BibTeX records: Eli Biham

download as .bib file

@inproceedings{DBLP:conf/sacrypt/BenmochaBP20,
  author       = {Gal Benmocha and
                  Eli Biham and
                  Stav Perle},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Unintended Features of APIs: Cryptanalysis of Incremental {HMAC}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {301--325},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_12},
  doi          = {10.1007/978-3-030-81652-0\_12},
  timestamp    = {Thu, 22 Jul 2021 18:58:14 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BenmochaBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BihamN19,
  author       = {Eli Biham and
                  Lior Neumann},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve
                  Attack},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {250--273},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_11},
  doi          = {10.1007/978-3-030-38471-5\_11},
  timestamp    = {Mon, 28 Aug 2023 21:17:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BihamN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamN19,
  author       = {Eli Biham and
                  Lior Neumann},
  title        = {Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Bar-OnBDK18,
  author       = {Achiya Bar{-}On and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Efficient Slide Attacks},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {3},
  pages        = {641--670},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9266-8},
  doi          = {10.1007/S00145-017-9266-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Bar-OnBDK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BihamP18,
  author       = {Eli Biham and
                  Stav Perle},
  title        = {Conditional Linear Cryptanalysis - Cryptanalysis of {DES} with Less
                  Than 242 Complexity},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {3},
  pages        = {215--264},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i3.215-264},
  doi          = {10.13154/TOSC.V2018.I3.215-264},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BihamP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamCS16,
  author       = {Eli Biham and
                  Yaniv Carmeli and
                  Adi Shamir},
  title        = {Bug Attacks},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {4},
  pages        = {775--805},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9209-1},
  doi          = {10.1007/S00145-015-9209-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnBDK16,
  author       = {Achiya Bar{-}On and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Efficient Slide Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnBDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamCJ15,
  author       = {Eli Biham and
                  Rafi Chen and
                  Antoine Joux},
  title        = {Cryptanalysis of {SHA-0} and Reduced {SHA-1}},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {1},
  pages        = {110--160},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9179-8},
  doi          = {10.1007/S00145-014-9179-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamDKS15,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Attacks on {IDEA} with at Least 6 Rounds},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {209--239},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9162-9},
  doi          = {10.1007/S00145-013-9162-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BihamC14,
  author       = {Eli Biham and
                  Yaniv Carmeli},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {An Improvement of Linear Cryptanalysis with Addition Operations with
                  Applications to {FEAL-8X}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_4},
  doi          = {10.1007/978-3-319-13051-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BihamC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamCDDKS13,
  author       = {Eli Biham and
                  Yaniv Carmeli and
                  Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamCDDKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AertsBMMDIKPVV12,
  author       = {Wim Aerts and
                  Eli Biham and
                  Dieter De Moitie and
                  Elke De Mulder and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Nathan Keller and
                  Bart Preneel and
                  Guy A. E. Vandenbosch and
                  Ingrid Verbauwhede},
  title        = {A Practical Attack on KeeLoq},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {136--157},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9091-9},
  doi          = {10.1007/S00145-010-9091-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KimHPBDK12,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {7},
  pages        = {4948--4966},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2191655},
  doi          = {10.1109/TIT.2012.2191655},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KimHPBDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Biham11,
  author       = {Eli Biham},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Differential Cryptanalysis},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {332--336},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_572},
  doi          = {10.1007/978-1-4419-5906-5\_572},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Biham11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDKS11,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Data-Efficient Attacks on Reduced-Round {IDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimHPBDK10,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvrahamBD10,
  author       = {Uri Avraham and
                  Eli Biham and
                  Orr Dunkelman},
  title        = {{ABC} - {A} New Framework for Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvrahamBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DunkelmanB09,
  author       = {Orr Dunkelman and
                  Eli Biham},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The SHAvite-3 - {A} New Hash Function},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1947/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DunkelmanB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarkanBK08,
  author       = {Elad Barkan and
                  Eli Biham and
                  Nathan Keller},
  title        = {Instant Ciphertext-Only Cryptanalysis of {GSM} Encrypted Communication},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {3},
  pages        = {392--429},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9001-y},
  doi          = {10.1007/S00145-007-9001-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarkanBK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/BihamS08,
  author       = {Eli Biham and
                  Jennifer Seberry},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {A New Very Fast Stream Cipher : Tpy},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {5},
  publisher    = {Australian Computer Society},
  year         = {2008},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/BihamS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamCS08,
  author       = {Eli Biham and
                  Yaniv Carmeli and
                  Adi Shamir},
  editor       = {David A. Wagner},
  title        = {Bug Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_13},
  doi          = {10.1007/978-3-540-85174-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BihamCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IndesteegeKDBP08,
  author       = {Sebastiaan Indesteege and
                  Nathan Keller and
                  Orr Dunkelman and
                  Eli Biham and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {A Practical Attack on KeeLoq},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_1},
  doi          = {10.1007/978-3-540-78967-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK08,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Kaisa Nyberg},
  title        = {A Unified Approach to Related-Key Attacks},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {73--96},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_5},
  doi          = {10.1007/978-3-540-71039-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamC08,
  author       = {Eli Biham and
                  Yaniv Carmeli},
  editor       = {Kaisa Nyberg},
  title        = {Efficient Reconstruction of {RC4} Keys from Internal States},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_17},
  doi          = {10.1007/978-3-540-71039-4\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham08,
  author       = {Eli Biham},
  editor       = {Kaisa Nyberg},
  title        = {New Techniques for Cryptanalysis of Hash Functions and Improved Attacks
                  on Snefru},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {444--461},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_28},
  doi          = {10.1007/978-3-540-71039-4\_28},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Biham08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BihamGI08,
  author       = {Eli Biham and
                  Yaron J. Goren and
                  Yuval Ishai},
  editor       = {Ran Canetti},
  title        = {Basing Weak Public-Key Cryptography on Strong One-Way Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_4},
  doi          = {10.1007/978-3-540-78524-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BihamGI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BihamDK07,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Masayuki Abe},
  title        = {A Simple Related-Key Attack on the Full {SHACAL-1}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {20--30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_2},
  doi          = {10.1007/11967668\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BihamDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK07,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Alex Biryukov},
  title        = {Improved Slide Attacks},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {153--166},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_10},
  doi          = {10.1007/978-3-540-74619-5\_10},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK07a,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Alex Biryukov},
  title        = {A New Attack on 6-Round {IDEA}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_14},
  doi          = {10.1007/978-3-540-74619-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7021,
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/portals/07021/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2006,
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74462-7},
  doi          = {10.1007/978-3-540-74462-7},
  isbn         = {978-3-540-74461-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07,
  author       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {07021 Executive Summary -- Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/1020},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07a,
  author       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {07021 Abstracts Collection -- Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/1037},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamD07,
  author       = {Eli Biham and
                  Orr Dunkelman},
  title        = {Differential Cryptanalysis in Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamD07a,
  author       = {Eli Biham and
                  Orr Dunkelman},
  title        = {A Framework for Iterative Hash Functions - {HAIFA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamD07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamBBMR06,
  author       = {Eli Biham and
                  Michel Boyer and
                  P. Oscar Boykin and
                  Tal Mor and
                  Vwani P. Roychowdhury},
  title        = {A Proof of the Security of Quantum Key Distribution},
  journal      = {J. Cryptol.},
  volume       = {19},
  number       = {4},
  pages        = {381--439},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00145-005-0011-3},
  doi          = {10.1007/S00145-005-0011-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamBBMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamDK06,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {New Cryptanalytic Results on {IDEA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {412--427},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_27},
  doi          = {10.1007/11935230\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarkanBS06,
  author       = {Elad Barkan and
                  Eli Biham and
                  Adi Shamir},
  editor       = {Cynthia Dwork},
  title        = {Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_1},
  doi          = {10.1007/11818175\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarkanBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BihamDK06,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {David Pointcheval},
  title        = {Related-Key Impossible Differential Attacks on 8-Round {AES-192}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {21--33},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_2},
  doi          = {10.1007/11605805\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BihamDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamBS05,
  author       = {Eli Biham and
                  Alex Biryukov and
                  Adi Shamir},
  title        = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {4},
  pages        = {291--311},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-005-0129-3},
  doi          = {10.1007/S00145-005-0129-3},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BihamBS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Bimal K. Roy},
  title        = {A Related-Key Rectangle Attack on the Full {KASUMI}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {443--461},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_24},
  doi          = {10.1007/11593447\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamCJCLJ05,
  author       = {Eli Biham and
                  Rafi Chen and
                  Antoine Joux and
                  Patrick Carribault and
                  Christophe Lemuet and
                  William Jalby},
  editor       = {Ronald Cramer},
  title        = {Collisions of {SHA-0} and Reduced {SHA-1}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {36--57},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_3},
  doi          = {10.1007/11426639\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamCJCLJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Ronald Cramer},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {507--525},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_30},
  doi          = {10.1007/11426639\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK05,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {New Combined Attacks on Block Ciphers},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {126--144},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_9},
  doi          = {10.1007/11502760\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamGN05,
  author       = {Eli Biham and
                  Louis Granboulan and
                  Phong Q. Nguyen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Impossible Fault Analysis of {RC4} and Differential Fault Analysis
                  of {RC4}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {359--367},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_24},
  doi          = {10.1007/11502760\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamGN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BarkanB05,
  author       = {Elad Barkan and
                  Eli Biham},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {Conditional Estimators: An Effective Attack on {A5/1}},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_1},
  doi          = {10.1007/11693383\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BarkanB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Biham05,
  author       = {Eli Biham},
  editor       = {Henk C. A. van Tilborg},
  title        = {Differential Cryptanalysis},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_108},
  doi          = {10.1007/0-387-23483-7\_108},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Biham05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-quant-ph-0511175,
  author       = {Eli Biham and
                  Michel Boyer and
                  P. Oscar Boykin and
                  Tal Mor and
                  Vwani P. Roychowdhury},
  title        = {A Proof of the Security of Quantum Key Distribution},
  journal      = {CoRR},
  volume       = {abs/quant-ph/0511175},
  year         = {2005},
  url          = {http://arxiv.org/abs/quant-ph/0511175},
  eprinttype    = {arXiv},
  eprint       = {quant-ph/0511175},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-quant-ph-0511175.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamS05,
  author       = {Eli Biham and
                  Jennifer Seberry},
  title        = {Py (Roo): {A} Fast and Secure Stream Cipher using Rolling Arrays},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BihamBKM04,
  author       = {Eli Biham and
                  Gilles Brassard and
                  Dan Kenigsberg and
                  Tal Mor},
  title        = {Quantum computing without entanglement},
  journal      = {Theor. Comput. Sci.},
  volume       = {320},
  number       = {1},
  pages        = {15--33},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.tcs.2004.03.041},
  doi          = {10.1016/J.TCS.2004.03.041},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BihamBKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamC04,
  author       = {Eli Biham and
                  Rafi Chen},
  editor       = {Matthew K. Franklin},
  title        = {Near-Collisions of {SHA-0}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {290--305},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_18},
  doi          = {10.1007/978-3-540-28628-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BihamC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamC04,
  author       = {Eli Biham and
                  Rafi Chen},
  title        = {Near-Collisions of {SHA-0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarkanBK03,
  author       = {Elad Barkan and
                  Eli Biham and
                  Nathan Keller},
  editor       = {Dan Boneh},
  title        = {Instant Ciphertext-Only Cryptanalysis of {GSM} Encrypted Communication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {600--616},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_35},
  doi          = {10.1007/978-3-540-45146-4\_35},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarkanBK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK03,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Thomas Johansson},
  title        = {Differential-Linear Cryptanalysis of Serpent},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {9--21},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_2},
  doi          = {10.1007/978-3-540-39887-5\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK03a,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Thomas Johansson},
  title        = {Rectangle Attacks on 49-Round {SHACAL-1}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_3},
  doi          = {10.1007/978-3-540-39887-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2003,
  editor       = {Eli Biham},
  title        = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9},
  doi          = {10.1007/3-540-39200-9},
  isbn         = {3-540-14039-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/BihamBBGM02,
  author       = {Eli Biham and
                  Michel Boyer and
                  Gilles Brassard and
                  Jeroen van de Graaf and
                  Tal Mor},
  title        = {Security of Quantum Key Distribution against All Collective Attacks},
  journal      = {Algorithmica},
  volume       = {34},
  number       = {4},
  pages        = {372--388},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00453-002-0973-6},
  doi          = {10.1007/S00453-002-0973-6},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/BihamBBGM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Biham02,
  author       = {Eli Biham},
  title        = {How to decrypt or even substitute DES-encrypted messages in 2\({}^{\mbox{28}}\)
                  steps},
  journal      = {Inf. Process. Lett.},
  volume       = {84},
  number       = {3},
  pages        = {117--124},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(02)00269-7},
  doi          = {10.1016/S0020-0190(02)00269-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Biham02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamK02,
  author       = {Eli Biham and
                  Lars R. Knudsen},
  title        = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {47--59},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0016-5},
  doi          = {10.1007/S00145-001-0016-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BarkanB02,
  author       = {Elad Barkan and
                  Eli Biham},
  editor       = {Yuliang Zheng},
  title        = {In How Many Ways Can You Write Rijndael?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_10},
  doi          = {10.1007/3-540-36178-2\_10},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BarkanB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Yuliang Zheng},
  title        = {Enhancing Differential-Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {254--266},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_16},
  doi          = {10.1007/3-540-36178-2\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {New Results on Boomerang and Rectangle Attacks},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_1},
  doi          = {10.1007/3-540-45661-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDK02,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {New Results on Boomerang and Rectangle Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarkanB02,
  author       = {Elad Barkan and
                  Eli Biham},
  title        = {In How Many Ways Can You Write Rijndael?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarkanB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarkanB02a,
  author       = {Elad Barkan and
                  Eli Biham},
  title        = {The Book of Rijndaels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarkanB02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/FriedmanBIS01,
  author       = {Roy Friedman and
                  Eli Biham and
                  Ayal Itzkovitz and
                  Assaf Schuster},
  title        = {Symphony: An Infrastructure for Managing Virtual Servers},
  journal      = {Clust. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {221--233},
  year         = {2001},
  url          = {https://doi.org/10.1023/A:1011498424351},
  doi          = {10.1023/A:1011498424351},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/FriedmanBIS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Birgit Pfitzmann},
  title        = {The Rectangle Attack - Rectangling the Serpent},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {340--357},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_21},
  doi          = {10.1007/3-540-44987-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  editor       = {Mitsuru Matsui},
  title        = {Linear Cryptanalysis of Reduced Round Serpent},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_2},
  doi          = {10.1007/3-540-45473-X\_2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamFMR01,
  author       = {Eli Biham and
                  Vladimir Furman and
                  Michal Misztal and
                  Vincent Rijmen},
  editor       = {Mitsuru Matsui},
  title        = {Differential Cryptanalysis of {Q}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_15},
  doi          = {10.1007/3-540-45473-X\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamFMR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {The Rectangle Attack - Rectangling the Serpent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/BihamF00,
  author       = {Eli Biham and
                  Vladimir Furman},
  title        = {Impossible Differential on 8-Round MARS' Core},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {186--194},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/BihamF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/AndersonBK00,
  author       = {Ross J. Anderson and
                  Eli Biham and
                  Lars R. Knudsen},
  title        = {The Case for Serpent},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {349--354},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/AndersonBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Biham00,
  author       = {Eli Biham},
  editor       = {Bart Preneel},
  title        = {Cryptanalysis of Patarin's 2-Round Public Key System with {S} Boxes
                  {(2R)}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {408--416},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_28},
  doi          = {10.1007/3-540-45539-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Biham00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BihamD00,
  author       = {Eli Biham and
                  Orr Dunkelman},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Cryptanalysis of the {A5/1} {GSM} Stream Cipher},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {43--51},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_5},
  doi          = {10.1007/3-540-44495-5\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BihamD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BihamF00,
  author       = {Eli Biham and
                  Vladimir Furman},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Improved Impossible Differentials on Twofish},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {80--92},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_8},
  doi          = {10.1007/3-540-44495-5\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BihamF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BihamBBMR00,
  author       = {Eli Biham and
                  Michel Boyer and
                  P. Oscar Boykin and
                  Tal Mor and
                  Vwani P. Roychowdhury},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {A proof of the security of quantum key distribution (extended abstract)},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {715--724},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335406},
  doi          = {10.1145/335305.335406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BihamBBMR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BihamBR99,
  author       = {Eli Biham and
                  Dan Boneh and
                  Omer Reingold},
  title        = {Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier
                  Than Factoring},
  journal      = {Inf. Process. Lett.},
  volume       = {70},
  number       = {2},
  pages        = {83--87},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0190(99)00047-2},
  doi          = {10.1016/S0020-0190(99)00047-2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/BihamBR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Biham99,
  author       = {Eli Biham},
  title        = {Cryptanalysis of Triple Modes of Operation},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {161--184},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900050},
  doi          = {10.1007/S001459900050},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Biham99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamBS99,
  author       = {Eli Biham and
                  Alex Biryukov and
                  Adi Shamir},
  editor       = {Jacques Stern},
  title        = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {12--23},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_2},
  doi          = {10.1007/3-540-48910-X\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamBS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/FriedmanSIBHKKV99,
  author       = {Roy Friedman and
                  Assaf Schuster and
                  Ayal Itzkovitz and
                  Eli Biham and
                  Erez Hadad and
                  Vladislav Kalinovsky and
                  Sergey Kleyman and
                  Roman Vitenberg},
  editor       = {Patrick Amestoy and
                  Philippe Berger and
                  Michel J. Dayd{\'{e}} and
                  Iain S. Duff and
                  Val{\'{e}}rie Frayss{\'{e}} and
                  Luc Giraud and
                  Daniel Ruiz},
  title        = {Symphony: Managing Virtual Servers in the Global Village},
  booktitle    = {Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference,
                  Toulouse, France, August 31 - September 3, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1685},
  pages        = {777--784},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48311-X\_110},
  doi          = {10.1007/3-540-48311-X\_110},
  timestamp    = {Tue, 04 Jun 2019 14:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/FriedmanSIBHKKV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamBS99,
  author       = {Eli Biham and
                  Alex Biryukov and
                  Adi Shamir},
  editor       = {Lars R. Knudsen},
  title        = {Miss in the Middle Attacks on {IDEA} and Khufu},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_10},
  doi          = {10.1007/3-540-48519-8\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamBS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Biham98,
  author       = {Eli Biham},
  title        = {Cryptanalysis of Multiple Modes of Operation},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {45--58},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900034},
  doi          = {10.1007/S001459900034},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Biham98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BihamS98,
  author       = {Eli Biham and
                  Amichai Shulman},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {User-Defined Divisibility of Ecash and a Practical Implementation},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_1},
  doi          = {10.1007/10721064\_1},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BihamS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AndersonBK98,
  author       = {Ross J. Anderson and
                  Eli Biham and
                  Lars R. Knudsen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {Serpent and Smartcards},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {246--253},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_23},
  doi          = {10.1007/10721064\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AndersonBK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamK98,
  author       = {Eli Biham and
                  Lars R. Knudsen},
  editor       = {Kaisa Nyberg},
  title        = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {100--111},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054120},
  doi          = {10.1007/BFB0054120},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamAK98,
  author       = {Eli Biham and
                  Ross J. Anderson and
                  Lars R. Knudsen},
  editor       = {Serge Vaudenay},
  title        = {Serpent: {A} New Block Cipher Proposal},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_15},
  doi          = {10.1007/3-540-69710-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamAK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qcqc/BironBBGL98,
  author       = {David Biron and
                  Ofer Biham and
                  Eli Biham and
                  Markus Grassl and
                  Daniel A. Lidar},
  editor       = {Colin P. Williams},
  title        = {Generalized Grover Search Algorithm for Arbitrary Initial Amplitude
                  Distribution},
  booktitle    = {Quantum Computing and Quantum Communications, First {NASA} International
                  Conference, QCQC'98, Palm Springs, California, USA, February 17-20,
                  1998, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1509},
  pages        = {140--147},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49208-9\_10},
  doi          = {10.1007/3-540-49208-9\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qcqc/BironBBGL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BihamBDRS98,
  author       = {Eli Biham and
                  Alex Biryukov and
                  Orr Dunkelman and
                  Eran Richardson and
                  Adi Shamir},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {362--376},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_27},
  doi          = {10.1007/3-540-48892-8\_27},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BihamBDRS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamB97,
  author       = {Eli Biham and
                  Alex Biryukov},
  title        = {An Improvement of Davies' Attack on {DES}},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {3},
  pages        = {195--206},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900027},
  doi          = {10.1007/S001459900027},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BihamB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS97,
  author       = {Eli Biham and
                  Adi Shamir},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Differential Fault Analysis of Secret Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {513--525},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052259},
  doi          = {10.1007/BFB0052259},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BihamS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham97,
  author       = {Eli Biham},
  editor       = {Eli Biham},
  title        = {Cryptanalysis of Ladder-DES},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {134--138},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052341},
  doi          = {10.1007/BFB0052341},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biham97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham97a,
  author       = {Eli Biham},
  editor       = {Eli Biham},
  title        = {A Fast New {DES} Implementation in Software},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {260--272},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052352},
  doi          = {10.1007/BFB0052352},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biham97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1997,
  editor       = {Eli Biham},
  title        = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052329},
  doi          = {10.1007/BFB0052329},
  isbn         = {3-540-63247-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR97-061,
  author       = {Eli Biham and
                  Dan Boneh and
                  Omer Reingold},
  title        = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR97-061}},
  year         = {1997},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-061/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR97-061},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR97-061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamBR97,
  author       = {Eli Biham and
                  Dan Boneh and
                  Omer Reingold},
  title        = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamBR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Ben-AroyaB96,
  author       = {Ishai Ben{-}Aroya and
                  Eli Biham},
  title        = {Differential Cryptanalysis of Lucifer},
  journal      = {J. Cryptol.},
  volume       = {9},
  number       = {1},
  pages        = {21--34},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF02254790},
  doi          = {10.1007/BF02254790},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Ben-AroyaB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndersonB96,
  author       = {Ross J. Anderson and
                  Eli Biham},
  editor       = {Dieter Gollmann},
  title        = {{TIGER:} {A} Fast New Hash Function},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {89--97},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_46},
  doi          = {10.1007/3-540-60865-6\_46},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndersonB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndersonB96a,
  author       = {Ross J. Anderson and
                  Eli Biham},
  editor       = {Dieter Gollmann},
  title        = {Two Practical and Provably Secure Block Ciphers: {BEARS} and {LION}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {113--120},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_48},
  doi          = {10.1007/3-540-60865-6\_48},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndersonB96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Biham94,
  author       = {Eli Biham},
  title        = {New Types of Cryptanalytic Attacks Using Related Keys},
  journal      = {J. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {229--246},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF00203965},
  doi          = {10.1007/BF00203965},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Biham94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Biham94,
  author       = {Eli Biham},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Cryptanalysis of Multiple Modes of Operation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000441},
  doi          = {10.1007/BFB0000441},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Biham94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BihamB94,
  author       = {Eli Biham and
                  Alex Biryukov},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {How to Strengthen {DES} Using Existing Hardware},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000451},
  doi          = {10.1007/BFB0000451},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BihamB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Biham94,
  author       = {Eli Biham},
  editor       = {Alfredo De Santis},
  title        = {On Matsui's Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {341--355},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053449},
  doi          = {10.1007/BFB0053449},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Biham94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamB94,
  author       = {Eli Biham and
                  Alex Biryukov},
  editor       = {Alfredo De Santis},
  title        = {An Improvement of Davies' Attack on {DES}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {461--467},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053464},
  doi          = {10.1007/BFB0053464},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamB94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamK94,
  author       = {Eli Biham and
                  Paul C. Kocher},
  editor       = {Bart Preneel},
  title        = {A Known Plaintext Attack on the {PKZIP} Stream Cipher},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {144--153},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_12},
  doi          = {10.1007/3-540-60590-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0032320,
  author       = {Eli Biham and
                  Adi Shamir},
  title        = {Differential Cryptanalysis of the Data Encryption Standard},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/978-1-4613-9314-6},
  doi          = {10.1007/978-1-4613-9314-6},
  isbn         = {978-1-4613-9316-0},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0032320.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-AroyaB93,
  author       = {Ishai Ben{-}Aroya and
                  Eli Biham},
  editor       = {Douglas R. Stinson},
  title        = {Differential Cryptanalysis of Lucifer},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_17},
  doi          = {10.1007/3-540-48329-2\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-AroyaB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Biham93,
  author       = {Eli Biham},
  editor       = {Tor Helleseth},
  title        = {New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {398--409},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_34},
  doi          = {10.1007/3-540-48285-7\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Biham93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Biham93,
  author       = {Eli Biham},
  editor       = {Ross J. Anderson},
  title        = {On Modes of Operation},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {116--120},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_14},
  doi          = {10.1007/3-540-58108-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Biham93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS92,
  author       = {Eli Biham and
                  Adi Shamir},
  editor       = {Ernest F. Brickell},
  title        = {Differential Cryptanalysis of the Full 16-Round {DES}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {487--496},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_34},
  doi          = {10.1007/3-540-48071-4\_34},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BihamS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BihamS91,
  author       = {Eli Biham and
                  Adi Shamir},
  title        = {Differential Cryptanalysis of DES-like Cryptosystems},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {1},
  pages        = {3--72},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00630563},
  doi          = {10.1007/BF00630563},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BihamS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS91,
  author       = {Eli Biham and
                  Adi Shamir},
  editor       = {Joan Feigenbaum},
  title        = {Differential Cryptanalysis of Snefru, Khafre, REDOC-II, {LOKI} and
                  Lucifer},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_11},
  doi          = {10.1007/3-540-46766-1\_11},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BihamS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BihamS91,
  author       = {Eli Biham and
                  Adi Shamir},
  editor       = {Donald W. Davies},
  title        = {Differential Cryptanalysis of Feal and N-Hash},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_1},
  doi          = {10.1007/3-540-46416-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BihamS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Biham91,
  author       = {Eli Biham},
  editor       = {Donald W. Davies},
  title        = {Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {532--534},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_49},
  doi          = {10.1007/3-540-46416-6\_49},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Biham91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BihamS90,
  author       = {Eli Biham and
                  Adi Shamir},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Differential Cryptanalysis of DES-like Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {2--21},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_1},
  doi          = {10.1007/3-540-38424-3\_1},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BihamS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics