Eli Biham

Results: 19



#Item
1

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

Add to Reading List

Source URL: omereingold.files.wordpress.com

Language: English - Date: 2014-10-21 18:30:18
    2

    A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-25 01:00:00
      3

      New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha

      Add to Reading List

      Source URL: www.cs.haifa.ac.il

      Language: English - Date: 2013-07-02 14:49:27
        4

        In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-08-31 13:50:33
          5

          The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2008-02-29 13:11:28
            6Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL

            Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

            Add to Reading List

            Source URL: zoo.cs.yale.edu

            Language: English - Date: 2012-10-14 17:28:33
            7ICE / Crypt / Advanced Encryption Standard / Cipher / Paillier cryptosystem / Khufu and Khafre / Cryptography / Chosen-plaintext attack / Ciphertext

            Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

            Add to Reading List

            Source URL: www.schneier.com

            Language: English - Date: 2014-03-02 23:18:30
            8Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers

            FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2006-03-10 16:40:02
            9Eli Biham / NESSIE / Symmetric-key algorithm / Serpent / Cryptographic hash function / Boomerang attack / Advanced Encryption Standard / Cryptanalysis / KASUMI / Cryptography / Block ciphers / SHACAL

            Cryptographic Hash Workshop

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2012-06-20 08:23:24
            10Knowledge / Preprint / Eurocrypt / International Cryptology Conference / Asiacrypt / Scientific literature / ArXiv / Electronic Colloquium on Computational Complexity / Peer review / Publishing / Academic publishing / Academia

            Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 1999-08-30 11:43:26
            UPDATE