Eyal Ronen

1.4k total citations
22 papers, 714 citations indexed

About

Eyal Ronen is a scholar working on Artificial Intelligence, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Eyal Ronen has authored 22 papers receiving a total of 714 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Artificial Intelligence, 7 papers in Signal Processing and 5 papers in Computer Networks and Communications. Recurrent topics in Eyal Ronen's work include Cryptographic Implementations and Security (9 papers), Advanced Malware Detection Techniques (7 papers) and Cryptography and Data Security (5 papers). Eyal Ronen is often cited by papers focused on Cryptographic Implementations and Security (9 papers), Advanced Malware Detection Techniques (7 papers) and Cryptography and Data Security (5 papers). Eyal Ronen collaborates with scholars based in Israel, United States and Australia. Eyal Ronen's co-authors include Adi Shamir, Colin O’Flynn, Mathy Vanhoef, Benny Pinkas, Annette Towler, Yuval Yarom, Orr Dunkelman, Daniel Genkin, Nathan Keller and Kenneth G. Paterson and has published in prestigious journals such as The Computer Journal, IEEE Security & Privacy and Journal of Cryptology.

In The Last Decade

Eyal Ronen

19 papers receiving 683 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Eyal Ronen Israel 11 368 356 293 203 126 22 714
Yasuo Okabe Japan 15 458 1.2× 659 1.9× 229 0.8× 129 0.6× 157 1.2× 110 911
Νικόλαος Αλεξόπουλος Germany 5 452 1.2× 256 0.7× 271 0.9× 306 1.5× 83 0.7× 8 753
Riivo Talviste Germany 4 468 1.3× 240 0.7× 260 0.9× 288 1.4× 81 0.6× 4 751
Wenrui Diao China 11 301 0.8× 236 0.7× 544 1.9× 398 2.0× 68 0.5× 37 771
Joseph G. Tront United States 16 161 0.4× 448 1.3× 199 0.7× 165 0.8× 215 1.7× 87 763
Riccardo Spolaor China 14 537 1.5× 487 1.4× 433 1.5× 234 1.2× 61 0.5× 29 806
Bei Gong China 15 393 1.1× 481 1.4× 189 0.6× 246 1.2× 108 0.9× 63 783
Yu Jin United States 16 408 1.1× 498 1.4× 174 0.6× 237 1.2× 64 0.5× 68 777
Xiaozhou Ye China 7 703 1.9× 627 1.8× 307 1.0× 97 0.5× 50 0.4× 23 939
Sureswaran Ramadass Malaysia 13 282 0.8× 486 1.4× 241 0.8× 127 0.6× 89 0.7× 70 628

Countries citing papers authored by Eyal Ronen

Since Specialization
Citations

This map shows the geographic impact of Eyal Ronen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Eyal Ronen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Eyal Ronen more than expected).

Fields of papers citing papers by Eyal Ronen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Eyal Ronen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Eyal Ronen. The network helps show where Eyal Ronen may publish in the future.

Co-authorship network of co-authors of Eyal Ronen

This figure shows the co-authorship network connecting the top 25 collaborators of Eyal Ronen. A scholar is included among the top collaborators of Eyal Ronen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Eyal Ronen. Eyal Ronen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Dunkelman, Orr, Nathan Keller, Eyal Ronen, & Adi Shamir. (2024). The Retracing Boomerang Attack, with Application to Reduced-Round AES. Journal of Cryptology. 37(3). 1 indexed citations
3.
Schaik, Stephan van, Daniel Genkin, Andrew Miller, et al.. (2024). SoK: SGX.Fail: How Stuff Gets eXposed. 4143–4162. 5 indexed citations
4.
Ronen, Eyal, et al.. (2024). Spec-o-Scope: Cache Probing at Cache Speed. 109–123. 1 indexed citations
5.
Dunkelman, Orr, Nathan Keller, Eyal Ronen, & Adi Shamir. (2023). Quantum time/memory/data tradeoff attacks. Designs Codes and Cryptography. 92(1). 159–177. 2 indexed citations
6.
Chuengsatiansup, Chitchanok, Eyal Ronen, Gregory G. Rose, & Yuval Yarom. (2022). Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung. The Computer Journal. 66(6). 1335–1341.
7.
Agarwal, Ayush, et al.. (2022). Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. 699–715. 10 indexed citations
8.
Dunkelman, Orr, et al.. (2021). Error Resilient Space Partitioning (Invited Talk). DROPS (Schloss Dagstuhl – Leibniz Center for Informatics). 1 indexed citations
9.
Pinkas, Benny & Eyal Ronen. (2021). Hashomer – Privacy-Preserving Bluetooth Based Contact Tracing Scheme for Hamagen. 10 indexed citations
10.
Vanhoef, Mathy & Eyal Ronen. (2020). Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. Lirias (KU Leuven). 517–533. 74 indexed citations
11.
Ronen, Eyal, et al.. (2019). The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. 435–452. 21 indexed citations
12.
Naor, Moni, Benny Pinkas, & Eyal Ronen. (2019). How to (not) Share a Password. 1369–1386. 10 indexed citations
13.
Ronen, Eyal, et al.. (2018). IoT Goes Nuclear: Creating a Zigbee Chain Reaction. IEEE Security & Privacy. 16(1). 54–62. 75 indexed citations
14.
Ronen, Eyal, Kenneth G. Paterson, & Adi Shamir. (2018). Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. 1397–1414. 13 indexed citations
15.
Dinur, Itai, et al.. (2018). Tight Bounds on Online Checkpointing Algorithms. arXiv (Cornell University).
16.
Ronen, Eyal, et al.. (2017). IoT Goes Nuclear: Creating a ZigBee Chain Reaction. 195–212. 285 indexed citations
17.
Ronen, Eyal & Adi Shamir. (2016). Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. 3–12. 142 indexed citations
18.
Ronen, Eyal. (2010). Nuevas tecnologías de fertilización de la palma de aceite. Revista Palmas. 31. 191–204. 1 indexed citations
19.
Towler, Annette, et al.. (2008). The seductive details effect in technology‐delivered instruction. Performance Improvement Quarterly. 21(2). 65–86. 22 indexed citations
20.
Towler, Annette & Eyal Ronen. (2008). Transfer of e-learning in the workplace: the effects of trainee characteristics and contextual factors. 1–80. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026