The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nathan Keller: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eli Biham, Orr Dunkelman, Nathan Keller
    A Related-Key Rectangle Attack on the Full KASUMI. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:443-461 [Conf]
  2. Eli Biham, Orr Dunkelman, Nathan Keller
    New Cryptanalytic Results on IDEA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:412-427 [Conf]
  3. Eli Biham, Orr Dunkelman, Nathan Keller
    Enhancing Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:254-266 [Conf]
  4. Elad Barkan, Eli Biham, Nathan Keller
    Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:600-616 [Conf]
  5. Eli Biham, Orr Dunkelman, Nathan Keller
    Related-Key Impossible Differential Attacks on 8-Round AES-192. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:21-33 [Conf]
  6. Orr Dunkelman, Nathan Keller
    A New Criterion for Nonlinearity of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:295-312 [Conf]
  7. Eli Biham, Orr Dunkelman, Nathan Keller
    A Simple Related-Key Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:20-30 [Conf]
  8. Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
    MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:1-19 [Conf]
  9. Eli Biham, Orr Dunkelman, Nathan Keller
    The Rectangle Attack - Rectangling the Serpent. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:340-357 [Conf]
  10. Eli Biham, Orr Dunkelman, Nathan Keller
    Related-Key Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:507-525 [Conf]
  11. Eli Biham, Orr Dunkelman, Nathan Keller
    Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:16-27 [Conf]
  12. Eli Biham, Orr Dunkelman, Nathan Keller
    New Results on Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:1-16 [Conf]
  13. Eli Biham, Orr Dunkelman, Nathan Keller
    Differential-Linear Cryptanalysis of Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:9-21 [Conf]
  14. Eli Biham, Orr Dunkelman, Nathan Keller
    Rectangle Attacks on 49-Round SHACAL-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:22-35 [Conf]
  15. Eli Biham, Orr Dunkelman, Nathan Keller
    New Combined Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:126-144 [Conf]
  16. Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
    Differential and Rectangle Attacks on Reduced-Round SHACAL-1. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:17-31 [Conf]
  17. Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman
    Related-Key Rectangle Attack on 42-Round SHACAL-2. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:85-100 [Conf]
  18. Eli Biham, Orr Dunkelman, Nathan Keller
    Improved Slide Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:153-166 [Conf]
  19. Eli Biham, Orr Dunkelman, Nathan Keller
    A New Attack on 6-Round IDEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:211-224 [Conf]
  20. Orr Dunkelman, Nathan Keller, Jongsung Kim
    Related-Key Rectangle Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:28-44 [Conf]
  21. Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
    MV3: A new word based stream cipher using rapid mixing and revolving buffers [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  22. A New Attack on the LEX Stream Cipher. [Citation Graph (, )][DBLP]


  23. An Improved Impossible Differential Attack on MISTY1. [Citation Graph (, )][DBLP]


  24. A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. [Citation Graph (, )][DBLP]


  25. Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. [Citation Graph (, )][DBLP]


  26. Cryptanalysis of CTC2. [Citation Graph (, )][DBLP]


  27. A Practical Attack on KeeLoq. [Citation Graph (, )][DBLP]


  28. Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. [Citation Graph (, )][DBLP]


  29. A Unified Approach to Related-Key Attacks. [Citation Graph (, )][DBLP]


  30. New Impossible Differential Attacks on AES. [Citation Graph (, )][DBLP]


  31. A Differential-Linear Attack on 12-Round Serpent. [Citation Graph (, )][DBLP]


  32. The Delicate Issues of Addition with Respect to XOR Differences. [Citation Graph (, )][DBLP]


  33. A tight quantitative version of Arrow's impossibility theorem [Citation Graph (, )][DBLP]


  34. Linear transformations of monotone functions on the discrete cube. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002