top of page


[1] I. Sheetrit and A. Wool. Cryptanalysis of KeeLoq code-hopping using a single FPGA. Cryptology ePrint Archive, Report 2011/242, 2011.

[2] Y. Oren and A. Wool. Perfect privacy for webmail with secret sharing. Technical report, Tel Aviv University, February 2009.

[3] E. Ronen. Security applications for hardware performance counters: Software attestation and random generation. Master’s thesis, Under the supervision of Prof. Avishai Wool. School of Electrical Engineering, Tel Aviv University, 2012.

[4] A Wool. Hackers do not stop at red lights. Ynet opinions, 4/June/2016 (in Hebrew).

bottom of page