Cryptographers' World
 

Eli Biham


Author's Web Page Link

64 papers in database with 5428 citations StarStarStarStar

Editor of 3 conference proceedings books

H-number: 31

Conference Proceedings

 
1. Eli BihamAmr M. Youssef, editors, Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers. Springer, 2007. ISBN 3-540-74461-4.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings. Springer, 2003. ISBN 3-540-14039-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Eli Biham, editor, Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings. Springer, 1997. ISBN 3-540-63247-6.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Elad Barkan,  Eli Biham,  Nathan Keller,  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, Journal of Cryptology, Volume 21(3), pp. 392 - 429, Springer, 2008.

[Cited 122 times Red StarRed Star]

2. Eli Biham,  Michel Boyer,  P. Oscar Boykin,  Tal Mor,  Vwani P. Roychowdhury,  A Proof of the Security of Quantum Key Distribution, Journal of Cryptology, Volume 19(4), pp. 381 - 439, Springer, 2006.

[Cited 119 times Red StarRed Star]

3. Eli Biham,  Alex Biryukov,  Adi Shamir,  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Journal of Cryptology, Volume 18(4), pp. 291 - 311, Springer, 2005.

[Cited 156 times Red StarRed Star]

4. Eli Biham,  Lars R. Knudsen,  Cryptanalysis of the ANSI X9.52 CBCM Mode, Journal of Cryptology, Volume 15(1), pp. 47 - 59, Springer, 2002.

[Cited 12 times ]

5. Eli Biham,  Cryptanalysis of Triple Modes of Operation, Journal of Cryptology, Volume 12(3), pp. 161 - 184, Springer, 1999.

[Cited 21 times ]

6. Eli Biham,  Cryptanalysis of Multiple Modes of Operation, Journal of Cryptology, Volume 11(1), pp. 45 - 58, Springer, 1998.

[Cited 33 times ]

7. Eli Biham,  Alex Biryukov,  An Improvement of Davies' Attack on DES, Journal of Cryptology, Volume 10(3), pp. 195 - 206, Springer, 1997.

[Cited 39 times ]

8. Ishai Ben-Aroya,  Eli Biham,  Differential Cryptanalysis of Lucifer, Journal of Cryptology, Volume 9(1), pp. 21 - 34, Springer, 1996.

[Cited 36 times ]

9. Eli Biham,  New Types of Cryptanalytic Attacks Using Related Keys, Journal of Cryptology, Volume 7(4), pp. 229 - 246, Springer, 1994.

[Cited 245 times Red StarRed Star]

10. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology, Volume 4(1), pp. 3 - 72, Springer, 1991.

[Cited 927 times Red StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Eli Biham,  Yaniv Carmeli,  Adi Shamir,  Bug Attacks, pp. 221 - 240, CRYPTO 2008.

[Electronic Edition][Cited 7 times ]

2. Sebastiaan Indesteege,  Nathan Keller,  Orr Dunkelman,  Eli Biham,  Bart Preneel,  A Practical Attack on KeeLoq, pp. 1 - 18, EUROCRYPT 2008.

[Electronic Edition][Cited 30 times ]

3. Eli Biham,  Yaron J. Goren,  Yuval Ishai,  Basing Weak Public-Key Cryptography on Strong One-Way Functions, pp. 55 - 72, TCC 2008.

[Electronic Edition][Cited 5 times ]

4. Eli Biham,  Orr Dunkelman,  Nathan Keller,  A Unified Approach to Related-Key Attacks, pp. 73 - 96, FSE 2008.

[Electronic Edition][Cited 4 times ]

5. Eli Biham,  Yaniv Carmeli,  Efficient Reconstruction of RC4 Keys from Internal States, pp. 270 - 288, FSE 2008.

[Electronic Edition][Cited 16 times ]

6. Eli Biham,  New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru, pp. 444 - 461, FSE 2008.

[Electronic Edition][Cited 8 times ]

7. Eli Biham,  Orr Dunkelman,  Nathan Keller,  A New Attack on 6-Round IDEA, pp. 211 - 224, FSE 2007.

[Electronic Edition][Cited 5 times ]

8. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Improved Slide Attacks, pp. 153 - 166, FSE 2007.

[Electronic Edition][Cited 15 times ]

9. Eli Biham,  Orr Dunkelman,  Nathan Keller,  A Simple Related-Key Attack on the Full SHACAL-1, pp. 20 - 30, CT-RSA 2007.

[Electronic Edition][Cited 12 times ]

10. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Related-Key Impossible Differential Attacks on 8-Round AES-192, pp. 21 - 33, CT-RSA 2006.

[Electronic Edition][Cited 46 times ]

11. Eli Biham,  Orr Dunkelman,  Nathan Keller,  New Cryptanalytic Results on IDEA, pp. 412 - 427, ASIACRYPT 2006.

[Electronic Edition][Cited 9 times ]

12. Elad Barkan,  Eli Biham,  Adi Shamir,  Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs, pp. 1 - 21, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

13. Eli Biham,  Orr Dunkelman,  Nathan Keller,  A Related-Key Rectangle Attack on the Full KASUMI, pp. 443 - 461, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

14. Elad Barkan,  Eli Biham,  Conditional Estimators: An Effective Attack on A5/1, pp. 1 - 19, SAC 2005.

[Electronic Edition][Cited 12 times ]

15. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Related-Key Boomerang and Rectangle Attacks, pp. 507 - 525, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 92 times Red Star]

16. Eli Biham,  Rafi Chen,  Antoine Joux,  Patrick Carribault,  Christophe Lemuet,  William Jalby,  Collisions of SHA-0 and Reduced SHA-1, pp. 36 - 57, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 184 times Red StarRed Star]

17. Eli Biham,  Orr Dunkelman,  Nathan Keller,  New Combined Attacks on Block Ciphers, pp. 126 - 144, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

18. Eli Biham,  Louis Granboulan,  Phong Q. Nguyen,  Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4, pp. 359 - 367, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 42 times ]

19. Eli Biham,  Rafi Chen,  Near-Collisions of SHA-0, pp. 290 - 305, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 207 times Red StarRed Star]

20. Elad Barkan,  Eli Biham,  Nathan Keller,  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, pp. 600 - 616, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 178 times Red StarRed Star]

21. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Rectangle Attacks on 49-Round SHACAL-1, pp. 22 - 35, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

22. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Differential-Linear Cryptanalysis of Serpent, pp. 9 - 21, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

23. Elad Barkan,  Eli Biham,  In How Many Ways Can You Write Rijndael?, pp. 160 - 175, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 56 times Red Star]

24. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Enhancing Differential-Linear Cryptanalysis, pp. 254 - 266, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

25. Eli Biham,  Orr Dunkelman,  Nathan Keller,  New Results on Boomerang and Rectangle Attacks, pp. 1 - 16, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

26. Eli Biham,  Orr Dunkelman,  Nathan Keller,  The Rectangle Attack - Rectangling the Serpent, pp. 340 - 357, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 118 times Red StarRed Star]

27. Eli Biham,  Vladimir Furman,  Michal Misztal,  Vincent Rijmen,  Differential Cryptanalysis of Q, pp. 174 - 186, FSE 2001.

[Electronic Edition][Cited 2 times ]

28. Eli Biham,  Orr Dunkelman,  Nathan Keller,  Linear Cryptanalysis of Reduced Round Serpent, pp. 16 - 27, FSE 2001.

[Electronic Edition][Cited 24 times ]

29. Eli Biham,  Orr Dunkelman,  Cryptanalysis of the A5/1 GSM Stream Cipher, pp. 43 - 51, INDOCRYPT 2000.

[Electronic Edition][Cited 63 times Red Star]

30. Eli Biham,  Vladimir Furman,  Improved Impossible Differentials on Twofish, pp. 80 - 92, INDOCRYPT 2000.

[Electronic Edition][Cited 4 times ]

31. Eli Biham,  Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R), pp. 408 - 416, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

32. Eli Biham,  Alex Biryukov,  Adi Shamir,  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, pp. 12 - 23, EUROCRYPT 1999.

[Electronic Edition][Cited 218 times Red StarRed Star]

33. Eli Biham,  Alex Biryukov,  Adi Shamir,  Miss in the Middle Attacks on IDEA and Khufu, pp. 124 - 138, FSE 1999.

[Electronic Edition][Cited 99 times Red Star]

34. Eli Biham,  Alex Biryukov,  Orr Dunkelman,  Eran Richardson,  Adi Shamir,  Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, pp. 362 - 376, SAC 1998.

[Electronic Edition][Cited 25 times ]

35. Eli Biham,  Lars R. Knudsen,  Cryptanalysis of the ANSI X9.52 CBCM Mode, pp. 100 - 111, EUROCRYPT 1998.

[Electronic Edition][Cited 11 times ]

36. Eli Biham,  Ross J. Anderson,  Lars R. Knudsen,  Serpent: A New Block Cipher Proposal, pp. 222 - 238, FSE 1998.

[Electronic Edition][Cited 81 times Red Star]

37. Eli Biham,  Adi Shamir,  Differential Fault Analysis of Secret Key Cryptosystems, pp. 513 - 525, CRYPTO 1997.

[Electronic Edition][Cited 519 times Red StarRed StarRed StarRed Star]

38. Eli Biham,  Cryptanalysis of Ladder-DES, pp. 134 - 138, FSE 1997.

[Electronic Edition][Cited 9 times ]

39. Eli Biham,  A Fast New DES Implementation in Software, pp. 260 - 272, FSE 1997.

[Electronic Edition][Cited 150 times Red StarRed Star]

40. Ross J. Anderson,  Eli Biham,  TIGER: A Fast New Hash Function, pp. 89 - 97, FSE 1996.

[Electronic Edition][Cited 76 times Red Star]

41. Ross J. Anderson,  Eli Biham,  Two Practical and Provably Secure Block Ciphers: BEARS and LION, pp. 113 - 120, FSE 1996.

[Electronic Edition][Cited 101 times Red StarRed Star]

42. Eli Biham,  Paul C. Kocher,  A Known Plaintext Attack on the PKZIP Stream Cipher, pp. 144 - 153, FSE 1994.

[Electronic Edition][Cited 11 times ]

43. Eli Biham,  Cryptanalysis of Multiple Modes of Operation, pp. 278 - 292, ASIACRYPT 1994.

[Electronic Edition][Cited 25 times ]

44. Eli Biham,  Alex Biryukov,  How to Strengthen DES Using Existing Hardware, pp. 398 - 412, ASIACRYPT 1994.

[Electronic Edition][Cited 41 times ]

45. Eli Biham,  On Matsui's Linear Cryptanalysis, pp. 341 - 355, EUROCRYPT 1994.

[Electronic Edition][Cited 93 times Red Star]

46. Eli Biham,  Alex Biryukov,  An Improvement of Davies' Attack on DES, pp. 461 - 467, EUROCRYPT 1994.

[Electronic Edition][Cited 46 times ]

47. Eli Biham,  On Modes of Operation, pp. 116 - 120, FSE 1993.

[Electronic Edition][Cited 15 times ]

48. Ishai Ben-Aroya,  Eli Biham,  Differential Cryptanalysis of Lucifer, pp. 187 - 199, CRYPTO 1993.

[Electronic Edition][Cited 39 times ]

49. Eli Biham,  New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract), pp. 398 - 409, EUROCRYPT 1993.

[Electronic Edition][Cited 335 times Red StarRed StarRed Star]

50. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of the Full 16-Round DES, pp. 487 - 496, CRYPTO 1992.

[Electronic Edition][Cited 285 times Red StarRed StarRed Star]

51. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer, pp. 156 - 171, CRYPTO 1991.

[Electronic Edition][Cited 101 times Red StarRed Star]

52. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of Feal and N-Hash, pp. 1 - 16, EUROCRYPT 1991.

[Electronic Edition][Cited 81 times Red Star]

53. Eli Biham,  Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91, pp. 532 - 534, EUROCRYPT 1991.

[Electronic Edition][Cited 79 times Red Star]

54. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of DES-like Cryptosystems, pp. 2 - 21, CRYPTO 1990.

[Electronic Edition][Cited 1262 times Red StarRed StarRed StarRed StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...