• Publications
  • Influence
Differential Cryptanalysis of DES-like Cryptosystems
  • 1,745
  • 159
Differential Fault Analysis of Secret Key Cryptosystems
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based onExpand
  • 1,468
  • 125
Differential Cryptanalysis of the Data Encryption Standard
DES, the Data Encryption Standard, is one of several cryptographic standards. The authors of this text detail their cryptanalytic "attack" upon DES and several other systems, using creative and novelExpand
  • 831
  • 60
Serpent: A Proposal for the Advanced Encryption Standard
We propose a new block cipher as a candidate for the Advanced Encryption Standard. Its design is highly conservative, yet still allows a very efficient implementation. It uses S-boxes similar toExpand
  • 404
  • 35
New types of cryptanalytic attacks using related keys
  • E. Biham
  • Computer Science, Mathematics
  • Journal of Cryptology
  • 1 December 1994
In this paper we study the influence of key-scheduling algorithms on the strength of blockciphers. We show that the key-scheduling algorithms of many blockciphers inherit obvious relationshipsExpand
  • 479
  • 33
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
In this paper we present a new cryptanalytic technique, based on impossible differentials, and use it to show that Skipjack reduced from 32 to 31 rounds can be broken by an attack which is fasterExpand
  • 380
  • 33
A Framework for Iterative Hash Functions - HAIFA
Since the seminal works of Merkle and Damgard on the iter- ation of compression functions, hash functions were built from compres- sion functions using the Merkle-Damgard construction. Recently,Expand
  • 221
  • 33
A Fast New DES Implementation in Software
  • E. Biham
  • Computer Science
  • FSE
  • 20 January 1997
In this paper we describe a fast new DES implementation. This implementation is about five times faster than the fastest known DES implementation on a (64-bit) Alpha computer, and about three timesExpand
  • 309
  • 28
Near-Collisions of SHA-0
In this paper we find two near-collisions of the full compression function of SHA-0, in which up to 142 of the 160 bits of the output are equal. We also find many full collisions of 65-round reducedExpand
  • 241
  • 24
Serpent: A New Block Cipher Proposal
We propose a new block cipher as a candidate for the Advanced Encryption Standard. Its design is highly conservative, yet still allows a very efficient implementation. It uses the well-understood DESExpand
  • 217
  • 24