Eli Biham

According to our database1, Eli Biham authored at least 106 papers between 1990 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.
IACR Trans. Symmetric Cryptol., 2018

Efficient Slide Attacks.
J. Cryptology, 2018

2016
Bug Attacks.
J. Cryptology, 2016

Efficient Slide Attacks.
IACR Cryptology ePrint Archive, 2016

2015
New Attacks on IDEA with at Least 6 Rounds.
J. Cryptology, 2015

Cryptanalysis of SHA-0 and Reduced SHA-1.
J. Cryptology, 2015

2014
An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

2013
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
IACR Cryptology ePrint Archive, 2013

2012
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis.
IEEE Trans. Information Theory, 2012

A Practical Attack on KeeLoq.
J. Cryptology, 2012

2011
Differential Cryptanalysis.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

New Data-Efficient Attacks on Reduced-Round IDEA.
IACR Cryptology ePrint Archive, 2011

2010
Related-Key Boomerang and Rectangle Attacks.
IACR Cryptology ePrint Archive, 2010

ABC - A New Framework for Block Ciphers.
IACR Cryptology ePrint Archive, 2010

2009
The SHAvite-3 - A New Hash Function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
J. Cryptology, 2008

Basing Weak Public-Key Cryptography on Strong One-Way Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

A Unified Approach to Related-Key Attacks.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Efficient Reconstruction of RC4 Keys from Internal States.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

A Practical Attack on KeeLoq.
Proceedings of the Advances in Cryptology, 2008

Bug Attacks.
Proceedings of the Advances in Cryptology, 2008

A New Very Fast Stream Cipher : Tpy.
Proceedings of the Sixth Australasian Information Security Conference, 2008

2007
A Framework for Iterative Hash Functions - HAIFA.
IACR Cryptology ePrint Archive, 2007

Differential Cryptanalysis in Stream Ciphers.
IACR Cryptology ePrint Archive, 2007

A New Attack on 6-Round IDEA.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Improved Slide Attacks.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

07021 Abstracts Collection -- Symmetric Cryptography.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

07021 Executive Summary -- Symmetric Cryptography.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

A Simple Related-Key Attack on the Full SHACAL-1.
Proceedings of the Topics in Cryptology, 2007

2006
A Proof of the Security of Quantum Key Distribution.
J. Cryptology, 2006

Related-Key Impossible Differential Attacks on 8-Round AES-192.
Proceedings of the Topics in Cryptology, 2006

Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
Proceedings of the Advances in Cryptology, 2006

New Cryptanalytic Results on IDEA.
Proceedings of the Advances in Cryptology, 2006

2005
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology, 2005

Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays.
IACR Cryptology ePrint Archive, 2005

A Proof of the Security of Quantum Key Distribution
CoRR, 2005

Conditional Estimators: An Effective Attack on A5/1.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

New Combined Attacks on Block Ciphers.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Related-Key Boomerang and Rectangle Attacks.
Proceedings of the Advances in Cryptology, 2005

Collisions of SHA-0 and Reduced SHA-1.
Proceedings of the Advances in Cryptology, 2005

A Related-Key Rectangle Attack on the Full KASUMI.
Proceedings of the Advances in Cryptology, 2005

2004
Quantum computing without entanglement.
Theor. Comput. Sci., 2004

Near-Collisions of SHA-0.
IACR Cryptology ePrint Archive, 2004

Near-Collisions of SHA-0.
Proceedings of the Advances in Cryptology, 2004

2003
Rectangle Attacks on 49-Round SHACAL-1.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Differential-Linear Cryptanalysis of Serpent.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
Proceedings of the Advances in Cryptology, 2003

2002
Cryptanalysis of the ANSI X9.52 CBCM Mode.
J. Cryptology, 2002

How to decrypt or even substitute DES-encrypted messages in 228 steps.
Inf. Process. Lett., 2002

New Results on Boomerang and Rectangle Attack.
IACR Cryptology ePrint Archive, 2002

The Book of Rijndaels.
IACR Cryptology ePrint Archive, 2002

In How Many Ways Can You Write Rijndael?
IACR Cryptology ePrint Archive, 2002

Security of Quantum Key Distribution against All Collective Attacks.
Algorithmica, 2002

New Results on Boomerang and Rectangle Attacks.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Enhancing Differential-Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2002

In How Many Ways Can You Write Rijndael?
Proceedings of the Advances in Cryptology, 2002

2001
The Rectangle Attack - Rectangling the Serpent.
IACR Cryptology ePrint Archive, 2001

Symphony: An Infrastructure for Managing Virtual Servers.
Cluster Computing, 2001

Differential Cryptanalysis of Q.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

The Rectangle Attack - Rectangling the Serpent.
Proceedings of the Advances in Cryptology, 2001

2000
A proof of the security of quantum key distribution (extended abstract).
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Improved Impossible Differentials on Twofish.
Proceedings of the Progress in Cryptology, 2000

Cryptanalysis of the A5/1 GSM Stream Cipher.
Proceedings of the Progress in Cryptology, 2000

Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R).
Proceedings of the Advances in Cryptology, 2000

Impossible Differential on 8-Round MARS' Core.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

The Case for Serpent.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Cryptanalysis of Triple Modes of Operation.
J. Cryptology, 1999

Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring.
Inf. Process. Lett., 1999

Miss in the Middle Attacks on IDEA and Khufu.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Symphony: Managing Virtual Servers in the Global Village.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Proceedings of the Advances in Cryptology, 1999

1998
Cryptanalysis of Multiple Modes of Operation.
J. Cryptology, 1998

Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Proceedings of the Selected Areas in Cryptography '98, 1998

Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution.
Proceedings of the Quantum Computing and Quantum Communications, 1998

Serpent: A New Block Cipher Proposal.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Cryptanalysis of the ANSI X9.52 CBCM Mode.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

User-Defined Divisibility of Ecash and a Practical Implementation.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Serpent and Smartcards.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
An Improvement of Davies' Attack on DES.
J. Cryptology, 1997

Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring.
IACR Cryptology ePrint Archive, 1997

Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Electronic Colloquium on Computational Complexity (ECCC), 1997

A Fast New DES Implementation in Software.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Cryptanalysis of Ladder-DES.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Differential Fault Analysis of Secret Key Cryptosystems.
Proceedings of the Advances in Cryptology, 1997

1996
Differential Cryptanalysis of Lucifer.
J. Cryptology, 1996

Two Practical and Provably Secure Block Ciphers: BEARS and LION.
Proceedings of the Fast Software Encryption, 1996

TIGER: A Fast New Hash Function.
Proceedings of the Fast Software Encryption, 1996

1994
New Types of Cryptanalytic Attacks Using Related Keys.
J. Cryptology, 1994

A Known Plaintext Attack on the PKZIP Stream Cipher.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

An Improvement of Davies' Attack on DES.
Proceedings of the Advances in Cryptology, 1994

On Matsui's Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 1994

How to Strengthen DES Using Existing Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

Cryptanalysis of Multiple Modes of Operation.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
On Modes of Operation.
Proceedings of the Fast Software Encryption, 1993

New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

Differential Cryptanalysis of Lucifer.
Proceedings of the Advances in Cryptology, 1993

Differential Cryptanalysis of the Data Encryption Standard.
Springer, ISBN: 978-1-4613-9316-0, 1993

1992
Differential Cryptanalysis of the Full 16-Round DES.
Proceedings of the Advances in Cryptology, 1992

1991
Differential Cryptanalysis of DES-like Cryptosystems.
J. Cryptology, 1991

Differential Cryptanalysis of Feal and N-Hash.
Proceedings of the Advances in Cryptology, 1991

Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91.
Proceedings of the Advances in Cryptology, 1991

Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
Proceedings of the Advances in Cryptology, 1991

1990
Differential Cryptanalysis of DES-like Cryptosystems.
Proceedings of the Advances in Cryptology, 1990


  Loading...