Dunkelman

Results: 11



#Item
1This paper appears in Orr Dunkelman, editor, CT-RSA 2012, Springer-Verlag LNCS 7178, 332–348, Plaintext-Checkable Encryption S´ebastien Canard1 , Georg Fuchsbauer2 , Aline Gouget3 , and Fabien Laguillaumie4 1

This paper appears in Orr Dunkelman, editor, CT-RSA 2012, Springer-Verlag LNCS 7178, 332–348, Plaintext-Checkable Encryption S´ebastien Canard1 , Georg Fuchsbauer2 , Aline Gouget3 , and Fabien Laguillaumie4 1

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2012-04-02 11:25:19
    2Rump-Programme.txt  Page 1 EC 2013 Rump Session 19:30 Aggelos Kiayias

    Rump-Programme.txt Page 1 EC 2013 Rump Session 19:30 Aggelos Kiayias

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2013-05-28 01:20:46
    3New	
  Attacks	
  on	
  SHA-­‐3 Adi  Shamir   The  Weizmann  Institute   Israel      Joint  work  with  Itai  Dinur  and  Orr  Dunkelman  

    New  Attacks  on  SHA-­‐3 Adi  Shamir   The  Weizmann  Institute   Israel     Joint  work  with  Itai  Dinur  and  Orr  Dunkelman  

    Add to Reading List

    Source URL: cis.sjtu.edu.cn

    Language: English - Date: 2012-12-05 11:26:12
      4Orr Dunkelman’s CV  Updated: February 2013 Curriculum Vitae Orr Dunkelman

      Orr Dunkelman’s CV Updated: February 2013 Curriculum Vitae Orr Dunkelman

      Add to Reading List

      Source URL: www.cs.haifa.ac.il

      Language: English - Date: 2015-11-04 02:35:44
        5Understanding the ZK-Crypts ─ Ciphers for (Almost) all Reasons Carmi Gressel,1 Orr Dunkelman,2 Avi Hecht1 FortressGB Ltd.1 & Katholieke Universitiet Leuven2 [carmi, ]1 []

        Understanding the ZK-Crypts ─ Ciphers for (Almost) all Reasons Carmi Gressel,1 Orr Dunkelman,2 Avi Hecht1 FortressGB Ltd.1 & Katholieke Universitiet Leuven2 [carmi, ]1 []

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        - Date: 2008-02-15 09:35:23
          6A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

          A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2010-01-10 13:51:33
          7The Transformation of American Community Marc Dunkelman O

          The Transformation of American Community Marc Dunkelman O

          Add to Reading List

          Source URL: www.nationalaffairs.com

          Language: English - Date: 2011-06-23 16:41:35
          8X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman <Orr.Dunkelman@esat.kuleuven.be> To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

          X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2012-06-20 09:58:52
          9EPA Presentation Eureka Smelter Site Fred Stroud EPA Environmental Response Team Tom Dunkelman

          EPA Presentation Eureka Smelter Site Fred Stroud EPA Environmental Response Team Tom Dunkelman

          Add to Reading List

          Source URL: www.ndep.nv.gov

          Language: English - Date: 2012-07-24 12:14:40
          10Purity Press IN THE NEWS:

          Purity Press IN THE NEWS:

          Add to Reading List

          Source URL: www.puritycompany.com

          Language: English - Date: 2008-06-12 08:57:38