


Остановите войну!
for scientists:
BibTeX records: Eyal Ronen
@article{DBLP:journals/iacr/AviramDKPRY22, author = {Nimrod Aviram and Benjamin Dowling and Ilan Komargodski and Kenneth G. Paterson and Eyal Ronen and Eylon Yogev}, title = {Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2022}, url = {https://eprint.iacr.org/2022/065}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AviramDKPRY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShakevskyRW22, author = {Alon Shakevsky and Eyal Ronen and Avishai Wool}, title = {Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2022}, url = {https://eprint.iacr.org/2022/208}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ShakevskyRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AmonDKRS21, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme {FF3}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {127--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_5}, doi = {10.1007/978-3-030-77886-6\_5}, timestamp = {Wed, 16 Jun 2021 11:57:04 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AmonDKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DunkelmanGKKRST21, author = {Orr Dunkelman and Zeev Geyzel and Chaya Keller and Nathan Keller and Eyal Ronen and Adi Shamir and Ran J. Tessler}, editor = {Nikhil Bansal and Emanuela Merelli and James Worrell}, title = {Error Resilient Space Partitioning (Invited Talk)}, booktitle = {48th International Colloquium on Automata, Languages, and Programming, {ICALP} 2021, July 12-16, 2021, Glasgow, Scotland (Virtual Conference)}, series = {LIPIcs}, volume = {198}, pages = {4:1--4:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2021.4}, doi = {10.4230/LIPIcs.ICALP.2021.4}, timestamp = {Tue, 15 Feb 2022 07:54:27 +0100}, biburl = {https://dblp.org/rec/conf/icalp/DunkelmanGKKRST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmonDKRS21, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme {FF3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2021}, url = {https://eprint.iacr.org/2021/335}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmonDKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chuengsatiansup21a, author = {Chitchanok Chuengsatiansup and Eyal Ronen and Gregory G. Rose and Yuval Yarom}, title = {Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {828}, year = {2021}, url = {https://eprint.iacr.org/2021/828}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chuengsatiansup21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKRS21, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Quantum Time/Memory/Data Tradeoff Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1561}, year = {2021}, url = {https://eprint.iacr.org/2021/1561}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bar-OnDKRS20, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {1003--1043}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09336-w}, doi = {10.1007/s00145-019-09336-w}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Bar-OnDKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/Bar-OnDDHKRS20, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Rani Hod and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Tight Bounds on Online Checkpointing Algorithms}, journal = {{ACM} Trans. Algorithms}, volume = {16}, number = {3}, pages = {31:1--31:22}, year = {2020}, url = {https://doi.org/10.1145/3379543}, doi = {10.1145/3379543}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/talg/Bar-OnDDHKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DunkelmanKRS20, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Anne Canteaut and Yuval Ishai}, title = {The Retracing Boomerang Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {280--309}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_11}, doi = {10.1007/978-3-030-45721-1\_11}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DunkelmanKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VanhoefR20, author = {Mathy Vanhoef and Eyal Ronen}, title = {Dragonblood: Analyzing the Dragonfly Handshake of {WPA3} and EAP-pwd}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {517--533}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00031}, doi = {10.1109/SP40000.2020.00031}, timestamp = {Thu, 20 Aug 2020 16:31:11 +0200}, biburl = {https://dblp.org/rec/conf/sp/VanhoefR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20, author = {Shaanan Cohney and Andrew Kwong and Shahar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1241--1258}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00046}, doi = {10.1109/SP40000.2020.00046}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CohneyKPGHRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-03675, author = {Orr Dunkelman and Zeev Geyzel and Chaya Keller and Nathan Keller and Eyal Ronen and Adi Shamir and Ran J. Tessler}, title = {Consistent High Dimensional Rounding with Side Information}, journal = {CoRR}, volume = {abs/2008.03675}, year = {2020}, url = {https://arxiv.org/abs/2008.03675}, eprinttype = {arXiv}, eprint = {2008.03675}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-03675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR20, author = {Moni Naor and Shahar Paz and Eyal Ronen}, title = {{CRISP:} Compromise Resilient Identity-based Symmetric {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2020}, url = {https://eprint.iacr.org/2020/529}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaorPR19, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1369--1386}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363204}, doi = {10.1145/3319535.3363204}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaorPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RonenGGSWY19, author = {Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom}, title = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS} Implementations}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {435--452}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00062}, doi = {10.1109/SP.2019.00062}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RonenGGSWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-10861, author = {Adi Shamir and Itay Safran and Eyal Ronen and Orr Dunkelman}, title = {A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance}, journal = {CoRR}, volume = {abs/1901.10861}, year = {2019}, url = {http://arxiv.org/abs/1901.10861}, eprinttype = {arXiv}, eprint = {1901.10861}, timestamp = {Sun, 03 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-10861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VanhoefR19, author = {Mathy Vanhoef and Eyal Ronen}, title = {Dragonblood: {A} Security Analysis of WPA3's {SAE} Handshake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2019}, url = {https://eprint.iacr.org/2019/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VanhoefR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohneyKPGHRY19, author = {Shaanan Cohney and Andrew Kwong and Shahar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2019}, url = {https://eprint.iacr.org/2019/996}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKRS19, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {The Retracing Boomerang Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2019}, url = {https://eprint.iacr.org/2019/1154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RonenSWO18, author = {Eyal Ronen and Adi Shamir and Achi{-}Or Weingarten and Colin O'Flynn}, title = {IoT Goes Nuclear: Creating a Zigbee Chain Reaction}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {54--62}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331033}, doi = {10.1109/MSP.2018.1331033}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RonenSWO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RonenPS18, author = {Eyal Ronen and Kenneth G. Paterson and Adi Shamir}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1397--1414}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243775}, doi = {10.1145/3243734.3243775}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RonenPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Bar-OnDKRS18, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {185--212}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_7}, doi = {10.1007/978-3-319-96881-0\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Bar-OnDKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Bar-OnDDHKRS18, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Rani Hod and Nathan Keller and Eyal Ronen and Adi Shamir}, editor = {Ioannis Chatzigiannakis and Christos Kaklamanis and D{\'{a}}niel Marx and Donald Sannella}, title = {Tight Bounds on Online Checkpointing Algorithms}, booktitle = {45th International Colloquium on Automata, Languages, and Programming, {ICALP} 2018, July 9-13, 2018, Prague, Czech Republic}, series = {LIPIcs}, volume = {107}, pages = {13:1--13:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2018.13}, doi = {10.4230/LIPIcs.ICALP.2018.13}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/Bar-OnDDHKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR18, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, title = {How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2018}, url = {http://eprint.iacr.org/2018/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnDKRS18, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2018}, url = {https://eprint.iacr.org/2018/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonenPS18, author = {Eyal Ronen and Kenneth G. Paterson and Adi Shamir}, title = {Pseudo Constant Time Implementations of {TLS} Are Only Pseudo Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2018}, url = {https://eprint.iacr.org/2018/747}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonenPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonenGGSWY18, author = {Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom}, title = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2018}, url = {https://eprint.iacr.org/2018/1173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonenGGSWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RonenSWO17, author = {Eyal Ronen and Adi Shamir and Achi{-}Or Weingarten and Colin O'Flynn}, title = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {195--212}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.14}, doi = {10.1109/SP.2017.14}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/RonenSWO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Bar-OnDDHKRS17, author = {Achiya Bar{-}On and Itai Dinur and Orr Dunkelman and Rani Hod and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Optimal Backup Strategies Against Cyber Attacks}, journal = {CoRR}, volume = {abs/1704.02659}, year = {2017}, url = {http://arxiv.org/abs/1704.02659}, eprinttype = {arXiv}, eprint = {1704.02659}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Bar-OnDDHKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/RonenS16, author = {Eyal Ronen and Adi Shamir}, title = {Extended Functionality Attacks on IoT Devices: The Case of Smart Lights}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {3--12}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.13}, doi = {10.1109/EuroSP.2016.13}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/RonenS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonenOSW16, author = {Eyal Ronen and Colin O'Flynn and Adi Shamir and Achi{-}Or Weingarten}, title = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2016}, url = {http://eprint.iacr.org/2016/1047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonenOSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.