Search the dblp DataBase
Eli Biham :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ross J. Anderson , Eli Biham , Lars R. Knudsen The Case for Serpent. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:349-354 [Conf ] Eli Biham , Vladimir Furman Impossible Differential on 8-Round MARS' Core. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:186-194 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller A Related-Key Rectangle Attack on the Full KASUMI. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:443-461 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller New Cryptanalytic Results on IDEA. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:412-427 [Conf ] Eli Biham Cryptanalysis of Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:278-292 [Conf ] Eli Biham , Alex Biryukov How to Strengthen DES Using Existing Hardware. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:398-412 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Enhancing Differential-Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:254-266 [Conf ] Elad Barkan , Eli Biham In How Many Ways Can You Write Rijndael? [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:160-175 [Conf ] Ross J. Anderson , Eli Biham , Lars R. Knudsen Serpent and Smartcards. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:246-253 [Conf ] Eli Biham , Amichai Shulman User-Defined Divisibility of Ecash and a Practical Implementation. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:1-18 [Conf ] Eli Biham , Adi Shamir Differential Fault Analysis of Secret Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:513-525 [Conf ] Ishai Ben-Aroya , Eli Biham Differtial Cryptanalysis of Lucifer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:187-199 [Conf ] Elad Barkan , Eli Biham , Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:600-616 [Conf ] Eli Biham , Rafi Chen Near-Collisions of SHA-0. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:290-305 [Conf ] Eli Biham , Adi Shamir Differential Cryptanalysis of DES-like Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:2-21 [Conf ] Eli Biham , Adi Shamir Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:156-171 [Conf ] Eli Biham , Adi Shamir Differential Cryptanalysis of the Full 16-Round DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:487-496 [Conf ] Elad Barkan , Eli Biham , Adi Shamir Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:1-21 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Related-Key Impossible Differential Attacks on 8-Round AES-192. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:21-33 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:20-30 [Conf ] Eli Biham Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:408-416 [Conf ] Eli Biham Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:532-534 [Conf ] Eli Biham New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:398-409 [Conf ] Eli Biham On Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:341-355 [Conf ] Eli Biham , Alex Biryukov An Improvement of Davies' Attack on DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:461-467 [Conf ] Eli Biham , Alex Biryukov , Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:12-23 [Conf ] Eli Biham , Rafi Chen , Antoine Joux , Patrick Carribault , Christophe Lemuet , William Jalby Collisions of SHA-0 and Reduced SHA-1. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:36-57 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller The Rectangle Attack - Rectangling the Serpent. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:340-357 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Related-Key Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:507-525 [Conf ] Eli Biham , Lars R. Knudsen Cryptanalysis of the ANSI X9.52 CBCM Mode. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:100-111 [Conf ] Eli Biham , Adi Shamir Differential Cryptoanalysis of Feal and N-Hash. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:1-16 [Conf ] Roy Friedman , Assaf Schuster , Ayal Itzkovitz , Eli Biham , Erez Hadad , Vladislav Kalinovsky , Sergey Kleyman , Roman Vitenberg Symphony: Managing Virtual Servers in the Global Village. [Citation Graph (0, 0)][DBLP ] Euro-Par, 1999, pp:777-784 [Conf ] Ross J. Anderson , Eli Biham TIGER: A Fast New Hash Function. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:89-97 [Conf ] Ross J. Anderson , Eli Biham Two Practical and Provably Secure Block Ciphers: BEARS and LION. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:113-120 [Conf ] Eli Biham On Modes of Operation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:116-120 [Conf ] Eli Biham Cryptanalysis of Ladder-DES. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:134-138 [Conf ] Eli Biham A Fast New DES Implementation in Software. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:260-272 [Conf ] Eli Biham , Ross J. Anderson , Lars R. Knudsen Serpent: A New Block Cipher Proposal. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:222-238 [Conf ] Eli Biham , Alex Biryukov , Adi Shamir Miss in the Middle Attacks on IDEA and Khufu. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:124-138 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:16-27 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller New Results on Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:1-16 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Differential-Linear Cryptanalysis of Serpent. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:9-21 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller Rectangle Attacks on 49-Round SHACAL-1. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:22-35 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller New Combined Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:126-144 [Conf ] Eli Biham , Vladimir Furman , Michal Misztal , Vincent Rijmen Differential Cryptanalysis of Q. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:174-186 [Conf ] Eli Biham , Louis Granboulan , Phong Q. Nguyen Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:359-367 [Conf ] Eli Biham , Paul C. Kocher A Known Plaintext Attack on the PKZIP Stream Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:144-153 [Conf ] Eli Biham , Orr Dunkelman Cryptanalysis of the A5/1 GSM Stream Cipher. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:43-51 [Conf ] Eli Biham , Vladimir Furman Improved Impossible Differentials on Twofish. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:80-92 [Conf ] David Biron , Ofer Biham , Eli Biham , Markus Grassl , Daniel A. Lidar Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution. [Citation Graph (0, 0)][DBLP ] QCQC, 1998, pp:140-147 [Conf ] Elad Barkan , Eli Biham Conditional Estimators: An Effective Attack on A5/1. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:1-19 [Conf ] Eli Biham , Alex Biryukov , Orr Dunkelman , Eran Richardson , Adi Shamir Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:362-376 [Conf ] Eli Biham , Michel Boyer , P. Oscar Boykin , Tal Mor , Vwani P. Roychowdhury A proof of the security of quantum key distribution (extended abstract). [Citation Graph (0, 0)][DBLP ] STOC, 2000, pp:715-724 [Conf ] Eli Biham , Michel Boyer , Gilles Brassard , Jeroen van de Graaf , Tal Mor Security of Quantum Key Distribution against All Collective Attacks. [Citation Graph (0, 0)][DBLP ] Algorithmica, 2002, v:34, n:4, pp:372-388 [Journal ] Roy Friedman , Eli Biham , Ayal Itzkovitz , Assaf Schuster Symphony: An Infrastructure for Managing Virtual Servers. [Citation Graph (0, 0)][DBLP ] Cluster Computing, 2001, v:4, n:3, pp:221-233 [Journal ] Eli Biham , Dan Boneh , Omer Reingold Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:61, pp:- [Journal ] Eli Biham How to decrypt or even substitute DES-encrypted messages in 228 steps. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2002, v:84, n:3, pp:117-124 [Journal ] Eli Biham , Dan Boneh , Omer Reingold Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:70, n:2, pp:83-87 [Journal ] Ishai Ben-Aroya , Eli Biham Differential Cryptanalysis of Lucifer. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1996, v:9, n:1, pp:21-34 [Journal ] Eli Biham New Types of Cryptanalytic Attacks Using Related Keys. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1994, v:7, n:4, pp:229-246 [Journal ] Eli Biham Cryptanalysis of Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1998, v:11, n:1, pp:45-58 [Journal ] Eli Biham Cryptanalysis of Triple Modes of Operation. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1999, v:12, n:3, pp:161-184 [Journal ] Eli Biham , Alex Biryukov An Improvement of Davies' Attack on DES. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1997, v:10, n:3, pp:195-206 [Journal ] Eli Biham , Alex Biryukov , Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2005, v:18, n:4, pp:291-311 [Journal ] Eli Biham , Lars R. Knudsen Cryptanalysis of the ANSI X9.52 CBCM Mode. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:1, pp:47-59 [Journal ] Eli Biham , Adi Shamir Differential Cryptanalysis of DES-like Cryptosystems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:4, n:1, pp:3-72 [Journal ] Eli Biham , Michel Boyer , P. Oscar Boykin , Tal Mor , Vwani P. Roychowdhury A Proof of the Security of Quantum Key Distribution. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2006, v:19, n:4, pp:381-439 [Journal ] Eli Biham , Gilles Brassard , Dan Kenigsberg , Tal Mor Quantum computing without entanglement. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:320, n:1, pp:15-33 [Journal ] Eli Biham , Orr Dunkelman , Nathan Keller Improved Slide Attacks. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:153-166 [Conf ] Eli Biham , Orr Dunkelman , Nathan Keller A New Attack on 6-Round IDEA. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:211-224 [Conf ] Bug Attacks. [Citation Graph (, )][DBLP ] 07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP ] 07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP ] A Practical Attack on KeeLoq. [Citation Graph (, )][DBLP ] A Unified Approach to Related-Key Attacks. [Citation Graph (, )][DBLP ] Efficient Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP ] New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. [Citation Graph (, )][DBLP ] Basing Weak Public-Key Cryptography on Strong One-Way Functions. [Citation Graph (, )][DBLP ] A Proof of the Security of Quantum Key Distribution [Citation Graph (, )][DBLP ] Search in 0.009secs, Finished in 0.012secs