What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Eli Biham
Google Scholar
71
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/sacrypt
Unintended Features of APIs: Cryptanalysis of Incremental HMAC.
Gal Benmocha
Eli Biham
Stav Perle
2019
conf/sacrypt
Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack.
Eli Biham
Lior Neumann
2018
journals/tosc
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity.
Eli Biham
Stav Perle
2018
journals/joc
Efficient Slide Attacks.
Achiya Bar-On
Eli Biham
Orr Dunkelman
Nathan Keller
2016
journals/joc
Bug Attacks.
Eli Biham
Yaniv Carmeli
Adi Shamir
2015
journals/joc
Cryptanalysis of SHA-0 and Reduced SHA-1.
Eli Biham
Rafi Chen
Antoine Joux
2015
journals/joc
New Attacks on IDEA with at Least 6 Rounds.
Eli Biham
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
conf/sacrypt
An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.
Eli Biham
Yaniv Carmeli
2012
journals/joc
A Practical Attack on KeeLoq.
Wim Aerts
Eli Biham
Dieter De Moitie
Elke De Mulder
Orr Dunkelman
Sebastiaan Indesteege
Nathan Keller
Bart Preneel
Guy A. E. Vandenbosch
Ingrid Verbauwhede
2008
journals/joc
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
Elad Barkan
Eli Biham
Nathan Keller
2008
conf/fse
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
Eli Biham
2008
conf/fse
A Unified Approach to Related-Key Attacks.
Eli Biham
Orr Dunkelman
Nathan Keller
2008
conf/fse
Efficient Reconstruction of RC4 Keys from Internal States.
Eli Biham
Yaniv Carmeli
2008
conf/crypto
Bug Attacks.
Eli Biham
Yaniv Carmeli
Adi Shamir
2008
conf/eurocrypt
A Practical Attack on KeeLoq.
Sebastiaan Indesteege
Nathan Keller
Orr Dunkelman
Eli Biham
Bart Preneel
2008
conf/tcc
Basing Weak Public-Key Cryptography on Strong One-Way Functions.
Eli Biham
Yaron J. Goren
Yuval Ishai
2007
conf/fse
Improved Slide Attacks.
Eli Biham
Orr Dunkelman
Nathan Keller
2007
conf/fse
A New Attack on 6-Round IDEA.
Eli Biham
Orr Dunkelman
Nathan Keller
2007
conf/ctrsa
A Simple Related-Key Attack on the Full SHACAL-1.
Eli Biham
Orr Dunkelman
Nathan Keller
2006
journals/joc
A Proof of the Security of Quantum Key Distribution.
Eli Biham
Michel Boyer
P. Oscar Boykin
Tal Mor
Vwani P. Roychowdhury
2006
conf/crypto
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
Elad Barkan
Eli Biham
Adi Shamir
2006
conf/ctrsa
Related-Key Impossible Differential Attacks on 8-Round AES-192.
Eli Biham
Orr Dunkelman
Nathan Keller
2006
conf/asiacrypt
New Cryptanalytic Results on IDEA.
Eli Biham
Orr Dunkelman
Nathan Keller
2005
journals/joc
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham
Alex Biryukov
Adi Shamir
2005
conf/fse
New Combined Attacks on Block Ciphers.
Eli Biham
Orr Dunkelman
Nathan Keller
2005
conf/fse
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
Eli Biham
Louis Granboulan
Phong Q. Nguyen
2005
conf/eurocrypt
Related-Key Boomerang and Rectangle Attacks.
Eli Biham
Orr Dunkelman
Nathan Keller
2005
conf/eurocrypt
Collisions of SHA-0 and Reduced SHA-1.
Eli Biham
Rafi Chen
Antoine Joux
Patrick Carribault
Christophe Lemuet
William Jalby
2005
conf/asiacrypt
A Related-Key Rectangle Attack on the Full KASUMI.
Eli Biham
Orr Dunkelman
Nathan Keller
2005
conf/sacrypt
Conditional Estimators: An Effective Attack on A5/1.
Elad Barkan
Eli Biham
2004
conf/crypto
Near-Collisions of SHA-0.
Eli Biham
Rafi Chen
2003
conf/fse
Rectangle Attacks on 49-Round SHACAL-1.
Eli Biham
Orr Dunkelman
Nathan Keller
2003
conf/fse
Differential-Linear Cryptanalysis of Serpent.
Eli Biham
Orr Dunkelman
Nathan Keller
2003
conf/crypto
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.
Elad Barkan
Eli Biham
Nathan Keller
2002
journals/joc
Cryptanalysis of the ANSI X9.52 CBCM Mode.
Eli Biham
Lars R. Knudsen
2002
conf/fse
New Results on Boomerang and Rectangle Attacks.
Eli Biham
Orr Dunkelman
Nathan Keller
2002
conf/asiacrypt
In How Many Ways Can You Write Rijndael?
Elad Barkan
Eli Biham
2002
conf/asiacrypt
Enhancing Differential-Linear Cryptanalysis.
Eli Biham
Orr Dunkelman
Nathan Keller
2001
conf/fse
Linear Cryptanalysis of Reduced Round Serpent.
Eli Biham
Orr Dunkelman
Nathan Keller
2001
conf/fse
Differential Cryptanalysis of Q.
Eli Biham
Vladimir Furman
Michal Misztal
Vincent Rijmen
2001
conf/eurocrypt
The Rectangle Attack - Rectangling the Serpent.
Eli Biham
Orr Dunkelman
Nathan Keller
2000
conf/eurocrypt
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R).
Eli Biham
1999
journals/joc
Cryptanalysis of Triple Modes of Operation.
Eli Biham
1999
conf/fse
Miss in the Middle Attacks on IDEA and Khufu.
Eli Biham
Alex Biryukov
Adi Shamir
1999
conf/eurocrypt
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham
Alex Biryukov
Adi Shamir
1998
journals/joc
Cryptanalysis of Multiple Modes of Operation.
Eli Biham
1998
conf/fse
Serpent: A New Block Cipher Proposal.
Eli Biham
Ross J. Anderson
Lars R. Knudsen
1998
conf/eurocrypt
Cryptanalysis of the ANSI X9.52 CBCM Mode.
Eli Biham
Lars R. Knudsen
1998
conf/sacrypt
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Eli Biham
Alex Biryukov
Orr Dunkelman
Eran Richardson
Adi Shamir
1997
journals/joc
An Improvement of Davies' Attack on DES.
Eli Biham
Alex Biryukov
1997
conf/fse
A Fast New DES Implementation in Software.
Eli Biham
1997
conf/fse
Cryptanalysis of Ladder-DES.
Eli Biham
1997
conf/crypto
Differential Fault Analysis of Secret Key Cryptosystems.
Eli Biham
Adi Shamir
1996
journals/joc
Differential Cryptanalysis of Lucifer.
Ishai Ben-Aroya
Eli Biham
1996
conf/fse
Two Practical and Provably Secure Block Ciphers: BEARS and LION.
Ross J. Anderson
Eli Biham
1996
conf/fse
TIGER: A Fast New Hash Function.
Ross J. Anderson
Eli Biham
1994
journals/joc
New Types of Cryptanalytic Attacks Using Related Keys.
Eli Biham
1994
conf/fse
A Known Plaintext Attack on the PKZIP Stream Cipher.
Eli Biham
Paul C. Kocher
1994
conf/eurocrypt
On Matsui's Linear Cryptanalysis.
Eli Biham
1994
conf/eurocrypt
An Improvement of Davies' Attack on DES.
Eli Biham
Alex Biryukov
1994
conf/asiacrypt
Cryptanalysis of Multiple Modes of Operation.
Eli Biham
1994
conf/asiacrypt
How to Strengthen DES Using Existing Hardware.
Eli Biham
Alex Biryukov
1993
conf/fse
On Modes of Operation.
Eli Biham
1993
conf/crypto
Differential Cryptanalysis of Lucifer.
Ishai Ben-Aroya
Eli Biham
1993
conf/eurocrypt
New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract).
Eli Biham
1992
conf/crypto
Differential Cryptanalysis of the Full 16-Round DES.
Eli Biham
Adi Shamir
1991
journals/joc
Differential Cryptanalysis of DES-like Cryptosystems.
Eli Biham
Adi Shamir
1991
conf/crypto
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
Eli Biham
Adi Shamir
1991
conf/eurocrypt
Differential Cryptanalysis of Feal and N-Hash.
Eli Biham
Adi Shamir
1991
conf/eurocrypt
Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91.
Eli Biham
1990
conf/crypto
Differential Cryptanalysis of DES-like Cryptosystems.
Eli Biham
Adi Shamir
Coauthors
Achiya Bar-On
(1)
Adi Shamir
(14)
Alex Biryukov
(7)
Antoine Joux
(2)
Bart Preneel
(2)
Christophe Lemuet
(1)
Dieter De Moitie
(1)
Elad Barkan
(5)
Eli Biham
(71)
Elke De Mulder
(1)
Eran Richardson
(1)
Gal Benmocha
(1)
Guy A. E. Vandenbosch
(1)
Ingrid Verbauwhede
(1)
Ishai Ben-Aroya
(2)
Lars R. Knudsen
(3)
Lior Neumann
(1)
Louis Granboulan
(1)
Michal Misztal
(1)
Michel Boyer
(1)
Nathan Keller
(21)
Orr Dunkelman
(20)
P. Oscar Boykin
(1)
Patrick Carribault
(1)
Paul C. Kocher
(1)
Phong Q. Nguyen
(1)
Rafi Chen
(3)
Ross J. Anderson
(3)
Sebastiaan Indesteege
(2)
Stav Perle
(2)
Tal Mor
(1)
Vincent Rijmen
(1)
Vladimir Furman
(1)
Vwani P. Roychowdhury
(1)
William Jalby
(1)
Wim Aerts
(1)
Yaniv Carmeli
(4)
Yaron J. Goren
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to