![]() |
| 2008 | ||
|---|---|---|
| 5 | EE | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptology 21(3): 392-429 (2008) |
| 2006 | ||
| 4 | EE | Elad Barkan, Eli Biham, Adi Shamir: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21 |
| 2005 | ||
| 3 | EE | Elad Barkan, Eli Biham: Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 2005: 1-19 |
| 2003 | ||
| 2 | EE | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. CRYPTO 2003: 600-616 |
| 2002 | ||
| 1 | EE | Elad Barkan, Eli Biham: In How Many Ways Can You Write Rijndael? ASIACRYPT 2002: 160-175 |
| 1 | Eli Biham | [1] [2] [3] [4] [5] |
| 2 | Nathan Keller | [2] [5] |
| 3 | Adi Shamir | [4] |