2008 |
85 | EE | Eli Biham,
Yaniv Carmeli,
Adi Shamir:
Bug Attacks.
CRYPTO 2008: 221-240 |
84 | EE | Sebastiaan Indesteege,
Nathan Keller,
Orr Dunkelman,
Eli Biham,
Bart Preneel:
A Practical Attack on KeeLoq.
EUROCRYPT 2008: 1-18 |
83 | EE | Eli Biham,
Yaniv Carmeli:
Efficient Reconstruction of RC4 Keys from Internal States.
FSE 2008: 270-288 |
82 | EE | Eli Biham:
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
FSE 2008: 444-461 |
81 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A Unified Approach to Related-Key Attacks.
FSE 2008: 73-96 |
80 | EE | Eli Biham,
Yaron J. Goren,
Yuval Ishai:
Basing Weak Public-Key Cryptography on Strong One-Way Functions.
TCC 2008: 55-72 |
79 | EE | Elad Barkan,
Eli Biham,
Nathan Keller:
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
J. Cryptology 21(3): 392-429 (2008) |
2007 |
78 | | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
Symmetric Cryptography, 07.01. - 12.01.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
77 | | Eli Biham,
Amr M. Youssef:
Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Springer 2007 |
76 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A Simple Related-Key Attack on the Full SHACAL-1.
CT-RSA 2007: 20-30 |
75 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Improved Slide Attacks.
FSE 2007: 153-166 |
74 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A New Attack on 6-Round IDEA.
FSE 2007: 211-224 |
73 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Abstracts Collection -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
72 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Executive Summary -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
2006 |
71 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
New Cryptanalytic Results on IDEA.
ASIACRYPT 2006: 412-427 |
70 | EE | Elad Barkan,
Eli Biham,
Adi Shamir:
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
CRYPTO 2006: 1-21 |
69 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Related-Key Impossible Differential Attacks on 8-Round AES-192.
CT-RSA 2006: 21-33 |
68 | EE | Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution.
J. Cryptology 19(4): 381-439 (2006) |
2005 |
67 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A Related-Key Rectangle Attack on the Full KASUMI.
ASIACRYPT 2005: 443-461 |
66 | EE | Eli Biham,
Rafi Chen,
Antoine Joux,
Patrick Carribault,
Christophe Lemuet,
William Jalby:
Collisions of SHA-0 and Reduced SHA-1.
EUROCRYPT 2005: 36-57 |
65 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Related-Key Boomerang and Rectangle Attacks.
EUROCRYPT 2005: 507-525 |
64 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
New Combined Attacks on Block Ciphers.
FSE 2005: 126-144 |
63 | EE | Eli Biham,
Louis Granboulan,
Phong Q. Nguyen:
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
FSE 2005: 359-367 |
62 | EE | Elad Barkan,
Eli Biham:
Conditional Estimators: An Effective Attack on A5/1.
Selected Areas in Cryptography 2005: 1-19 |
61 | EE | Eli Biham:
Differential Cryptanalysis.
Encyclopedia of Cryptography and Security 2005 |
60 | EE | Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution
CoRR abs/quant-ph/0511175: (2005) |
59 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology 18(4): 291-311 (2005) |
2004 |
58 | EE | Eli Biham,
Rafi Chen:
Near-Collisions of SHA-0.
CRYPTO 2004: 290-305 |
57 | EE | Eli Biham,
Gilles Brassard,
Dan Kenigsberg,
Tal Mor:
Quantum computing without entanglement.
Theor. Comput. Sci. 320(1): 15-33 (2004) |
2003 |
56 | | Eli Biham:
Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings
Springer 2003 |
55 | EE | Elad Barkan,
Eli Biham,
Nathan Keller:
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
CRYPTO 2003: 600-616 |
54 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Rectangle Attacks on 49-Round SHACAL-1.
FSE 2003: 22-35 |
53 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Differential-Linear Cryptanalysis of Serpent.
FSE 2003: 9-21 |
2002 |
52 | EE | Elad Barkan,
Eli Biham:
In How Many Ways Can You Write Rijndael?
ASIACRYPT 2002: 160-175 |
51 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Enhancing Differential-Linear Cryptanalysis.
ASIACRYPT 2002: 254-266 |
50 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
New Results on Boomerang and Rectangle Attacks.
FSE 2002: 1-16 |
49 | EE | Eli Biham,
Michel Boyer,
Gilles Brassard,
Jeroen van de Graaf,
Tal Mor:
Security of Quantum Key Distribution against All Collective Attacks.
Algorithmica 34(4): 372-388 (2002) |
48 | EE | Eli Biham:
How to decrypt or even substitute DES-encrypted messages in 228 steps.
Inf. Process. Lett. 84(3): 117-124 (2002) |
47 | EE | Eli Biham,
Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode.
J. Cryptology 15(1): 47-59 (2002) |
2001 |
46 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
The Rectangle Attack - Rectangling the Serpent.
EUROCRYPT 2001: 340-357 |
45 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Linear Cryptanalysis of Reduced Round Serpent.
FSE 2001: 16-27 |
44 | EE | Eli Biham,
Vladimir Furman,
Michal Misztal,
Vincent Rijmen:
Differential Cryptanalysis of Q.
FSE 2001: 174-186 |
43 | | Roy Friedman,
Eli Biham,
Ayal Itzkovitz,
Assaf Schuster:
Symphony: An Infrastructure for Managing Virtual Servers.
Cluster Computing 4(3): 221-233 (2001) |
2000 |
42 | | Eli Biham,
Vladimir Furman:
Impossible Differential on 8-Round MARS' Core.
AES Candidate Conference 2000: 186-194 |
41 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
The Case for Serpent.
AES Candidate Conference 2000: 349-354 |
40 | EE | Eli Biham:
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R).
EUROCRYPT 2000: 408-416 |
39 | EE | Eli Biham,
Orr Dunkelman:
Cryptanalysis of the A5/1 GSM Stream Cipher.
INDOCRYPT 2000: 43-51 |
38 | EE | Eli Biham,
Vladimir Furman:
Improved Impossible Differentials on Twofish.
INDOCRYPT 2000: 80-92 |
37 | EE | Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani P. Roychowdhury:
A proof of the security of quantum key distribution (extended abstract).
STOC 2000: 715-724 |
1999 |
36 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
EUROCRYPT 1999: 12-23 |
35 | EE | Roy Friedman,
Assaf Schuster,
Ayal Itzkovitz,
Eli Biham,
Erez Hadad,
Vladislav Kalinovsky,
Sergey Kleyman,
Roman Vitenberg:
Symphony: Managing Virtual Servers in the Global Village.
Euro-Par 1999: 777-784 |
34 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu.
FSE 1999: 124-138 |
33 | EE | Eli Biham,
Dan Boneh,
Omer Reingold:
Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring.
Inf. Process. Lett. 70(2): 83-87 (1999) |
32 | EE | Eli Biham:
Cryptanalysis of Triple Modes of Operation.
J. Cryptology 12(3): 161-184 (1999) |
1998 |
31 | | Eli Biham,
Amichai Shulman:
User-Defined Divisibility of Ecash and a Practical Implementation.
CARDIS 1998: 1-18 |
30 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
Serpent and Smartcards.
CARDIS 1998: 246-253 |
29 | EE | Eli Biham,
Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode.
EUROCRYPT 1998: 100-111 |
28 | EE | Eli Biham,
Ross J. Anderson,
Lars R. Knudsen:
Serpent: A New Block Cipher Proposal.
FSE 1998: 222-238 |
27 | EE | David Biron,
Ofer Biham,
Eli Biham,
Markus Grassl,
Daniel A. Lidar:
Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution.
QCQC 1998: 140-147 |
26 | EE | Eli Biham,
Alex Biryukov,
Orr Dunkelman,
Eran Richardson,
Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Selected Areas in Cryptography 1998: 362-376 |
25 | EE | Eli Biham:
Cryptanalysis of Multiple Modes of Operation.
J. Cryptology 11(1): 45-58 (1998) |
1997 |
24 | | Eli Biham:
Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings
Springer 1997 |
23 | EE | Eli Biham,
Adi Shamir:
Differential Fault Analysis of Secret Key Cryptosystems.
CRYPTO 1997: 513-525 |
22 | EE | Eli Biham:
Cryptanalysis of Ladder-DES.
FSE 1997: 134-138 |
21 | EE | Eli Biham:
A Fast New DES Implementation in Software.
FSE 1997: 260-272 |
20 | EE | Eli Biham,
Dan Boneh,
Omer Reingold:
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997) |
19 | | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
J. Cryptology 10(3): 195-206 (1997) |
1996 |
18 | | Ross J. Anderson,
Eli Biham:
Two Practical and Provably Secure Block Ciphers: BEARS and LION.
FSE 1996: 113-120 |
17 | | Ross J. Anderson,
Eli Biham:
TIGER: A Fast New Hash Function.
FSE 1996: 89-97 |
16 | | Ishai Ben-Aroya,
Eli Biham:
Differential Cryptanalysis of Lucifer.
J. Cryptology 9(1): 21-34 (1996) |
1994 |
15 | | Eli Biham:
Cryptanalysis of Multiple Modes of Operation.
ASIACRYPT 1994: 278-292 |
14 | | Eli Biham,
Alex Biryukov:
How to Strengthen DES Using Existing Hardware.
ASIACRYPT 1994: 398-412 |
13 | EE | Eli Biham:
On Matsui's Linear Cryptanalysis.
EUROCRYPT 1994: 341-355 |
12 | EE | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
EUROCRYPT 1994: 461-467 |
11 | | Eli Biham,
Paul C. Kocher:
A Known Plaintext Attack on the PKZIP Stream Cipher.
FSE 1994: 144-153 |
10 | | Eli Biham:
New Types of Cryptanalytic Attacks Using Related Keys.
J. Cryptology 7(4): 229-246 (1994) |
1993 |
9 | EE | Ishai Ben-Aroya,
Eli Biham:
Differtial Cryptanalysis of Lucifer.
CRYPTO 1993: 187-199 |
8 | EE | Eli Biham:
New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract).
EUROCRYPT 1993: 398-409 |
7 | | Eli Biham:
On Modes of Operation.
FSE 1993: 116-120 |
1992 |
6 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of the Full 16-Round DES.
CRYPTO 1992: 487-496 |
1991 |
5 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
CRYPTO 1991: 156-171 |
4 | EE | Eli Biham,
Adi Shamir:
Differential Cryptoanalysis of Feal and N-Hash.
EUROCRYPT 1991: 1-16 |
3 | EE | Eli Biham:
Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91.
EUROCRYPT 1991: 532-534 |
2 | | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
J. Cryptology 4(1): 3-72 (1991) |
1990 |
1 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
CRYPTO 1990: 2-21 |