Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Eli Biham
@inproceedings{DBLP:conf/sacrypt/BenmochaBP20, author = {Gal Benmocha and Eli Biham and Stav Perle}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Unintended Features of APIs: Cryptanalysis of Incremental {HMAC}}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {301--325}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_12}, doi = {10.1007/978-3-030-81652-0\_12}, timestamp = {Thu, 22 Jul 2021 18:58:14 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BenmochaBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BihamN19, author = {Eli Biham and Lior Neumann}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {250--273}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_11}, doi = {10.1007/978-3-030-38471-5\_11}, timestamp = {Mon, 28 Aug 2023 21:17:39 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BihamN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamN19, author = {Eli Biham and Lior Neumann}, title = {Breaking the Bluetooth Pairing - The Fixed Coordinate Invalid Curve Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2019}, url = {https://eprint.iacr.org/2019/1043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Bar-OnBDK18, author = {Achiya Bar{-}On and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Efficient Slide Attacks}, journal = {J. Cryptol.}, volume = {31}, number = {3}, pages = {641--670}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9266-8}, doi = {10.1007/S00145-017-9266-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Bar-OnBDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BihamP18, author = {Eli Biham and Stav Perle}, title = {Conditional Linear Cryptanalysis - Cryptanalysis of {DES} with Less Than 242 Complexity}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {3}, pages = {215--264}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i3.215-264}, doi = {10.13154/TOSC.V2018.I3.215-264}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BihamP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamCS16, author = {Eli Biham and Yaniv Carmeli and Adi Shamir}, title = {Bug Attacks}, journal = {J. Cryptol.}, volume = {29}, number = {4}, pages = {775--805}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9209-1}, doi = {10.1007/S00145-015-9209-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnBDK16, author = {Achiya Bar{-}On and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Efficient Slide Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2016}, url = {http://eprint.iacr.org/2016/1177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnBDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamCJ15, author = {Eli Biham and Rafi Chen and Antoine Joux}, title = {Cryptanalysis of {SHA-0} and Reduced {SHA-1}}, journal = {J. Cryptol.}, volume = {28}, number = {1}, pages = {110--160}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9179-8}, doi = {10.1007/S00145-014-9179-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamDKS15, author = {Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Attacks on {IDEA} with at Least 6 Rounds}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {209--239}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9162-9}, doi = {10.1007/S00145-013-9162-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BihamC14, author = {Eli Biham and Yaniv Carmeli}, editor = {Antoine Joux and Amr M. Youssef}, title = {An Improvement of Linear Cryptanalysis with Addition Operations with Applications to {FEAL-8X}}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {59--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_4}, doi = {10.1007/978-3-319-13051-4\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BihamC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamCDDKS13, author = {Eli Biham and Yaniv Carmeli and Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2013}, url = {http://eprint.iacr.org/2013/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamCDDKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AertsBMMDIKPVV12, author = {Wim Aerts and Eli Biham and Dieter De Moitie and Elke De Mulder and Orr Dunkelman and Sebastiaan Indesteege and Nathan Keller and Bart Preneel and Guy A. E. Vandenbosch and Ingrid Verbauwhede}, title = {A Practical Attack on KeeLoq}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {136--157}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9091-9}, doi = {10.1007/S00145-010-9091-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KimHPBDK12, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {7}, pages = {4948--4966}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2191655}, doi = {10.1109/TIT.2012.2191655}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KimHPBDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Biham11, author = {Eli Biham}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Differential Cryptanalysis}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {332--336}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_572}, doi = {10.1007/978-1-4419-5906-5\_572}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Biham11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDKS11, author = {Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Data-Efficient Attacks on Reduced-Round {IDEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2011}, url = {http://eprint.iacr.org/2011/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimHPBDK10, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2010}, url = {http://eprint.iacr.org/2010/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvrahamBD10, author = {Uri Avraham and Eli Biham and Orr Dunkelman}, title = {{ABC} - {A} New Framework for Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2010}, url = {http://eprint.iacr.org/2010/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvrahamBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DunkelmanB09, author = {Orr Dunkelman and Eli Biham}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The SHAvite-3 - {A} New Hash Function}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1947/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DunkelmanB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BarkanBK08, author = {Elad Barkan and Eli Biham and Nathan Keller}, title = {Instant Ciphertext-Only Cryptanalysis of {GSM} Encrypted Communication}, journal = {J. Cryptol.}, volume = {21}, number = {3}, pages = {392--429}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9001-y}, doi = {10.1007/S00145-007-9001-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BarkanBK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/BihamS08, author = {Eli Biham and Jennifer Seberry}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {A New Very Fast Stream Cipher : Tpy}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {5}, publisher = {Australian Computer Society}, year = {2008}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/BihamS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BihamCS08, author = {Eli Biham and Yaniv Carmeli and Adi Shamir}, editor = {David A. Wagner}, title = {Bug Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {221--240}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_13}, doi = {10.1007/978-3-540-85174-5\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BihamCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IndesteegeKDBP08, author = {Sebastiaan Indesteege and Nathan Keller and Orr Dunkelman and Eli Biham and Bart Preneel}, editor = {Nigel P. Smart}, title = {A Practical Attack on KeeLoq}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_1}, doi = {10.1007/978-3-540-78967-3\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK08, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Kaisa Nyberg}, title = {A Unified Approach to Related-Key Attacks}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {73--96}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_5}, doi = {10.1007/978-3-540-71039-4\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamC08, author = {Eli Biham and Yaniv Carmeli}, editor = {Kaisa Nyberg}, title = {Efficient Reconstruction of {RC4} Keys from Internal States}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {270--288}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_17}, doi = {10.1007/978-3-540-71039-4\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham08, author = {Eli Biham}, editor = {Kaisa Nyberg}, title = {New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {444--461}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_28}, doi = {10.1007/978-3-540-71039-4\_28}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Biham08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BihamGI08, author = {Eli Biham and Yaron J. Goren and Yuval Ishai}, editor = {Ran Canetti}, title = {Basing Weak Public-Key Cryptography on Strong One-Way Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {55--72}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_4}, doi = {10.1007/978-3-540-78524-8\_4}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BihamGI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BihamDK07, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Masayuki Abe}, title = {A Simple Related-Key Attack on the Full {SHACAL-1}}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {20--30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_2}, doi = {10.1007/11967668\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BihamDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK07, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Alex Biryukov}, title = {Improved Slide Attacks}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {153--166}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_10}, doi = {10.1007/978-3-540-74619-5\_10}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/BihamDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK07a, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Alex Biryukov}, title = {A New Attack on 6-Round {IDEA}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {211--224}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_14}, doi = {10.1007/978-3-540-74619-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7021, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, title = {Symmetric Cryptography, 07.01. - 12.01.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07021}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/portals/07021/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2006, editor = {Eli Biham and Amr M. Youssef}, title = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74462-7}, doi = {10.1007/978-3-540-74462-7}, isbn = {978-3-540-74461-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07, author = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, title = {07021 Executive Summary -- Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 07.01. - 12.01.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07021}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/1020}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07a, author = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, title = {07021 Abstracts Collection -- Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 07.01. - 12.01.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07021}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/1037}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamD07, author = {Eli Biham and Orr Dunkelman}, title = {Differential Cryptanalysis in Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2007}, url = {http://eprint.iacr.org/2007/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamD07a, author = {Eli Biham and Orr Dunkelman}, title = {A Framework for Iterative Hash Functions - {HAIFA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2007}, url = {http://eprint.iacr.org/2007/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamD07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamBBMR06, author = {Eli Biham and Michel Boyer and P. Oscar Boykin and Tal Mor and Vwani P. Roychowdhury}, title = {A Proof of the Security of Quantum Key Distribution}, journal = {J. Cryptol.}, volume = {19}, number = {4}, pages = {381--439}, year = {2006}, url = {https://doi.org/10.1007/s00145-005-0011-3}, doi = {10.1007/S00145-005-0011-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamBBMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamDK06, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Xuejia Lai and Kefei Chen}, title = {New Cryptanalytic Results on {IDEA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {412--427}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_27}, doi = {10.1007/11935230\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamDK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarkanBS06, author = {Elad Barkan and Eli Biham and Adi Shamir}, editor = {Cynthia Dwork}, title = {Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {1--21}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_1}, doi = {10.1007/11818175\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarkanBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BihamDK06, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {David Pointcheval}, title = {Related-Key Impossible Differential Attacks on 8-Round {AES-192}}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {21--33}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_2}, doi = {10.1007/11605805\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BihamDK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamBS05, author = {Eli Biham and Alex Biryukov and Adi Shamir}, title = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials}, journal = {J. Cryptol.}, volume = {18}, number = {4}, pages = {291--311}, year = {2005}, url = {https://doi.org/10.1007/s00145-005-0129-3}, doi = {10.1007/S00145-005-0129-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BihamBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Bimal K. Roy}, title = {A Related-Key Rectangle Attack on the Full {KASUMI}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {443--461}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_24}, doi = {10.1007/11593447\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamCJCLJ05, author = {Eli Biham and Rafi Chen and Antoine Joux and Patrick Carribault and Christophe Lemuet and William Jalby}, editor = {Ronald Cramer}, title = {Collisions of {SHA-0} and Reduced {SHA-1}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {36--57}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_3}, doi = {10.1007/11426639\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamCJCLJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Ronald Cramer}, title = {Related-Key Boomerang and Rectangle Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {507--525}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_30}, doi = {10.1007/11426639\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK05, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Henri Gilbert and Helena Handschuh}, title = {New Combined Attacks on Block Ciphers}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {126--144}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_9}, doi = {10.1007/11502760\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamGN05, author = {Eli Biham and Louis Granboulan and Phong Q. Nguyen}, editor = {Henri Gilbert and Helena Handschuh}, title = {Impossible Fault Analysis of {RC4} and Differential Fault Analysis of {RC4}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {359--367}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_24}, doi = {10.1007/11502760\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamGN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BarkanB05, author = {Elad Barkan and Eli Biham}, editor = {Bart Preneel and Stafford E. Tavares}, title = {Conditional Estimators: An Effective Attack on {A5/1}}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {1--19}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_1}, doi = {10.1007/11693383\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BarkanB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Biham05, author = {Eli Biham}, editor = {Henk C. A. van Tilborg}, title = {Differential Cryptanalysis}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_108}, doi = {10.1007/0-387-23483-7\_108}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Biham05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-quant-ph-0511175, author = {Eli Biham and Michel Boyer and P. Oscar Boykin and Tal Mor and Vwani P. Roychowdhury}, title = {A Proof of the Security of Quantum Key Distribution}, journal = {CoRR}, volume = {abs/quant-ph/0511175}, year = {2005}, url = {http://arxiv.org/abs/quant-ph/0511175}, eprinttype = {arXiv}, eprint = {quant-ph/0511175}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-quant-ph-0511175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamS05, author = {Eli Biham and Jennifer Seberry}, title = {Py (Roo): {A} Fast and Secure Stream Cipher using Rolling Arrays}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2005}, url = {http://eprint.iacr.org/2005/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BihamBKM04, author = {Eli Biham and Gilles Brassard and Dan Kenigsberg and Tal Mor}, title = {Quantum computing without entanglement}, journal = {Theor. Comput. Sci.}, volume = {320}, number = {1}, pages = {15--33}, year = {2004}, url = {https://doi.org/10.1016/j.tcs.2004.03.041}, doi = {10.1016/J.TCS.2004.03.041}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BihamBKM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BihamC04, author = {Eli Biham and Rafi Chen}, editor = {Matthew K. Franklin}, title = {Near-Collisions of {SHA-0}}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {290--305}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_18}, doi = {10.1007/978-3-540-28628-8\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BihamC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamC04, author = {Eli Biham and Rafi Chen}, title = {Near-Collisions of {SHA-0}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2004}, url = {http://eprint.iacr.org/2004/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarkanBK03, author = {Elad Barkan and Eli Biham and Nathan Keller}, editor = {Dan Boneh}, title = {Instant Ciphertext-Only Cryptanalysis of {GSM} Encrypted Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {600--616}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_35}, doi = {10.1007/978-3-540-45146-4\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarkanBK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK03, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Thomas Johansson}, title = {Differential-Linear Cryptanalysis of Serpent}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {9--21}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_2}, doi = {10.1007/978-3-540-39887-5\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK03a, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Thomas Johansson}, title = {Rectangle Attacks on 49-Round {SHACAL-1}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {22--35}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_3}, doi = {10.1007/978-3-540-39887-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2003, editor = {Eli Biham}, title = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9}, doi = {10.1007/3-540-39200-9}, isbn = {3-540-14039-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/BihamBBGM02, author = {Eli Biham and Michel Boyer and Gilles Brassard and Jeroen van de Graaf and Tal Mor}, title = {Security of Quantum Key Distribution against All Collective Attacks}, journal = {Algorithmica}, volume = {34}, number = {4}, pages = {372--388}, year = {2002}, url = {https://doi.org/10.1007/s00453-002-0973-6}, doi = {10.1007/S00453-002-0973-6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/BihamBBGM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Biham02, author = {Eli Biham}, title = {How to decrypt or even substitute DES-encrypted messages in 2\({}^{\mbox{28}}\) steps}, journal = {Inf. Process. Lett.}, volume = {84}, number = {3}, pages = {117--124}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(02)00269-7}, doi = {10.1016/S0020-0190(02)00269-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Biham02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamK02, author = {Eli Biham and Lars R. Knudsen}, title = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode}, journal = {J. Cryptol.}, volume = {15}, number = {1}, pages = {47--59}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0016-5}, doi = {10.1007/S00145-001-0016-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BarkanB02, author = {Elad Barkan and Eli Biham}, editor = {Yuliang Zheng}, title = {In How Many Ways Can You Write Rijndael?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {160--175}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_10}, doi = {10.1007/3-540-36178-2\_10}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BarkanB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Yuliang Zheng}, title = {Enhancing Differential-Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {254--266}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_16}, doi = {10.1007/3-540-36178-2\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Joan Daemen and Vincent Rijmen}, title = {New Results on Boomerang and Rectangle Attacks}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_1}, doi = {10.1007/3-540-45661-9\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDK02, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {New Results on Boomerang and Rectangle Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2002}, url = {http://eprint.iacr.org/2002/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarkanB02, author = {Elad Barkan and Eli Biham}, title = {In How Many Ways Can You Write Rijndael?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2002}, url = {http://eprint.iacr.org/2002/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarkanB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarkanB02a, author = {Elad Barkan and Eli Biham}, title = {The Book of Rijndaels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2002}, url = {http://eprint.iacr.org/2002/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarkanB02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/FriedmanBIS01, author = {Roy Friedman and Eli Biham and Ayal Itzkovitz and Assaf Schuster}, title = {Symphony: An Infrastructure for Managing Virtual Servers}, journal = {Clust. Comput.}, volume = {4}, number = {3}, pages = {221--233}, year = {2001}, url = {https://doi.org/10.1023/A:1011498424351}, doi = {10.1023/A:1011498424351}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/FriedmanBIS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Birgit Pfitzmann}, title = {The Rectangle Attack - Rectangling the Serpent}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {340--357}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_21}, doi = {10.1007/3-540-44987-6\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, editor = {Mitsuru Matsui}, title = {Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {16--27}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_2}, doi = {10.1007/3-540-45473-X\_2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamFMR01, author = {Eli Biham and Vladimir Furman and Michal Misztal and Vincent Rijmen}, editor = {Mitsuru Matsui}, title = {Differential Cryptanalysis of {Q}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {174--186}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_15}, doi = {10.1007/3-540-45473-X\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamFMR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {The Rectangle Attack - Rectangling the Serpent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2001}, url = {http://eprint.iacr.org/2001/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/BihamF00, author = {Eli Biham and Vladimir Furman}, title = {Impossible Differential on 8-Round MARS' Core}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {186--194}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/BihamF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/AndersonBK00, author = {Ross J. Anderson and Eli Biham and Lars R. Knudsen}, title = {The Case for Serpent}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {349--354}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aes/AndersonBK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Biham00, author = {Eli Biham}, editor = {Bart Preneel}, title = {Cryptanalysis of Patarin's 2-Round Public Key System with {S} Boxes {(2R)}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {408--416}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_28}, doi = {10.1007/3-540-45539-6\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Biham00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BihamD00, author = {Eli Biham and Orr Dunkelman}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Cryptanalysis of the {A5/1} {GSM} Stream Cipher}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {43--51}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_5}, doi = {10.1007/3-540-44495-5\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BihamD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BihamF00, author = {Eli Biham and Vladimir Furman}, editor = {Bimal K. Roy and Eiji Okamoto}, title = {Improved Impossible Differentials on Twofish}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {80--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44495-5\_8}, doi = {10.1007/3-540-44495-5\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BihamF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BihamBBMR00, author = {Eli Biham and Michel Boyer and P. Oscar Boykin and Tal Mor and Vwani P. Roychowdhury}, editor = {F. Frances Yao and Eugene M. Luks}, title = {A proof of the security of quantum key distribution (extended abstract)}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {715--724}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335406}, doi = {10.1145/335305.335406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BihamBBMR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BihamBR99, author = {Eli Biham and Dan Boneh and Omer Reingold}, title = {Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring}, journal = {Inf. Process. Lett.}, volume = {70}, number = {2}, pages = {83--87}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00047-2}, doi = {10.1016/S0020-0190(99)00047-2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/BihamBR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Biham99, author = {Eli Biham}, title = {Cryptanalysis of Triple Modes of Operation}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {161--184}, year = {1999}, url = {https://doi.org/10.1007/s001459900050}, doi = {10.1007/S001459900050}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Biham99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamBS99, author = {Eli Biham and Alex Biryukov and Adi Shamir}, editor = {Jacques Stern}, title = {Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {12--23}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_2}, doi = {10.1007/3-540-48910-X\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamBS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/FriedmanSIBHKKV99, author = {Roy Friedman and Assaf Schuster and Ayal Itzkovitz and Eli Biham and Erez Hadad and Vladislav Kalinovsky and Sergey Kleyman and Roman Vitenberg}, editor = {Patrick Amestoy and Philippe Berger and Michel J. Dayd{\'{e}} and Iain S. Duff and Val{\'{e}}rie Frayss{\'{e}} and Luc Giraud and Daniel Ruiz}, title = {Symphony: Managing Virtual Servers in the Global Village}, booktitle = {Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31 - September 3, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1685}, pages = {777--784}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48311-X\_110}, doi = {10.1007/3-540-48311-X\_110}, timestamp = {Tue, 04 Jun 2019 14:36:07 +0200}, biburl = {https://dblp.org/rec/conf/europar/FriedmanSIBHKKV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamBS99, author = {Eli Biham and Alex Biryukov and Adi Shamir}, editor = {Lars R. Knudsen}, title = {Miss in the Middle Attacks on {IDEA} and Khufu}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {124--138}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_10}, doi = {10.1007/3-540-48519-8\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamBS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Biham98, author = {Eli Biham}, title = {Cryptanalysis of Multiple Modes of Operation}, journal = {J. Cryptol.}, volume = {11}, number = {1}, pages = {45--58}, year = {1998}, url = {https://doi.org/10.1007/s001459900034}, doi = {10.1007/S001459900034}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Biham98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BihamS98, author = {Eli Biham and Amichai Shulman}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {User-Defined Divisibility of Ecash and a Practical Implementation}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {1--18}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_1}, doi = {10.1007/10721064\_1}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BihamS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AndersonBK98, author = {Ross J. Anderson and Eli Biham and Lars R. Knudsen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {Serpent and Smartcards}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {246--253}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_23}, doi = {10.1007/10721064\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AndersonBK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamK98, author = {Eli Biham and Lars R. Knudsen}, editor = {Kaisa Nyberg}, title = {Cryptanalysis of the {ANSI} {X9.52} {CBCM} Mode}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {100--111}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054120}, doi = {10.1007/BFB0054120}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamAK98, author = {Eli Biham and Ross J. Anderson and Lars R. Knudsen}, editor = {Serge Vaudenay}, title = {Serpent: {A} New Block Cipher Proposal}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {222--238}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_15}, doi = {10.1007/3-540-69710-1\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamAK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qcqc/BironBBGL98, author = {David Biron and Ofer Biham and Eli Biham and Markus Grassl and Daniel A. Lidar}, editor = {Colin P. Williams}, title = {Generalized Grover Search Algorithm for Arbitrary Initial Amplitude Distribution}, booktitle = {Quantum Computing and Quantum Communications, First {NASA} International Conference, QCQC'98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1509}, pages = {140--147}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49208-9\_10}, doi = {10.1007/3-540-49208-9\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qcqc/BironBBGL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BihamBDRS98, author = {Eli Biham and Alex Biryukov and Orr Dunkelman and Eran Richardson and Adi Shamir}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {362--376}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_27}, doi = {10.1007/3-540-48892-8\_27}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BihamBDRS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamB97, author = {Eli Biham and Alex Biryukov}, title = {An Improvement of Davies' Attack on {DES}}, journal = {J. Cryptol.}, volume = {10}, number = {3}, pages = {195--206}, year = {1997}, url = {https://doi.org/10.1007/s001459900027}, doi = {10.1007/S001459900027}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BihamB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BihamS97, author = {Eli Biham and Adi Shamir}, editor = {Burton S. Kaliski Jr.}, title = {Differential Fault Analysis of Secret Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {513--525}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052259}, doi = {10.1007/BFB0052259}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BihamS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham97, author = {Eli Biham}, editor = {Eli Biham}, title = {Cryptanalysis of Ladder-DES}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {134--138}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052341}, doi = {10.1007/BFB0052341}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biham97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham97a, author = {Eli Biham}, editor = {Eli Biham}, title = {A Fast New {DES} Implementation in Software}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {260--272}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052352}, doi = {10.1007/BFB0052352}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biham97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1997, editor = {Eli Biham}, title = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052329}, doi = {10.1007/BFB0052329}, isbn = {3-540-63247-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR97-061, author = {Eli Biham and Dan Boneh and Omer Reingold}, title = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR97-061}}, year = {1997}, url = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-061/index.html}, eprinttype = {ECCC}, eprint = {TR97-061}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR97-061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamBR97, author = {Eli Biham and Dan Boneh and Omer Reingold}, title = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {1997}, url = {http://eprint.iacr.org/1997/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamBR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Ben-AroyaB96, author = {Ishai Ben{-}Aroya and Eli Biham}, title = {Differential Cryptanalysis of Lucifer}, journal = {J. Cryptol.}, volume = {9}, number = {1}, pages = {21--34}, year = {1996}, url = {https://doi.org/10.1007/BF02254790}, doi = {10.1007/BF02254790}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Ben-AroyaB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndersonB96, author = {Ross J. Anderson and Eli Biham}, editor = {Dieter Gollmann}, title = {{TIGER:} {A} Fast New Hash Function}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {89--97}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_46}, doi = {10.1007/3-540-60865-6\_46}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndersonB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndersonB96a, author = {Ross J. Anderson and Eli Biham}, editor = {Dieter Gollmann}, title = {Two Practical and Provably Secure Block Ciphers: {BEARS} and {LION}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {113--120}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_48}, doi = {10.1007/3-540-60865-6\_48}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndersonB96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Biham94, author = {Eli Biham}, title = {New Types of Cryptanalytic Attacks Using Related Keys}, journal = {J. Cryptol.}, volume = {7}, number = {4}, pages = {229--246}, year = {1994}, url = {https://doi.org/10.1007/BF00203965}, doi = {10.1007/BF00203965}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Biham94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Biham94, author = {Eli Biham}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Cryptanalysis of Multiple Modes of Operation}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {278--292}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000441}, doi = {10.1007/BFB0000441}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Biham94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BihamB94, author = {Eli Biham and Alex Biryukov}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {How to Strengthen {DES} Using Existing Hardware}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {398--412}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000451}, doi = {10.1007/BFB0000451}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BihamB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Biham94, author = {Eli Biham}, editor = {Alfredo De Santis}, title = {On Matsui's Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {341--355}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053449}, doi = {10.1007/BFB0053449}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Biham94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamB94, author = {Eli Biham and Alex Biryukov}, editor = {Alfredo De Santis}, title = {An Improvement of Davies' Attack on {DES}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {461--467}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053464}, doi = {10.1007/BFB0053464}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamK94, author = {Eli Biham and Paul C. Kocher}, editor = {Bart Preneel}, title = {A Known Plaintext Attack on the {PKZIP} Stream Cipher}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {144--153}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_12}, doi = {10.1007/3-540-60590-8\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0032320, author = {Eli Biham and Adi Shamir}, title = {Differential Cryptanalysis of the Data Encryption Standard}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/978-1-4613-9314-6}, doi = {10.1007/978-1-4613-9314-6}, isbn = {978-1-4613-9316-0}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0032320.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-AroyaB93, author = {Ishai Ben{-}Aroya and Eli Biham}, editor = {Douglas R. Stinson}, title = {Differential Cryptanalysis of Lucifer}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {187--199}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_17}, doi = {10.1007/3-540-48329-2\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-AroyaB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Biham93, author = {Eli Biham}, editor = {Tor Helleseth}, title = {New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {398--409}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_34}, doi = {10.1007/3-540-48285-7\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Biham93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Biham93, author = {Eli Biham}, editor = {Ross J. Anderson}, title = {On Modes of Operation}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {116--120}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_14}, doi = {10.1007/3-540-58108-1\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Biham93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BihamS92, author = {Eli Biham and Adi Shamir}, editor = {Ernest F. Brickell}, title = {Differential Cryptanalysis of the Full 16-Round {DES}}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {487--496}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_34}, doi = {10.1007/3-540-48071-4\_34}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BihamS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BihamS91, author = {Eli Biham and Adi Shamir}, title = {Differential Cryptanalysis of DES-like Cryptosystems}, journal = {J. Cryptol.}, volume = {4}, number = {1}, pages = {3--72}, year = {1991}, url = {https://doi.org/10.1007/BF00630563}, doi = {10.1007/BF00630563}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BihamS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BihamS91, author = {Eli Biham and Adi Shamir}, editor = {Joan Feigenbaum}, title = {Differential Cryptanalysis of Snefru, Khafre, REDOC-II, {LOKI} and Lucifer}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {156--171}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_11}, doi = {10.1007/3-540-46766-1\_11}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BihamS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BihamS91, author = {Eli Biham and Adi Shamir}, editor = {Donald W. Davies}, title = {Differential Cryptanalysis of Feal and N-Hash}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {1--16}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_1}, doi = {10.1007/3-540-46416-6\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BihamS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Biham91, author = {Eli Biham}, editor = {Donald W. Davies}, title = {Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {532--534}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_49}, doi = {10.1007/3-540-46416-6\_49}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Biham91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BihamS90, author = {Eli Biham and Adi Shamir}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Differential Cryptanalysis of DES-like Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {2--21}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_1}, doi = {10.1007/3-540-38424-3\_1}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BihamS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.