Eli Biham

Results: 19



#Item
11Key management / RSA / Cryptanalysis / Data Encryption Standard / Block cipher / Differential cryptanalysis / Eli Biham / Timing attack / Digital signature / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
12Eli Biham / ESTREAM / Jennifer Seberry / RC4 / Eli / Cryptography / Stream ciphers / Py

Pypy: Another Version of Py Eli Biham, Jennifer Seberry Department of Computer Science

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2006-03-16 09:22:47
13VEST / Cipher / Block cipher / Differential cryptanalysis / Key size / ESTREAM / Phelix / Grain / Stream ciphers / Cryptography / Py

The Truth on TPy Eli Biham∗

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2008-02-29 12:28:09
14NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
15Eli Biham / Key exchange / Diffie–Hellman key exchange / Advanced Encryption Standard / Index of cryptography articles / Cryptography / Cryptographic protocols / Data Encryption Standard

Introduction to Cryptography[removed]4444) Dr. Orr Dunkelman

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2012-10-25 14:22:57
16Block cipher / Cryptanalysis / Symmetric-key algorithm / Cipher / One-time pad / Padding / Index of cryptography articles / FEAL / Cryptography / Differential cryptanalysis / Eli Biham

Proposal for Translating Cryptology Terms to Hebrew Yossi Markovitz initiated this list. Ron Irmai, Shraga Irmai, Adi Shamir, Moti

Add to Reading List

Source URL: webcourse.cs.technion.ac.il

Language: English - Date: 2006-11-05 09:06:55
17GOST / Slide attack / Chosen-plaintext attack / Ciphertext / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Linear cryptanalysis / Integral cryptanalysis / Cryptography / Espionage / GOST standards

Improved Slide Attacks Eli Biham

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
18Advanced Encryption Standard process / National Institute of Standards and Technology / Serpent / Data Encryption Standard / MARS / Key schedule / Q / RC6 / Twofish / Cryptography / Block ciphers / Advanced Encryption Standard

The Case for Serpent Ross Anderson, Eli Biham and Lars Knudsen 24th March 2000

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 07:35:00
19Academia / Haifa / Technion / Asher Space Research Institute / Peretz Lavie / Jacob Ziv / Aaron Ciechanover / Abraham Lempel / Eli Biham / Israeli Jews / Israel / Science and technology in Israel

PDF Document

Add to Reading List

Source URL: www.focus.technion.ac.il

Language: English - Date: 2013-01-17 08:55:26
UPDATE