Eli Biham - אלי ביהם

Research Information

Research areas: cryptography and cryptanalysis, differential and linear cryptanalysis, quantum cryptography and quantum computation.

CYBERDAY 2015    יום עיון בסייבר ואבטחת מידע (cyberday.org) July 29, 2015
CRYPTODAY    יום עיון בקריפטולוגיה (cryptoday.org)
May 10, 2012 Plagiarism See full message in http://www.cs.technion.ac.il/~biham/plagiarism.html.
Biometry and Privacy links
מדינת מעקב - המאגר הביומטרי ומאגרים אחרים - מאמר במגאזין ארץ אחרת
The SHAvite-3 hash function
A Framework for Iterative Hash Functions --- HAIFA
Py (Roo) Py (Roo) - A Fast and Secure Stream Cipher using Rolling Arrays
         Pypy (Roopy) Pypy (Roopy) - Another version of Py
         TPy (TRoo) Tweaking the IV Setup of the Py Family of Stream Ciphers --- The Ciphers TPy, TPypy, and TPy6
         The Truth on TPy
Tiger - a Fast New Cryptographic Hash Function
Serpent - A New Block Cipher Proposal for AES
The Nessie project
      Test vectors of NESSIE submissions and other primitives
Slides of my invited Talk in Indocrypt 2000:
      On the Selection of the Advanced Encryption Standard.
Slides of my invited Talk in SAC 2004: New Results on Sha-0 and SHA-1.
Slides of my invited Talk in the hash functions workshop in Krakow,
      June 2005: Recent Advances in Hash Functions: The Way to Go.
Slides of my RUMP session talk in FSE 2006:
      Pypy: Another Version of Py (pronounce Roopy or Rupee).


See the courses page
List of courses in cryptology and computer security


Hebrew/Gregorian Calendars for any year (calendar for 2015, in Hebrew, calendar for 2016, in Hebrew)


In memory of my grandfathers Philip Biham and Zvi Brachiahu (in Hebrew)
Short CV

Eli Biham
Computer Science Department, Technion, Technion city, Haifa 3200003, Israel
Email: b i h a m @ CSDOMAIN
where CSDOMAIN = cs.technion.ac.il
SPAMS and bulk mails are not welcome, see below
This home page is also accessible as http://eli.biham.net/.

Email and Requests by Email --- read before sending email to me

I use AUTOMATIC anti-spam programs to discard emails from known spammers and spamming sites. For information how to bypass it, and what you should not send, see here.