Tomer Ashur
Technische Universiteit Eindhoven
H-index: 15
Europe-Netherlands
Top articles of Tomer Ashur
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
On the Feasibility of Sliced Garbling | Cryptology ePrint Archive | Tomer Ashur Carmit Hazay Rahul Satish | 2024 |
Vision Mark-32: ZK-Friendly Hash Function Over Binary Tower Fields | Cryptology ePrint Archive | Tomer Ashur Mohammad Mahzoun Jim Posen Danilo Šijačić | 2024 |
Arithmetization Oriented Encryption | Cryptology ePrint Archive | Tomer Ashur Al Kindi | 2023 |
Special Issue on Failed Approaches and Insightful Losses in Cryptology—Foreword | Tomer Ashur Chris J Mitchell | 2023/6 | |
XHash8 and XHash12: Efficient STARK-friendly Hash Functions | Cryptology ePrint Archive | Tomer Ashur Al Kindi Mohammad Mahzoun | 2023 |
How not to design an efficient FHE-friendly block cipher: Seljuk | The Computer Journal | Tomer Ashur Mohammad Mahzoun Dilara Toprakhisar | 2023/6 |
A New Linear Distinguisher for Four-Round AES | Cryptology ePrint Archive | Tomer Ashur Erik Takke | 2023 |
Design and Analysis of Lightweight Symmetric-Key Primitives | Raluca Elena Posteuca | 2023/5/17 | |
Algebraic Cryptanalysis of HADES Design Strategy: Application to POSEIDON and Poseidon2 | Tomer Ashur Thomas Buschman Mohammad Mahzoun | 2023/4/14 | |
On the effect of the key-expansion algorithm in simon-like ciphers | The Computer Journal | Jinyu Lu Yunwen Liu Tomer Ashur Chao Li | 2022/9 |
Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers | IET Information Security | Jinyu Lu Yunwen Liu Tomer Ashur Bing Sun Chao Li | 2022/7 |
Differential Cryptanalysis of K-Cipher | Mohammad Mahzoun Liliya Kraleva Raluca Posteuca Tomer Ashur | 2022/6/30 | |
Cryptanalysis of strong physically unclonable functions | IEEE Open Journal of the Solid-State Circuits Society | Liliya Kraleva Mohammad Mahzoun Raluca Posteuca Dilara Toprakhisar Tomer Ashur | 2022/12/6 |
Rescue-prime optimized | Cryptology ePrint Archive | Tomer Ashur Al Kindi Willi Meier Alan Szepieniec Bobbin Threadbare | 2022 |
Chaghri-a FHE-friendly block cipher | Tomer Ashur Mohammad Mahzoun Dilara Toprakhisar | 2022/11/7 | |
A Comparative Study of Vision and AES in FHE Setting | Proceedings of the 2021 Symposium on Information Theory and Signal Processing in the Benelux | Dilara Toprakhisar Tomer Ashur | 2021/5/20 |
Analysis and recommendations for MAC and key lengths in delayed disclosure GNSS authentication protocols | IEEE Transactions on Aerospace and Electronic Systems | Ignacio Fernández-Hernández Tomer Ashur Vincent Rijmen | 2021/1/26 |
A New Framework for Garbled Circuits. | IACR Cryptol. ePrint Arch. | Tomer Ashur Efrat Cohen Carmit Hazay Avishay Yanai | 2021 |
How to backdoor a cipher | Cryptology ePrint Archive | Raluca Posteuca Tomer Ashur | 2021 |
An account of the ISO/IEC standardization of the Simon and Speck block cipher families | Security of Ubiquitous Computing Systems: Selected Topics | Tomer Ashur Atul Luykx | 2021 |