default search action
Eyal Ronen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum time/memory/data tradeoff attacks. Des. Codes Cryptogr. 92(1): 159-177 (2024) - [j5]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack, with Application to Reduced-Round AES. J. Cryptol. 37(3): 32 (2024) - [c25]Cecilia Boschini, Hila Dahari, Moni Naor, Eyal Ronen:
That's Not My Signature! Fail-Stop Signatures for a Post-quantum World. CRYPTO (1) 2024: 107-140 - [c24]Cas Cremers, Eyal Ronen, Mang Zhao:
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements. SP 2024: 2686-2704 - [c23]Stephan van Schaik, Alexander Seto, Thomas Yurek, Adam Batori, Bader AlBassam, Daniel Genkin, Andrew Miller, Eyal Ronen, Yuval Yarom, Christina Garman:
SoK: SGX.Fail: How Stuff Gets eXposed. SP 2024: 4143-4162 - [c22]Michal Shagam, Eyal Ronen:
Windows into the Past: Exploiting Legacy Crypto in Modern OS's Kerberos Implementation. USENIX Security Symposium 2024 - [i26]Gal Horowitz, Eyal Ronen, Yuval Yarom:
Spec-o-Scope: Cache Probing at Cache Speed. IACR Cryptol. ePrint Arch. 2024: 775 (2024) - 2023
- [j4]Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom:
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. Comput. J. 66(6): 1335-1341 (2023) - [c21]Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen:
To Attest or Not to Attest, This is the Question - Provable Attestation in FIDO2. ASIACRYPT (6) 2023: 297-328 - [c20]Carlos Aguilar Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue:
SDitH in the QROM. ASIACRYPT (7) 2023: 317-350 - [c19]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [c18]Andreas Hülsing, Mikhail A. Kudinov, Eyal Ronen, Eylon Yogev:
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. SP 2023: 1435-1453 - [c17]Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom:
The Gates of Time: Improving Cache Attacks with Transient Execution. USENIX Security Symposium 2023: 1955-1972 - [c16]Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad S. Wahby, Yuval Yarom:
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. USENIX Security Symposium 2023: 7107-7124 - [i25]Zebin Yun, Achi-Or Weingarten, Eyal Ronen, Mahmood Sharif:
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations. CoRR abs/2312.11309 (2023) - [i24]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i23]Carlos Aguilar Melchor, Andreas Hülsing, David Joseph, Christian Majenz, Eyal Ronen, Dongze Yue:
SDitH in the QROM. IACR Cryptol. ePrint Arch. 2023: 756 (2023) - [i22]Cas Cremers, Eyal Ronen, Mang Zhao:
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements. IACR Cryptol. ePrint Arch. 2023: 1243 (2023) - [i21]Nina Bindel, Nicolas Gama, Sandra Guasch, Eyal Ronen:
To attest or not to attest, this is the question - Provable attestation in FIDO2. IACR Cryptol. ePrint Arch. 2023: 1398 (2023) - [i20]Cecilia Boschini, Hila Dahari, Moni Naor, Eyal Ronen:
That's not my signature! Fail-stop signatures for a post-quantum world. IACR Cryptol. ePrint Arch. 2023: 1754 (2023) - 2022
- [c15]Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen:
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs. CRYPTO (2) 2022: 668-698 - [c14]Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom:
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. SP 2022: 699-715 - [c13]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. USENIX Security Symposium 2022: 251-268 - [i19]Nimrod Aviram, Benjamin Dowling, Ilan Komargodski, Kenneth G. Paterson, Eyal Ronen, Eylon Yogev:
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS. IACR Cryptol. ePrint Arch. 2022: 65 (2022) - [i18]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. IACR Cryptol. ePrint Arch. 2022: 208 (2022) - [i17]Mikhail A. Kudinov, Andreas Hülsing, Eyal Ronen, Eylon Yogev:
SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. IACR Cryptol. ePrint Arch. 2022: 778 (2022) - [i16]Cas Cremers, Charlie Jacomme, Eyal Ronen:
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation. IACR Cryptol. ePrint Arch. 2022: 1691 (2022) - 2021
- [c12]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c11]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [i15]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i14]Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom:
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. IACR Cryptol. ePrint Arch. 2021: 828 (2021) - [i13]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j3]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j2]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c10]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [c9]Mathy Vanhoef, Eyal Ronen:
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. SP 2020: 517-533 - [c8]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. SP 2020: 1241-1258 - [i12]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i11]Moni Naor, Shahar Paz, Eyal Ronen:
CRISP: Compromise Resilient Identity-based Symmetric PAKE. IACR Cryptol. ePrint Arch. 2020: 529 (2020)
2010 – 2019
- 2019
- [c7]Moni Naor, Benny Pinkas, Eyal Ronen:
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior. CCS 2019: 1369-1386 - [c6]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [i10]Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman:
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance. CoRR abs/1901.10861 (2019) - [i9]Mathy Vanhoef, Eyal Ronen:
Dragonblood: A Security Analysis of WPA3's SAE Handshake. IACR Cryptol. ePrint Arch. 2019: 383 (2019) - [i8]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. IACR Cryptol. ePrint Arch. 2019: 996 (2019) - [i7]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - 2018
- [j1]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a Zigbee Chain Reaction. IEEE Secur. Priv. 16(1): 54-62 (2018) - [c5]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c4]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c3]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i6]Moni Naor, Benny Pinkas, Eyal Ronen:
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior. IACR Cryptol. ePrint Arch. 2018: 3 (2018) - [i5]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i4]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i3]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - 2017
- [c2]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE Symposium on Security and Privacy 2017: 195-212 - [i2]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - 2016
- [c1]Eyal Ronen, Adi Shamir:
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. EuroS&P 2016: 3-12 - [i1]Eyal Ronen, Colin O'Flynn, Adi Shamir, Achi-Or Weingarten:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IACR Cryptol. ePrint Arch. 2016: 1047 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint