Environment dominates over host genetics in shaping human gut microbiota

D Rothschild, O Weissbrod, E Barkan, A Kurilshikov… - Nature, 2018 - nature.com
Human gut microbiome composition is shaped by multiple factors but the relative contribution
of host genetics remains elusive. Here we examine genotype and microbiome data from …

Large-scale association analyses identify host factors influencing human gut microbiome composition

…, W Turpin, JY Moon, HN Kim, K Lüll, E Barkan… - Nature …, 2021 - nature.com
To study the effect of host genetics on gut microbiome composition, the MiBioGen consortium
curated and analyzed genome-wide genotypes and 16S fecal microbiome data from …

Instant ciphertext-only cryptanalysis of GSM encrypted communication

E Barkan, E Biham, N Keller - Annual international cryptology conference, 2003 - Springer
In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted
communication, and various active attacks on the GSM protocols. These attacks can even break …

Instant ciphertext-only cryptanalysis of GSM encrypted communication

E Barkan, E Biham, N Keller - Journal of Cryptology, 2008 - Springer
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System
for Mobile communications) encrypted communication, and various active attacks on the …

In how many ways can you write Rijndael?

E Barkan, E Biham - Advances in Cryptology—ASIACRYPT 2002: 8th …, 2002 - Springer
In this paper we ask the question what happens if we replace all the constants in Rijndael,
including the replacement of the irreducible polynomial, the coefficients of the MixColumn …

Whole-genome sequencing reveals that variants in the interleukin 18 receptor accessory protein 3′ UTR protect against ALS

C Eitan, A Siany, E Barkan, T Olender, KR van Eijk… - Nature …, 2022 - nature.com
The noncoding genome is substantially larger than the protein-coding genome but has been
largely unexplored by genetic association studies. Here, we performed region-based rare …

Conditional estimators: An effective attack on A5/1

E Barkan, E Biham - International Workshop on Selected Areas in …, 2005 - Springer
Irregularly-clocked linear feedback shift registers (LFSRs) are commonly used in stream
ciphers. We propose to harness the power of conditional estimators for correlation attacks on …

Rigorous bounds on cryptanalytic time/memory tradeoffs

E Barkan, E Biham, A Shamir - Annual International Cryptology …, 2006 - Springer
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the
inversion of a random function f:{0,1,..., N–1} ↦{0,1,..., N–1}. The model contains all the known …

Host genetics and microbiome associations through the lens of genome wide association studies

O Weissbrod, D Rothschild, E Barkan… - Current opinion in …, 2018 - Elsevier
… Author links open overlay panel Omer Weissbrod 1 2 , Daphna Rothschild 1 2 , Elad
Barkan 1 2 , Eran Segal 1 2 … Barkan, A. Kurilshikov, T. Korem, D. …

[PS][PS] The book of Rijndaels.

E Barkan, E Biham - IACR Cryptol. ePrint Arch., 2002 - eprint.iacr.org
This paper is the full book of the 240 dual ciphers of Rijndael, in which only the constants di
er from Rijndael. See:\In How Many Ways Can You Write Rijndael?", http://eprint. iacr. org.