Publications

Copyright Information: The papers provided in this page are copyrighted by the authors or by IACR, Springer, or others. Some of them are early or initial versions of the published papers. The papers marked by CSnnn or CS-year-nn are technical reports of the Technion's Computer Science department.

Some other papers of mine appear in eprint.iacr.org, IACR CryptoDB, and in the NESSIE site www.cryptonessie.org. You may see also the technical reports page of my faculty. An almost complete list of my publications appears in DBLP.

Go to Books Patents Theses of My Students

  1. Eli Biham, (in Hebrew)
    אל תתנו את האצבע למאגר (Do not Give Your Finger to the Database),
    ארץ אחרת (Eretz Acheret), 22/04/2012.
  2. Eli Biham, (in Hebrew)
    נגד החוק: לא למאגר הביומטרי (Against the Biometric Database Law),
    ישראל היום (Israel Today), 17/11/2009.

  3. Eli Biham, (in Hebrew)
    מאגר טביעות אצבע - סכנה לביטחון המדינה (The Biometric Database is Dangerous),
    Ynet, 30/07/2009.

  4. Eli Biham,
    New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru,
    CS-2008-05

  5. Eli Biham, Yaniv Carmeli,
    Efficient Reconstruction of RC4 Keys from Internal States,
    CS-2008-06

  6. Eli Biham, Orr Dunkelman,
    A Framework for Iterative Hash Functions --- HAIFA,
    CS-2007-15

  7. Eli Biham, Orr Dunkelman,
    Differential Cryptanalysis of Stream Ciphers,
    CS-2007-10

  8. Eli Biham, Orr Dunkelman, Nathan Keller,
    A Related-Key Rectangle Attack on the Full KASUMI,
    CS-2005-14

  9. Eli Biham, Jennifer Seberry,
    Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays,
    CS-2005-11

  10. Eli Biham, Rafi Chen,
    Near-Collisions of SHA-0,
    CS-2004-09,
    Proceedings of Crypto 2004, to appear
    Also contains a Breaking News information on SHA-0 and SHA-1

  11. Eli Biham, Ayal Itzkovitz,
    Visual Cryptography with Polarization,
    Presented in the Dagstuhl seminar on Cryptography, September 1997, and in the RUMP session of CRYPTO'98
    This paper was missing here for a long time...

  12. Elad Barkan, Eli Biham, Nathan Keller,
    Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication,
    CS-2003-05,
    Proceedings of Crypto 2003
    FULL VERSION,
    CS-2006-07

  13. Eli Biham,
    Cryptanalysis of Patarin's 2-Round Public Key System S Boxes (2R),
    CS-2000-01,
    Proceedings of Eurocrypt 2000

  14. Eli Biham, Vladimir Furman,
    Improved Impossible Differentials on Twofish proceedings of Indocrypt 2000.

  15. Eli Biham, Vladimir Furman,
    Impossible Differential of 8-Round Mars' Core

  16. Eli Biham,
    Comment on Selecting the Ciphers for the AES Second Round,
    Submitted as a comment to the AES first round, April 15, 1999.

  17. Ross Anderson, Eli Biham, Lars Knudsen,
    Serpent and Smartcards,
    Submitted as a comment to the AES first round, April 15, 1999.
    Proceedings of Cardis'98.

  18. Eli Biham, Adi Shamir,
    Power Analysis of the Key Scheduling of the AES Candidates,
    Second AES conference, 1999

  19. Eli Biham,
    A Note on Comparing the AES Candidates,
    Second AES conference, 1999
    Revised Version
    Slides
    See also the slides of my Asiacrypt'98 presentation: Design Tradeoffs of the AES Candidates: view, print

  20. Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir,
    Cryptanalysis of Magenta,
    Distributed at the first AES conference, August 20, 1998
    Second AES conference, 1999
    Slides

  21. Eli Biham, Alex Biryukov, Adi Shamir,
    Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials,
    CS0947
    See also here

  22. Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir,
    Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR,
    CS0946,
    Proceedings of SAC'98
    See also here

  23. Roy Friedman, Eli Biham, Ayal Itzkovitz, Assaf Schuster,
    Symphony: Managing Virtual Servers in the Global Village,
    CS 0939

  24. Eli Biham, Lars R. Knudsen,
    Cryptanalysis of the ANSI X9.52 CBCM Mode,
    CS 0928,
    Proceedings of Eurocrypt'98

  25. Eli Biham, Tal Mor,
    Bounds on Information and the Security of Quantum Cryptography,
    Physical Review Letters, Vol. 79, No. 20, pp. 4024-4037, November 1997

  26. Eli Biham, Adi Shamir,
    Differential Fault Analysis of Secret Key Cryptosystems,
    CS 0910,
    Proceedings of Crypto'97

  27. Eli Biham,
    A Fast New DES Implementation in Software,
    CS 0891,
    Fast Software Encryption 4, 1997

  28. Eli Biham,
    Cryptanalysis of Ladder-DES,
    CS 0890,
    Fast Software Encryption 4, 1997

  29. Eli Biham, Tal Mor,
    On the Security of Quantum Cryptography Against Collective Attacks,
    Physical Review Letters, Vol. 78, No. 11, pp. 2256-2259, March 1997

  30. Eli Biham, Bruno Huttner, Tal Mor,
    Quantum Cryptographic Network based on Quantum Memories,
    (Figure 1),
    Physical Review A, Vol. 54, No. 4, pp. 2651-2658, October 1996

  31. Eli Biham,
    Cryptanalysis of Triple-Modes of Operation,
    CS 885, August 1996

  32. Eli Biham,
    How to Forge DES-Encrypted Messages in $2^{28}$ Steps,
    CS 884, August 1996

  33. Ross Anderson, Eli Biham,
    Tiger: A Fast New Hash Function,
    Fast Software Encryption 3, 1996, LNCS 1039
    For more information on Tiger look here

  34. Ross Anderson, Eli Biham,
    Two Practical and Provably Secure Block Ciphers: BEAR and LION,
    CS 875, December 1995
    Fast Software Encryption 3, 1996, LNCS 1039

  35. Eli Biham, Paul C. Kocher,
    A Known Plaintext Attack on the PKZIP Stream Cipher,
    CS 842, December 1994
    Fast Software Encryption 2, Proceedings of the Leuven Workshop, LNCS 1008

  36. Eli Biham,
    Cryptanalysis of Multiple Modes of Operation,
    CS 833, October 1994
    Proceedings of Asiacrypt'94, LNCS 917
    Journal of Cryptology, Vol. 11, No. 1, pp. 45-58, 1998

  37. Eli Biham, Alex Biryukov,
    An Improvement of Davies' Attack on DES,
    CS 817, May 1994
    Proceedings of Eurocrypt'94, LNCS 950
    Journal of Cryptology, Vol. 10, No. 3, pp. 195-206, 1997

  38. Eli Biham, Alex Biryukov,
    How to Strengthen DES Using Existing Hardware,
    CS 816, May 1994
    Proceedings of Asiacrypt'94, LNCS 917
    A revised version!!!

  39. Eli Biham,
    On Matsui's Linear Cryptanalysis,
    CS 813, April 1994
    Proceedings of Eurocrypt'94, LNCS 950

  40. Eli Biham,
    On Modes of Operation,
    proceedings of Fast Software Encryption 1, Cambridge Security Workshop, 1993, LNCS 809

  41. Ishai Ben-Aroya, Eli Biham,
    Differential Cryptanalysis of Lucifer,
    CS 782, October 1993
    Proceedings of Crypto'93, LNCS 773
    Journal of Cryptology, Vol. 9, No. 1, pp. 21-34, 1996

  42. Eli Biham,
    New Types of Cryptanalytic Attacks Using Related Keys,
    CS 753, September 1992
    Proceedings of Eurocrypt'93, LNCS 765
    Journal of Cryptology, Vol. 7, No. 4, pp. 229-246, 1994

  43. Eli Biham, Adi Shamir,
    Differential Cryptanalysis of the Full 16-Round DES,
    CS 708, December 1991
    Proceedings of Crypto'92, LNCS 740

  44. Eli Biham, Adi Shamir,
    Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer,
    Technical report CS91-18, Weizmann Institute of Science
    CRYPTO'91.

  45. Eli Biham,
    How to Break the Chaotic-Map Cryptosystem Presented at EUROCRYPT'91,
    EUROCRYPT'91.

  46. Eli Biham, Adi Shamir,
    Differential cryptanalysis of Feal and N-Hash,
    Technical report CS91-17, Weizmann Institute of Science
    EUROCRYPT'91.

  47. Eli Biham, Adi Shamir,
    Differential cryptanalysis of DES-like cryptosystems,
    Technical report CS90-16, Weizmann Institute of Science
    CRYPTO'90 & Journal of Cryptology, Vol. 4, No. 1, pp. 3-72, 1991.

Books

  1. Eli Biham, Adi Shamir,
    Differential Cryptanalysis of the Data Encryption Standard,
    Springer Verlag, 1993.
    ISBN: 0-387-97930-1, 3-540-97930-1.

    Electronic copy (PDF) - processed from the authors' LaTeX files.

  2. Eli Biham (Ed.),
    proceedings of Fast Software Encryption,
    4th international workshop, FSE'97,
    Haifa, Israel, January 1997,
    Lecture notes in computer science 1267, Springer Verlag, 1997.

    These proceedings are made available online by Springer to Springerlink users at http://link.springer.de/link/service/series/0558/tocs/t1267.htm.

  3. Eli Biham (Ed.),
    proceedings of EUROCRYPT 2003,
    Warsaw, Poland, May 2003,
    Lecture notes in computer science 2656, Springer Verlag, 2003.

    These proceedings are made available online by Springer to Springerlink users at http://link.springer.de/link/service/series/0558/tocs/t2656.htm.

  4. Eli Biham, Amr Youssef (Eds.),
    proceedings of Selected Areas in Cryptography (SAC) 2006,
    Montreal, Canada, August 2006,
    Lecture notes in computer science 4356, Springer Verlag, 2003.

    These proceedings are made available online by Springer to Springerlink users at http://www.springerlink.com/content/h66j74350p6j/?p=44ebe982303e46ad8bcef6fdcd3deb2d&pi=1.

Patents

  1. Elad Barkan, Eli Biham,
    Cryptanalysis Method and System,
    Israel Patent #155671, Applied on 30/04/2003, Granted on 16/03/2005.
  2. Elad Barkan, Eli Biham,
    Cryptoanalysis method and system,
    US Patent #8009826, Issued on August 30, 2011.
  3. Elad Barkan, Eli Biham,
    Cryptanalysis method and system,
    US Patent #8295477, Issued on October 23, 2012.

Theses of My Students

  1. Alex Biryukov,
    M.Sc. thesis, 1995.
  2. Tal Mor,
    Ph.D. thesis, 1997.
  3. Amichai Shulman,
    Cryptographic Methods for Implementing Anonymous Electronic Cash,
    M.Sc. thesis, 1998.
  4. Vladimir Furman,
    M.Sc. thesis, 2001.
  5. Dan Kenigsberg,
    Grover's Quantum Search Algorithm and Mixed States,
    M.Sc. thesis, 2001.
  6. Orr Dunkelman,
    Techniques for Cryptanalysis of Block Ciphers,
    Ph.D. thesis, 2006.
  7. Elad Barkan,
    Cryptanalysis of Ciphers and Protocols,
    Ph.D. thesis, 2006.
  8. Rafi Chen,
    New Techniques for Cryptanalysis of Cryptographic Hash Functions,
    Ph.D. thesis, 2011.
  9. Uri Avraham,
    ABC - A New Framewrok for Block Ciphers,
    M.Sc. thesis, 2012.