Biham, Eli
47  Ergebnisse:
Personensuche X
?
1

Unintended Features of APIs: Cryptanalysis of Incremental H..:

, In: Selected Areas in Cryptography; Lecture Notes in Computer Science,
Benmocha, Gal ; Biham, Eli ; Perle, Stav - p. 301-325 , 2021
 
?
2

Breaking the Bluetooth Pairing – The Fixed Coordinate Inval..:

, In: Lecture Notes in Computer Science; Selected Areas in Cryptography – SAC 2019,
Biham, Eli ; Neumann, Lior - p. 250-273 , 2020
 
?
3

K7: A Protected Protocol for Industrial Control Systems tha..:

, In: Sixth Annual Industrial Control System Security (ICSS) Workshop,
Biham, Eli ; Bitan, Sara ; Dankner, Alon - p. 1-12 , 2020
 
?
5

Efficient Slide Attacks:

Bar-On, Achiya ; Biham, Eli ; Dunkelman, Orr.
Journal of Cryptology.  31 (2017)  3 - p. 641-670 , 2017
 
?
6

Bug Attacks:

Biham, Eli ; Carmeli, Yaniv ; Shamir, Adi
Journal of Cryptology.  29 (2015)  4 - p. 775-805 , 2015
 
?
7

Cryptanalysis of SHA-0 and Reduced SHA-1:

Biham, Eli ; Chen, Rafi ; Joux, Antoine
Journal of Cryptology.  28 (2014)  1 - p. 110-160 , 2014
 
?
8

New Attacks on IDEA with at Least 6 Rounds:

Biham, Eli ; Dunkelman, Orr ; Keller, Nathan.
Journal of Cryptology.  28 (2013)  2 - p. 209-239 , 2013
 
?
9

A Practical Attack on KeeLoq:

Aerts, Wim ; Biham, Eli ; De Moitié, Dieter...
Journal of Cryptology.  25 (2010)  1 - p. 136-157 , 2010
 
?
10

Selected areas in cryptography 

13th international workshop, SAC 2006, Montreal, Canada, Au...  Lecture notes in computer science ; 4356
 
?
 
?
14

Quantum computing without entanglement:

Biham, Eli ; Brassard, Gilles ; Kenigsberg, Dan.
Theoretical Computer Science.  320 (2004)  1 - p. 15-33 , 2004
 
?
15

How to decrypt or even substitute DES-encrypted messages in..:

Biham, Eli
Information Processing Letters.  84 (2002)  3 - p. 117-124 , 2002
 
1-15