Follow
Adi Shamir
Adi Shamir
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
276851978
How to share a secret
A Shamir
Communications of the ACM 22 (11), 612-613, 1979
193121979
Identity-based cryptosystems and signature schemes
A Shamir
Advances in Cryptology: Proceedings of CRYPTO 84 4, 47-53, 1985
102671985
Differential cryptanalysis of DES-like cryptosystems
E Biham, A Shamir
Journal of CRYPTOLOGY 4, 3-72, 1991
6123*1991
How to prove yourself: Practical solutions to identification and signature problems
A Fiat, A Shamir
Conference on the theory and application of cryptographic techniques, 186-194, 1986
59031986
Visual cryptography
M Naor, A Shamir
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
41021995
How to leak a secret
RL Rivest, A Shamir, Y Tauman
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
24372001
Differential fault analysis of secret key cryptosystems
E Biham, A Shamir
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997
23261997
On the complexity of time table and multi-commodity flow problems
S Even, A Itai, A Shamir
16th annual symposium on foundations of computer science (sfcs 1975), 184-193, 1975
21531975
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
18912006
Zero knowledge proofs of identity
U Fiege, A Fiat, A Shamir
Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987
18681987
Weaknesses in the key scheduling algorithm of RC4
S Fluhrer, I Mantin, A Shamir
Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 …, 2001
18372001
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
18111983
Quantitative analysis of the full bitcoin transaction graph
D Ron, A Shamir
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
14162013
Ip= pspace
A Shamir
Journal of the ACM (JACM) 39 (4), 869-877, 1992
12481992
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
N Courtois, A Klimov, J Patarin, A Shamir
International Conference on the Theory and Applications of Cryptographic …, 2000
11572000
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
10981996
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
E Biham, A Biryukov, A Shamir
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
1043*1999
Time-lock puzzles and timed-release crypto
RL Rivest, A Shamir, DA Wagner
8141996
Real time cryptanalysis of A5/1 on a PC
A Biryukov, A Shamir, D Wagner
Fast Software Encryption: 7th International Workshop, FSE 2000 New York, NY …, 2001
7772001
The system can't perform the operation now. Try again later.
Articles 1–20