Eli Biham

From MaRDI portal
Person:321308

Available identifiers

zbMath Open biham.eliDBLPb/EliBihamWikidataQ2142762 ScholiaQ2142762MaRDI QIDQ321308

List of research outcomes





PublicationDate of PublicationType
Unintended features of APIs: cryptanalysis of incremental HMAC2022-03-25Paper
Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack2020-07-21Paper
Efficient slide attacks2018-09-14Paper
Serpent: A New Block Cipher Proposal2018-05-09Paper
A fast new DES implementation in software2018-05-09Paper
Cryptanalysis of Ladder-DES2018-05-09Paper
Advanced Encryption Standard2018-05-09Paper
Tiger: A fast new hash function2017-11-15Paper
Two practical and provably secure block ciphers: BEAR and LION2017-11-15Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis2017-07-12Paper
Bug attacks2016-10-13Paper
An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X2016-04-13Paper
New attacks on IDEA with at least 6 rounds2015-05-12Paper
Cryptanalysis of SHA-0 and reduced SHA-12015-03-25Paper
A proof of the security of quantum key distribution (extended abstract)2014-09-26Paper
A practical attack on KeeLoq2012-05-23Paper
Techniques for cryptanalysis of block ciphers. (to appear)2012-03-16Paper
Fast Software Encryption2010-01-05Paper
Fast Software Encryption2010-01-05Paper
Instant ciphertext-only cryptanalysis of GSM encrypted communication2009-06-08Paper
Bug Attacks2009-02-10Paper
A Unified Approach to Related-Key Attacks2008-09-18Paper
Efficient Reconstruction of RC4 Keys from Internal States2008-09-18Paper
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru2008-09-18Paper
Improved Slide Attacks2008-09-16Paper
A New Attack on 6-Round IDEA2008-09-16Paper
Collisions of SHA-0 and Reduced SHA-12008-05-06Paper
Related-Key Boomerang and Rectangle Attacks2008-05-06Paper
New Cryptanalytic Results on IDEA2008-04-24Paper
A Simple Related-Key Attack on the Full SHACAL-12008-04-17Paper
A Practical Attack on KeeLoq2008-04-15Paper
A Related-Key Rectangle Attack on the Full KASUMI2008-03-18Paper
Basing Weak Public-Key Cryptography on Strong One-Way Functions2008-03-05Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Conditional Estimators: An Effective Attack on A5/12007-11-15Paper
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs2007-09-04Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
A proof of the security of quantum key distribution2007-01-24Paper
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials2006-08-14Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2006-06-22Paper
https://portal.mardi4nfdi.de/entity/Q33749252006-03-01Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q30463322004-08-12Paper
Linear Cryptanalysis of Reduced Round Serpent2004-08-12Paper
Differential Cryptanalysis of Q2004-08-12Paper
Quantum computing without entanglement2004-08-10Paper
Enhancing Differential-Linear Cryptanalysis2003-07-16Paper
In How Many Ways Can You Write Rijndael?2003-07-16Paper
Security of quantum key distribution against all collective attacks2003-05-04Paper
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.2003-01-21Paper
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring2002-07-25Paper
Cryptanalysis of the ANSI X9. 52 CBCM Mode2002-05-21Paper
https://portal.mardi4nfdi.de/entity/Q27788562002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27075912001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27075952001-07-08Paper
On modes of operation2000-08-30Paper
Cryptanalysis of triple modes of operation2000-06-06Paper
https://portal.mardi4nfdi.de/entity/Q44848862000-06-05Paper
https://portal.mardi4nfdi.de/entity/Q49418082000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49391442000-02-23Paper
https://portal.mardi4nfdi.de/entity/Q42508302000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q49347272000-01-31Paper
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials1999-10-05Paper
https://portal.mardi4nfdi.de/entity/Q42496311999-06-17Paper
Cryptanalysis of multiple modes of operation1998-12-13Paper
https://portal.mardi4nfdi.de/entity/Q43645741998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q43657531998-01-26Paper
https://portal.mardi4nfdi.de/entity/Q43657681997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43424741997-11-02Paper
https://portal.mardi4nfdi.de/entity/Q43417461997-10-06Paper
An improvement of Davies' attack on DES1997-08-28Paper
https://portal.mardi4nfdi.de/entity/Q43417971997-06-18Paper
Differential cryptanalysis of Lucifer1996-08-20Paper
https://portal.mardi4nfdi.de/entity/Q43187171995-03-30Paper
New types of cryptanalytic attacks using related keys1995-01-30Paper
https://portal.mardi4nfdi.de/entity/Q42795601994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q31362981993-09-19Paper
https://portal.mardi4nfdi.de/entity/Q40357141993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374991993-05-18Paper
Differential Cryptanalysis of Feal and N-Hash1993-05-18Paper
Differential cryptanalysis of DES-like cryptosystems1991-01-01Paper

Research outcomes over time

This page was built for person: Eli Biham