scispace - formally typeset
O

Orr Dunkelman

Researcher at University of Haifa

Publications -  225
Citations -  6909

Orr Dunkelman is an academic researcher from University of Haifa. The author has contributed to research in topics: Block cipher & Differential cryptanalysis. The author has an hindex of 42, co-authored 212 publications receiving 6226 citations. Previous affiliations of Orr Dunkelman include Katholieke Universiteit Leuven & Weizmann Institute of Science.

Papers
More filters
Journal ArticleDOI

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation

TL;DR: This paper introduces DeepCAPTCHA, a new and secure CAPTCHA scheme based on adversarial examples, an inherit limitation of the current DL networks, and implements a proof of concept system, which shows that the scheme offers high security and good usability compared with the best previously existing CAPTCHAs.
Journal Article

KATAN & KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers

TL;DR: In this article, the authors proposed a new family of very efficient hardware oriented block ciphers, which share the 80-bit key size and security level and achieve a speedup of 12.5 KBit/sec (at 100 KHz).
Journal Article

A Practical Attack on KeeLoq

TL;DR: It is concluded that the practical key recovery attack against KeeLoq can be used to subvert the security of real systems and reveal the master secret used in an entire class of devices from attacking a single device.
Book ChapterDOI

A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony

TL;DR: This paper describes a new type of attack called a sandwich attack, and uses it to construct a simple distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 2-14, which indicates that the changes made by ETSI's SAGE group in moving from MISTY to KASumI resulted in a much weaker cipher.
Book ChapterDOI

Improved Single-Key Attacks on 8-Round AES-192 and AES-256

TL;DR: The first non-marginal attack on 8-round AES-192 was reported in this paper, which reduced the time complexity of exhaustive key search to about 1/32,000 of the full codebook.