Eli Biham

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Unintended features of APIs: cryptanalysis of incremental HMAC
 
2022-03-25Paper
Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
 
2020-07-21Paper
Efficient slide attacks
Journal of Cryptology
2018-09-14Paper
Serpent: a new block cipher proposal
Fast Software Encryption
2018-05-09Paper
A fast new DES implementation in software
Fast Software Encryption
2018-05-09Paper
Cryptanalysis of Ladder-DES
Fast Software Encryption
2018-05-09Paper
Advanced encryption standard. Draft minimum requirements and evaluation criteria
Fast Software Encryption
2018-05-09Paper
Tiger: a fast new hash function
Fast Software Encryption
2017-11-15Paper
Two practical and provably secure block ciphers: BEAR and LION
Fast Software Encryption
2017-11-15Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Bug attacks
Journal of Cryptology
2016-10-13Paper
An improvement of linear cryptanalysis with addition operations with applications to FEAL-8X
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
New attacks on IDEA with at least 6 rounds
Journal of Cryptology
2015-05-12Paper
Cryptanalysis of SHA-0 and reduced SHA-1
Journal of Cryptology
2015-03-25Paper
A proof of the security of quantum key distribution (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
Techniques for cryptanalysis of block ciphers. (to appear)
Information Security and Cryptography
2012-03-16Paper
Differential-linear cryptanalysis of Serpent.
Lecture Notes in Computer Science
2010-01-05Paper
Rectangle attacks on 49-round SHACAL-1.
Lecture Notes in Computer Science
2010-01-05Paper
Instant ciphertext-only cryptanalysis of GSM encrypted communication
Journal of Cryptology
2009-06-08Paper
Bug Attacks
Lecture Notes in Computer Science
2009-02-10Paper
A Unified Approach to Related-Key Attacks
Fast Software Encryption
2008-09-18Paper
Efficient Reconstruction of RC4 Keys from Internal States
Fast Software Encryption
2008-09-18Paper
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
Fast Software Encryption
2008-09-18Paper
Improved Slide Attacks
Fast Software Encryption
2008-09-16Paper
A New Attack on 6-Round IDEA
Fast Software Encryption
2008-09-16Paper
Collisions of SHA-0 and Reduced SHA-1
Lecture Notes in Computer Science
2008-05-06Paper
Related-Key Boomerang and Rectangle Attacks
Lecture Notes in Computer Science
2008-05-06Paper
New Cryptanalytic Results on IDEA
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
A Simple Related-Key Attack on the Full SHACAL-1
Lecture Notes in Computer Science
2008-04-17Paper
A Practical Attack on KeeLoq
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
A Related-Key Rectangle Attack on the Full KASUMI
Lecture Notes in Computer Science
2008-03-18Paper
Basing Weak Public-Key Cryptography on Strong One-Way Functions
Theory of Cryptography
2008-03-05Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Conditional Estimators: An Effective Attack on A5/1
Selected Areas in Cryptography
2007-11-15Paper
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
Lecture Notes in Computer Science
2007-09-04Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
A proof of the security of quantum key distribution
Journal of Cryptology
2007-01-24Paper
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
Journal of Cryptology
2006-08-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
scientific article; zbMATH DE number 5009213 (Why is no real title available?)
 
2006-03-01Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2089123 (Why is no real title available?)
 
2004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent
Fast Software Encryption
2004-08-12Paper
Differential Cryptanalysis of Q
Fast Software Encryption
2004-08-12Paper
Quantum computing without entanglement
Theoretical Computer Science
2004-08-10Paper
Enhancing Differential-Linear Cryptanalysis
Lecture Notes in Computer Science
2003-07-16Paper
In How Many Ways Can You Write Rijndael?
Lecture Notes in Computer Science
2003-07-16Paper
Security of quantum key distribution against all collective attacks
Algorithmica
2003-05-04Paper
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
Information Processing Letters
2003-01-21Paper
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring
Information Processing Letters
2002-07-25Paper
Cryptanalysis of the ANSI X9. 52 CBCM Mode
Journal of Cryptology
2002-05-21Paper
scientific article; zbMATH DE number 1722685 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583933 (Why is no real title available?)
 
2001-07-08Paper
scientific article; zbMATH DE number 1583936 (Why is no real title available?)
 
2001-07-08Paper
On modes of operation
Fast Software Encryption
2000-08-30Paper
Cryptanalysis of triple modes of operation
Journal of Cryptology
2000-06-06Paper
scientific article; zbMATH DE number 1455091 (Why is no real title available?)
 
2000-06-05Paper
scientific article; zbMATH DE number 1418249 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1406119 (Why is no real title available?)
 
2000-02-23Paper
scientific article; zbMATH DE number 1304130 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1394311 (Why is no real title available?)
 
2000-01-31Paper
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
Advances in Cryptology — EUROCRYPT ’99
1999-10-05Paper
scientific article; zbMATH DE number 1303116 (Why is no real title available?)
 
1999-06-17Paper
Cryptanalysis of multiple modes of operation
Journal of Cryptology
1998-12-13Paper
scientific article; zbMATH DE number 1088257 (Why is no real title available?)
 
1998-05-12Paper
scientific article; zbMATH DE number 1088928 (Why is no real title available?)
 
1998-01-26Paper
scientific article; zbMATH DE number 1088943 (Why is no real title available?)
 
1997-11-18Paper
scientific article; zbMATH DE number 1024498 (Why is no real title available?)
 
1997-11-02Paper
scientific article; zbMATH DE number 1024056 (Why is no real title available?)
 
1997-10-06Paper
An improvement of Davies' attack on DES
Journal of Cryptology
1997-08-28Paper
scientific article; zbMATH DE number 1024102 (Why is no real title available?)
 
1997-06-18Paper
Differential cryptanalysis of Lucifer
Journal of Cryptology
1996-08-20Paper
scientific article; zbMATH DE number 708826 (Why is no real title available?)
 
1995-03-30Paper
New types of cryptanalytic attacks using related keys
Journal of Cryptology
1995-01-30Paper
scientific article; zbMATH DE number 503238 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 417582 (Why is no real title available?)
 
1993-09-19Paper
scientific article; zbMATH DE number 176547 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 177620 (Why is no real title available?)
 
1993-05-18Paper
Differential Cryptanalysis of Feal and N-Hash
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
Differential cryptanalysis of DES-like cryptosystems
Journal of Cryptology
1991-01-01Paper


Research outcomes over time


This page was built for person: Eli Biham