| 2008 | ||
|---|---|---|
| 85 | Eli Biham, Yaniv Carmeli, Adi Shamir: Bug Attacks. CRYPTO 2008: 221-240 | |
| 84 | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel: A Practical Attack on KeeLoq. EUROCRYPT 2008: 1-18 | |
| 83 | Eli Biham, Yaniv Carmeli: Efficient Reconstruction of RC4 Keys from Internal States. FSE 2008: 270-288 | |
| 82 | Eli Biham: New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. FSE 2008: 444-461 | |
| 81 | Eli Biham, Orr Dunkelman, Nathan Keller: A Unified Approach to Related-Key Attacks. FSE 2008: 73-96 | |
| 80 | Eli Biham, Yaron J. Goren, Yuval Ishai: Basing Weak Public-Key Cryptography on Strong One-Way Functions. TCC 2008: 55-72 | |
| 79 | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptology 21(3): 392-429 (2008) | |
| 2007 | ||
| 78 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
| 77 | Eli Biham, Amr M. Youssef: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers Springer 2007 | |
| 76 | Eli Biham, Orr Dunkelman, Nathan Keller: A Simple Related-Key Attack on the Full SHACAL-1. CT-RSA 2007: 20-30 | |
| 75 | Eli Biham, Orr Dunkelman, Nathan Keller: Improved Slide Attacks. FSE 2007: 153-166 | |
| 74 | Eli Biham, Orr Dunkelman, Nathan Keller: A New Attack on 6-Round IDEA. FSE 2007: 211-224 | |
| 73 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
| 72 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
| 2006 | ||
| 71 | Eli Biham, Orr Dunkelman, Nathan Keller: New Cryptanalytic Results on IDEA. ASIACRYPT 2006: 412-427 | |
| 70 | Elad Barkan, Eli Biham, Adi Shamir: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21 | |
| 69 | Eli Biham, Orr Dunkelman, Nathan Keller: Related-Key Impossible Differential Attacks on 8-Round AES-192. CT-RSA 2006: 21-33 | |
| 68 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution. J. Cryptology 19(4): 381-439 (2006) | |
| 2005 | ||
| 67 | Eli Biham, Orr Dunkelman, Nathan Keller: A Related-Key Rectangle Attack on the Full KASUMI. ASIACRYPT 2005: 443-461 | |
| 66 | Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby: Collisions of SHA-0 and Reduced SHA-1. EUROCRYPT 2005: 36-57 | |
| 65 | Eli Biham, Orr Dunkelman, Nathan Keller: Related-Key Boomerang and Rectangle Attacks. EUROCRYPT 2005: 507-525 | |
| 64 | Eli Biham, Orr Dunkelman, Nathan Keller: New Combined Attacks on Block Ciphers. FSE 2005: 126-144 | |
| 63 | Eli Biham, Louis Granboulan, Phong Q. Nguyen: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. FSE 2005: 359-367 | |
| 62 | Elad Barkan, Eli Biham: Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 2005: 1-19 | |
| 61 | Eli Biham: Differential Cryptanalysis. Encyclopedia of Cryptography and Security 2005 | |
| 60 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution CoRR abs/quant-ph/0511175: (2005) | |
| 59 | Eli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptology 18(4): 291-311 (2005) | |
| 2004 | ||
| 58 | Eli Biham, Rafi Chen: Near-Collisions of SHA-0. CRYPTO 2004: 290-305 | |
| 57 | Eli Biham, Gilles Brassard, Dan Kenigsberg, Tal Mor: Quantum computing without entanglement. Theor. Comput. Sci. 320(1): 15-33 (2004) | |
| 2003 | ||
| 56 | Eli Biham: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings Springer 2003 | |
| 55 | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. CRYPTO 2003: 600-616 | |
| 54 | Eli Biham, Orr Dunkelman, Nathan Keller: Rectangle Attacks on 49-Round SHACAL-1. FSE 2003: 22-35 | |
| 53 | Eli Biham, Orr Dunkelman, Nathan Keller: Differential-Linear Cryptanalysis of Serpent. FSE 2003: 9-21 | |
| 2002 | ||
| 52 | Elad Barkan, Eli Biham: In How Many Ways Can You Write Rijndael? ASIACRYPT 2002: 160-175 | |
| 51 | Eli Biham, Orr Dunkelman, Nathan Keller: Enhancing Differential-Linear Cryptanalysis. ASIACRYPT 2002: 254-266 | |
| 50 | Eli Biham, Orr Dunkelman, Nathan Keller: New Results on Boomerang and Rectangle Attacks. FSE 2002: 1-16 | |
| 49 | Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor: Security of Quantum Key Distribution against All Collective Attacks. Algorithmica 34(4): 372-388 (2002) | |
| 48 | Eli Biham: How to decrypt or even substitute DES-encrypted messages in 228 steps. Inf. Process. Lett. 84(3): 117-124 (2002) | |
| 47 | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptology 15(1): 47-59 (2002) | |
| 2001 | ||
| 46 | Eli Biham, Orr Dunkelman, Nathan Keller: The Rectangle Attack - Rectangling the Serpent. EUROCRYPT 2001: 340-357 | |
| 45 | Eli Biham, Orr Dunkelman, Nathan Keller: Linear Cryptanalysis of Reduced Round Serpent. FSE 2001: 16-27 | |
| 44 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186 | |
| 43 | Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster: Symphony: An Infrastructure for Managing Virtual Servers. Cluster Computing 4(3): 221-233 (2001) | |
| 2000 | ||
| 42 | Eli Biham, Vladimir Furman: Impossible Differential on 8-Round MARS' Core. AES Candidate Conference 2000: 186-194 | |
| 41 | Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354 | |
| 40 | Eli Biham: Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). EUROCRYPT 2000: 408-416 | |
| 39 | Eli Biham, Orr Dunkelman: Cryptanalysis of the A5/1 GSM Stream Cipher. INDOCRYPT 2000: 43-51 | |
| 38 | Eli Biham, Vladimir Furman: Improved Impossible Differentials on Twofish. INDOCRYPT 2000: 80-92 | |
| 37 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A proof of the security of quantum key distribution (extended abstract). STOC 2000: 715-724 | |
| 1999 | ||
| 36 | Eli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23 | |
| 35 | Roy Friedman, Assaf Schuster, Ayal Itzkovitz, Eli Biham, Erez Hadad, Vladislav Kalinovsky, Sergey Kleyman, Roman Vitenberg: Symphony: Managing Virtual Servers in the Global Village. Euro-Par 1999: 777-784 | |
| 34 | Eli Biham, Alex Biryukov, Adi Shamir: Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138 | |
| 33 | Eli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999) | |
| 32 | Eli Biham: Cryptanalysis of Triple Modes of Operation. J. Cryptology 12(3): 161-184 (1999) | |
| 1998 | ||
| 31 | Eli Biham, Amichai Shulman: User-Defined Divisibility of Ecash and a Practical Implementation. CARDIS 1998: 1-18 | |
| 30 | Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253 | |
| 29 | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111 | |
| 28 | Eli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 | |
| 27 | David Biron, Ofer Biham, Eli Biham, Markus Grassl, Daniel A. Lidar: Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution. QCQC 1998: 140-147 | |
| 26 | Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir: Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376 | |
| 25 | Eli Biham: Cryptanalysis of Multiple Modes of Operation. J. Cryptology 11(1): 45-58 (1998) | |
| 1997 | ||
| 24 | Eli Biham: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings Springer 1997 | |
| 23 | Eli Biham, Adi Shamir: Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997: 513-525 | |
| 22 | Eli Biham: Cryptanalysis of Ladder-DES. FSE 1997: 134-138 | |
| 21 | Eli Biham: A Fast New DES Implementation in Software. FSE 1997: 260-272 | |
| 20 | Eli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997) | |
| 19 | Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. J. Cryptology 10(3): 195-206 (1997) | |
| 1996 | ||
| 18 | Ross J. Anderson, Eli Biham: Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996: 113-120 | |
| 17 | Ross J. Anderson, Eli Biham: TIGER: A Fast New Hash Function. FSE 1996: 89-97 | |
| 16 | Ishai Ben-Aroya, Eli Biham: Differential Cryptanalysis of Lucifer. J. Cryptology 9(1): 21-34 (1996) | |
| 1994 | ||
| 15 | Eli Biham: Cryptanalysis of Multiple Modes of Operation. ASIACRYPT 1994: 278-292 | |
| 14 | Eli Biham, Alex Biryukov: How to Strengthen DES Using Existing Hardware. ASIACRYPT 1994: 398-412 | |
| 13 | Eli Biham: On Matsui's Linear Cryptanalysis. EUROCRYPT 1994: 341-355 | |
| 12 | Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. EUROCRYPT 1994: 461-467 | |
| 11 | Eli Biham, Paul C. Kocher: A Known Plaintext Attack on the PKZIP Stream Cipher. FSE 1994: 144-153 | |
| 10 | Eli Biham: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4): 229-246 (1994) | |
| 1993 | ||
| 9 | Ishai Ben-Aroya, Eli Biham: Differtial Cryptanalysis of Lucifer. CRYPTO 1993: 187-199 | |
| 8 | Eli Biham: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). EUROCRYPT 1993: 398-409 | |
| 7 | Eli Biham: On Modes of Operation. FSE 1993: 116-120 | |
| 1992 | ||
| 6 | Eli Biham, Adi Shamir: Differential Cryptanalysis of the Full 16-Round DES. CRYPTO 1992: 487-496 | |
| 1991 | ||
| 5 | Eli Biham, Adi Shamir: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. CRYPTO 1991: 156-171 | |
| 4 | Eli Biham, Adi Shamir: Differential Cryptoanalysis of Feal and N-Hash. EUROCRYPT 1991: 1-16 | |
| 3 | Eli Biham: Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. EUROCRYPT 1991: 532-534 | |
| 2 | Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(1): 3-72 (1991) | |
| 1990 | ||
| 1 | Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. CRYPTO 1990: 2-21 | |