Knowledge

Eli Biham

Source ๐Ÿ“

25: 325: 156: 595: 53: 600: 542:
Biham, E., & Perle, S. (2018). Conditional Linear Cryptanalysis โ€“ Cryptanalysis of DES with Less Than 242 Complexity. IACR Transactions on Symmetric Cryptology, 2018(3).
57: 240: 284: 291:
of the Technion Computer Science department, after serving for two years as chief of CS graduate school. Biham invented (publicly)
33: 554:
Bar-On, A., Biham, E., Dunkelman, O., & Keller, N. (2018). Efficient Slide Attacks. Journal of Cryptology, 31(3), 641โ€“670.
383: 605: 462: 107: 79: 126: 610: 86: 620: 504: 93: 417: 371: 292: 213: 49: 75: 308: 304: 38: 42: 590: 615: 467: 585: 8: 185: 411: 190: 100: 485: 471: 450: 446: 346: 288: 247: 230: 543: 268: 64: 525: 579: 500: 496: 489: 475: 391: 280: 276: 205: 555: 442:
Biham has taken part in the design of several new cryptographic primitives:
458: 454: 430: 397: 350: 201: 481: 570: 421: 387: 375: 296: 252: 209: 400:) the ANSI X9.52 CBCM mode (few days before the final standardization) 339: 335: 287:
Computer Science department. From 2008 to 2013, Biham was the
63:
from the article and its talk page, especially if potentially
426:
Conditional Linear Cryptanalysis - joint work with Stav Perle
492:(see article for more detail on their cryptanalytic status). 155: 596:
Academic staff of Technion โ€“ Israel Institute of Technology
601:
International Association for Cryptologic Research fellows
461:
which was one of the final five contenders to become the
404: 300: 407:
security mechanisms (with Elad Barkan and Nathan Keller)
295:, for which he received his Ph.D., while working under 374:- publicly invented during his Ph.D. studies under 16:Israeli cryptographer and cryptanalyst (born 1960) 314: 577: 437: 544:https://doi.org/10.13154/tosc.v2018.i3.215-264 503:which was one of the 14 semifinalists in the 299:. It had been invented before by a team at 154: 56:about living persons that is unsourced or 556:https://doi.org/10.1007/s00145-017-9266-8 285:Technion - Israel Institute of Technology 241:Technion โ€“ Israel Institute of Technology 127:Learn how and when to remove this message 380:Attacking all triple modes of operation. 311:told IBM to keep the discovery secret. 578: 384:Impossible differential cryptanalysis 318: 18: 272: 13: 14: 632: 564: 571:Eli Biham's homepage at Technion 323: 23: 548: 536: 518: 505:NIST hash function competition 338:format but may read better as 315:Contributions to cryptanalysis 1: 526:"Eli Biham, 2012 IACR Fellow" 511: 478:fast on 64-bit machines, and 463:Advanced Encryption Standard 438:New cryptographic primitives 433:with reduced time complexity 34:biography of a living person 7: 606:Israeli computer scientists 488:), one of a family of fast 418:Differential Fault Analysis 208:(invention and breaking of 169:1960 (age 63–64) 61:must be removed immediately 10: 637: 372:Differential cryptanalysis 293:differential cryptanalysis 283:who is a professor at the 214:Differential cryptanalysis 258: 246: 236: 226: 219: 212:functions), specifically 196: 181: 173: 165: 153: 148: 141: 396:Breaking (together with 309:National Security Agency 305:Data Encryption Standard 347:converting this section 611:Israeli cryptographers 48:Please help by adding 621:Modern cryptographers 54:Contentious material 412:related-key attacks 186:Tel Aviv University 420:- joint work with 386:- joint work with 349:, if appropriate. 191:Weizmann Institute 160:Eli Biham in 2009. 368: 367: 262: 261: 221:Scientific career 137: 136: 129: 111: 37:needs additional 628: 558: 552: 546: 540: 534: 533: 522: 495:SHAvite-3 (with 486:Jennifer Seberry 410:Co-invention of 363: 360: 354: 345:You can help by 327: 326: 319: 275:) is an Israeli 274: 248:Doctoral advisor 231:Computer science 158: 139: 138: 132: 125: 121: 118: 112: 110: 69: 50:reliable sources 27: 26: 19: 636: 635: 631: 630: 629: 627: 626: 625: 576: 575: 567: 562: 561: 553: 549: 541: 537: 524: 523: 519: 514: 440: 364: 358: 355: 344: 328: 324: 317: 189: 182:Alma mater 161: 144: 133: 122: 116: 113: 70: 68: 47: 28: 24: 17: 12: 11: 5: 634: 624: 623: 618: 613: 608: 603: 598: 593: 588: 574: 573: 566: 565:External links 563: 560: 559: 547: 535: 516: 515: 513: 510: 509: 508: 493: 490:stream ciphers 479: 465: 439: 436: 435: 434: 427: 424: 415: 408: 401: 394: 381: 378: 366: 365: 331: 329: 322: 316: 313: 260: 259: 256: 255: 250: 244: 243: 238: 234: 233: 228: 224: 223: 217: 216: 198: 197:Known for 194: 193: 183: 179: 178: 175: 171: 170: 167: 163: 162: 159: 151: 150: 146: 145: 142: 135: 134: 58:poorly sourced 31: 29: 22: 15: 9: 6: 4: 3: 2: 633: 622: 619: 617: 614: 612: 609: 607: 604: 602: 599: 597: 594: 592: 591:Living people 589: 587: 584: 583: 581: 572: 569: 568: 557: 551: 545: 539: 531: 527: 521: 517: 506: 502: 501:hash function 498: 497:Orr Dunkelman 494: 491: 487: 483: 480: 477: 476:hash function 473: 472:Ross Anderson 469: 466: 464: 460: 456: 452: 451:Ross Anderson 448: 445: 444: 443: 432: 431:slide attacks 428: 425: 423: 419: 416: 413: 409: 406: 403:Breaking the 402: 399: 395: 393: 392:Alex Biryukov 389: 385: 382: 379: 377: 373: 370: 369: 362: 359:December 2023 353:is available. 352: 348: 342: 341: 337: 332:This section 330: 321: 320: 312: 310: 306: 303:during their 302: 298: 294: 290: 286: 282: 278: 277:cryptographer 270: 266: 257: 254: 251: 249: 245: 242: 239: 235: 232: 229: 225: 222: 218: 215: 211: 207: 206:cryptanalysis 203: 199: 195: 192: 187: 184: 180: 176: 172: 168: 164: 157: 152: 147: 140: 131: 128: 120: 109: 106: 102: 99: 95: 92: 88: 85: 81: 78: โ€“  77: 73: 72:Find sources: 66: 62: 59: 55: 51: 45: 44: 40: 35: 30: 21: 20: 616:Israeli Jews 550: 538: 530:www.iacr.org 529: 520: 459:block cipher 455:Lars Knudsen 441: 398:Lars Knudsen 356: 351:Editing help 333: 281:cryptanalyst 264: 263: 237:Institutions 220: 202:cryptography 123: 117:January 2008 114: 104: 97: 90: 83: 71: 60: 43:verification 36: 586:1960 births 200:Studies in 174:Nationality 76:"Eli Biham" 580:Categories 512:References 429:Efficient 422:Adi Shamir 388:Adi Shamir 376:Adi Shamir 307:work; the 297:Adi Shamir 253:Adi Shamir 210:Encryption 87:newspapers 265:Eli Biham 143:Eli Biham 39:citations 273:ืืœื™ ื‘ื™ื”ื 149:ืืœื™ ื‘ื™ื”ื 65:libelous 447:Serpent 177:Israeli 101:scholar 484:(with 470:(with 449:(with 334:is in 269:Hebrew 227:Fields 103:  96:  89:  82:  74:  499:), a 474:), a 468:Tiger 457:), a 340:prose 108:JSTOR 94:books 32:This 453:and 390:and 336:list 289:dean 279:and 204:and 166:Born 80:news 41:for 405:GSM 301:IBM 582:: 528:. 482:Py 271:: 52:. 532:. 507:. 414:. 361:) 357:( 343:. 267:( 188:, 130:) 124:( 119:) 115:( 105:ยท 98:ยท 91:ยท 84:ยท 67:. 46:.

Index

biography of a living person
citations
verification
reliable sources
Contentious material
poorly sourced
libelous
"Eli Biham"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Tel Aviv University
Weizmann Institute
cryptography
cryptanalysis
Encryption
Differential cryptanalysis
Computer science
Technion โ€“ Israel Institute of Technology
Doctoral advisor
Adi Shamir
Hebrew
cryptographer
cryptanalyst
Technion - Israel Institute of Technology
dean

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘