2008 | ||
---|---|---|
85 | Eli Biham, Yaniv Carmeli, Adi Shamir: Bug Attacks. CRYPTO 2008: 221-240 | |
84 | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel: A Practical Attack on KeeLoq. EUROCRYPT 2008: 1-18 | |
83 | Eli Biham, Yaniv Carmeli: Efficient Reconstruction of RC4 Keys from Internal States. FSE 2008: 270-288 | |
82 | Eli Biham: New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. FSE 2008: 444-461 | |
81 | Eli Biham, Orr Dunkelman, Nathan Keller: A Unified Approach to Related-Key Attacks. FSE 2008: 73-96 | |
80 | Eli Biham, Yaron J. Goren, Yuval Ishai: Basing Weak Public-Key Cryptography on Strong One-Way Functions. TCC 2008: 55-72 | |
79 | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptology 21(3): 392-429 (2008) | |
2007 | ||
78 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
77 | Eli Biham, Amr M. Youssef: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers Springer 2007 | |
76 | Eli Biham, Orr Dunkelman, Nathan Keller: A Simple Related-Key Attack on the Full SHACAL-1. CT-RSA 2007: 20-30 | |
75 | Eli Biham, Orr Dunkelman, Nathan Keller: Improved Slide Attacks. FSE 2007: 153-166 | |
74 | Eli Biham, Orr Dunkelman, Nathan Keller: A New Attack on 6-Round IDEA. FSE 2007: 211-224 | |
73 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
72 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
2006 | ||
71 | Eli Biham, Orr Dunkelman, Nathan Keller: New Cryptanalytic Results on IDEA. ASIACRYPT 2006: 412-427 | |
70 | Elad Barkan, Eli Biham, Adi Shamir: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21 | |
69 | Eli Biham, Orr Dunkelman, Nathan Keller: Related-Key Impossible Differential Attacks on 8-Round AES-192. CT-RSA 2006: 21-33 | |
68 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution. J. Cryptology 19(4): 381-439 (2006) | |
2005 | ||
67 | Eli Biham, Orr Dunkelman, Nathan Keller: A Related-Key Rectangle Attack on the Full KASUMI. ASIACRYPT 2005: 443-461 | |
66 | Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby: Collisions of SHA-0 and Reduced SHA-1. EUROCRYPT 2005: 36-57 | |
65 | Eli Biham, Orr Dunkelman, Nathan Keller: Related-Key Boomerang and Rectangle Attacks. EUROCRYPT 2005: 507-525 | |
64 | Eli Biham, Orr Dunkelman, Nathan Keller: New Combined Attacks on Block Ciphers. FSE 2005: 126-144 | |
63 | Eli Biham, Louis Granboulan, Phong Q. Nguyen: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. FSE 2005: 359-367 | |
62 | Elad Barkan, Eli Biham: Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 2005: 1-19 | |
61 | Eli Biham: Differential Cryptanalysis. Encyclopedia of Cryptography and Security 2005 | |
60 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution CoRR abs/quant-ph/0511175: (2005) | |
59 | Eli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptology 18(4): 291-311 (2005) | |
2004 | ||
58 | Eli Biham, Rafi Chen: Near-Collisions of SHA-0. CRYPTO 2004: 290-305 | |
57 | Eli Biham, Gilles Brassard, Dan Kenigsberg, Tal Mor: Quantum computing without entanglement. Theor. Comput. Sci. 320(1): 15-33 (2004) | |
2003 | ||
56 | Eli Biham: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings Springer 2003 | |
55 | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. CRYPTO 2003: 600-616 | |
54 | Eli Biham, Orr Dunkelman, Nathan Keller: Rectangle Attacks on 49-Round SHACAL-1. FSE 2003: 22-35 | |
53 | Eli Biham, Orr Dunkelman, Nathan Keller: Differential-Linear Cryptanalysis of Serpent. FSE 2003: 9-21 | |
2002 | ||
52 | Elad Barkan, Eli Biham: In How Many Ways Can You Write Rijndael? ASIACRYPT 2002: 160-175 | |
51 | Eli Biham, Orr Dunkelman, Nathan Keller: Enhancing Differential-Linear Cryptanalysis. ASIACRYPT 2002: 254-266 | |
50 | Eli Biham, Orr Dunkelman, Nathan Keller: New Results on Boomerang and Rectangle Attacks. FSE 2002: 1-16 | |
49 | Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor: Security of Quantum Key Distribution against All Collective Attacks. Algorithmica 34(4): 372-388 (2002) | |
48 | Eli Biham: How to decrypt or even substitute DES-encrypted messages in 228 steps. Inf. Process. Lett. 84(3): 117-124 (2002) | |
47 | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptology 15(1): 47-59 (2002) | |
2001 | ||
46 | Eli Biham, Orr Dunkelman, Nathan Keller: The Rectangle Attack - Rectangling the Serpent. EUROCRYPT 2001: 340-357 | |
45 | Eli Biham, Orr Dunkelman, Nathan Keller: Linear Cryptanalysis of Reduced Round Serpent. FSE 2001: 16-27 | |
44 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186 | |
43 | Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster: Symphony: An Infrastructure for Managing Virtual Servers. Cluster Computing 4(3): 221-233 (2001) | |
2000 | ||
42 | Eli Biham, Vladimir Furman: Impossible Differential on 8-Round MARS' Core. AES Candidate Conference 2000: 186-194 | |
41 | Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354 | |
40 | Eli Biham: Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). EUROCRYPT 2000: 408-416 | |
39 | Eli Biham, Orr Dunkelman: Cryptanalysis of the A5/1 GSM Stream Cipher. INDOCRYPT 2000: 43-51 | |
38 | Eli Biham, Vladimir Furman: Improved Impossible Differentials on Twofish. INDOCRYPT 2000: 80-92 | |
37 | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A proof of the security of quantum key distribution (extended abstract). STOC 2000: 715-724 | |
1999 | ||
36 | Eli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23 | |
35 | Roy Friedman, Assaf Schuster, Ayal Itzkovitz, Eli Biham, Erez Hadad, Vladislav Kalinovsky, Sergey Kleyman, Roman Vitenberg: Symphony: Managing Virtual Servers in the Global Village. Euro-Par 1999: 777-784 | |
34 | Eli Biham, Alex Biryukov, Adi Shamir: Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138 | |
33 | Eli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999) | |
32 | Eli Biham: Cryptanalysis of Triple Modes of Operation. J. Cryptology 12(3): 161-184 (1999) | |
1998 | ||
31 | Eli Biham, Amichai Shulman: User-Defined Divisibility of Ecash and a Practical Implementation. CARDIS 1998: 1-18 | |
30 | Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253 | |
29 | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111 | |
28 | Eli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 | |
27 | David Biron, Ofer Biham, Eli Biham, Markus Grassl, Daniel A. Lidar: Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution. QCQC 1998: 140-147 | |
26 | Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir: Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376 | |
25 | Eli Biham: Cryptanalysis of Multiple Modes of Operation. J. Cryptology 11(1): 45-58 (1998) | |
1997 | ||
24 | Eli Biham: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings Springer 1997 | |
23 | Eli Biham, Adi Shamir: Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997: 513-525 | |
22 | Eli Biham: Cryptanalysis of Ladder-DES. FSE 1997: 134-138 | |
21 | Eli Biham: A Fast New DES Implementation in Software. FSE 1997: 260-272 | |
20 | Eli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997) | |
19 | Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. J. Cryptology 10(3): 195-206 (1997) | |
1996 | ||
18 | Ross J. Anderson, Eli Biham: Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996: 113-120 | |
17 | Ross J. Anderson, Eli Biham: TIGER: A Fast New Hash Function. FSE 1996: 89-97 | |
16 | Ishai Ben-Aroya, Eli Biham: Differential Cryptanalysis of Lucifer. J. Cryptology 9(1): 21-34 (1996) | |
1994 | ||
15 | Eli Biham: Cryptanalysis of Multiple Modes of Operation. ASIACRYPT 1994: 278-292 | |
14 | Eli Biham, Alex Biryukov: How to Strengthen DES Using Existing Hardware. ASIACRYPT 1994: 398-412 | |
13 | Eli Biham: On Matsui's Linear Cryptanalysis. EUROCRYPT 1994: 341-355 | |
12 | Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. EUROCRYPT 1994: 461-467 | |
11 | Eli Biham, Paul C. Kocher: A Known Plaintext Attack on the PKZIP Stream Cipher. FSE 1994: 144-153 | |
10 | Eli Biham: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4): 229-246 (1994) | |
1993 | ||
9 | Ishai Ben-Aroya, Eli Biham: Differtial Cryptanalysis of Lucifer. CRYPTO 1993: 187-199 | |
8 | Eli Biham: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). EUROCRYPT 1993: 398-409 | |
7 | Eli Biham: On Modes of Operation. FSE 1993: 116-120 | |
1992 | ||
6 | Eli Biham, Adi Shamir: Differential Cryptanalysis of the Full 16-Round DES. CRYPTO 1992: 487-496 | |
1991 | ||
5 | Eli Biham, Adi Shamir: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. CRYPTO 1991: 156-171 | |
4 | Eli Biham, Adi Shamir: Differential Cryptoanalysis of Feal and N-Hash. EUROCRYPT 1991: 1-16 | |
3 | Eli Biham: Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. EUROCRYPT 1991: 532-534 | |
2 | Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(1): 3-72 (1991) | |
1990 | ||
1 | Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. CRYPTO 1990: 2-21 |