Publications
Copyright Information: The papers provided in this page are
copyrighted by the authors or by IACR, Springer, or others. Some of
them are early or initial versions of the published papers.
The papers marked by CSnnn or CS-year-nn are technical reports of the
Technion's Computer Science department.
Some other papers of mine appear in
eprint.iacr.org,
IACR CryptoDB,
and in the NESSIE site
www.cryptonessie.org.
You may see also the
technical
reports page of my faculty.
An almost complete list of my publications appears in DBLP.
Go to
Books
Patents
Theses of My Students
- Eli Biham, (in Hebrew)
אל תתנו את האצבע למאגר (Do not Give Your Finger to the Database),
ארץ אחרת (Eretz Acheret), 22/04/2012.
- Eli Biham, (in Hebrew)
נגד החוק: לא למאגר הביומטרי (Against the Biometric Database Law),
ישראל היום (Israel Today), 17/11/2009.
- Eli Biham, (in Hebrew)
מאגר טביעות אצבע - סכנה לביטחון המדינה (The Biometric Database is Dangerous),
Ynet, 30/07/2009.
- Eli Biham,
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru,
CS-2008-05
- Eli Biham, Yaniv Carmeli,
Efficient Reconstruction of RC4 Keys from Internal States,
CS-2008-06
- Eli Biham, Orr Dunkelman,
A Framework for Iterative Hash Functions --- HAIFA,
CS-2007-15
- Eli Biham, Orr Dunkelman,
Differential Cryptanalysis of Stream Ciphers,
CS-2007-10
- Eli Biham, Orr Dunkelman, Nathan Keller,
A Related-Key Rectangle Attack on the Full KASUMI,
CS-2005-14
- Eli Biham, Jennifer Seberry,
Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays,
CS-2005-11
- Eli Biham, Rafi Chen,
Near-Collisions of SHA-0,
CS-2004-09,
Proceedings of Crypto 2004, to appear
Also contains a Breaking News information on SHA-0 and SHA-1
- Eli Biham, Ayal Itzkovitz,
Visual Cryptography with Polarization,
Presented in the Dagstuhl seminar on Cryptography, September 1997, and
in the RUMP session of CRYPTO'98
This paper was missing here for a long time...
- Elad Barkan, Eli Biham, Nathan Keller,
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication,
CS-2003-05,
Proceedings of Crypto 2003
FULL VERSION,
CS-2006-07
- Eli Biham,
Cryptanalysis of Patarin's 2-Round Public Key System S Boxes (2R),
CS-2000-01,
Proceedings of Eurocrypt 2000
- Eli Biham, Vladimir Furman,
Improved Impossible Differentials on Twofish
proceedings of Indocrypt 2000.
- Eli Biham, Vladimir Furman,
Impossible Differential of 8-Round Mars' Core
- Eli Biham,
Comment on Selecting the Ciphers for the AES Second Round,
Submitted as a comment to the AES first round, April 15, 1999.
- Ross Anderson, Eli Biham, Lars Knudsen,
Serpent and Smartcards,
Submitted as a comment to the AES first round, April 15, 1999.
Proceedings of Cardis'98.
- Eli Biham, Adi Shamir,
Power Analysis of the Key Scheduling of the AES Candidates,
Second AES conference, 1999
- Eli Biham,
A Note on Comparing the AES Candidates,
Second AES conference, 1999
Revised Version
Slides
See also the slides of my Asiacrypt'98 presentation:
Design Tradeoffs of the AES Candidates:
view,
print
- Eli Biham, Alex Biryukov, Niels Ferguson,
Lars R. Knudsen, Bruce Schneier, Adi Shamir,
Cryptanalysis of Magenta,
Distributed at the first AES conference, August 20, 1998
Second AES conference, 1999
Slides
- Eli Biham, Alex Biryukov, Adi Shamir,
Cryptanalysis of Skipjack Reduced to 31 Rounds using
Impossible Differentials,
CS0947
See also here
- Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir,
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR,
CS0946,
Proceedings of SAC'98
See also here
- Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster,
Symphony: Managing Virtual Servers in the Global Village,
CS 0939
- Eli Biham, Lars R. Knudsen,
Cryptanalysis of the ANSI X9.52 CBCM Mode,
CS 0928,
Proceedings of Eurocrypt'98
- Eli Biham, Tal Mor,
Bounds on Information and the Security of
Quantum Cryptography,
Physical Review Letters, Vol. 79, No. 20, pp. 4024-4037, November 1997
- Eli Biham, Adi Shamir,
Differential Fault Analysis of Secret Key Cryptosystems,
CS 0910,
Proceedings of Crypto'97
- Eli Biham,
A Fast New DES Implementation in Software,
CS 0891,
Fast Software Encryption 4, 1997
- Eli Biham,
Cryptanalysis of Ladder-DES,
CS 0890,
Fast Software Encryption 4, 1997
- Eli Biham, Tal Mor,
On the Security of Quantum Cryptography
Against Collective Attacks,
Physical Review Letters, Vol. 78, No. 11, pp. 2256-2259, March 1997
- Eli Biham, Bruno Huttner, Tal Mor,
Quantum Cryptographic Network based on Quantum Memories,
(Figure 1),
Physical Review A, Vol. 54, No. 4, pp. 2651-2658, October 1996
- Eli Biham,
Cryptanalysis of Triple-Modes of Operation,
CS 885, August 1996
- Eli Biham,
How to Forge DES-Encrypted Messages in $2^{28}$ Steps,
CS 884, August 1996
- Ross Anderson, Eli Biham,
Tiger: A Fast New Hash Function,
Fast Software Encryption 3, 1996, LNCS 1039
For more information on Tiger look
here
- Ross Anderson, Eli Biham,
Two Practical and Provably Secure Block Ciphers: BEAR and LION,
CS 875, December 1995
Fast Software Encryption 3, 1996, LNCS 1039
- Eli Biham, Paul C. Kocher,
A Known Plaintext Attack on the PKZIP Stream Cipher,
CS 842, December 1994
Fast Software Encryption 2, Proceedings of the Leuven Workshop, LNCS 1008
- Eli Biham,
Cryptanalysis of Multiple Modes of Operation,
CS 833, October 1994
Proceedings of Asiacrypt'94, LNCS 917
Journal of Cryptology, Vol. 11, No. 1, pp. 45-58, 1998
- Eli Biham, Alex Biryukov,
An Improvement of Davies' Attack on DES,
CS 817, May 1994
Proceedings of Eurocrypt'94, LNCS 950
Journal of Cryptology, Vol. 10, No. 3, pp. 195-206, 1997
- Eli Biham, Alex Biryukov,
How to Strengthen DES Using Existing Hardware,
CS 816, May 1994
Proceedings of Asiacrypt'94, LNCS 917
A revised version!!!
- Eli Biham,
On Matsui's Linear Cryptanalysis,
CS 813, April 1994
Proceedings of Eurocrypt'94, LNCS 950
- Eli Biham,
On Modes of Operation,
proceedings of Fast Software Encryption 1, Cambridge Security Workshop,
1993, LNCS 809
- Ishai Ben-Aroya, Eli Biham,
Differential Cryptanalysis of Lucifer,
CS 782, October 1993
Proceedings of Crypto'93, LNCS 773
Journal of Cryptology, Vol. 9, No. 1, pp. 21-34, 1996
- Eli Biham,
New Types of Cryptanalytic Attacks Using Related Keys,
CS 753, September 1992
Proceedings of Eurocrypt'93, LNCS 765
Journal of Cryptology, Vol. 7, No. 4, pp. 229-246, 1994
- Eli Biham, Adi Shamir,
Differential Cryptanalysis of the Full 16-Round DES,
CS 708, December 1991
Proceedings of Crypto'92, LNCS 740
- Eli Biham, Adi Shamir,
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer,
Technical report CS91-18, Weizmann Institute of Science
CRYPTO'91.
- Eli Biham,
How to Break the Chaotic-Map Cryptosystem Presented at EUROCRYPT'91,
EUROCRYPT'91.
- Eli Biham, Adi Shamir,
Differential cryptanalysis of Feal and N-Hash,
Technical report CS91-17, Weizmann Institute of Science
EUROCRYPT'91.
- Eli Biham, Adi Shamir,
Differential cryptanalysis of DES-like cryptosystems,
Technical report CS90-16, Weizmann Institute of Science
CRYPTO'90 & Journal of Cryptology, Vol. 4, No. 1, pp. 3-72, 1991.
Books
- Eli Biham, Adi Shamir,
Differential Cryptanalysis of the Data Encryption Standard,
Springer Verlag, 1993.
ISBN: 0-387-97930-1, 3-540-97930-1.
Electronic copy (PDF) - processed from the authors' LaTeX files.
- Eli Biham (Ed.),
proceedings of Fast Software Encryption,
4th international workshop, FSE'97,
Haifa, Israel, January 1997,
Lecture notes in computer science 1267, Springer Verlag, 1997.
These proceedings are made available online by Springer to Springerlink users at
http://link.springer.de/link/service/series/0558/tocs/t1267.htm.
- Eli Biham (Ed.),
proceedings of EUROCRYPT 2003,
Warsaw, Poland, May 2003,
Lecture notes in computer science 2656, Springer Verlag, 2003.
These proceedings are made available online by Springer to Springerlink users at
http://link.springer.de/link/service/series/0558/tocs/t2656.htm.
- Eli Biham, Amr Youssef (Eds.),
proceedings of Selected Areas in Cryptography (SAC) 2006,
Montreal, Canada, August 2006,
Lecture notes in computer science 4356, Springer Verlag, 2003.
These proceedings are made available online by Springer to Springerlink users at
http://www.springerlink.com/content/h66j74350p6j/?p=44ebe982303e46ad8bcef6fdcd3deb2d&pi=1.
Patents
- Elad Barkan, Eli Biham,
Cryptanalysis Method and System,
Israel Patent #155671,
Applied on 30/04/2003, Granted on 16/03/2005.
- Elad Barkan, Eli Biham,
Cryptoanalysis method and system,
US Patent #8009826,
Issued on August 30, 2011.
- Elad Barkan, Eli Biham,
Cryptanalysis method and system,
US Patent #8295477,
Issued on October 23, 2012.
Theses of My Students
- Alex Biryukov,
M.Sc. thesis, 1995.
- Tal Mor,
Ph.D. thesis, 1997.
- Amichai Shulman,
Cryptographic Methods for Implementing Anonymous Electronic Cash,
M.Sc. thesis, 1998.
- Vladimir Furman,
M.Sc. thesis, 2001.
- Dan Kenigsberg,
Grover's Quantum Search Algorithm and Mixed States,
M.Sc. thesis, 2001.
- Orr Dunkelman,
Techniques for Cryptanalysis of Block Ciphers,
Ph.D. thesis, 2006.
- Elad Barkan,
Cryptanalysis of Ciphers and Protocols,
Ph.D. thesis, 2006.
- Rafi Chen,
New Techniques for Cryptanalysis of Cryptographic Hash Functions,
Ph.D. thesis, 2011.
- Uri Avraham,
ABC - A New Framewrok for Block Ciphers,
M.Sc. thesis, 2012.