Eli Biham

According to our database1, Eli Biham authored at least 94 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack.
IACR Cryptol. ePrint Arch., 2019

2018
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.
IACR Trans. Symmetric Cryptol., 2018

Efficient Slide Attacks.
J. Cryptology, 2018

2016
Bug Attacks.
J. Cryptology, 2016

2015
New Attacks on IDEA with at Least 6 Rounds.
J. Cryptology, 2015

Cryptanalysis of SHA-0 and Reduced SHA-1.
J. Cryptology, 2015

2014
An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

2013
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
IACR Cryptol. ePrint Arch., 2013

2012
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis.
IEEE Trans. Inf. Theory, 2012

A Practical Attack on KeeLoq.
J. Cryptology, 2012

2011
Differential Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

New Data-Efficient Attacks on Reduced-Round IDEA.
IACR Cryptol. ePrint Arch., 2011

2010
Related-Key Boomerang and Rectangle Attacks.
IACR Cryptol. ePrint Arch., 2010

ABC - A New Framework for Block Ciphers.
IACR Cryptol. ePrint Arch., 2010

2009
The SHAvite-3 - A New Hash Function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
J. Cryptology, 2008

Basing Weak Public-Key Cryptography on Strong One-Way Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

A Unified Approach to Related-Key Attacks.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Efficient Reconstruction of RC4 Keys from Internal States.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

A Practical Attack on KeeLoq.
Proceedings of the Advances in Cryptology, 2008

A New Very Fast Stream Cipher : Tpy.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
A Framework for Iterative Hash Functions - HAIFA.
IACR Cryptol. ePrint Arch., 2007

Differential Cryptanalysis in Stream Ciphers.
IACR Cryptol. ePrint Arch., 2007

A New Attack on 6-Round IDEA.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Improved Slide Attacks.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

07021 Abstracts Collection -- Symmetric Cryptography.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

07021 Executive Summary -- Symmetric Cryptography.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

A Simple Related-Key Attack on the Full SHACAL-1.
Proceedings of the Topics in Cryptology, 2007

2006
A Proof of the Security of Quantum Key Distribution.
J. Cryptology, 2006

Related-Key Impossible Differential Attacks on 8-Round AES-192.
Proceedings of the Topics in Cryptology, 2006

Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
Proceedings of the Advances in Cryptology, 2006

New Cryptanalytic Results on IDEA.
Proceedings of the Advances in Cryptology, 2006

2005
Differential Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology, 2005

Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays.
IACR Cryptol. ePrint Arch., 2005

Conditional Estimators: An Effective Attack on A5/1.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

New Combined Attacks on Block Ciphers.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Related-Key Boomerang and Rectangle Attacks.
Proceedings of the Advances in Cryptology, 2005

Collisions of SHA-0 and Reduced SHA-1.
Proceedings of the Advances in Cryptology, 2005

A Related-Key Rectangle Attack on the Full KASUMI.
Proceedings of the Advances in Cryptology, 2005

2004
Quantum computing without entanglement.
Theor. Comput. Sci., 2004

Near-Collisions of SHA-0.
IACR Cryptol. ePrint Arch., 2004

2003
Rectangle Attacks on 49-Round SHACAL-1.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Differential-Linear Cryptanalysis of Serpent.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
Cryptanalysis of the ANSI X9.52 CBCM Mode.
J. Cryptology, 2002

How to decrypt or even substitute DES-encrypted messages in 228 steps.
Inf. Process. Lett., 2002

New Results on Boomerang and Rectangle Attack.
IACR Cryptol. ePrint Arch., 2002

The Book of Rijndaels.
IACR Cryptol. ePrint Arch., 2002

In How Many Ways Can You Write Rijndael?
IACR Cryptol. ePrint Arch., 2002

Security of Quantum Key Distribution against All Collective Attacks.
Algorithmica, 2002

New Results on Boomerang and Rectangle Attacks.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Enhancing Differential-Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2002

2001
The Rectangle Attack - Rectangling the Serpent.
IACR Cryptol. ePrint Arch., 2001

Symphony: An Infrastructure for Managing Virtual Servers.
Cluster Computing, 2001

Differential Cryptanalysis of Q.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
A proof of the security of quantum key distribution (extended abstract).
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Improved Impossible Differentials on Twofish.
Proceedings of the Progress in Cryptology, 2000

Cryptanalysis of the A5/1 GSM Stream Cipher.
Proceedings of the Progress in Cryptology, 2000

Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R).
Proceedings of the Advances in Cryptology, 2000

Impossible Differential on 8-Round MARS' Core.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

The Case for Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Cryptanalysis of Triple Modes of Operation.
J. Cryptology, 1999

Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring.
Inf. Process. Lett., 1999

Miss in the Middle Attacks on IDEA and Khufu.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Symphony: Managing Virtual Servers in the Global Village.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

1998
Cryptanalysis of Multiple Modes of Operation.
J. Cryptology, 1998

Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Proceedings of the Selected Areas in Cryptography '98, 1998

Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution.
Proceedings of the Quantum Computing and Quantum Communications, 1998

Serpent: A New Block Cipher Proposal.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

User-Defined Divisibility of Ecash and a Practical Implementation.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Serpent and Smartcards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
An Improvement of Davies' Attack on DES.
J. Cryptology, 1997

Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Electronic Colloquium on Computational Complexity (ECCC), 1997

A Fast New DES Implementation in Software.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Cryptanalysis of Ladder-DES.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Differential Fault Analysis of Secret Key Cryptosystems.
Proceedings of the Advances in Cryptology, 1997

1996
Differential Cryptanalysis of Lucifer.
J. Cryptology, 1996

Two Practical and Provably Secure Block Ciphers: BEARS and LION.
Proceedings of the Fast Software Encryption, 1996

TIGER: A Fast New Hash Function.
Proceedings of the Fast Software Encryption, 1996

1994
New Types of Cryptanalytic Attacks Using Related Keys.
J. Cryptology, 1994

A Known Plaintext Attack on the PKZIP Stream Cipher.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

On Matsui's Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 1994

How to Strengthen DES Using Existing Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
On Modes of Operation.
Proceedings of the Fast Software Encryption, 1993

New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

Differential Cryptanalysis of the Data Encryption Standard.
Springer, ISBN: 978-1-4613-9316-0, 1993

1992
Differential Cryptanalysis of the Full 16-Round DES.
Proceedings of the Advances in Cryptology, 1992

1991
Differential Cryptanalysis of DES-like Cryptosystems.
J. Cryptology, 1991

Differential Cryptanalysis of Feal and N-Hash.
Proceedings of the Advances in Cryptology, 1991

Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91.
Proceedings of the Advances in Cryptology, 1991

Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
Proceedings of the Advances in Cryptology, 1991


  Loading...