Eyal Ronen

Eyal Ronen

Tel Aviv University

H-index: 13

Asia-Israel

About Eyal Ronen

Eyal Ronen, With an exceptional h-index of 13 and a recent h-index of 13 (since 2020), a distinguished researcher at Tel Aviv University, specializes in the field of Applied Cryptography.

His recent articles reflect a diverse array of research interests and contributions to the field:

Quantum time/memory/data tradeoff attacks

Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol

Row, Row, Row your boat: How to not find weak keys in pilsung

The gates of time: Improving cache attacks with transient execution

SPHINCS+ C: Compressing SPHINCS+ With (Almost) No Cost

Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation

The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations

That’s not my signature! Fail-stop signatures for a post-quantum world

Eyal Ronen Information

University

Position

___

Citations(all)

1663

Citations(since 2020)

1407

Cited By

815

hIndex(all)

13

hIndex(since 2020)

13

i10Index(all)

13

i10Index(since 2020)

13

Email

University Profile Page

Tel Aviv University

Google Scholar

View Google Scholar Profile

Eyal Ronen Skills & Research Interests

Applied Cryptography

Top articles of Eyal Ronen

Title

Journal

Author(s)

Publication Date

Quantum time/memory/data tradeoff attacks

Designs, Codes and Cryptography

Orr Dunkelman

Nathan Keller

Eyal Ronen

Adi Shamir

2024/1

Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol

USENIX Security Symposium (USENIX Security)

Andrew Kwong

Walter Wang

Jason Kim

Jonathan Berger

Daniel Genkin

...

2023

Row, Row, Row your boat: How to not find weak keys in pilsung

The Computer Journal

Chitchanok Chuengsatiansup

Eyal Ronen

Gregory G Rose

Yuval Yarom

2023/6

The gates of time: Improving cache attacks with transient execution

Daniel Katzman

William Kosasih

Chitchanok Chuengsatiansup

Eyal Ronen

Yuval Yarom

2023

SPHINCS+ C: Compressing SPHINCS+ With (Almost) No Cost

Andreas Hülsing

Mikhail Kudinov

Eyal Ronen

Eylon Yogev

2023/5/21

Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation

Itai Dinur

Orr Dunkelman

Nathan Keller

Eyal Ronen

Adi Shamir

2023/4/15

The Ultimate Combo: Boosting Adversarial Example Transferability by Composing Data Augmentations

arXiv preprint arXiv:2312.11309

Zebin Yun

Achi-Or Weingarten

Eyal Ronen

Mahmood Sharif

2023/12/18

That’s not my signature! Fail-stop signatures for a post-quantum world

Cryptology ePrint Archive

Cecilia Boschini

Hila Dahari

Moni Naor

Eyal Ronen

2023

To attest or not to attest, this is the question–Provable attestation in FIDO2

Nina Bindel

Nicolas Gama

Sandra Guasch

Eyal Ronen

2023/12/4

Multi-Stage Group Key Distribution and PAKEs: Securing Zoom Groups against Malicious Servers without New Security Elements

Cryptology ePrint Archive

Cas Cremers

Eyal Ronen

Mang Zhao

2023

SDitH in the QROM

Carlos Aguilar-Melchor

Andreas Hülsing

David Joseph

Christian Majenz

Eyal Ronen

...

2023/12/4

TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation

Cryptology ePrint Archive

Cas Cremers

Gal Horowitz

Charlie Jacomme

Eyal Ronen

2022

CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs

Cas Cremers

Moni Naor

Shahar Paz

Eyal Ronen

2022/8/15

Trust Dies in Darkness: Shedding Light on Samsung's {TrustZone} Keymaster Design

Alon Shakevsky

Eyal Ronen

Avishai Wool

2022

Spook. js: Attacking Chrome strict site isolation via speculative execution

Ayush Agarwal

Sioli O’Connell

Jason Kim

Shaked Yehezkel

Daniel Genkin

...

2022/5/22

Practical (post-quantum) key combiners from one-wayness and applications to TLS

Cryptology ePrint Archive

Nimrod Aviram

Benjamin Dowling

Ilan Komargodski

Kenneth G Paterson

Eyal Ronen

...

2022

Sok: Sgx. fail: How stuff get exposed

Stephan van Schaik

Alex Seto

Thomas Yurek

Adam Batori

Bader AlBassam

...

2022

Three third generation attacks on the format preserving encryption scheme FF3

Ohad Amon

Orr Dunkelman

Nathan Keller

Eyal Ronen

Adi Shamir

2021/6/16

Consistent High Dimensional Rounding with Side Information

arXiv preprint arXiv:2008.03675

Orr Dunkelman

Zeev Geyzel

Chaya Keller

Nathan Keller

Eyal Ronen

...

2020/8/9

The retracing boomerang attack

Orr Dunkelman

Nathan Keller

Eyal Ronen

Adi Shamir

2020/5/1

See List of Professors in Eyal Ronen University(Tel Aviv University)

Co-Authors

H-index: 97
Moni Naor

Moni Naor

Weizmann Institute of Science

H-index: 64
Benny Pinkas

Benny Pinkas

Bar-Ilan University

H-index: 47
Orr Dunkelman

Orr Dunkelman

University of Haifa

H-index: 39
Nathan Keller

Nathan Keller

Bar-Ilan University

H-index: 38
Daniel Genkin

Daniel Genkin

University of Michigan

academic-engine