Eyal Ronen
Eyal Ronen
Verified email at tauex.tau.ac.il - Homepage
Title
Cited by
Cited by
Year
IoT goes nuclear: Creating a ZigBee chain reaction
E Ronen, A Shamir, AO Weingarten, C O’Flynn
2017 IEEE Symposium on Security and Privacy (SP), 195-212, 2017
4762017
Extended functionality attacks on IoT devices: The case of smart lights
E Ronen, A Shamir
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 3-12, 2016
2092016
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
M Vanhoef, E Ronen
2020 IEEE Symposium on Security and Privacy (SP), 517-533, 2020
70*2020
A simple explanation for the existence of adversarial examples with small hamming distance
A Shamir, I Safran, E Ronen, O Dunkelman
arXiv preprint arXiv:1901.10861, 2019
472019
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations
E Ronen, R Gillham, D Genkin, A Shamir, D Wong, Y Yarom
2019 IEEE Symposium on Security and Privacy (SP), 435-452, 2019
462019
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
A Bar-On, O Dunkelman, N Keller, E Ronen, A Shamir
Journal of Cryptology 33 (3), 1003-1043, 2020
362020
Pseudorandom black swans: cache attacks on CTR_DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
2020 IEEE Symposium on Security and Privacy (SP), 1241-1258, 2020
202020
Pseudo constant time implementations of TLS are only pseudo secure
E Ronen, KG Paterson, A Shamir
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
192018
The Retracing Boomerang Attack.
O Dunkelman, N Keller, E Ronen, A Shamir
EUROCRYPT (1), 280-309, 2020
122020
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior
M Naor, B Pinkas, E Ronen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
112019
Hashomer-a proposal for a privacy-preserving bluetooth based contact tracing scheme for hamagen
B Pinkas, E Ronen
GitHub, April, 2020
72020
Tight Bounds on Online Checkpointing Algorithms
A Bar-On, I Dinur, O Dunkelman, R Hod, N Keller, E Ronen, A Shamir
ACM Transactions on Algorithms (TALG) 16 (3), 1-22, 2020
3*2020
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
O Amon, O Dunkelman, N Keller, E Ronen, A Shamir
Annual International Conference on the Theory and Applications of …, 2021
12021
CHIP and CRISP: Protecting All Parties Against Compromise through Identity-Binding PAKEs
C Cremers, M Naor, S Paz, E Ronen
Cryptology ePrint Archive, 2020
1*2020
Security applications for hardware performance counters: Software attestation and random generation
E Ronen
University of Tel-Aviv, 2012
12012
Quantum Time/Memory/Data Tradeoff Attacks
O Dunkelman, N Keller, E Ronen, A Shamir
Cryptology ePrint Archive, 2021
2021
Error Resilient Space Partitioning (Invited Talk)
O Dunkelman, Z Geyzel, C Keller, N Keller, E Ronen, A Shamir, ...
48th International Colloquium on Automata, Languages, and Programming (ICALP …, 2021
2021
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
C Chuengsatiansup, E Ronen, GG Rose, Y Yarom
Cryptology ePrint Archive, 2021
2021
Consistent High Dimensional Rounding with Side Information
O Dunkelman, Z Geyzel, C Keller, N Keller, E Ronen, A Shamir, ...
arXiv preprint arXiv:2008.03675, 2020
2020
The security of IoT devices
E Ronen
The Weizmann Institute of Science, 0
The system can't perform the operation now. Try again later.
Articles 1–20