Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan Efficient slide attacks. (English) Zbl 1400.94116 J. Cryptology 31, No. 3, 641-670 (2018). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Carmeli, Yaniv; Shamir, Adi Bug attacks. (English) Zbl 1365.94402 J. Cryptology 29, No. 4, 775-805 (2016). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi New attacks on IDEA with at least 6 rounds. (English) Zbl 1377.94037 J. Cryptology 28, No. 2, 209-239 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Chen, Rafi; Joux, Antoine Cryptanalysis of SHA-0 and reduced SHA-1. (English) Zbl 1334.94061 J. Cryptology 28, No. 1, 110-160 (2015). Reviewer: Adrian Atanasiu (Bucureşti) MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Aerts, Wim; Biham, Eli; De Moitié, Dieter; De Mulder, Elke; Dunkelman, Orr; Indesteege, Sebastiaan; Keller, Nathan; Preneel, Bart; Vandenbosch, Guy A. E.; Verbauwhede, Ingrid A practical attack on KeeLoq. (English) Zbl 1279.94049 J. Cryptology 25, No. 1, 136-157 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Barkan, Elad; Biham, Eli; Keller, Nathan Instant ciphertext-only cryptanalysis of GSM encrypted communication. (English) Zbl 1161.94383 J. Cryptology 21, No. 3, 392-429 (2008). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani A proof of the security of quantum key distribution. (English) Zbl 1109.68045 J. Cryptology 19, No. 4, 381-439 (2006). MSC: 68P25 68Q10 81P68 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
Biham, Eli; Biryukov, Alex; Shamir, Adi Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. (English) Zbl 1096.94023 J. Cryptology 18, No. 4, 291-311 (2005). MSC: 94A60 68P25 94A55 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Knudsen, Lars R. Cryptanalysis of the ANSI X9. 52 CBCM Mode. (English) Zbl 0992.94029 J. Cryptology 15, No. 1, 47-59 (2001). Reviewer: Jörg Desel (Eichstätt) MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli Cryptanalysis of triple modes of operation. (English) Zbl 0937.94005 J. Cryptology 12, No. 3, 161-184 (1999). Reviewer: Mario A.de Boer (Amsterdam) MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli Cryptanalysis of multiple modes of operation. (English) Zbl 0902.94013 J. Cryptology 11, No. 1, 45-58 (1998). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Biryukov, Alex An improvement of Davies’ attack on DES. (English) Zbl 0881.94012 J. Cryptology 10, No. 3, 195-205 (1997). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Ben-Aroya, Ishai; Biham, Eli Differential cryptanalysis of Lucifer. (English) Zbl 0844.94010 J. Cryptology 9, No. 1, 21-34 (1996). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli New types of cryptanalytic attacks using related keys. (English) Zbl 0812.94012 J. Cryptology 7, No. 4, 229-246 (1994). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Biham, Eli; Shamir, Adi Differential cryptanalysis of DES-like cryptosystems. (English) Zbl 0729.68017 J. Cryptology 4, No. 1, 3-72 (1991). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI