Eli Biham


Ontology type: schema:Person     


Person Info

NAME

Eli

SURNAME

Biham

Publications in SciGraph latest 50 shown

  • 2018-07 Efficient Slide Attacks in JOURNAL OF CRYPTOLOGY
  • 2016-10 Bug Attacks in JOURNAL OF CRYPTOLOGY
  • 2015-04 New Attacks on IDEA with at Least 6 Rounds in JOURNAL OF CRYPTOLOGY
  • 2015-01 Cryptanalysis of SHA-0 and Reduced SHA-1 in JOURNAL OF CRYPTOLOGY
  • 2014 An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2012-01 A Practical Attack on KeeLoq in JOURNAL OF CRYPTOLOGY
  • 2008-07 Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication in JOURNAL OF CRYPTOLOGY
  • 2008 A Unified Approach to Related-Key Attacks in FAST SOFTWARE ENCRYPTION
  • 2008 Bug Attacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2008 A Practical Attack on KeeLoq in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2008
  • 2008 New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru in FAST SOFTWARE ENCRYPTION
  • 2008 Basing Weak Public-Key Cryptography on Strong One-Way Functions in THEORY OF CRYPTOGRAPHY
  • 2008 Efficient Reconstruction of RC4 Keys from Internal States in FAST SOFTWARE ENCRYPTION
  • 2007 Improved Slide Attacks in FAST SOFTWARE ENCRYPTION
  • 2007 A New Attack on 6-Round IDEA in FAST SOFTWARE ENCRYPTION
  • 2006-10 A Proof of the Security of Quantum Key Distribution in JOURNAL OF CRYPTOLOGY
  • 2006-05-17 A fast new DES implementation in software in FAST SOFTWARE ENCRYPTION
  • 2006-05-17 Cryptanalysis of Ladder-DES in FAST SOFTWARE ENCRYPTION
  • 2006-05-17 Differential fault analysis of secret key cryptosystems in ADVANCES IN CRYPTOLOGY — CRYPTO '97
  • 2006 Related-Key Impossible Differential Attacks on 8-Round AES-192 in TOPICS IN CRYPTOLOGY – CT-RSA 2006
  • 2006 Conditional Estimators: An Effective Attack on A5/1 in SELECTED AREAS IN CRYPTOGRAPHY
  • 2006 A Simple Related-Key Attack on the Full SHACAL-1 in TOPICS IN CRYPTOLOGY – CT-RSA 2007
  • 2006 Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs in ADVANCES IN CRYPTOLOGY - CRYPTO 2006
  • 2006 New Cryptanalytic Results on IDEA in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2006
  • 2005-09 Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials in JOURNAL OF CRYPTOLOGY
  • 2005 New Combined Attacks on Block Ciphers in FAST SOFTWARE ENCRYPTION
  • 2005 Collisions of SHA-0 and Reduced SHA-1 in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • 2005 Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4 in FAST SOFTWARE ENCRYPTION
  • 2005 A Related-Key Rectangle Attack on the Full KASUMI in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2005
  • 2005 Related-Key Boomerang and Rectangle Attacks in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • 2004 Near-Collisions of SHA-0 in ADVANCES IN CRYPTOLOGY – CRYPTO 2004
  • 2003 Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication in ADVANCES IN CRYPTOLOGY - CRYPTO 2003
  • 2003 Rectangle Attacks on 49-Round SHACAL-1 in FAST SOFTWARE ENCRYPTION
  • 2003 Differential-Linear Cryptanalysis of Serpent in FAST SOFTWARE ENCRYPTION
  • 2002-04-26 Cryptanalysis of the A5/1 GSM Stream Cipher in PROGRESS IN CRYPTOLOGY —INDOCRYPT 2000
  • 2002-04-26 Improved Impossible Differentials on Twofish in PROGRESS IN CRYPTOLOGY —INDOCRYPT 2000
  • 2002-03 Cryptanalysis of the ANSI X9.52 CBCM mode in JOURNAL OF CRYPTOLOGY
  • 2002 Enhancing Differential-Linear Cryptanalysis in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2002
  • 2002 New Results on Boomerang and Rectangle Attacks in FAST SOFTWARE ENCRYPTION
  • 2002 In How Many Ways Can You Write Rijndael? in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2002
  • 2002 Linear Cryptanalysis of Reduced Round Serpent in FAST SOFTWARE ENCRYPTION
  • 2002 Differential Cryptanalysis of Q in FAST SOFTWARE ENCRYPTION
  • 2001-07-13 Differential Cryptanalysis of Lucifer in ADVANCES IN CRYPTOLOGY — CRYPTO’ 93
  • 2001-07 Symphony: An Infrastructure for Managing Virtual Servers in CLUSTER COMPUTING
  • 2001-05-18 Miss in the Middle Attacks on IDEA and Khufu in FAST SOFTWARE ENCRYPTION
  • 2001-05-18 Differential Cryptanalysis of the Full 16-round DES in ADVANCES IN CRYPTOLOGY — CRYPTO’ 92
  • 2001-05-18 Differential Cryptanalysis of DES-like Cryptosystems in ADVANCES IN CRYPTOLOGY-CRYPT0’ 90
  • 2001-05-18 Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer in ADVANCES IN CRYPTOLOGY — CRYPTO ’91
  • 2001-05-18 Differential Cryptanalysis of Feal and N-Hash in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’91
  • 2001-04-15 The Rectangle Attack — Rectangling the Serpent in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.6451.6", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Biham", 
        "givenName": "Eli", 
        "id": "sg:person.014332733635.97", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014332733635.97"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:50", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1605.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.014332733635.97'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.014332733635.97'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.014332733635.97'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.014332733635.97'


     




    Preview window. Press ESC to close (or click here)


    ...