Properties (47)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Person
|
gptkbp:affiliation |
Technion
|
gptkbp:awards |
Best Paper Award
|
gptkbp:birthYear |
1955
|
gptkbp:class |
Cryptography Courses
|
gptkbp:collaborations |
gptkb:Adrian_Perrig
Moti Yung |
gptkbp:community |
Cryptography and Information Security Group
|
gptkbp:conference |
Asiacrypt Conference
Crypto Conference Eurocrypt Conference |
gptkbp:contribution |
Cryptographic Algorithms
Differential Cryptanalysis |
gptkbp:editor |
gptkb:International_Journal_of_Information_Security
gptkb:Journal_of_Cryptology gptkb:ACM_Transactions_on_Information_Systems gptkb:Journal_of_Computer_and_System_Sciences IEEE Transactions on Information Theory |
gptkbp:field |
Computer Science
|
https://www.w3.org/2000/01/rdf-schema#label |
Eli Biham
|
gptkbp:influence |
Modern Cryptography
|
gptkbp:knownFor |
Cryptography
|
gptkbp:mentor |
PhD Students
|
gptkbp:nationality |
gptkb:Israeli
|
gptkbp:notableFeature |
Cryptography Conferences
Information Security Conferences Security_Conferences |
gptkbp:patentCitation |
gptkb:Key_Management_Systems
Secure Communication Protocols Encryption Techniques Cryptographic Methods Digital_Signatures |
gptkbp:publications |
gptkb:The_Data_Encryption_Standard
Block Cipher Modes of Operation Cryptanalysis of DES AES_Proposal |
gptkbp:researchContribution |
gptkb:Digital_Rights_Management
gptkb:Quantum_Cryptography Public Key Cryptography Homomorphic Encryption Secure Multi-Party Computation Cryptographic Protocols Blockchain Security Secure Hash Functions Cryptographic Hardware Zero-Knowledge_Proofs |
gptkbp:researchInterest |
Information Security
|