Nathan Keller
Bar-Ilan University
H-index: 39
Asia-Israel
Top articles of Nathan Keller
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
On t-intersecting families of permutations | Advances in Mathematics | Nathan Keller Noam Lifshitz Dor Minzer Ohad Sheinfeld | 2024/5/1 |
Partial sums meet FFT: Improved attack on 6-round AES | Cryptology ePrint Archive | Orr Dunkelman Shibam Ghosh Nathan Keller Gaetan Leurent Avichai Marmor | 2023 |
Quantum time/memory/data tradeoff attacks | Designs, Codes and Cryptography | Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2024/1 |
Practical-Time Related-Key Attack on GOST with Secret S-Boxes | Orr Dunkelman Nathan Keller Ariel Weizmann | 2023/8/9 | |
Sharp hypercontractivity for global functions | arXiv preprint arXiv:2307.01356 | Nathan Keller Noam Lifshitz Omri Marcus | 2023/7/3 |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | Itai Dinur Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2023/4/15 | |
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity | arXiv preprint arXiv:2310.18107 | Nathan Keller Noam Lifshitz Ohad Sheinfeld | 2023/10/27 |
Fine-grained cryptanalysis: Tight conditional bounds for dense k-sum and k-xor | Itai Dinur Nathan Keller Ohad Klein | 2022/2/7 | |
Locality-preserving hashing for shifts with connections to cryptography | arXiv preprint arXiv:2201.03041 | Elette Boyle Itai Dinur Niv Gilboa Yuval Ishai Nathan Keller | 2022/1/9 |
Proof of Tomaszewski's conjecture on randomly signed sums | Advances in Mathematics | Nathan Keller Ohad Klein | 2022/10/8 |
Practical key recovery attacks on FlexAEAD | Designs, Codes and Cryptography | Orr Dunkelman Maria Eichlseder Daniel Kales Nathan Keller Gaëtan Leurent | 2022/4 |
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture | Advances in Mathematics | Nathan Keller Noam Lifshitz | 2021/12/3 |
Three third generation attacks on the format preserving encryption scheme FF3 | Ohad Amon Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2021/6/16 | |
Mind the middle layer: the HADES design strategy revisited | Nathan Keller Asaf Rosemarin | 2021/6/16 | |
New slide attacks on almost self-similar ciphers | Orr Dunkelman Nathan Keller Noam Lasry Adi Shamir | 2020/5/1 | |
A structure theorem for almost low-degree functions on the slice | Israel Journal of Mathematics | Nathan Keller Ohad Klein | 2020/10 |
A practical forgery attack on Lilliput-AE | Journal of Cryptology | Orr Dunkelman Nathan Keller Eran Lambooij Yu Sasaki | 2020/7 |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing | Journal of Cryptology | Itai Dinur Nathan Keller Ohad Klein | 2020/7 |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities | Journal of Cryptology | Achiya Bar-On Orr Dunkelman Nathan Keller Eyal Ronen Adi Shamir | 2020/7 |
Tight bounds on online checkpointing algorithms | ACM Transactions on Algorithms (TALG) | Achiya Bar-On Itai Dinur Orr Dunkelman Rani Hod Nathan Keller | 2020/6/1 |