First Page | Document Content | |
---|---|---|
![]() Date: 2012-06-20 08:23:24Eli Biham NESSIE Symmetric-key algorithm Serpent Cryptographic hash function Boomerang attack Advanced Encryption Standard Cryptanalysis KASUMI Cryptography Block ciphers SHACAL | Add to Reading List |
![]() | Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†DocID: 1nWeC - View Document |
![]() | A Note on Comparing the AES Candidates Eli Biham Computer Science Department Technion { Israel Institute of Technology Haifa 32000, Israel Email:DocID: 1mlxI - View Document |
![]() | New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael MasalhaDocID: 1jvxK - View Document |
![]() | In How Many Ways Can You Write Rijndael? Elad Barkan and Eli Biham Computer Science Department Technion – Israel Institute of Technology Haifa 32000, Israel Email: {barkan,biham}@cs.technion.ac.ilDocID: 1jkiK - View Document |
![]() | The Truth on TPy Eli Biham∗ Jennifer Seberry† February 29, 2008DocID: 1b89t - View Document |