Adi Shamir
Adi Shamir
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
238211978
How to share a secret
A Shamir
Communications of the ACM 22 (11), 612-613, 1979
161121979
Identity-based cryptosystems and signature schemes
A Shamir
Workshop on the theory and application of cryptographic techniques, 47-53, 1984
91761984
Differential cryptanalysis of DES-like cryptosystems
E Biham, A Shamir
Journal of CRYPTOLOGY 4 (1), 3-72, 1991
5078*1991
How to prove yourself: Practical solutions to identification and signature problems
A Fiat, A Shamir
Conference on the theory and application of cryptographic techniques, 186-194, 1986
46521986
Visual cryptography
M Naor, A Shamir
Workshop on the Theory and Application of of Cryptographic Techniques, 1-12, 1994
35741994
Differential fault analysis of secret key cryptosystems
E Biham, A Shamir
Annual international cryptology conference, 513-525, 1997
20271997
On the complexity of time table and multi-commodity flow problems
S Even, A Itai, A Shamir
16th Annual Symposium on Foundations of Computer Science (sfcs 1975), 184-193, 1975
19521975
How to leak a secret
RL Rivest, A Shamir, Y Tauman
International Conference on the Theory and Application of Cryptology and …, 2001
19482001
Weaknesses in the key scheduling algorithm of RC4
S Fluhrer, I Mantin, A Shamir
International Workshop on Selected Areas in Cryptography, 1-24, 2001
16742001
Zero-knowledge proofs of identity
U Feige, A Fiat, A Shamir
Journal of cryptology 1 (2), 77-94, 1988
16361988
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
15751983
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
Cryptographers’ track at the RSA conference, 1-20, 2006
13852006
Ip= pspace
A Shamir
Journal of the ACM (JACM) 39 (4), 869-877, 1992
11001992
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
10561996
Quantitative analysis of the full bitcoin transaction graph
D Ron, A Shamir
International Conference on Financial Cryptography and Data Security, 6-24, 2013
10192013
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
N Courtois, A Klimov, J Patarin, A Shamir
International Conference on the Theory and Applications of Cryptographic …, 2000
9672000
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
E Biham, A Biryukov, A Shamir
International Conference on the Theory and Applications of Cryptographic …, 1999
7501999
Differential cryptanalysis of the full 16-round DES
E Biham, A Shamir
Annual international cryptology conference, 487-496, 1992
7021992
Witness indistinguishable and witness hiding protocols
U Feige, A Shamir
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
6991990
The system can't perform the operation now. Try again later.
Articles 1–20