Itai Dinur

2.3k total citations
17 papers, 63 citations indexed

About

Itai Dinur is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computational Theory and Mathematics. According to data from OpenAlex, Itai Dinur has authored 17 papers receiving a total of 63 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Artificial Intelligence, 9 papers in Computer Vision and Pattern Recognition and 3 papers in Computational Theory and Mathematics. Recurrent topics in Itai Dinur's work include Cryptographic Implementations and Security (12 papers), Coding theory and cryptography (10 papers) and Chaos-based Image/Signal Encryption (9 papers). Itai Dinur is often cited by papers focused on Cryptographic Implementations and Security (12 papers), Coding theory and cryptography (10 papers) and Chaos-based Image/Signal Encryption (9 papers). Itai Dinur collaborates with scholars based in Israel, France and Burundi. Itai Dinur's co-authors include Adi Shamir, Orr Dunkelman, Gaëtan Leurent, Nathan Keller, Shlomi Dolev, Sachin Lodha, Qingju Wang, Yunwen Liu, Willi Meier and Zhenzhen Bao and has published in prestigious journals such as Communications of the ACM, Lecture notes in computer science and Algorithmica.

In The Last Decade

Itai Dinur

15 papers receiving 60 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Itai Dinur Israel 6 49 29 11 10 10 17 63
Erik Zenner Denmark 4 39 0.8× 34 1.2× 9 0.8× 11 1.1× 6 0.6× 12 56
Seiya Tokui Japan 2 33 0.7× 30 1.0× 5 0.5× 10 1.0× 6 0.6× 2 70
Virginie Lallemand France 3 63 1.3× 49 1.7× 13 1.2× 5 0.5× 12 1.2× 10 69
Jiqiang Lu Singapore 6 71 1.4× 67 2.3× 13 1.2× 12 1.2× 11 1.1× 20 92
Nicky Mouha Belgium 5 48 1.0× 28 1.0× 18 1.6× 11 1.1× 13 1.3× 22 75
Aleksei Udovenko Luxembourg 5 48 1.0× 33 1.1× 6 0.5× 8 0.8× 8 0.8× 15 59
Xavier Bonnetain France 3 83 1.7× 30 1.0× 9 0.8× 6 0.6× 5 0.5× 8 93
Patrick Derbez France 6 77 1.6× 53 1.8× 7 0.6× 6 0.6× 13 1.3× 19 85
Jarek Duda Poland 3 40 0.8× 43 1.5× 20 1.8× 22 2.2× 8 0.8× 7 81
David Gérault Singapore 5 77 1.6× 52 1.8× 12 1.1× 6 0.6× 21 2.1× 11 84

Countries citing papers authored by Itai Dinur

Since Specialization
Citations

This map shows the geographic impact of Itai Dinur's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Itai Dinur with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Itai Dinur more than expected).

Fields of papers citing papers by Itai Dinur

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Itai Dinur. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Itai Dinur. The network helps show where Itai Dinur may publish in the future.

Co-authorship network of co-authors of Itai Dinur

This figure shows the co-authorship network connecting the top 25 collaborators of Itai Dinur. A scholar is included among the top collaborators of Itai Dinur based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Itai Dinur. Itai Dinur is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Dinur, Itai & Gaëtan Leurent. (2020). Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process. IACR Transactions on Symmetric Cryptology. 1–4. 3 indexed citations
3.
Bao, Zhenzhen, Itai Dinur, Jian Guo, Gaëtan Leurent, & Lei Wang. (2019). Generic Attacks on Hash Combiners. Journal of Cryptology. 33(3). 742–823. 3 indexed citations
4.
Dinur, Itai, et al.. (2018). Cyber Security Cryptography and Machine Learning. Lecture notes in computer science. 6 indexed citations
5.
Dinur, Itai. (2018). An algorithmic framework for the generalized birthday problem. Designs Codes and Cryptography. 87(8). 1897–1926. 5 indexed citations
6.
Dinur, Itai, Orr Dunkelman, Nathan Keller, & Adi Shamir. (2018). Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. Journal of Cryptology. 32(4). 1448–1490. 1 indexed citations
7.
Dinur, Itai, et al.. (2018). Tight Bounds on Online Checkpointing Algorithms. arXiv (Cornell University).
8.
Dinur, Itai & Gaëtan Leurent. (2016). Improved Generic Attacks Against Hash-Based MACs and HAIFA. Algorithmica. 79(4). 1161–1195. 5 indexed citations
9.
Dinur, Itai, Yunwen Liu, Willi Meier, & Qingju Wang. (2015). Optimized Interpolation Attacks on LowMC. Lecture notes in computer science. 2015. 418–560. 6 indexed citations
10.
Dinur, Itai, Orr Dunkelman, Nathan Keller, & Adi Shamir. (2015). Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes. Journal of Cryptology. 29(4). 697–728. 6 indexed citations
11.
Dinur, Itai, Orr Dunkelman, Nathan Keller, & Adi Shamir. (2015). Reflections on slide with a twist attacks. Designs Codes and Cryptography. 77(2-3). 633–651. 1 indexed citations
12.
Dinur, Itai, et al.. (2014). Cryptanalysis of SP Networks with Partial Non-Linear Layers. IACR Cryptology ePrint Archive. 2 indexed citations
13.
Dinur, Itai. (2014). Improved Differential Cryptanalysis of Round-Reduced Speck. HAL (Le Centre pour la Communication Scientifique Directe). 4 indexed citations
14.
Dinur, Itai, Orr Dunkelman, Nathan Keller, & Adi Shamir. (2014). Dissection. Communications of the ACM. 57(10). 98–105. 2 indexed citations
15.
Dinur, Itai & Adi Shamir. (2012). Applying cube attacks to stream ciphers in realistic scenarios. Cryptography and Communications. 4(3-4). 217–232. 12 indexed citations
16.
Dinur, Itai, Orr Dunkelman, & Adi Shamir. (2012). Improved Practical Attacks on Round-Reduced Keccak. Journal of Cryptology. 27(2). 183–209. 6 indexed citations
17.
Dinur, Itai & Adi Shamir. (2010). Generic Analysis of Small Cryptographic Leaks. 2. 39–48. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026