Tomer Ashur
Tomer Ashur
Verified email at - Homepage
TitleCited byYear
Boosting authenticated encryption robustness with minimal modifications
T Ashur, O Dunkelman, A Luykx
Annual International Cryptology Conference, 3-33, 2017
Improved Linear Trails for the Block Cipher Simon.
T Ashur
IACR Cryptology ePrint Archive 2015, 285, 2015
Rotational cryptanalysis in the presence of constants
T Ashur, Y Liu
IACR Transactions on Symmetric Cryptology, 57-70, 2016
Revisiting the Wrong-Key-Randomization Hypothesis.
T Ashur, T Beyne, V Rijmen
IACR Cryptology ePrint Archive 2016, 990, 2016
Linear analysis of reduced-round CubeHash
T Ashur, O Dunkelman
International Conference on Applied Cryptography and Network Security, 462-478, 2011
Rotational-XOR cryptanalysis of reduced-round SPECK
Y Liu, G De Witte, A Ranea, T Ashur
IACR Transactions on Symmetric Cryptology, 24-36, 2017
Linear cryptanalysis of reduced-round SPECK
T Ashur, D Bodden
Proceedings of the 37th Symposium on Information Theory in the Benelux, 2016
Cryptanalysis of MORUS
T Ashur, M Eichlseder, MM Lauridsen, G Leurent, B Minaud, Y Rotella, ...
International Conference on the Theory and Application of Cryptology and …, 2018
On linear hulls and trails
T Ashur, V Rijmen
International Conference on Cryptology in India, 269-286, 2016
An Automated Tool for Rotational-XOR Cryptanalysis of ARX-based Primitives
T Ashur, G De Witte, Y Liu
Proceedings of the 38th Symposium on Information Theory in the Benelux, 59-66, 2017
Cryptanalysis of GOST2
T Ashur, A Bar-On, O Dunkelman
IACR Transactions on Symmetric Cryptology, 203-214, 2017
Linear Cryptanalysis Using Low-bias Linear Approximations.
T Ashur, D Bodden, O Dunkelman
IACR Cryptology ePrint Archive 2017, 204, 2017
Fast, furious and insecure: Passive keyless entry and start systems in modern supercars
L Wouters, E Marin, T Ashur, B Gierlichs, B Preneel
IACR Transactions on Cryptographic Hardware and Embedded Systems, 66-85, 2019
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives.
T Ashur, S Dhooghe
IACR Cryptology ePrint Archive 2018, 1098, 2018
Damaging, simplifying, and salvaging p-OMD
T Ashur, B Mennink
International Conference on Information Security, 73-92, 2016
A practical related-key boomerang attack for the full MMB block cipher
T Ashur, O Dunkelman
International Conference on Cryptology and Network Security, 271-290, 2013
Cryptanalysis of Symmetric-key Primitives
T Ashur
KU Leuven, 2017
An easy-to-use tool for rotational-XOR cryptanalysis of ARX block ciphers
A Ranea, Y Liu, T Ashur
Proceedings of the Romanian Academy, Series A 18 (3), 307-316, 2017
Breaching the Privacy of Israel’s Paper Ballot Voting System
T Ashur, O Dunkelman, N Talmon
International Joint Conference on Electronic Voting, 108-124, 2016
POSTER: On the anonymity of Israel's general elections
T Ashur, O Dunkelman
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20