The following pages link to Eli Biham (Q321308):
Displaying 50 items.
- Bug attacks (Q321310) (← links)
- A practical attack on KeeLoq (Q421044) (← links)
- Quantum computing without entanglement (Q596121) (← links)
- Techniques for cryptanalysis of block ciphers. (to appear) (Q764863) (← links)
- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack (Q778923) (← links)
- Differential cryptanalysis of DES-like cryptosystems (Q807011) (← links)
- Unintended features of APIs: cryptanalysis of incremental HMAC (Q832351) (← links)
- A proof of the security of quantum key distribution (Q862412) (← links)
- Instant ciphertext-only cryptanalysis of GSM encrypted communication (Q1021231) (← links)
- Cryptanalysis of triple modes of operation (Q1304975) (← links)
- New types of cryptanalytic attacks using related keys (Q1340196) (← links)
- An improvement of Davies' attack on DES (Q1364902) (← links)
- Cryptanalysis of multiple modes of operation (Q1382148) (← links)
- Cryptanalysis of the ANSI X9. 52 CBCM Mode (Q1596368) (← links)
- Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring (Q1606932) (← links)
- How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (Q1853119) (← links)
- Security of quantum key distribution against all collective attacks (Q1871825) (← links)
- Differential cryptanalysis of Lucifer (Q1912769) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- New attacks on IDEA with at least 6 rounds (Q2344046) (← links)
- Efficient slide attacks (Q2413611) (← links)
- Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials (Q2499261) (← links)
- (Q2707591) (← links)
- (Q2707595) (← links)
- (Q2778856) (← links)
- An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X (Q2798604) (← links)
- (Q3046332) (← links)
- Linear Cryptanalysis of Reduced Round Serpent (Q3046584) (← links)
- Differential Cryptanalysis of Q (Q3046603) (← links)
- (Q3136298) (← links)
- A proof of the security of quantum key distribution (extended abstract) (Q3192046) (← links)
- (Q3374925) (← links)
- Improved Slide Attacks (Q3524887) (← links)
- A New Attack on 6-Round IDEA (Q3524892) (← links)
- A Unified Approach to Related-Key Attacks (Q3525662) (← links)
- Efficient Reconstruction of RC4 Keys from Internal States (Q3525679) (← links)
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru (Q3525694) (← links)
- Bug Attacks (Q3600222) (← links)
- (Q4035714) (← links)
- Differential Cryptanalysis of Feal and N-Hash (Q4037445) (← links)
- (Q4037499) (← links)
- (Q4249631) (← links)
- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials (Q4250749) (← links)
- (Q4250830) (← links)
- (Q4279560) (← links)
- (Q4318717) (← links)
- (Q4341746) (← links)
- (Q4341797) (← links)
- (Q4342474) (← links)
- (Q4364574) (← links)