The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Eli Biham: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ross J. Anderson, Eli Biham, Lars R. Knudsen
    The Case for Serpent. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:349-354 [Conf]
  2. Eli Biham, Vladimir Furman
    Impossible Differential on 8-Round MARS' Core. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:186-194 [Conf]
  3. Eli Biham, Orr Dunkelman, Nathan Keller
    A Related-Key Rectangle Attack on the Full KASUMI. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:443-461 [Conf]
  4. Eli Biham, Orr Dunkelman, Nathan Keller
    New Cryptanalytic Results on IDEA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:412-427 [Conf]
  5. Eli Biham
    Cryptanalysis of Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:278-292 [Conf]
  6. Eli Biham, Alex Biryukov
    How to Strengthen DES Using Existing Hardware. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:398-412 [Conf]
  7. Eli Biham, Orr Dunkelman, Nathan Keller
    Enhancing Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:254-266 [Conf]
  8. Elad Barkan, Eli Biham
    In How Many Ways Can You Write Rijndael? [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:160-175 [Conf]
  9. Ross J. Anderson, Eli Biham, Lars R. Knudsen
    Serpent and Smartcards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:246-253 [Conf]
  10. Eli Biham, Amichai Shulman
    User-Defined Divisibility of Ecash and a Practical Implementation. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:1-18 [Conf]
  11. Eli Biham, Adi Shamir
    Differential Fault Analysis of Secret Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:513-525 [Conf]
  12. Ishai Ben-Aroya, Eli Biham
    Differtial Cryptanalysis of Lucifer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:187-199 [Conf]
  13. Elad Barkan, Eli Biham, Nathan Keller
    Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:600-616 [Conf]
  14. Eli Biham, Rafi Chen
    Near-Collisions of SHA-0. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:290-305 [Conf]
  15. Eli Biham, Adi Shamir
    Differential Cryptanalysis of DES-like Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:2-21 [Conf]
  16. Eli Biham, Adi Shamir
    Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:156-171 [Conf]
  17. Eli Biham, Adi Shamir
    Differential Cryptanalysis of the Full 16-Round DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:487-496 [Conf]
  18. Elad Barkan, Eli Biham, Adi Shamir
    Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:1-21 [Conf]
  19. Eli Biham, Orr Dunkelman, Nathan Keller
    Related-Key Impossible Differential Attacks on 8-Round AES-192. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:21-33 [Conf]
  20. Eli Biham, Orr Dunkelman, Nathan Keller
    A Simple Related-Key Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:20-30 [Conf]
  21. Eli Biham
    Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:408-416 [Conf]
  22. Eli Biham
    Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:532-534 [Conf]
  23. Eli Biham
    New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:398-409 [Conf]
  24. Eli Biham
    On Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:341-355 [Conf]
  25. Eli Biham, Alex Biryukov
    An Improvement of Davies' Attack on DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:461-467 [Conf]
  26. Eli Biham, Alex Biryukov, Adi Shamir
    Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:12-23 [Conf]
  27. Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby
    Collisions of SHA-0 and Reduced SHA-1. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:36-57 [Conf]
  28. Eli Biham, Orr Dunkelman, Nathan Keller
    The Rectangle Attack - Rectangling the Serpent. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:340-357 [Conf]
  29. Eli Biham, Orr Dunkelman, Nathan Keller
    Related-Key Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:507-525 [Conf]
  30. Eli Biham, Lars R. Knudsen
    Cryptanalysis of the ANSI X9.52 CBCM Mode. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:100-111 [Conf]
  31. Eli Biham, Adi Shamir
    Differential Cryptoanalysis of Feal and N-Hash. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:1-16 [Conf]
  32. Roy Friedman, Assaf Schuster, Ayal Itzkovitz, Eli Biham, Erez Hadad, Vladislav Kalinovsky, Sergey Kleyman, Roman Vitenberg
    Symphony: Managing Virtual Servers in the Global Village. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 1999, pp:777-784 [Conf]
  33. Ross J. Anderson, Eli Biham
    TIGER: A Fast New Hash Function. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:89-97 [Conf]
  34. Ross J. Anderson, Eli Biham
    Two Practical and Provably Secure Block Ciphers: BEARS and LION. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:113-120 [Conf]
  35. Eli Biham
    On Modes of Operation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:116-120 [Conf]
  36. Eli Biham
    Cryptanalysis of Ladder-DES. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:134-138 [Conf]
  37. Eli Biham
    A Fast New DES Implementation in Software. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:260-272 [Conf]
  38. Eli Biham, Ross J. Anderson, Lars R. Knudsen
    Serpent: A New Block Cipher Proposal. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:222-238 [Conf]
  39. Eli Biham, Alex Biryukov, Adi Shamir
    Miss in the Middle Attacks on IDEA and Khufu. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:124-138 [Conf]
  40. Eli Biham, Orr Dunkelman, Nathan Keller
    Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:16-27 [Conf]
  41. Eli Biham, Orr Dunkelman, Nathan Keller
    New Results on Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:1-16 [Conf]
  42. Eli Biham, Orr Dunkelman, Nathan Keller
    Differential-Linear Cryptanalysis of Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:9-21 [Conf]
  43. Eli Biham, Orr Dunkelman, Nathan Keller
    Rectangle Attacks on 49-Round SHACAL-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:22-35 [Conf]
  44. Eli Biham, Orr Dunkelman, Nathan Keller
    New Combined Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:126-144 [Conf]
  45. Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen
    Differential Cryptanalysis of Q. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:174-186 [Conf]
  46. Eli Biham, Louis Granboulan, Phong Q. Nguyen
    Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:359-367 [Conf]
  47. Eli Biham, Paul C. Kocher
    A Known Plaintext Attack on the PKZIP Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:144-153 [Conf]
  48. Eli Biham, Orr Dunkelman
    Cryptanalysis of the A5/1 GSM Stream Cipher. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:43-51 [Conf]
  49. Eli Biham, Vladimir Furman
    Improved Impossible Differentials on Twofish. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:80-92 [Conf]
  50. David Biron, Ofer Biham, Eli Biham, Markus Grassl, Daniel A. Lidar
    Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution. [Citation Graph (0, 0)][DBLP]
    QCQC, 1998, pp:140-147 [Conf]
  51. Elad Barkan, Eli Biham
    Conditional Estimators: An Effective Attack on A5/1. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:1-19 [Conf]
  52. Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir
    Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:362-376 [Conf]
  53. Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury
    A proof of the security of quantum key distribution (extended abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 2000, pp:715-724 [Conf]
  54. Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor
    Security of Quantum Key Distribution against All Collective Attacks. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:34, n:4, pp:372-388 [Journal]
  55. Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster
    Symphony: An Infrastructure for Managing Virtual Servers. [Citation Graph (0, 0)][DBLP]
    Cluster Computing, 2001, v:4, n:3, pp:221-233 [Journal]
  56. Eli Biham, Dan Boneh, Omer Reingold
    Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:61, pp:- [Journal]
  57. Eli Biham
    How to decrypt or even substitute DES-encrypted messages in 228 steps. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:84, n:3, pp:117-124 [Journal]
  58. Eli Biham, Dan Boneh, Omer Reingold
    Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:2, pp:83-87 [Journal]
  59. Ishai Ben-Aroya, Eli Biham
    Differential Cryptanalysis of Lucifer. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:1, pp:21-34 [Journal]
  60. Eli Biham
    New Types of Cryptanalytic Attacks Using Related Keys. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1994, v:7, n:4, pp:229-246 [Journal]
  61. Eli Biham
    Cryptanalysis of Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1998, v:11, n:1, pp:45-58 [Journal]
  62. Eli Biham
    Cryptanalysis of Triple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1999, v:12, n:3, pp:161-184 [Journal]
  63. Eli Biham, Alex Biryukov
    An Improvement of Davies' Attack on DES. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1997, v:10, n:3, pp:195-206 [Journal]
  64. Eli Biham, Alex Biryukov, Adi Shamir
    Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2005, v:18, n:4, pp:291-311 [Journal]
  65. Eli Biham, Lars R. Knudsen
    Cryptanalysis of the ANSI X9.52 CBCM Mode. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:1, pp:47-59 [Journal]
  66. Eli Biham, Adi Shamir
    Differential Cryptanalysis of DES-like Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:4, n:1, pp:3-72 [Journal]
  67. Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury
    A Proof of the Security of Quantum Key Distribution. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:381-439 [Journal]
  68. Eli Biham, Gilles Brassard, Dan Kenigsberg, Tal Mor
    Quantum computing without entanglement. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:320, n:1, pp:15-33 [Journal]
  69. Eli Biham, Orr Dunkelman, Nathan Keller
    Improved Slide Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:153-166 [Conf]
  70. Eli Biham, Orr Dunkelman, Nathan Keller
    A New Attack on 6-Round IDEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:211-224 [Conf]

  71. Bug Attacks. [Citation Graph (, )][DBLP]


  72. 07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP]


  73. 07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP]


  74. A Practical Attack on KeeLoq. [Citation Graph (, )][DBLP]


  75. A Unified Approach to Related-Key Attacks. [Citation Graph (, )][DBLP]


  76. Efficient Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP]


  77. New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. [Citation Graph (, )][DBLP]


  78. Basing Weak Public-Key Cryptography on Strong One-Way Functions. [Citation Graph (, )][DBLP]


  79. A Proof of the Security of Quantum Key Distribution [Citation Graph (, )][DBLP]


Search in 0.009secs, Finished in 0.012secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002