![]() | 2008 | |
---|---|---|
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Yaniv Carmeli, Adi Shamir: Bug Attacks. CRYPTO 2008: 221-240 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel: A Practical Attack on KeeLoq. EUROCRYPT 2008: 1-18 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Yaniv Carmeli: Efficient Reconstruction of RC4 Keys from Internal States. FSE 2008: 270-288 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. FSE 2008: 444-461 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: A Unified Approach to Related-Key Attacks. FSE 2008: 73-96 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Yaron J. Goren, Yuval Ishai: Basing Weak Public-Key Cryptography on Strong One-Way Functions. TCC 2008: 55-72 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptology 21(3): 392-429 (2008) |
2007 | ||
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Amr M. Youssef: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers Springer 2007 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: A Simple Related-Key Attack on the Full SHACAL-1. CT-RSA 2007: 20-30 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Improved Slide Attacks. FSE 2007: 153-166 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: A New Attack on 6-Round IDEA. FSE 2007: 211-224 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 |
2006 | ||
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: New Cryptanalytic Results on IDEA. ASIACRYPT 2006: 412-427 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Elad Barkan, Eli Biham, Adi Shamir: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Related-Key Impossible Differential Attacks on 8-Round AES-192. CT-RSA 2006: 21-33 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution. J. Cryptology 19(4): 381-439 (2006) |
2005 | ||
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: A Related-Key Rectangle Attack on the Full KASUMI. ASIACRYPT 2005: 443-461 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby: Collisions of SHA-0 and Reduced SHA-1. EUROCRYPT 2005: 36-57 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Related-Key Boomerang and Rectangle Attacks. EUROCRYPT 2005: 507-525 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: New Combined Attacks on Block Ciphers. FSE 2005: 126-144 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Louis Granboulan, Phong Q. Nguyen: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. FSE 2005: 359-367 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Elad Barkan, Eli Biham: Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 2005: 1-19 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Differential Cryptanalysis. Encyclopedia of Cryptography and Security 2005 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution CoRR abs/quant-ph/0511175: (2005) |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptology 18(4): 291-311 (2005) |
2004 | ||
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Rafi Chen: Near-Collisions of SHA-0. CRYPTO 2004: 290-305 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Gilles Brassard, Dan Kenigsberg, Tal Mor: Quantum computing without entanglement. Theor. Comput. Sci. 320(1): 15-33 (2004) |
2003 | ||
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings Springer 2003 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Elad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. CRYPTO 2003: 600-616 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Rectangle Attacks on 49-Round SHACAL-1. FSE 2003: 22-35 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Differential-Linear Cryptanalysis of Serpent. FSE 2003: 9-21 |
2002 | ||
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Elad Barkan, Eli Biham: In How Many Ways Can You Write Rijndael? ASIACRYPT 2002: 160-175 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Enhancing Differential-Linear Cryptanalysis. ASIACRYPT 2002: 254-266 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: New Results on Boomerang and Rectangle Attacks. FSE 2002: 1-16 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor: Security of Quantum Key Distribution against All Collective Attacks. Algorithmica 34(4): 372-388 (2002) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: How to decrypt or even substitute DES-encrypted messages in 228 steps. Inf. Process. Lett. 84(3): 117-124 (2002) |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptology 15(1): 47-59 (2002) |
2001 | ||
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: The Rectangle Attack - Rectangling the Serpent. EUROCRYPT 2001: 340-357 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman, Nathan Keller: Linear Cryptanalysis of Reduced Round Serpent. FSE 2001: 16-27 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster: Symphony: An Infrastructure for Managing Virtual Servers. Cluster Computing 4(3): 221-233 (2001) |
2000 | ||
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Vladimir Furman: Impossible Differential on 8-Round MARS' Core. AES Candidate Conference 2000: 186-194 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). EUROCRYPT 2000: 408-416 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Orr Dunkelman: Cryptanalysis of the A5/1 GSM Stream Cipher. INDOCRYPT 2000: 43-51 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Vladimir Furman: Improved Impossible Differentials on Twofish. INDOCRYPT 2000: 80-92 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A proof of the security of quantum key distribution (extended abstract). STOC 2000: 715-724 |
1999 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Roy Friedman, Assaf Schuster, Ayal Itzkovitz, Eli Biham, Erez Hadad, Vladislav Kalinovsky, Sergey Kleyman, Roman Vitenberg: Symphony: Managing Virtual Servers in the Global Village. Euro-Par 1999: 777-784 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov, Adi Shamir: Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999) |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Cryptanalysis of Triple Modes of Operation. J. Cryptology 12(3): 161-184 (1999) |
1998 | ||
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Amichai Shulman: User-Defined Divisibility of Ecash and a Practical Implementation. CARDIS 1998: 1-18 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | David Biron, Ofer Biham, Eli Biham, Markus Grassl, Daniel A. Lidar: Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution. QCQC 1998: 140-147 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir: Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Cryptanalysis of Multiple Modes of Operation. J. Cryptology 11(1): 45-58 (1998) |
1997 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings Springer 1997 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Adi Shamir: Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997: 513-525 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Cryptanalysis of Ladder-DES. FSE 1997: 134-138 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: A Fast New DES Implementation in Software. FSE 1997: 260-272 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997) |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. J. Cryptology 10(3): 195-206 (1997) |
1996 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Ross J. Anderson, Eli Biham: Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996: 113-120 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Ross J. Anderson, Eli Biham: TIGER: A Fast New Hash Function. FSE 1996: 89-97 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Ishai Ben-Aroya, Eli Biham: Differential Cryptanalysis of Lucifer. J. Cryptology 9(1): 21-34 (1996) |
1994 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Cryptanalysis of Multiple Modes of Operation. ASIACRYPT 1994: 278-292 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov: How to Strengthen DES Using Existing Hardware. ASIACRYPT 1994: 398-412 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: On Matsui's Linear Cryptanalysis. EUROCRYPT 1994: 341-355 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. EUROCRYPT 1994: 461-467 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Paul C. Kocher: A Known Plaintext Attack on the PKZIP Stream Cipher. FSE 1994: 144-153 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4): 229-246 (1994) |
1993 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Ishai Ben-Aroya, Eli Biham: Differtial Cryptanalysis of Lucifer. CRYPTO 1993: 187-199 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). EUROCRYPT 1993: 398-409 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: On Modes of Operation. FSE 1993: 116-120 |
1992 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Adi Shamir: Differential Cryptanalysis of the Full 16-Round DES. CRYPTO 1992: 487-496 |
1991 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Adi Shamir: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. CRYPTO 1991: 156-171 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Adi Shamir: Differential Cryptoanalysis of Feal and N-Hash. EUROCRYPT 1991: 1-16 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham: Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. EUROCRYPT 1991: 532-534 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(1): 3-72 (1991) |
1990 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. CRYPTO 1990: 2-21 |