×

zbMATH — the first resource for mathematics

Biham, Eli

Compute Distance To:
Author ID: biham.eli Recent zbMATH articles by "Biham, Eli"
Published as: Biham, E.; Biham, Eli
External Links: MGP · Wikidata · dblp · GND
Documents Indexed: 84 Publications since 1991, including 5 Books

Publications by Year

Citations contained in zbMATH

74 Publications have been cited 987 times in 651 Documents Cited by Year
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
219
1991
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
72
1993
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
62
1991
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
55
1999
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
52
1997
Serpent: a new block cipher proposal. Zbl 1385.94015
Biham, Eli; Anderson, Ross; Knudsen, Lars
36
1998
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
32
1994
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
26
1993
The rectangle attack – rectangling the Serpent. Zbl 0981.94017
Biham, Eli; Dunkelman, Orr; Keller, Nathan
21
2001
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
20
2006
Related-key boomerang and rectangle attacks. Zbl 1137.94338
Biham, Eli; Dunkelman, Orr; Keller, Nathan
18
2005
Generalized Grover search algorithm for arbitrary initial amplitude distribution. Zbl 0945.68037
Biron, David; Biham, Ofer; Biham, Eli; Grassl, Markus; Lidar, Daniel A.
18
1999
New types of cryptanalytic attacks using related keys. Zbl 0951.94521
Biham, E.
17
1994
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
15
2006
Near-collisions of SHA-0. Zbl 1104.94307
Biham, Eli; Chen, Rafi
15
2004
Quantum computing without entanglement. Zbl 1067.81009
Biham, Eli; Brassard, Gilles; Kenigsberg, Dan; Mor, Tal
15
2004
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Collisions of SHA-0 and reduced SHA-1. Zbl 1137.94337
Biham, Eli; Chen, Rafi; Joux, Antoine; Carribault, Patrick; Lemuet, Christophe; Jalby, William
13
2005
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
12
2005
Security of quantum key distribution against all collective attacks. Zbl 1050.68038
Biham, Eli; Boyer, Michel; Brassard, Gilles; van de Graaf, Jeroen; Mor, Tal
11
2002
On Matsui’s linear cryptoanalysis. Zbl 0879.94025
Biham, Eli
11
1995
Improved slide attacks. Zbl 1186.94425
Biham, Eli; Dunkelman, Orr; Keller, Nathan
10
2007
A related-key rectangle attack on the full KASUMI. Zbl 1154.94375
Biham, Eli; Dunkelman, Orr; Keller, Nathan
10
2005
A fast new DES implementation in software. Zbl 1385.94014
Biham, Eli
10
1997
Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT’91. Zbl 0825.94182
Biham, Eli
10
1991
Efficient reconstruction of RC4 keys from internal states. Zbl 1154.68381
Biham, Eli; Carmeli, Yaniv
8
2008
Enhancing differential-linear cryptanalysis. Zbl 1065.94538
Biham, Eli; Dunkelman, Orr; Keller, Nathan
8
2002
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. Zbl 1042.68041
Biham, Eli
8
2002
A proof of the security of quantum key distribution (extended abstract). Zbl 1296.94085
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
8
2000
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Zbl 1003.94521
Biham, Eli; Boneh, Dan; Reingold, Omer
8
1999
Two practical and provably secure block ciphers: BEAR and LION. Zbl 1373.94908
Anderson, Ross; Biham, Eli
8
1996
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
8
1991
A practical attack on KeeLoq. Zbl 1149.94322
Indesteege, Sebastiaan; Keller, Nathan; Dunkelman, Orr; Biham, Eli; Preneel, Bart
7
2008
Differential-linear cryptanalysis of Serpent. Zbl 1254.94024
Biham, Eli; Dunkelman, Orr; Keller, Nathan
7
2003
New results on boomerang and rectangle attacks. Zbl 1045.94512
Biham, Eli; Dunkelman, Orr; Keller, Nathan
7
2002
Tiger: a fast new hash function. Zbl 1373.94907
Anderson, Ross; Biham, Eli
7
1996
Techniques for cryptanalysis of block ciphers. (to appear). Zbl 06015144
Biham, Eli; Dunkelman, Orr
6
2020
Impossible fault analysis of RC4 and differential fault analysis of RC4. Zbl 1140.94325
Biham, Eli; Granboulan, Louis; Nguyên, Phong Q.
6
2005
Related-key impossible differential attacks on 8-round AES-192. Zbl 1125.94320
Biham, Eli; Dunkelman, Orr; Keller, Nathan
5
2006
New combined attacks on block ciphers. Zbl 1140.94324
Biham, Eli; Dunkelman, Orr; Keller, Nathan
5
2005
In how many ways can you write Rijndael? Zbl 1065.68529
Barkan, Elad; Biham, Eli
5
2002
Cryptanalysis of Patarin’s 2-round public key system with \(S\) boxes (2R). Zbl 1082.94505
Biham, Eli
5
2000
How to strengthen DES using existing hardware. Zbl 0873.94014
Biham, Eli; Biryukov, Alex
5
1995
Differential cryptanalysis of Lucifer. Zbl 0871.94024
Ben-Aroya, Ishai; Biham, Eli
5
1994
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
4
2008
A unified approach to related-key attacks. Zbl 1154.68382
Biham, Eli; Dunkelman, Orr; Keller, Nathan
4
2008
New cryptanalytic results on IDEA. Zbl 1172.94562
Biham, Eli; Dunkelman, Orr; Keller, Nathan
4
2006
Instant ciphertext-only cryptanalysis of GSM encrypted communication. Zbl 1122.94349
Barkan, Elad; Biham, Eli; Keller, Nathan
4
2003
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
4
1999
An improvement of Davies’ attack on DES. Zbl 0881.94012
Biham, Eli; Biryukov, Alex
4
1997
Related-key boomerang and rectangle attacks: theory and experimental analysis. Zbl 1365.94438
Kim, Jongsung; Hong, Seokhie; Preneel, Bart; Biham, Eli; Dunkelman, Orr; Keller, Nathan
3
2012
Basing weak public-key cryptography on strong one-way functions. Zbl 1162.94339
Biham, Eli; Goren, Yaron J.; Ishai, Yuval
3
2008
A simple related-key attack on the full SHACAL-1. Zbl 1177.94129
Biham, Eli; Dunkelman, Orr; Keller, Nathan
3
2006
Conditional estimators: An effective attack on A5/1. Zbl 1151.94478
Barkan, Elad; Biham, Eli
3
2006
Cryptanalysis of the A5/1 GSM stream cipher. Zbl 0963.94019
Biham, Eli; Dunkelman, Orr
3
2000
Cryptanalysis of triple modes of operation. Zbl 0937.94005
Biham, Eli
3
1999
New techniques for cryptanalysis of hash functions and improved attacks on Snefru. Zbl 1154.68380
Biham, Eli
2
2008
Linear cryptanalysis of reduced round Serpent. Zbl 1073.68618
Biham, Eli; Dunkelman, Orr; Keller, Nathan
2
2002
Cryptanalysis of multiple modes of operation. Zbl 0902.94013
Biham, Eli
2
1998
Cryptanalysis of Ladder-DES. Zbl 1385.94013
Biham, Eli
2
1997
On modes of operation. Zbl 0943.94530
Biham, Eli
2
1994
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
Efficient slide attacks. Zbl 1400.94116
Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan
1
2018
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Cryptanalysis of SHA-0 and reduced SHA-1. Zbl 1334.94061
Biham, Eli; Chen, Rafi; Joux, Antoine
1
2015
A practical attack on KeeLoq. Zbl 1279.94049
Aerts, Wim; Biham, Eli; De Moitié, Dieter; De Mulder, Elke; Dunkelman, Orr; Indesteege, Sebastiaan; Keller, Nathan; Preneel, Bart; Vandenbosch, Guy A. E.; Verbauwhede, Ingrid
1
2012
Instant ciphertext-only cryptanalysis of GSM encrypted communication. Zbl 1161.94383
Barkan, Elad; Biham, Eli; Keller, Nathan
1
2008
A new attack on 6-round IDEA. Zbl 1186.94426
Biham, Eli; Dunkelman, Orr; Keller, Nathan
1
2007
Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Zbl 1121.94001
Biham, Eli (ed.); Youssef, Amr M. (ed.)
1
2007
Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Zbl 1020.00023
Biham, Eli (ed.)
1
2003
Cryptanalysis of the ANSI X9. 52 CBCM mode. Zbl 0929.68047
Biham, Eli; Knudsen, Lars R.
1
1998
An improvement of Davies’ attack on DES. Zbl 0881.94011
Biham, Eli; Biryukov, Alex
1
1995
Cryptanalysis of multiple modes of operation. Zbl 0872.94027
Biham, Eli
1
1995
Techniques for cryptanalysis of block ciphers. (to appear). Zbl 06015144
Biham, Eli; Dunkelman, Orr
6
2020
Efficient slide attacks. Zbl 1400.94116
Bar-On, Achiya; Biham, Eli; Dunkelman, Orr; Keller, Nathan
1
2018
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Cryptanalysis of SHA-0 and reduced SHA-1. Zbl 1334.94061
Biham, Eli; Chen, Rafi; Joux, Antoine
1
2015
Related-key boomerang and rectangle attacks: theory and experimental analysis. Zbl 1365.94438
Kim, Jongsung; Hong, Seokhie; Preneel, Bart; Biham, Eli; Dunkelman, Orr; Keller, Nathan
3
2012
A practical attack on KeeLoq. Zbl 1279.94049
Aerts, Wim; Biham, Eli; De Moitié, Dieter; De Mulder, Elke; Dunkelman, Orr; Indesteege, Sebastiaan; Keller, Nathan; Preneel, Bart; Vandenbosch, Guy A. E.; Verbauwhede, Ingrid
1
2012
Efficient reconstruction of RC4 keys from internal states. Zbl 1154.68381
Biham, Eli; Carmeli, Yaniv
8
2008
A practical attack on KeeLoq. Zbl 1149.94322
Indesteege, Sebastiaan; Keller, Nathan; Dunkelman, Orr; Biham, Eli; Preneel, Bart
7
2008
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
4
2008
A unified approach to related-key attacks. Zbl 1154.68382
Biham, Eli; Dunkelman, Orr; Keller, Nathan
4
2008
Basing weak public-key cryptography on strong one-way functions. Zbl 1162.94339
Biham, Eli; Goren, Yaron J.; Ishai, Yuval
3
2008
New techniques for cryptanalysis of hash functions and improved attacks on Snefru. Zbl 1154.68380
Biham, Eli
2
2008
Instant ciphertext-only cryptanalysis of GSM encrypted communication. Zbl 1161.94383
Barkan, Elad; Biham, Eli; Keller, Nathan
1
2008
Improved slide attacks. Zbl 1186.94425
Biham, Eli; Dunkelman, Orr; Keller, Nathan
10
2007
A new attack on 6-round IDEA. Zbl 1186.94426
Biham, Eli; Dunkelman, Orr; Keller, Nathan
1
2007
Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Zbl 1121.94001
Biham, Eli (ed.); Youssef, Amr M. (ed.)
1
2007
A proof of the security of quantum key distribution. Zbl 1109.68045
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
20
2006
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
15
2006
Related-key impossible differential attacks on 8-round AES-192. Zbl 1125.94320
Biham, Eli; Dunkelman, Orr; Keller, Nathan
5
2006
New cryptanalytic results on IDEA. Zbl 1172.94562
Biham, Eli; Dunkelman, Orr; Keller, Nathan
4
2006
A simple related-key attack on the full SHACAL-1. Zbl 1177.94129
Biham, Eli; Dunkelman, Orr; Keller, Nathan
3
2006
Conditional estimators: An effective attack on A5/1. Zbl 1151.94478
Barkan, Elad; Biham, Eli
3
2006
Related-key boomerang and rectangle attacks. Zbl 1137.94338
Biham, Eli; Dunkelman, Orr; Keller, Nathan
18
2005
Collisions of SHA-0 and reduced SHA-1. Zbl 1137.94337
Biham, Eli; Chen, Rafi; Joux, Antoine; Carribault, Patrick; Lemuet, Christophe; Jalby, William
13
2005
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
12
2005
A related-key rectangle attack on the full KASUMI. Zbl 1154.94375
Biham, Eli; Dunkelman, Orr; Keller, Nathan
10
2005
Impossible fault analysis of RC4 and differential fault analysis of RC4. Zbl 1140.94325
Biham, Eli; Granboulan, Louis; Nguyên, Phong Q.
6
2005
New combined attacks on block ciphers. Zbl 1140.94324
Biham, Eli; Dunkelman, Orr; Keller, Nathan
5
2005
Near-collisions of SHA-0. Zbl 1104.94307
Biham, Eli; Chen, Rafi
15
2004
Quantum computing without entanglement. Zbl 1067.81009
Biham, Eli; Brassard, Gilles; Kenigsberg, Dan; Mor, Tal
15
2004
Differential-linear cryptanalysis of Serpent. Zbl 1254.94024
Biham, Eli; Dunkelman, Orr; Keller, Nathan
7
2003
Instant ciphertext-only cryptanalysis of GSM encrypted communication. Zbl 1122.94349
Barkan, Elad; Biham, Eli; Keller, Nathan
4
2003
Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Zbl 1020.00023
Biham, Eli (ed.)
1
2003
Security of quantum key distribution against all collective attacks. Zbl 1050.68038
Biham, Eli; Boyer, Michel; Brassard, Gilles; van de Graaf, Jeroen; Mor, Tal
11
2002
Enhancing differential-linear cryptanalysis. Zbl 1065.94538
Biham, Eli; Dunkelman, Orr; Keller, Nathan
8
2002
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. Zbl 1042.68041
Biham, Eli
8
2002
New results on boomerang and rectangle attacks. Zbl 1045.94512
Biham, Eli; Dunkelman, Orr; Keller, Nathan
7
2002
In how many ways can you write Rijndael? Zbl 1065.68529
Barkan, Elad; Biham, Eli
5
2002
Linear cryptanalysis of reduced round Serpent. Zbl 1073.68618
Biham, Eli; Dunkelman, Orr; Keller, Nathan
2
2002
The rectangle attack – rectangling the Serpent. Zbl 0981.94017
Biham, Eli; Dunkelman, Orr; Keller, Nathan
21
2001
A proof of the security of quantum key distribution (extended abstract). Zbl 1296.94085
Biham, Eli; Boyer, Michel; Boykin, P. Oscar; Mor, Tal; Roychowdhury, Vwani
8
2000
Cryptanalysis of Patarin’s 2-round public key system with \(S\) boxes (2R). Zbl 1082.94505
Biham, Eli
5
2000
Cryptanalysis of the A5/1 GSM stream cipher. Zbl 0963.94019
Biham, Eli; Dunkelman, Orr
3
2000
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
55
1999
Generalized Grover search algorithm for arbitrary initial amplitude distribution. Zbl 0945.68037
Biron, David; Biham, Ofer; Biham, Eli; Grassl, Markus; Lidar, Daniel A.
18
1999
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Zbl 1003.94521
Biham, Eli; Boneh, Dan; Reingold, Omer
8
1999
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
4
1999
Cryptanalysis of triple modes of operation. Zbl 0937.94005
Biham, Eli
3
1999
Serpent: a new block cipher proposal. Zbl 1385.94015
Biham, Eli; Anderson, Ross; Knudsen, Lars
36
1998
Cryptanalysis of multiple modes of operation. Zbl 0902.94013
Biham, Eli
2
1998
Cryptanalysis of the ANSI X9. 52 CBCM mode. Zbl 0929.68047
Biham, Eli; Knudsen, Lars R.
1
1998
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
52
1997
A fast new DES implementation in software. Zbl 1385.94014
Biham, Eli
10
1997
An improvement of Davies’ attack on DES. Zbl 0881.94012
Biham, Eli; Biryukov, Alex
4
1997
Cryptanalysis of Ladder-DES. Zbl 1385.94013
Biham, Eli
2
1997
Two practical and provably secure block ciphers: BEAR and LION. Zbl 1373.94908
Anderson, Ross; Biham, Eli
8
1996
Tiger: a fast new hash function. Zbl 1373.94907
Anderson, Ross; Biham, Eli
7
1996
On Matsui’s linear cryptoanalysis. Zbl 0879.94025
Biham, Eli
11
1995
How to strengthen DES using existing hardware. Zbl 0873.94014
Biham, Eli; Biryukov, Alex
5
1995
An improvement of Davies’ attack on DES. Zbl 0881.94011
Biham, Eli; Biryukov, Alex
1
1995
Cryptanalysis of multiple modes of operation. Zbl 0872.94027
Biham, Eli
1
1995
New types of cryptanalytic attacks using related keys. Zbl 0812.94012
Biham, Eli
32
1994
New types of cryptanalytic attacks using related keys. Zbl 0951.94521
Biham, E.
17
1994
Differential cryptanalysis of Lucifer. Zbl 0871.94024
Ben-Aroya, Ishai; Biham, Eli
5
1994
On modes of operation. Zbl 0943.94530
Biham, Eli
2
1994
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
72
1993
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
26
1993
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
219
1991
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
62
1991
Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT’91. Zbl 0825.94182
Biham, Eli
10
1991
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
8
1991
all top 5

Cited by 1,078 Authors

19 Rijmen, Vincent
18 Dunkelman, Orr
16 Keller, Nathan
14 Knudsen, Lars Ramkilde
13 Biham, Eli
13 Calderini, Marco
12 Carlet, Claude
11 Li, Chao
10 Sala, Massimiliano
10 Shamir, Adi
9 Blondeau, Celine
9 Bogdanov, Andrey
9 Budaghyan, Lilya
9 Leander, Gregor
9 Youssef, Amr M.
8 Biryukov, Alex
8 Lucks, Stefan
8 Nyberg, Kaisa
8 Perrin, Léo
8 Qu, Longjiang
7 Aragona, Riccardo
7 Gong, Guang
7 Hong, Jin
7 Lu, Jiqiang
7 Meier, Willi
7 Poinsot, Laurent
7 Sasaki, Yu
6 Hu, Yupu
6 Kim, Jongsung
6 Maitra, Subhamoy
6 Mendel, Florian
6 Phan, Raphael Chung-Wei
6 Renner, Renato
6 Sarkar, Santanu
6 Wu, Wenling
5 Civino, Roberto
5 Daemen, Joan
5 Derbez, Patrick
5 Fouque, Pierre-Alain
5 Helleseth, Tor
5 Jin, Chenhui
5 Khoo, Khoongming
5 Lai, Xuejia
5 Liao, Xiaofeng
5 Mala, Hamid
5 Mor, Tal
5 Naya-Plasencia, María
5 Pasalic, Enes
5 Peng, Jie
5 Rastegin, Alexey E.
5 Rechberger, Christian
5 Sarkar, Palash
5 Sun, Bing
5 Sung, Jaechul
5 Tan, Chik How
5 Tan, Yin
5 Tavares, Stafford E.
5 Todo, Yosuke
5 Wang, Meiqin
5 Wang, Mingsheng
5 Wang, Xiaoyun
4 Boyer, Michel
4 Canteaut, Anne
4 Dakhilalian, Mohammad
4 Gorski, Michael
4 Hong, Seokhie
4 Jia, Keting
4 Lamberger, Mario
4 Leurent, Gaëtan
4 Li, Yongqiang
4 Minier, Marine
4 Mouha, Nicky
4 Mukhopadhyay, Debdeep
4 Paul, Goutam
4 Preneel, Bart
4 Pudovkina, Marina A.
4 Shibutani, Kyoji
4 Vaudenay, Serge
4 Villa, Irene
4 Wagner, David A.
4 Wang, Gaoli
4 Zhang, Huanguo
4 Zhang, Lei
3 Beierle, Christof
3 Borghoff, Julia
3 Chen, Jiazhe
3 Roy Chowdhury, Dipanwita
3 Demirci, Hüseyin
3 Dinur, Itai
3 Dobraunig, Christoph
3 Gérault, David
3 Isobe, Takanori
3 Kanso, Ali
3 Kara, Orhun
3 Kelsey, John
3 Kircanski, Aleksandar
3 Lafourcade, Pascal
3 Lee, Sangjin
3 Lee, Yuseop
3 Li, Chunlei
...and 978 more Authors
all top 5

Cited in 87 Serials

70 Designs, Codes and Cryptography
52 Journal of Cryptology
31 Cryptography and Communications
27 Information Processing Letters
24 Quantum Information Processing
20 Finite Fields and their Applications
19 Theoretical Computer Science
13 Prikladnaya Diskretnaya Matematika
11 Information Sciences
10 Discrete Applied Mathematics
8 International Journal of Theoretical Physics
8 Applicable Algebra in Engineering, Communication and Computing
8 Nonlinear Dynamics
8 Wuhan University Journal of Natural Sciences (WUJNS)
8 Journal of Discrete Mathematical Sciences & Cryptography
6 Physics Letters. A
6 Chaos, Solitons and Fractals
6 Mathematical Problems in Engineering
5 International Journal of Foundations of Computer Science
5 International Journal of Quantum Information
5 Journal of Mathematical Cryptology
5 Advances in Mathematics of Communications
5 Science China. Information Sciences
4 Applied Mathematics and Computation
4 Journal of Computer and System Sciences
4 Cryptologia
4 Journal of Computer Science and Technology
4 New Generation Computing
4 Discrete Mathematics and Applications
4 Communications in Nonlinear Science and Numerical Simulation
4 Science China. Mathematics
3 Discrete Mathematics
3 Journal of Computational and Applied Mathematics
3 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
3 Cybernetics and Systems Analysis
2 Computers & Mathematics with Applications
2 Journal of Complexity
2 Information and Computation
2 International Journal of Computer Mathematics
2 New Journal of Physics
2 International Journal of Applied Mathematics and Computer Science
2 Physical Review Letters
2 Journal of Systems Science and Complexity
2 Natural Computing
2 Foundations of Physics
2 Science in China. Series F
2 Algorithms
1 Artificial Intelligence
1 Communications in Mathematical Physics
1 Computer Physics Communications
1 Journal of the Franklin Institute
1 Letters in Mathematical Physics
1 Problems of Information Transmission
1 Reviews of Modern Physics
1 ACM Transactions on Mathematical Software
1 Annali di Matematica Pura ed Applicata. Serie Quarta
1 Computing
1 Journal of Algebra
1 Journal of Statistical Planning and Inference
1 Kybernetes
1 Nonlinear Analysis. Theory, Methods & Applications. Series A: Theory and Methods
1 Journal of Information & Optimization Sciences
1 Note di Matematica
1 Journal of Symbolic Computation
1 Algorithmica
1 International Journal of Parallel Programming
1 Journal of Automated Reasoning
1 Mathematical and Computer Modelling
1 SIAM Journal on Discrete Mathematics
1 Distributed Computing
1 Journal of Nonlinear Science
1 Journal of Mathematical Sciences (New York)
1 Soft Computing
1 Chaos
1 Journal of Applied Mathematics
1 Entropy
1 Journal of Algebra and its Applications
1 Journal of Shanghai Jiaotong University (Science)
1 Journal of Zhejiang University. Science A
1 Mathematics in Computer Science
1 Physical Review A, Third Series
1 Formalized Mathematics
1 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
1 International Journal of Group Theory
1 Frontiers of Computer Science in China
1 Quanta
1 Electronic Journal of Mathematical Analysis and Applications EJMAA

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.