Eli Biham

Results: 19



#Item
1Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

Add to Reading List

Source URL: omereingold.files.wordpress.com

Language: English - Date: 2014-10-21 18:30:18
    2A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:

    A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-25 01:00:00
      3New Types of Cryptanalytic Attacks Using Related Keys Eli Biham  Presented by: Nael Masalha

      New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha

      Add to Reading List

      Source URL: www.cs.haifa.ac.il

      Language: English - Date: 2013-07-02 14:49:27
        4In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il

        In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.il

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-08-31 13:50:33
          5The Truth on TPy Eli Biham∗ Jennifer Seberry†  February 29, 2008

          The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2008-02-29 13:11:28
            6Dierential Cryptanalysis of DES-like Cryptosystems Eli Biham  Adi Shamir

            Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

            Add to Reading List

            Source URL: zoo.cs.yale.edu

            Language: English - Date: 2012-10-14 17:28:33
            7Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998  Magenta is an encryption algorithm submitted for AES by Deutsche

            Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

            Add to Reading List

            Source URL: www.schneier.com

            Language: English - Date: 2014-03-02 23:18:30
            8FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

            FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2006-03-10 16:40:02
            9Cryptographic Hash Workshop

            Cryptographic Hash Workshop

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2012-06-20 08:23:24
            10Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel

            Updating the IACR Publication Infrastructure by a Preprint Server Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 1999-08-30 11:43:26