Eli Biham mainly investigates Computer security, Cryptography, Differential cryptanalysis, Theoretical computer science and Block cipher. The Computer security study combines topics in areas such as Quantum cryptography, Quantum information and Computation. Her Cryptography study introduces a deeper knowledge of Algorithm.
Eli Biham studies Differential cryptanalysis, namely Boomerang attack. Her Boomerang attack study combines topics from a wide range of disciplines, such as Impossible differential cryptanalysis, Integral cryptanalysis and Slide attack. Her research integrates issues of MDC-2, Cryptographic hash function, Quantum key distribution, Key and BB84 in her study of Theoretical computer science.
Block cipher, Computer security, Theoretical computer science, Differential cryptanalysis and Cryptography are her primary areas of study. Her Block cipher research incorporates themes from Rectangle, Key size and Cipher. The Computer security study which covers Quantum information that intersects with Quantum algorithm.
Her Differential cryptanalysis research incorporates elements of Linear cryptanalysis and Arithmetic. Her work in Cryptography addresses issues such as Encryption, which are connected to fields such as Topology. Her studies deal with areas such as Impossible differential cryptanalysis, Interpolation attack, Integral cryptanalysis and XSL attack as well as Boomerang attack.
Eli Biham mostly deals with Theoretical computer science, Block cipher, Computer security, Key and Cryptanalysis. The various areas that Eli Biham examines in her Theoretical computer science study include Hash chain, Secure Hash Algorithm, SHA-2, Hash function and Cryptography. Her research in Block cipher intersects with topics in Exploit and Cipher.
Her Key-agreement protocol study in the realm of Key interacts with subjects such as Universal composability and Advantage. Eli Biham is interested in Slide attack, which is a field of Cryptanalysis. Her work is dedicated to discovering how Boomerang attack, Interpolation attack are connected with Integral cryptanalysis and other disciplines.
Eli Biham focuses on Computer security, Block cipher, Theoretical computer science, Key and Cryptanalysis. Her Block cipher study focuses mostly on KASUMI, Boomerang attack and Interpolation attack. Her work carried out in the field of Boomerang attack brings together such families of science as Meet-in-the-middle attack, Birthday attack and RC4.
The concepts of her Theoretical computer science study are interwoven with issues in Hash filter, Cryptographic hash function, Hash tree, Merkle tree and Rolling hash. Her work in Cryptanalysis addresses subjects such as Stream cipher, which are connected to disciplines such as Key space, Byte and Key generation. Her study in Slide attack is interdisciplinary in nature, drawing from both Ciphertext-only attack, Related-key attack and Chosen-ciphertext attack.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Differential cryptanalysis of DES-like cryptosystems
Eli Biham;Adi Shamir.
international cryptology conference (1990)
Differential fault analysis of secret key cryptosystems
E. Biham;A. Shamir.
Lecture Notes in Computer Science (1997)
Differential Cryptanalysis of the Data Encryption Standard
Eli Biham;Adi Shamir.
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
Eli Biham;Alex Biryukov;Adi Shamir.
Journal of Cryptology (2005)
Differential Cryptanalysis of the Full 16-Round DES
Eli Biham;Adi Shamir.
international cryptology conference (1992)
New types of cryptanalytic attacks using related keys
Journal of Cryptology (1994)
Serpent: A Proposal for the Advanced Encryption Standard
Ross Anderson;Eli Biham;Lars Knudsen.
A Fast New DES Implementation in Software
fast software encryption (1997)
Serpent: A New Block Cipher Proposal
Eli Biham;Ross J. Anderson;Lars R. Knudsen.
fast software encryption (1998)
Near-collisions of SHA-0
Eli Biham;Rafi Chen.
international cryptology conference (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: