1![Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh† Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†](https://www.pdfsearch.io/img/940bdd406509372becc43d15f9bdbce2.jpg) | Add to Reading ListSource URL: omereingold.files.wordpress.comLanguage: English - Date: 2014-10-21 18:30:18
|
---|
2![A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email: A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:](https://www.pdfsearch.io/img/42541da5fdba4263f541ff60342e8d1d.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2007-09-25 01:00:00
|
---|
3![New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha](https://www.pdfsearch.io/img/066763a0af144f956c4f871ed7379558.jpg) | Add to Reading ListSource URL: www.cs.haifa.ac.ilLanguage: English - Date: 2013-07-02 14:49:27
|
---|
4![In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il](https://www.pdfsearch.io/img/64e77ad3ebe225670ccdda4b4b6438a0.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2007-08-31 13:50:33
|
---|
5![The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008 The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008](https://www.pdfsearch.io/img/2d2ae1604ab12dd9114887c77c0bb7e5.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2008-02-29 13:11:28
|
---|
6![Di
erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir Di
erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir](https://www.pdfsearch.io/img/f120dd8b731912f0e8b61e7a3359f1a8.jpg) | Add to Reading ListSource URL: zoo.cs.yale.eduLanguage: English - Date: 2012-10-14 17:28:33
|
---|
7![Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche](https://www.pdfsearch.io/img/19f7663a7a1d58700a24835417f68cfb.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:30
|
---|
8![FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration](https://www.pdfsearch.io/img/1593f9dbd3cd1b4b6c19c2e8c9577b5f.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2006-03-10 16:40:02
|
---|
9![Cryptographic Hash Workshop Cryptographic Hash Workshop](https://www.pdfsearch.io/img/3f68818a4665953a168975a9d4d4cf88.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 08:23:24
|
---|
10![Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel](https://www.pdfsearch.io/img/44b7b25a280b0625b0bbb61eb56e7a23.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 1999-08-30 11:43:26
|
---|