Dinur

Results: 16



#Item
11MISTY1 / Eurocrypt / Shamir / Dunkelman / Itai / Dinur

Rump-Programme.txt Page 1 EC 2013 Rump Session 19:30 Aggelos Kiayias

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-05-28 01:20:46
12

New  Attacks  on  SHA-­‐3 Adi  Shamir   The  Weizmann  Institute   Israel     Joint  work  with  Itai  Dinur  and  Orr  Dunkelman  

Add to Reading List

Source URL: cis.sjtu.edu.cn

Language: English - Date: 2012-12-05 11:26:12
    13Trivium / Linear cryptanalysis / Differential cryptanalysis / Stream ciphers / Grain / Cube attack

    Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-03-20 11:59:02
    14NP-complete problems / Vertex cover / Independent set / NP-complete / NP / PCP theorem / Maximal independent set / Power set / P versus NP problem / Theoretical computer science / Mathematics / Computational complexity theory

    Annals of Mathematics, [removed]), 439–485 On the hardness of approximating minimum vertex cover By Irit Dinur and Samuel Safra*

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2006-04-11 06:21:40
    15Robert Costanza / Worldwatch Institute / Sustainability / Ecological economics / Herman Daly / State of the World / Natural capital / State of the World 2010: Transforming Cultures: From Consumerism to Sustainability / Environmental economics / Environment / Economics

    State of the World 2013 FRIDAY, 5 APRIL 2013 | APA On Friday April 5th, host Esty Dinur spoke with Tom Prugh, co-director of the State of the World 2013 and State of the World 2014 projects. He was editor in chief of Wor

    Add to Reading List

    Source URL: www.worldwatch.org

    Language: English - Date: 2014-12-04 06:24:02
    16Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

    Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-08-25 03:00:27
    UPDATE