First Page | Document Content | |
---|---|---|
![]() Date: 2010-08-24 17:09:24NIST hash function competition Eli Biham SHA-2 SHA-1 Preimage attack MD5 Advanced Encryption Standard Keccak Collision attack Cryptography Error detection and correction Cryptographic hash functions | Add to Reading List |
![]() | Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†DocID: 1nWeC - View Document |
![]() | A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:DocID: 1mlxI - View Document |
![]() | New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael MasalhaDocID: 1jvxK - View Document |
![]() | In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.ilDocID: 1jkiK - View Document |
![]() | The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008DocID: 1b89t - View Document |