D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 49 Citations 17,457 119 World Ranking 3781 National Ranking 71

Overview

What is she best known for?

The fields of study she is best known for:

  • Cryptography
  • Block cipher
  • Algebra

Eli Biham mainly investigates Computer security, Cryptography, Differential cryptanalysis, Theoretical computer science and Block cipher. The Computer security study combines topics in areas such as Quantum cryptography, Quantum information and Computation. Her Cryptography study introduces a deeper knowledge of Algorithm.

Eli Biham studies Differential cryptanalysis, namely Boomerang attack. Her Boomerang attack study combines topics from a wide range of disciplines, such as Impossible differential cryptanalysis, Integral cryptanalysis and Slide attack. Her research integrates issues of MDC-2, Cryptographic hash function, Quantum key distribution, Key and BB84 in her study of Theoretical computer science.

Her most cited work include:

  • Differential cryptanalysis of DES-like cryptosystems (2004 citations)
  • Differential Fault Analysis of Secret Key Cryptosystems (1059 citations)
  • Differential Cryptanalysis of the Data Encryption Standard (740 citations)

What are the main themes of her work throughout her whole career to date?

Block cipher, Computer security, Theoretical computer science, Differential cryptanalysis and Cryptography are her primary areas of study. Her Block cipher research incorporates themes from Rectangle, Key size and Cipher. The Computer security study which covers Quantum information that intersects with Quantum algorithm.

Her Differential cryptanalysis research incorporates elements of Linear cryptanalysis and Arithmetic. Her work in Cryptography addresses issues such as Encryption, which are connected to fields such as Topology. Her studies deal with areas such as Impossible differential cryptanalysis, Interpolation attack, Integral cryptanalysis and XSL attack as well as Boomerang attack.

She most often published in these fields:

  • Block cipher (28.31%)
  • Computer security (27.71%)
  • Theoretical computer science (25.30%)

What were the highlights of her more recent work (between 2006-2021)?

  • Theoretical computer science (25.30%)
  • Block cipher (28.31%)
  • Computer security (27.71%)

In recent papers she was focusing on the following fields of study:

Eli Biham mostly deals with Theoretical computer science, Block cipher, Computer security, Key and Cryptanalysis. The various areas that Eli Biham examines in her Theoretical computer science study include Hash chain, Secure Hash Algorithm, SHA-2, Hash function and Cryptography. Her research in Block cipher intersects with topics in Exploit and Cipher.

Her Key-agreement protocol study in the realm of Key interacts with subjects such as Universal composability and Advantage. Eli Biham is interested in Slide attack, which is a field of Cryptanalysis. Her work is dedicated to discovering how Boomerang attack, Interpolation attack are connected with Integral cryptanalysis and other disciplines.

Between 2006 and 2021, her most popular works were:

  • A Framework for Iterative Hash Functions — HAIFA ? (179 citations)
  • Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication (124 citations)
  • A Practical Attack on KeeLoq (102 citations)

In her most recent research, the most cited papers focused on:

  • Cryptography
  • Block cipher
  • Algebra

Eli Biham focuses on Computer security, Block cipher, Theoretical computer science, Key and Cryptanalysis. Her Block cipher study focuses mostly on KASUMI, Boomerang attack and Interpolation attack. Her work carried out in the field of Boomerang attack brings together such families of science as Meet-in-the-middle attack, Birthday attack and RC4.

The concepts of her Theoretical computer science study are interwoven with issues in Hash filter, Cryptographic hash function, Hash tree, Merkle tree and Rolling hash. Her work in Cryptanalysis addresses subjects such as Stream cipher, which are connected to disciplines such as Key space, Byte and Key generation. Her study in Slide attack is interdisciplinary in nature, drawing from both Ciphertext-only attack, Related-key attack and Chosen-ciphertext attack.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Differential cryptanalysis of DES-like cryptosystems

Eli Biham;Adi Shamir.
international cryptology conference (1990)

3498 Citations

Differential fault analysis of secret key cryptosystems

E. Biham;A. Shamir.
Lecture Notes in Computer Science (1997)

2469 Citations

Differential Cryptanalysis of the Data Encryption Standard

Eli Biham;Adi Shamir.
(1993)

1193 Citations

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials

Eli Biham;Alex Biryukov;Adi Shamir.
Journal of Cryptology (2005)

1026 Citations

Differential Cryptanalysis of the Full 16-Round DES

Eli Biham;Adi Shamir.
international cryptology conference (1992)

728 Citations

New types of cryptanalytic attacks using related keys

Eli Biham.
Journal of Cryptology (1994)

616 Citations

Serpent: A Proposal for the Advanced Encryption Standard

Ross Anderson;Eli Biham;Lars Knudsen.
(1998)

549 Citations

A Fast New DES Implementation in Software

Eli Biham.
fast software encryption (1997)

414 Citations

Serpent: A New Block Cipher Proposal

Eli Biham;Ross J. Anderson;Lars R. Knudsen.
fast software encryption (1998)

325 Citations

Near-collisions of SHA-0

Eli Biham;Rafi Chen.
international cryptology conference (2004)

314 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Eli Biham

Bart Preneel

Bart Preneel

KU Leuven

Publications: 127

Vincent Rijmen

Vincent Rijmen

KU Leuven

Publications: 99

Alex Biryukov

Alex Biryukov

University of Luxembourg

Publications: 68

Orr Dunkelman

Orr Dunkelman

University of Haifa

Publications: 65

Christof Paar

Christof Paar

Max Planck Institute for Security and Privacy

Publications: 64

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 57

Claude Carlet

Claude Carlet

Paris 8 University

Publications: 56

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 56

Lars R. Knudsen

Lars R. Knudsen

Technical University of Denmark

Publications: 55

Gregor Leander

Gregor Leander

Ruhr University Bochum

Publications: 47

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 44

Adi Shamir

Adi Shamir

Weizmann Institute of Science

Publications: 38

Andrey Bogdanov

Andrey Bogdanov

CYBERCRYPT

Publications: 37

Serge Vaudenay

Serge Vaudenay

École Polytechnique Fédérale de Lausanne

Publications: 36

Kazuo Ohta

Kazuo Ohta

University of Electro-Communications

Publications: 36

Hoi-Kwong Lo

Hoi-Kwong Lo

University of Hong Kong

Publications: 32

Trending Scientists

Sheng Chen

Sheng Chen

University of Southampton

Gennady A. Leonov

Gennady A. Leonov

St Petersburg University

Peter G. Casazza

Peter G. Casazza

University of Missouri

Jimei Yang

Jimei Yang

Adobe Systems (United States)

Juan Carlos Niebles

Juan Carlos Niebles

Stanford University

Ilian A. Bonev

Ilian A. Bonev

École de Technologie Supérieure

Tsuyoshi Sekitani

Tsuyoshi Sekitani

Osaka University

Takayuki Kawahara

Takayuki Kawahara

Tokyo University of Science

Nicolai Miosge

Nicolai Miosge

University of Göttingen

Bridget T. Hill

Bridget T. Hill

The Honourable Society of Lincoln's Inn

Mathieu Rouault

Mathieu Rouault

University of Cape Town

Augustin Colette

Augustin Colette

Stanford University

Caterina Pesce

Caterina Pesce

Sapienza University of Rome

Laura Kann

Laura Kann

Centers for Disease Control and Prevention

Garry L. Jennings

Garry L. Jennings

University of Sydney

Sanjay Sharma

Sanjay Sharma

St George's, University of London

Something went wrong. Please try again later.