Eyal Ronen
Tel Aviv University
H-index: 13
Asia-Israel
Top articles of Eyal Ronen
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Quantum time/memory/data tradeoff attacks | Designs, Codes and Cryptography | Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2024/1 |
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol | USENIX Security Symposium (USENIX Security) | Andrew Kwong Walter Wang Jason Kim Jonathan Berger Daniel Genkin | 2023 |
Row, Row, Row your boat: How to not find weak keys in pilsung | The Computer Journal | Chitchanok Chuengsatiansup Eyal Ronen Gregory G Rose Yuval Yarom | 2023/6 |
The gates of time: Improving cache attacks with transient execution | Daniel Katzman William Kosasih Chitchanok Chuengsatiansup Eyal Ronen Yuval Yarom | 2023 | |
SPHINCS+ C: Compressing SPHINCS+ With (Almost) No Cost | Andreas Hülsing Mikhail Kudinov Eyal Ronen Eylon Yogev | 2023/5/21 | |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | Itai Dinur Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2023/4/15 | |
The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations | arXiv preprint arXiv:2312.11309 | Zebin Yun Achi-Or Weingarten Eyal Ronen Mahmood Sharif | 2023/12/18 |
That’s not my signature! Fail-stop signatures for a post-quantum world | Cryptology ePrint Archive | Cecilia Boschini Hila Dahari Moni Naor Eyal Ronen | 2023 |
To attest or not to attest, this is the question–Provable attestation in FIDO2 | Nina Bindel Nicolas Gama Sandra Guasch Eyal Ronen | 2023/12/4 | |
Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements | Cryptology ePrint Archive | Cas Cremers Eyal Ronen Mang Zhao | 2023 |
SDitH in the QROM | Carlos Aguilar-Melchor Andreas Hülsing David Joseph Christian Majenz Eyal Ronen | 2023/12/4 | |
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation | Cryptology ePrint Archive | Cas Cremers Gal Horowitz Charlie Jacomme Eyal Ronen | 2022 |
CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs | Cas Cremers Moni Naor Shahar Paz Eyal Ronen | 2022/8/15 | |
Trust Dies in Darkness: Shedding Light on Samsung's {TrustZone} Keymaster Design | Alon Shakevsky Eyal Ronen Avishai Wool | 2022 | |
Spook. js: Attacking Chrome strict site isolation via speculative execution | Ayush Agarwal Sioli O’Connell Jason Kim Shaked Yehezkel Daniel Genkin | 2022/5/22 | |
Practical (post-quantum) key combiners from one-wayness and applications to TLS | Cryptology ePrint Archive | Nimrod Aviram Benjamin Dowling Ilan Komargodski Kenneth G Paterson Eyal Ronen | 2022 |
Sok: Sgx. fail: How stuff get exposed | Stephan van Schaik Alex Seto Thomas Yurek Adam Batori Bader AlBassam | 2022 | |
Three third generation attacks on the format preserving encryption scheme FF3 | Ohad Amon Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2021/6/16 | |
Consistent High Dimensional Rounding with Side Information | arXiv preprint arXiv:2008.03675 | Orr Dunkelman Zeev Geyzel Chaya Keller Nathan Keller Eyal Ronen | 2020/8/9 |
The retracing boomerang attack | Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2020/5/1 |