Tomer Ashur

707 total citations
20 papers, 222 citations indexed

About

Tomer Ashur is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Tomer Ashur has authored 20 papers receiving a total of 222 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 10 papers in Computer Vision and Pattern Recognition and 3 papers in Hardware and Architecture. Recurrent topics in Tomer Ashur's work include Cryptographic Implementations and Security (16 papers), Coding theory and cryptography (12 papers) and Chaos-based Image/Signal Encryption (10 papers). Tomer Ashur is often cited by papers focused on Cryptographic Implementations and Security (16 papers), Coding theory and cryptography (12 papers) and Chaos-based Image/Signal Encryption (10 papers). Tomer Ashur collaborates with scholars based in Belgium, Netherlands and China. Tomer Ashur's co-authors include Yunwen Liu, Alan Szepieniec, Eli Ben‐Sasson, Abdelrahaman Aly, Vincent Rijmen, Bart Preneel, Eduard Marin, Benedikt Gierlichs, Ignacio Fernández‐Hernández and Ingrid Verbauwhede and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Transactions on Aerospace and Electronic Systems.

In The Last Decade

Tomer Ashur

18 papers receiving 218 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tomer Ashur Belgium 11 148 60 52 42 37 20 222
Infall Syafalni Indonesia 7 90 0.6× 60 1.0× 82 1.6× 49 1.2× 46 1.2× 74 224
Utsav Banerjee United States 8 159 1.1× 48 0.8× 52 1.0× 41 1.0× 50 1.4× 24 237
Jiyuan Sun China 3 191 1.3× 39 0.7× 28 0.5× 22 0.5× 17 0.5× 5 255
Farnoud Farahmand United States 11 183 1.2× 100 1.7× 36 0.7× 39 0.9× 91 2.5× 19 241
Muslum Ozgur Ozmen United States 8 149 1.0× 38 0.6× 29 0.6× 59 1.4× 10 0.3× 20 223
Yiyuan Luo China 9 182 1.2× 83 1.4× 64 1.2× 50 1.2× 10 0.3× 33 231
José Cano United Kingdom 8 90 0.6× 70 1.2× 50 1.0× 65 1.5× 38 1.0× 36 202
Atif Raza Jafri Pakistan 11 197 1.3× 27 0.5× 86 1.7× 57 1.4× 33 0.9× 27 335
Fábio Borges Brazil 10 206 1.4× 77 1.3× 50 1.0× 54 1.3× 21 0.6× 37 309

Countries citing papers authored by Tomer Ashur

Since Specialization
Citations

This map shows the geographic impact of Tomer Ashur's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tomer Ashur with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tomer Ashur more than expected).

Fields of papers citing papers by Tomer Ashur

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tomer Ashur. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tomer Ashur. The network helps show where Tomer Ashur may publish in the future.

Co-authorship network of co-authors of Tomer Ashur

This figure shows the co-authorship network connecting the top 25 collaborators of Tomer Ashur. A scholar is included among the top collaborators of Tomer Ashur based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tomer Ashur. Tomer Ashur is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ashur, Tomer, et al.. (2023). How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk. The Computer Journal. 66(6). 1312–1319.
2.
Ashur, Tomer, et al.. (2022). Cryptanalysis of Strong Physically Unclonable Functions. SHILAP Revista de lepidopterología. 3. 32–40. 12 indexed citations
3.
Ashur, Tomer, et al.. (2022). Chaghri - A FHE-friendly Block Cipher. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 139–150. 14 indexed citations
4.
Liu, Yunwen, et al.. (2022). Improved rotational‐XOR cryptanalysis of Simon‐like block ciphers. IET Information Security. 16(4). 282–300. 7 indexed citations
5.
Ashur, Tomer, et al.. (2022). Differential Cryptanalysis of K-Cipher. TU/e Research Portal. 1–7. 3 indexed citations
6.
Ashur, Tomer, et al.. (2021). Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations. IEEE Transactions on Information Theory. 68(2). 1296–1315.
7.
Fernández‐Hernández, Ignacio, Tomer Ashur, & Vincent Rijmen. (2021). Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols. IEEE Transactions on Aerospace and Electronic Systems. 57(3). 1827–1839. 17 indexed citations
8.
Szepieniec, Alan & Tomer Ashur. (2020). Eaglesong: an ARX hash with fast diffusion. TU/e Research Portal. 21(1). 69–76. 1 indexed citations
9.
Ashur, Tomer, et al.. (2020). Revisiting the Wrong-Key-Randomization Hypothesis. Journal of Cryptology. 33(2). 567–594. 2 indexed citations
10.
Aly, Abdelrahaman, et al.. (2020). Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. IACR Transactions on Symmetric Cryptology. 1–45. 38 indexed citations
11.
Aly, Abdelrahaman, et al.. (2020). Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. SHILAP Revista de lepidopterología. 22 indexed citations
12.
Marin, Eduard, et al.. (2019). Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars. SHILAP Revista de lepidopterología. 16 indexed citations
13.
Marin, Eduard, et al.. (2019). Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars. IACR Transactions on Cryptographic Hardware and Embedded Systems. 66–85. 28 indexed citations
15.
Liu, Yunwen, et al.. (2017). Rotational-XOR Cryptanalysis of Reduced-round SPECK. IACR Transactions on Symmetric Cryptology. 24–36. 12 indexed citations
16.
Ashur, Tomer, et al.. (2017). An automated tool for rotational-XOR cryptanalysis of ARX-based primitives. TU/e Research Portal (Eindhoven University of Technology). 3 indexed citations
17.
Ashur, Tomer, et al.. (2017). Cryptanalysis of GOST2. IACR Transactions on Symmetric Cryptology. 203–214. 1 indexed citations
18.
Liu, Yunwen, et al.. (2017). Rotational-XOR Cryptanalysis of Reduced-round SPECK. SHILAP Revista de lepidopterología. 12 indexed citations
19.
Ashur, Tomer & Yunwen Liu. (2016). Rotational Cryptanalysis in the Presence of Constants. IACR Transactions on Symmetric Cryptology. 57–70. 15 indexed citations
20.
Ashur, Tomer, et al.. (2016). Linear cryptanalysis of reduced-round speck. TU/e Research Portal (Eindhoven University of Technology). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026