25:
325:
156:
595:
53:
600:
542:
Biham, E., & Perle, S. (2018). Conditional Linear
Cryptanalysis โ Cryptanalysis of DES with Less Than 242 Complexity. IACR Transactions on Symmetric Cryptology, 2018(3).
57:
240:
284:
291:
of the
Technion Computer Science department, after serving for two years as chief of CS graduate school. Biham invented (publicly)
33:
554:
Bar-On, A., Biham, E., Dunkelman, O., & Keller, N. (2018). Efficient Slide
Attacks. Journal of Cryptology, 31(3), 641โ670.
383:
605:
462:
107:
79:
126:
610:
86:
620:
504:
93:
417:
371:
292:
213:
49:
75:
308:
304:
38:
42:
590:
615:
467:
585:
8:
185:
411:
190:
100:
485:
471:
450:
446:
346:
288:
247:
230:
543:
268:
64:
525:
579:
500:
496:
489:
475:
391:
280:
276:
205:
555:
442:
Biham has taken part in the design of several new cryptographic primitives:
458:
454:
430:
397:
350:
201:
481:
570:
421:
387:
375:
296:
252:
209:
400:) the ANSI X9.52 CBCM mode (few days before the final standardization)
339:
335:
287:
Computer
Science department. From 2008 to 2013, Biham was the
63:
from the article and its talk page, especially if potentially
426:
492:(see article for more detail on their cryptanalytic status).
155:
596:
Academic staff of
Technion โ Israel Institute of Technology
601:
International
Association for Cryptologic Research fellows
461:
which was one of the final five contenders to become the
404:
300:
407:
security mechanisms (with Elad Barkan and Nathan Keller)
295:, for which he received his Ph.D., while working under
374:- publicly invented during his Ph.D. studies under
16:Israeli cryptographer and cryptanalyst (born 1960)
314:
577:
437:
544:https://doi.org/10.13154/tosc.v2018.i3.215-264
503:which was one of the 14 semifinalists in the
299:. It had been invented before by a team at
154:
56:about living persons that is unsourced or
556:https://doi.org/10.1007/s00145-017-9266-8
285:Technion - Israel Institute of Technology
241:Technion โ Israel Institute of Technology
127:Learn how and when to remove this message
380:Attacking all triple modes of operation.
311:told IBM to keep the discovery secret.
578:
384:Impossible differential cryptanalysis
318:
18:
272:
13:
14:
632:
564:
571:Eli Biham's homepage at Technion
323:
23:
548:
536:
518:
505:NIST hash function competition
338:format but may read better as
315:Contributions to cryptanalysis
1:
526:"Eli Biham, 2012 IACR Fellow"
511:
478:fast on 64-bit machines, and
463:Advanced Encryption Standard
438:New cryptographic primitives
433:with reduced time complexity
34:biography of a living person
7:
606:Israeli computer scientists
488:), one of a family of fast
418:Differential Fault Analysis
208:(invention and breaking of
169:1960 (age 63–64)
61:must be removed immediately
10:
637:
372:Differential cryptanalysis
293:differential cryptanalysis
283:who is a professor at the
214:Differential cryptanalysis
258:
246:
236:
226:
219:
212:functions), specifically
196:
181:
173:
165:
153:
148:
141:
396:Breaking (together with
309:National Security Agency
305:Data Encryption Standard
347:converting this section
611:Israeli cryptographers
48:Please help by adding
621:Modern cryptographers
54:Contentious material
412:related-key attacks
186:Tel Aviv University
420:- joint work with
386:- joint work with
349:, if appropriate.
191:Weizmann Institute
160:Eli Biham in 2009.
368:
367:
262:
261:
221:Scientific career
137:
136:
129:
111:
37:needs additional
628:
558:
552:
546:
540:
534:
533:
522:
495:SHAvite-3 (with
486:Jennifer Seberry
410:Co-invention of
363:
360:
354:
345:You can help by
327:
326:
319:
275:) is an Israeli
274:
248:Doctoral advisor
231:Computer science
158:
139:
138:
132:
125:
121:
118:
112:
110:
69:
50:reliable sources
27:
26:
19:
636:
635:
631:
630:
629:
627:
626:
625:
576:
575:
567:
562:
561:
553:
549:
541:
537:
524:
523:
519:
514:
440:
364:
358:
355:
344:
328:
324:
317:
189:
182:Alma mater
161:
144:
133:
122:
116:
113:
70:
68:
47:
28:
24:
17:
12:
11:
5:
634:
624:
623:
618:
613:
608:
603:
598:
593:
588:
574:
573:
566:
565:External links
563:
560:
559:
547:
535:
516:
515:
513:
510:
509:
508:
493:
490:stream ciphers
479:
465:
439:
436:
435:
434:
427:
424:
415:
408:
401:
394:
381:
378:
366:
365:
331:
329:
322:
316:
313:
260:
259:
256:
255:
250:
244:
243:
238:
234:
233:
228:
224:
223:
217:
216:
198:
197:Known for
194:
193:
183:
179:
178:
175:
171:
170:
167:
163:
162:
159:
151:
150:
146:
145:
142:
135:
134:
58:poorly sourced
31:
29:
22:
15:
9:
6:
4:
3:
2:
633:
622:
619:
617:
614:
612:
609:
607:
604:
602:
599:
597:
594:
592:
591:Living people
589:
587:
584:
583:
581:
572:
569:
568:
557:
551:
545:
539:
531:
527:
521:
517:
506:
502:
501:hash function
498:
497:Orr Dunkelman
494:
491:
487:
483:
480:
477:
476:hash function
473:
472:Ross Anderson
469:
466:
464:
460:
456:
452:
451:Ross Anderson
448:
445:
444:
443:
432:
431:slide attacks
428:
425:
423:
419:
416:
413:
409:
406:
403:Breaking the
402:
399:
395:
393:
392:Alex Biryukov
389:
385:
382:
379:
377:
373:
370:
369:
362:
359:December 2023
353:is available.
352:
348:
342:
341:
337:
332:This section
330:
321:
320:
312:
310:
306:
303:during their
302:
298:
294:
290:
286:
282:
278:
277:cryptographer
270:
266:
257:
254:
251:
249:
245:
242:
239:
235:
232:
229:
225:
222:
218:
215:
211:
207:
206:cryptanalysis
203:
199:
195:
192:
187:
184:
180:
176:
172:
168:
164:
157:
152:
147:
140:
131:
128:
120:
109:
106:
102:
99:
95:
92:
88:
85:
81:
78: โ
77:
73:
72:Find sources:
66:
62:
59:
55:
51:
45:
44:
40:
35:
30:
21:
20:
616:Israeli Jews
550:
538:
530:www.iacr.org
529:
520:
459:block cipher
455:Lars Knudsen
441:
398:Lars Knudsen
356:
351:Editing help
333:
281:cryptanalyst
264:
263:
237:Institutions
220:
202:cryptography
123:
117:January 2008
114:
104:
97:
90:
83:
71:
60:
43:verification
36:
586:1960 births
200:Studies in
174:Nationality
76:"Eli Biham"
580:Categories
512:References
429:Efficient
422:Adi Shamir
388:Adi Shamir
376:Adi Shamir
307:work; the
297:Adi Shamir
253:Adi Shamir
210:Encryption
87:newspapers
265:Eli Biham
143:Eli Biham
39:citations
273:ืืื ืืืื
149:ืืื ืืืื
65:libelous
447:Serpent
177:Israeli
101:scholar
484:(with
470:(with
449:(with
334:is in
269:Hebrew
227:Fields
103:
96:
89:
82:
74:
499:), a
474:), a
468:Tiger
457:), a
340:prose
108:JSTOR
94:books
32:This
453:and
390:and
336:list
289:dean
279:and
204:and
166:Born
80:news
41:for
405:GSM
301:IBM
582::
528:.
482:Py
271::
52:.
532:.
507:.
414:.
361:)
357:(
343:.
267:(
188:,
130:)
124:(
119:)
115:(
105:ยท
98:ยท
91:ยท
84:ยท
67:.
46:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.