-COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee Belgium
124
Collaborators
Citations 
PageRank 
115
1614
110.26
Referers 
Referees 
References 
1759
910
1311
Search Limit
1001000
Title
Citations
PageRank
Year
Finding Collisions against 4-Round SHA-3-384 in Practical Time00.342022
Practical key recovery attacks on FlexAEAD00.342022
Practical Related-Key Forgery Attacks on the Full TinyJAMBU-192/256.00.342022
Inverting Binarizations Of Facial Templates Produced By Deep Learning (And Its Implications)00.342021
Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64.00.342020
Counting Active S-Boxes is not Enough.00.342020
A Practical Forgery Attack on Lilliput-AE00.342020
It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings00.342019
DNS-Morph: UDP-Based Bootstrapping Protocol For Tor.00.342019
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications10.412019
DLCT: A New Tool for Differential-Linear Cryptanalysis.00.342019
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs00.342019
Linear Cryptanalysis Reduced Round of Piccolo-80.00.342019
Efficient Construction of the Boomerang Connection Table.00.342018
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.00.342018
Efficient Slide Attacks.10.402018
Reconstructing An S-Box From Its Difference Distribution Table00.342018
Efficient Construction of the Kite Generator Revisited.00.342018
Efficient Construction Of Diamond Structures00.342017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation.140.742017
Linear Cryptanalysis Using Low-bias Linear Approximations.00.342017
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.10.362017
No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA.00.342016
Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes40.422016
Breaching the Privacy of Israel's Paper Ballot Voting System.00.342016
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity.00.342016
New Second-Preimage Attacks on Hash Functions50.402016
HoneyFaces: Increasing the Security and Privacy of Authentication Using Synthetic Facial Images.00.342016
Improved Top-Down Techniques in Differential Cryptanalysis.40.562015
New Attacks on Feistel Structures with Improved Memory Complexities.60.492015
Slidex Attacks on the Even–Mansour Encryption Scheme10.352015
Cryptanalysis of SP Networks with Partial Non-Linear Layers.40.402015
Decomposing the ASASA Block Cipher Construction.70.452015
Almost universal forgery attacks on AES-based MAC’s20.392015
Reflections on Slide with a Twist Attacks.00.342014
Improved Practical Attacks on Round-Reduced Keccak110.662014
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.80.512014
Dissection: a new paradigm for solving bicomposite search problems10.352014
Improved Analysis of Zorro-Like Ciphers.50.442014
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.10.352013
On the anonymity of Israel's general elections.20.402013
Cryptanalysis of the Stream Cipher LEX30.402013
Practical-time attacks against reduced variants of MISTY100.342013
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.50.502013
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.00.342013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2170.652013
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher10.372013
Low-Data Complexity Attacks on AES100.682012
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3.20.372012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.301.082012
  • 1
  • 2