| 2008 |
| 85 | EE | Eli Biham,
Yaniv Carmeli,
Adi Shamir:
Bug Attacks.
CRYPTO 2008: 221-240 |
| 84 | EE | Sebastiaan Indesteege,
Nathan Keller,
Orr Dunkelman,
Eli Biham,
Bart Preneel:
A Practical Attack on KeeLoq.
EUROCRYPT 2008: 1-18 |
| 83 | EE | Eli Biham,
Yaniv Carmeli:
Efficient Reconstruction of RC4 Keys from Internal States.
FSE 2008: 270-288 |
| 82 | EE | Eli Biham:
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
FSE 2008: 444-461 |
| 81 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A Unified Approach to Related-Key Attacks.
FSE 2008: 73-96 |
| 80 | EE | Eli Biham,
Yaron J. Goren,
Yuval Ishai:
Basing Weak Public-Key Cryptography on Strong One-Way Functions.
TCC 2008: 55-72 |
| 79 | EE | Elad Barkan,
Eli Biham,
Nathan Keller:
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
J. Cryptology 21(3): 392-429 (2008) |
| 2007 |
| 78 | | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
Symmetric Cryptography, 07.01. - 12.01.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
| 77 | | Eli Biham,
Amr M. Youssef:
Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Springer 2007 |
| 76 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A Simple Related-Key Attack on the Full SHACAL-1.
CT-RSA 2007: 20-30 |
| 75 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Improved Slide Attacks.
FSE 2007: 153-166 |
| 74 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A New Attack on 6-Round IDEA.
FSE 2007: 211-224 |
| 73 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Abstracts Collection -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
| 72 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Executive Summary -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
| 2006 |
| 71 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
New Cryptanalytic Results on IDEA.
ASIACRYPT 2006: 412-427 |
| 70 | EE | Elad Barkan,
Eli Biham,
Adi Shamir:
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
CRYPTO 2006: 1-21 |
| 69 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Related-Key Impossible Differential Attacks on 8-Round AES-192.
CT-RSA 2006: 21-33 |
| 68 | EE | Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution.
J. Cryptology 19(4): 381-439 (2006) |
| 2005 |
| 67 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
A Related-Key Rectangle Attack on the Full KASUMI.
ASIACRYPT 2005: 443-461 |
| 66 | EE | Eli Biham,
Rafi Chen,
Antoine Joux,
Patrick Carribault,
Christophe Lemuet,
William Jalby:
Collisions of SHA-0 and Reduced SHA-1.
EUROCRYPT 2005: 36-57 |
| 65 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Related-Key Boomerang and Rectangle Attacks.
EUROCRYPT 2005: 507-525 |
| 64 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
New Combined Attacks on Block Ciphers.
FSE 2005: 126-144 |
| 63 | EE | Eli Biham,
Louis Granboulan,
Phong Q. Nguyen:
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
FSE 2005: 359-367 |
| 62 | EE | Elad Barkan,
Eli Biham:
Conditional Estimators: An Effective Attack on A5/1.
Selected Areas in Cryptography 2005: 1-19 |
| 61 | EE | Eli Biham:
Differential Cryptanalysis.
Encyclopedia of Cryptography and Security 2005 |
| 60 | EE | Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani P. Roychowdhury:
A Proof of the Security of Quantum Key Distribution
CoRR abs/quant-ph/0511175: (2005) |
| 59 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology 18(4): 291-311 (2005) |
| 2004 |
| 58 | EE | Eli Biham,
Rafi Chen:
Near-Collisions of SHA-0.
CRYPTO 2004: 290-305 |
| 57 | EE | Eli Biham,
Gilles Brassard,
Dan Kenigsberg,
Tal Mor:
Quantum computing without entanglement.
Theor. Comput. Sci. 320(1): 15-33 (2004) |
| 2003 |
| 56 | | Eli Biham:
Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings
Springer 2003 |
| 55 | EE | Elad Barkan,
Eli Biham,
Nathan Keller:
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
CRYPTO 2003: 600-616 |
| 54 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Rectangle Attacks on 49-Round SHACAL-1.
FSE 2003: 22-35 |
| 53 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Differential-Linear Cryptanalysis of Serpent.
FSE 2003: 9-21 |
| 2002 |
| 52 | EE | Elad Barkan,
Eli Biham:
In How Many Ways Can You Write Rijndael?
ASIACRYPT 2002: 160-175 |
| 51 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Enhancing Differential-Linear Cryptanalysis.
ASIACRYPT 2002: 254-266 |
| 50 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
New Results on Boomerang and Rectangle Attacks.
FSE 2002: 1-16 |
| 49 | EE | Eli Biham,
Michel Boyer,
Gilles Brassard,
Jeroen van de Graaf,
Tal Mor:
Security of Quantum Key Distribution against All Collective Attacks.
Algorithmica 34(4): 372-388 (2002) |
| 48 | EE | Eli Biham:
How to decrypt or even substitute DES-encrypted messages in 228 steps.
Inf. Process. Lett. 84(3): 117-124 (2002) |
| 47 | EE | Eli Biham,
Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode.
J. Cryptology 15(1): 47-59 (2002) |
| 2001 |
| 46 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
The Rectangle Attack - Rectangling the Serpent.
EUROCRYPT 2001: 340-357 |
| 45 | EE | Eli Biham,
Orr Dunkelman,
Nathan Keller:
Linear Cryptanalysis of Reduced Round Serpent.
FSE 2001: 16-27 |
| 44 | EE | Eli Biham,
Vladimir Furman,
Michal Misztal,
Vincent Rijmen:
Differential Cryptanalysis of Q.
FSE 2001: 174-186 |
| 43 | | Roy Friedman,
Eli Biham,
Ayal Itzkovitz,
Assaf Schuster:
Symphony: An Infrastructure for Managing Virtual Servers.
Cluster Computing 4(3): 221-233 (2001) |
| 2000 |
| 42 | | Eli Biham,
Vladimir Furman:
Impossible Differential on 8-Round MARS' Core.
AES Candidate Conference 2000: 186-194 |
| 41 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
The Case for Serpent.
AES Candidate Conference 2000: 349-354 |
| 40 | EE | Eli Biham:
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R).
EUROCRYPT 2000: 408-416 |
| 39 | EE | Eli Biham,
Orr Dunkelman:
Cryptanalysis of the A5/1 GSM Stream Cipher.
INDOCRYPT 2000: 43-51 |
| 38 | EE | Eli Biham,
Vladimir Furman:
Improved Impossible Differentials on Twofish.
INDOCRYPT 2000: 80-92 |
| 37 | EE | Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani P. Roychowdhury:
A proof of the security of quantum key distribution (extended abstract).
STOC 2000: 715-724 |
| 1999 |
| 36 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
EUROCRYPT 1999: 12-23 |
| 35 | EE | Roy Friedman,
Assaf Schuster,
Ayal Itzkovitz,
Eli Biham,
Erez Hadad,
Vladislav Kalinovsky,
Sergey Kleyman,
Roman Vitenberg:
Symphony: Managing Virtual Servers in the Global Village.
Euro-Par 1999: 777-784 |
| 34 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu.
FSE 1999: 124-138 |
| 33 | EE | Eli Biham,
Dan Boneh,
Omer Reingold:
Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring.
Inf. Process. Lett. 70(2): 83-87 (1999) |
| 32 | EE | Eli Biham:
Cryptanalysis of Triple Modes of Operation.
J. Cryptology 12(3): 161-184 (1999) |
| 1998 |
| 31 | | Eli Biham,
Amichai Shulman:
User-Defined Divisibility of Ecash and a Practical Implementation.
CARDIS 1998: 1-18 |
| 30 | | Ross J. Anderson,
Eli Biham,
Lars R. Knudsen:
Serpent and Smartcards.
CARDIS 1998: 246-253 |
| 29 | EE | Eli Biham,
Lars R. Knudsen:
Cryptanalysis of the ANSI X9.52 CBCM Mode.
EUROCRYPT 1998: 100-111 |
| 28 | EE | Eli Biham,
Ross J. Anderson,
Lars R. Knudsen:
Serpent: A New Block Cipher Proposal.
FSE 1998: 222-238 |
| 27 | EE | David Biron,
Ofer Biham,
Eli Biham,
Markus Grassl,
Daniel A. Lidar:
Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution.
QCQC 1998: 140-147 |
| 26 | EE | Eli Biham,
Alex Biryukov,
Orr Dunkelman,
Eran Richardson,
Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Selected Areas in Cryptography 1998: 362-376 |
| 25 | EE | Eli Biham:
Cryptanalysis of Multiple Modes of Operation.
J. Cryptology 11(1): 45-58 (1998) |
| 1997 |
| 24 | | Eli Biham:
Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings
Springer 1997 |
| 23 | EE | Eli Biham,
Adi Shamir:
Differential Fault Analysis of Secret Key Cryptosystems.
CRYPTO 1997: 513-525 |
| 22 | EE | Eli Biham:
Cryptanalysis of Ladder-DES.
FSE 1997: 134-138 |
| 21 | EE | Eli Biham:
A Fast New DES Implementation in Software.
FSE 1997: 260-272 |
| 20 | EE | Eli Biham,
Dan Boneh,
Omer Reingold:
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997) |
| 19 | | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
J. Cryptology 10(3): 195-206 (1997) |
| 1996 |
| 18 | | Ross J. Anderson,
Eli Biham:
Two Practical and Provably Secure Block Ciphers: BEARS and LION.
FSE 1996: 113-120 |
| 17 | | Ross J. Anderson,
Eli Biham:
TIGER: A Fast New Hash Function.
FSE 1996: 89-97 |
| 16 | | Ishai Ben-Aroya,
Eli Biham:
Differential Cryptanalysis of Lucifer.
J. Cryptology 9(1): 21-34 (1996) |
| 1994 |
| 15 | | Eli Biham:
Cryptanalysis of Multiple Modes of Operation.
ASIACRYPT 1994: 278-292 |
| 14 | | Eli Biham,
Alex Biryukov:
How to Strengthen DES Using Existing Hardware.
ASIACRYPT 1994: 398-412 |
| 13 | EE | Eli Biham:
On Matsui's Linear Cryptanalysis.
EUROCRYPT 1994: 341-355 |
| 12 | EE | Eli Biham,
Alex Biryukov:
An Improvement of Davies' Attack on DES.
EUROCRYPT 1994: 461-467 |
| 11 | | Eli Biham,
Paul C. Kocher:
A Known Plaintext Attack on the PKZIP Stream Cipher.
FSE 1994: 144-153 |
| 10 | | Eli Biham:
New Types of Cryptanalytic Attacks Using Related Keys.
J. Cryptology 7(4): 229-246 (1994) |
| 1993 |
| 9 | EE | Ishai Ben-Aroya,
Eli Biham:
Differtial Cryptanalysis of Lucifer.
CRYPTO 1993: 187-199 |
| 8 | EE | Eli Biham:
New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract).
EUROCRYPT 1993: 398-409 |
| 7 | | Eli Biham:
On Modes of Operation.
FSE 1993: 116-120 |
| 1992 |
| 6 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of the Full 16-Round DES.
CRYPTO 1992: 487-496 |
| 1991 |
| 5 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
CRYPTO 1991: 156-171 |
| 4 | EE | Eli Biham,
Adi Shamir:
Differential Cryptoanalysis of Feal and N-Hash.
EUROCRYPT 1991: 1-16 |
| 3 | EE | Eli Biham:
Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91.
EUROCRYPT 1991: 532-534 |
| 2 | | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
J. Cryptology 4(1): 3-72 (1991) |
| 1990 |
| 1 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
CRYPTO 1990: 2-21 |