dblp.uni-trier.dewww.uni-trier.de

Eli Biham Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2008
85EEEli Biham, Yaniv Carmeli, Adi Shamir: Bug Attacks. CRYPTO 2008: 221-240
84EESebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel: A Practical Attack on KeeLoq. EUROCRYPT 2008: 1-18
83EEEli Biham, Yaniv Carmeli: Efficient Reconstruction of RC4 Keys from Internal States. FSE 2008: 270-288
82EEEli Biham: New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. FSE 2008: 444-461
81EEEli Biham, Orr Dunkelman, Nathan Keller: A Unified Approach to Related-Key Attacks. FSE 2008: 73-96
80EEEli Biham, Yaron J. Goren, Yuval Ishai: Basing Weak Public-Key Cryptography on Strong One-Way Functions. TCC 2008: 55-72
79EEElad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. J. Cryptology 21(3): 392-429 (2008)
2007
78 Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007
77 Eli Biham, Amr M. Youssef: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers Springer 2007
76EEEli Biham, Orr Dunkelman, Nathan Keller: A Simple Related-Key Attack on the Full SHACAL-1. CT-RSA 2007: 20-30
75EEEli Biham, Orr Dunkelman, Nathan Keller: Improved Slide Attacks. FSE 2007: 153-166
74EEEli Biham, Orr Dunkelman, Nathan Keller: A New Attack on 6-Round IDEA. FSE 2007: 211-224
73EEEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007
72EEEli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007
2006
71EEEli Biham, Orr Dunkelman, Nathan Keller: New Cryptanalytic Results on IDEA. ASIACRYPT 2006: 412-427
70EEElad Barkan, Eli Biham, Adi Shamir: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21
69EEEli Biham, Orr Dunkelman, Nathan Keller: Related-Key Impossible Differential Attacks on 8-Round AES-192. CT-RSA 2006: 21-33
68EEEli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution. J. Cryptology 19(4): 381-439 (2006)
2005
67EEEli Biham, Orr Dunkelman, Nathan Keller: A Related-Key Rectangle Attack on the Full KASUMI. ASIACRYPT 2005: 443-461
66EEEli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby: Collisions of SHA-0 and Reduced SHA-1. EUROCRYPT 2005: 36-57
65EEEli Biham, Orr Dunkelman, Nathan Keller: Related-Key Boomerang and Rectangle Attacks. EUROCRYPT 2005: 507-525
64EEEli Biham, Orr Dunkelman, Nathan Keller: New Combined Attacks on Block Ciphers. FSE 2005: 126-144
63EEEli Biham, Louis Granboulan, Phong Q. Nguyen: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. FSE 2005: 359-367
62EEElad Barkan, Eli Biham: Conditional Estimators: An Effective Attack on A5/1. Selected Areas in Cryptography 2005: 1-19
61EEEli Biham: Differential Cryptanalysis. Encyclopedia of Cryptography and Security 2005
60EEEli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A Proof of the Security of Quantum Key Distribution CoRR abs/quant-ph/0511175: (2005)
59EEEli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptology 18(4): 291-311 (2005)
2004
58EEEli Biham, Rafi Chen: Near-Collisions of SHA-0. CRYPTO 2004: 290-305
57EEEli Biham, Gilles Brassard, Dan Kenigsberg, Tal Mor: Quantum computing without entanglement. Theor. Comput. Sci. 320(1): 15-33 (2004)
2003
56 Eli Biham: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings Springer 2003
55EEElad Barkan, Eli Biham, Nathan Keller: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. CRYPTO 2003: 600-616
54EEEli Biham, Orr Dunkelman, Nathan Keller: Rectangle Attacks on 49-Round SHACAL-1. FSE 2003: 22-35
53EEEli Biham, Orr Dunkelman, Nathan Keller: Differential-Linear Cryptanalysis of Serpent. FSE 2003: 9-21
2002
52EEElad Barkan, Eli Biham: In How Many Ways Can You Write Rijndael? ASIACRYPT 2002: 160-175
51EEEli Biham, Orr Dunkelman, Nathan Keller: Enhancing Differential-Linear Cryptanalysis. ASIACRYPT 2002: 254-266
50EEEli Biham, Orr Dunkelman, Nathan Keller: New Results on Boomerang and Rectangle Attacks. FSE 2002: 1-16
49EEEli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor: Security of Quantum Key Distribution against All Collective Attacks. Algorithmica 34(4): 372-388 (2002)
48EEEli Biham: How to decrypt or even substitute DES-encrypted messages in 228 steps. Inf. Process. Lett. 84(3): 117-124 (2002)
47EEEli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. J. Cryptology 15(1): 47-59 (2002)
2001
46EEEli Biham, Orr Dunkelman, Nathan Keller: The Rectangle Attack - Rectangling the Serpent. EUROCRYPT 2001: 340-357
45EEEli Biham, Orr Dunkelman, Nathan Keller: Linear Cryptanalysis of Reduced Round Serpent. FSE 2001: 16-27
44EEEli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186
43 Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster: Symphony: An Infrastructure for Managing Virtual Servers. Cluster Computing 4(3): 221-233 (2001)
2000
42 Eli Biham, Vladimir Furman: Impossible Differential on 8-Round MARS' Core. AES Candidate Conference 2000: 186-194
41 Ross J. Anderson, Eli Biham, Lars R. Knudsen: The Case for Serpent. AES Candidate Conference 2000: 349-354
40EEEli Biham: Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). EUROCRYPT 2000: 408-416
39EEEli Biham, Orr Dunkelman: Cryptanalysis of the A5/1 GSM Stream Cipher. INDOCRYPT 2000: 43-51
38EEEli Biham, Vladimir Furman: Improved Impossible Differentials on Twofish. INDOCRYPT 2000: 80-92
37EEEli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani P. Roychowdhury: A proof of the security of quantum key distribution (extended abstract). STOC 2000: 715-724
1999
36EEEli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23
35EERoy Friedman, Assaf Schuster, Ayal Itzkovitz, Eli Biham, Erez Hadad, Vladislav Kalinovsky, Sergey Kleyman, Roman Vitenberg: Symphony: Managing Virtual Servers in the Global Village. Euro-Par 1999: 777-784
34EEEli Biham, Alex Biryukov, Adi Shamir: Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138
33EEEli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999)
32EEEli Biham: Cryptanalysis of Triple Modes of Operation. J. Cryptology 12(3): 161-184 (1999)
1998
31 Eli Biham, Amichai Shulman: User-Defined Divisibility of Ecash and a Practical Implementation. CARDIS 1998: 1-18
30 Ross J. Anderson, Eli Biham, Lars R. Knudsen: Serpent and Smartcards. CARDIS 1998: 246-253
29EEEli Biham, Lars R. Knudsen: Cryptanalysis of the ANSI X9.52 CBCM Mode. EUROCRYPT 1998: 100-111
28EEEli Biham, Ross J. Anderson, Lars R. Knudsen: Serpent: A New Block Cipher Proposal. FSE 1998: 222-238
27EEDavid Biron, Ofer Biham, Eli Biham, Markus Grassl, Daniel A. Lidar: Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution. QCQC 1998: 140-147
26EEEli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir: Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376
25EEEli Biham: Cryptanalysis of Multiple Modes of Operation. J. Cryptology 11(1): 45-58 (1998)
1997
24 Eli Biham: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings Springer 1997
23EEEli Biham, Adi Shamir: Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997: 513-525
22EEEli Biham: Cryptanalysis of Ladder-DES. FSE 1997: 134-138
21EEEli Biham: A Fast New DES Implementation in Software. FSE 1997: 260-272
20EEEli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997)
19 Eli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. J. Cryptology 10(3): 195-206 (1997)
1996
18 Ross J. Anderson, Eli Biham: Two Practical and Provably Secure Block Ciphers: BEARS and LION. FSE 1996: 113-120
17 Ross J. Anderson, Eli Biham: TIGER: A Fast New Hash Function. FSE 1996: 89-97
16 Ishai Ben-Aroya, Eli Biham: Differential Cryptanalysis of Lucifer. J. Cryptology 9(1): 21-34 (1996)
1994
15EEEli Biham: Cryptanalysis of Multiple Modes of Operation. ASIACRYPT 1994: 278-292
14EEEli Biham, Alex Biryukov: How to Strengthen DES Using Existing Hardware. ASIACRYPT 1994: 398-412
13EEEli Biham: On Matsui's Linear Cryptanalysis. EUROCRYPT 1994: 341-355
12EEEli Biham, Alex Biryukov: An Improvement of Davies' Attack on DES. EUROCRYPT 1994: 461-467
11 Eli Biham, Paul C. Kocher: A Known Plaintext Attack on the PKZIP Stream Cipher. FSE 1994: 144-153
10 Eli Biham: New Types of Cryptanalytic Attacks Using Related Keys. J. Cryptology 7(4): 229-246 (1994)
1993
9EEIshai Ben-Aroya, Eli Biham: Differtial Cryptanalysis of Lucifer. CRYPTO 1993: 187-199
8EEEli Biham: New Types of Cryptoanalytic Attacks Using related Keys (Extended Abstract). EUROCRYPT 1993: 398-409
7 Eli Biham: On Modes of Operation. FSE 1993: 116-120
1992
6EEEli Biham, Adi Shamir: Differential Cryptanalysis of the Full 16-Round DES. CRYPTO 1992: 487-496
1991
5EEEli Biham, Adi Shamir: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. CRYPTO 1991: 156-171
4EEEli Biham, Adi Shamir: Differential Cryptoanalysis of Feal and N-Hash. EUROCRYPT 1991: 1-16
3EEEli Biham: Cryptoanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91. EUROCRYPT 1991: 532-534
2 Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(1): 3-72 (1991)
1990
1EEEli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. CRYPTO 1990: 2-21

Coauthor Index

1Ross J. Anderson [17] [18] [28] [30] [41]
2Elad Barkan [52] [55] [62] [70] [79]
3Ishai Ben-Aroya [9] [16]
4Ofer Biham [27]
5David Biron [27]
6Alex Biryukov [12] [14] [19] [26] [34] [36] [59]
7Dan Boneh [20] [33]
8Michel Boyer [37] [49] [60] [68]
9P. Oscar Boykin [37] [60] [68]
10Gilles Brassard [49] [57]
11Yaniv Carmeli [83] [85]
12Patrick Carribault [66]
13Rafi Chen [58] [66]
14Orr Dunkelman [26] [39] [45] [46] [50] [51] [53] [54] [64] [65] [67] [69] [71] [74] [75] [76] [81] [84]
15Roy Friedman [35] [43]
16Vladimir Furman [38] [42] [44]
17Yaron J. Goren [80]
18Jeroen van de Graaf [49]
19Louis Granboulan [63]
20Markus Grassl [27]
21Erez Hadad [35]
22Helena Handschuh [72] [73] [78]
23Sebastiaan Indesteege [84]
24Yuval Ishai [80]
25Ayal Itzkovitz [35] [43]
26William Jalby [66]
27Antoine Joux [66]
28Vladislav Kalinovsky [35]
29Nathan Keller [45] [46] [50] [51] [53] [54] [55] [64] [65] [67] [69] [71] [74] [75] [76] [79] [81] [84]
30Dan Kenigsberg [57]
31Sergey Kleyman [35]
32Lars R. Knudsen [28] [29] [30] [41] [47]
33Paul C. Kocher [11]
34Christophe Lemuet [66]
35Daniel A. Lidar [27]
36Stefan Lucks [72] [73] [78]
37Michal Misztal [44]
38Tal Mor [37] [49] [57] [60] [68]
39Phong Q. Nguyen [63]
40Bart Preneel [84]
41Omer Reingold [20] [33]
42Eran Richardson [26]
43Vincent Rijmen [44] [72] [73] [78]
44Vwani P. Roychowdhury [37] [60] [68]
45Assaf Schuster [35] [43]
46Adi Shamir [1] [2] [4] [5] [6] [23] [26] [34] [36] [59] [70] [85]
47Amichai Shulman [31]
48Roman Vitenberg [35]
49Amr M. Youssef [77]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)