Edit Profile Shamir, Adi Compute Distance To: Compute Author ID: shamir.adi Published as: Shamir, A.; Shamir, Adi Homepage: http://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html External Links: MGP · Wikidata · dblp · GND Awards: Turing Award (2002) Documents Indexed: 147 Publications since 1975, including 2 Books Biographic References: 1 Publication all top 5 Co-Authors 23 single-authored 27 Dunkelman, Orr 20 Dinur, Itai 20 Keller, Nathan 15 Biham, Eli 10 Biryukov, Alex 7 Tromer, Eran 6 Klimov, Alexander 5 Feige, Uriel 5 Fiat, Amos 5 Hoch, Jonathan J. 5 Lapidot, Dror 4 Manna, Zohar 4 Rivest, Ronald Linn 3 Bouillaguet, Charles 3 Fouque, Pierre-Alain 3 Lenstra, Arjen K. 3 Naor, Moni 3 Tsaban, Boaz 2 Andreeva, Elena Anatol’evna 2 Bar-On, Achiya 2 Carmeli, Yaniv 2 Dodis, Yevgeniy 2 Even, Shimon 2 Feldman, David Victor 2 Genkin, Daniel 2 Impagliazzo, Russell 2 Kelsey, John 2 Kipnis, Aviad 2 Mantin, Itsik 2 Nisan, Noam 2 Osvik, Dag Arne 2 Ronen, Eyal 2 Rudich, Steven 2 Ruinskiy, Dima 2 Schrift, A. W. 2 Stephens-Davidowitz, Noah 2 Tauman, Yael 2 van Someren, Nicko 2 Wichs, Daniel 2 Zimmer, Sebastien 1 Adleman, Leonard Max 1 Aoki, Takafumi 1 Aumasson, Jean-Philippe 1 Barkan, Elad 1 Chen, Hsieh-Chung 1 Cheng, Chen-Mou 1 Chou, Tung 1 Courtois, Nicolas T. 1 Dodson, Bruce A. 1 Dolev, Shlomi 1 Dubois, Vivien 1 Fluhrer, Scott R. 1 Frieze, Alan Michael 1 Goldreich, Oded 1 Güneysu, Tim 1 Gutman, Masha 1 Halevy, Dani 1 Håstad, Johan Torkel 1 Homma, Naofumi 1 Hughes, James P. 1 Itai, Alon 1 Kannan, Ravindran 1 Khovratovich, Dmitry 1 Kopeetsky, Marina 1 Kortsmit, Wil 1 Lagarias, Jeffrey C. 1 Leyland, Paul C. 1 Meier, Willi 1 Mityagin, Anton 1 Miyamoto, Atsushi 1 Naccache, David 1 Niederhagen, Ruben 1 Ong, Hooi Jin 1 Oren, Yossef 1 Paar, Christof 1 Patarin, Jacques 1 Phan, Raphael Chung-Wei 1 Polak, Inna 1 Richardson, Eran 1 Satoh, Akashi 1 Schnorr, Claus Peter 1 Schroeppel, Richard 1 Shallit, Jeffrey O. 1 Stern, Jacques 1 Stern, Julien P. 1 Tomlinson, Jim 1 Wadge, William W. 1 Wagner, David A. 1 Yang, Bo-Yin 1 Zimmermann, Ralf 1 Zippel, Richard E. all top 5 Serials 17 Journal of Cryptology 6 SIAM Journal on Computing 3 IEEE Transactions on Information Theory 3 Information Processing Letters 3 Journal of Computer and System Sciences 3 Communications of the ACM 2 IEEE Transactions on Computers 2 Information and Computation 2 Designs, Codes and Cryptography 1 Information and Control 1 Journal of the Association for Computing Machinery 1 Networks 1 Theoretical Computer Science 1 Cryptologia 1 Combinatorica 1 Algorithmica 1 Theory of Computing Systems 1 Journal of Mathematical Cryptology 1 Cryptography and Communications all top 5 Fields 122 Information and communication theory, circuits (94-XX) 65 Computer science (68-XX) 10 Number theory (11-XX) 6 Numerical analysis (65-XX) 4 Combinatorics (05-XX) 3 Mathematical logic and foundations (03-XX) 3 Operations research, mathematical programming (90-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Field theory and polynomials (12-XX) 1 Group theory and generalizations (20-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 125 Publications have been cited 3,745 times in 3,054 Documents Cited by ▼ Year ▼ A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005Rivest, R. L.; Shamir, A.; Adleman, L. 648 1978 How to share a secret. Zbl 0414.94021Shamir, Adi 608 1979 Identity-based cryptosystems and signature schemes. Zbl 1359.94626Shamir, Adi 325 1985 On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021Even, S.; Itai, A.; Shamir, A. 239 1976 Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017Biham, Eli; Shamir, Adi 219 1991 How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012Fiat, Amos; Shamir, Adi 149 1987 Visual cryptography. Zbl 0878.94048Naor, Moni; Shamir, Adi 77 1995 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005Biham, Eli; Shamir, Adi 72 1993 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096Shamir, Adi 68 1992 Zero-knowledge proofs of identity. Zbl 0659.94006Feige, Uriel; Fiat, Amos; Shamir, Adi 66 1988 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 64 2000 Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014Biham, Eli; Shamir, Adi 62 1991 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013Biham, Eli; Biryukov, Alex; Shamir, Adi 55 1999 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010Biham, Eli; Shamir, Adi 52 1997 How to leak a secret. Zbl 1064.94558Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 50 2001 Cube attacks on tweakable black box polynomials. Zbl 1239.94045Dinur, Itai; Shamir, Adi 47 2009 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012Kipnis, Aviad; Shamir, Adi 36 1999 The LSD broadcast encryption scheme. Zbl 1026.94528Halevy, Dani; Shamir, Adi 34 2002 A practical attack on broadcast RC4. Zbl 1073.68637Mantin, Itsik; Shamir, Adi 32 2002 Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045Feige, U.; Shamir, A. 31 1990 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013Biryukov, Alex; Shamir, Adi 30 2000 Improved online/offline signature schemes. Zbl 1003.94533Shamir, Adi; Tauman, Yael 29 2001 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015Feige, Uriel; Lapidot, Dror; Shamir, Adi 29 1999 A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015Schroeppel, Richard; Shamir, Adi 29 1981 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017Biham, Eli; Shamir, Adi 26 1993 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065Dunkelman, Orr; Keller, Nathan; Shamir, Adi 23 2012 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 23 2001 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045Dunkelman, Orr; Keller, Nathan; Shamir, Adi 21 2010 Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi 20 1988 A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007Shamir, Adi 19 1984 A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029Shamir, Adi 19 1979 Second preimage attacks on dithered hash functions. Zbl 1149.94302Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 18 2008 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 18 2006 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 17 2009 Practical cryptanalysis of SFLASH. Zbl 1215.94043Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 17 2007 Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414Lapidot, Dror; Shamir, Adi 17 1991 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030Kipnis, Aviad; Shamir, Adi 16 1998 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384Barkan, Elad; Biham, Eli; Shamir, Adi 15 2006 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640Biryukov, Alex; Shamir, Adi; Wagner, David 15 2001 Structural cryptanalysis of SASAS. Zbl 0981.94015Biryukov, Alex; Shamir, Adi 15 2001 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010Biham, Eli; Biryukov, Alex; Shamir, Adi 15 1999 Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018Shamir, Adi 15 1979 The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017Manna, Zohar; Shamir, Adi 15 1976 Improved attacks on full GOST. Zbl 1282.94040Dinur, Itai; Dunkelman, Orr; Shamir, Adi 14 2012 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 12 2012 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023Biham, Eli; Biryukov, Alex; Shamir, Adi 12 2005 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042Dinur, Itai; Shamir, Adi 10 2011 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 10 2010 Fault analysis of stream ciphers. Zbl 1104.68479Hoch, Jonathan J.; Shamir, Adi 10 2004 A new class of invertible mappings. Zbl 1020.94522Klimov, Alexander; Shamir, Adi 10 2002 How to reuse a “write-once” memory. Zbl 0548.68046Rivest, Ronald L.; Shamir, Adi 10 1982 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064Dunkelman, Orr; Keller, Nathan; Shamir, Adi 9 2010 Efficient signature schemes based on birational permutations. Zbl 0877.94041Shamir, Adi 9 1994 The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016Manna, Zohar; Shamir, Adi 9 1978 The optimal approach to recursive programs. Zbl 0361.68022Manna, Zohar; Shamir, Adi 9 1977 Cryptographic applications of T-functions. Zbl 1081.94030Klimov, Alexander; Shamir, Adi 8 2004 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078Lapidot, Dror; Shamir, Adi 8 1997 Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012Biham, Eli; Shamir, Adi 8 1991 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2013 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 7 2010 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391Klimov, Alexander; Shamir, Adi 7 2005 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063Genkin, Daniel; Shamir, Adi; Tromer, Eran 6 2014 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044Dinur, Itai; Dunkelman, Orr; Shamir, Adi 6 2012 Structural cryptanalysis of SASAS. Zbl 1201.94076Biryukov, Alex; Shamir, Adi 6 2010 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 6 2010 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047Hoch, Jonathan J.; Shamir, Adi 6 2006 On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017Shamir, Adi 6 1981 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056Dunkelman, Orr; Keller, Nathan; Shamir, Adi 5 2015 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054Dinur, Itai; Dunkelman, Orr; Shamir, Adi 5 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 5 2014 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547Klimov, Alexander; Shamir, Adi 5 2004 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 5 2003 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015Lapidot, Dror; Shamir, Adi 5 1995 Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005Fiat, Amos; Shamir, Adi 5 1986 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064Dinur, Itai; Dunkelman, Orr; Shamir, Adi 4 2014 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 4 2011 Bug attacks. Zbl 1183.94022Biham, Eli; Carmeli, Yaniv; Shamir, Adi 4 2008 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372Hoch, Jonathan J.; Shamir, Adi 4 2008 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 4 1999 On the universality of the next bit test. Zbl 0786.94007Schrift, A. W.; Shamir, A. 4 1991 How to find a battleship. Zbl 0673.90063Fiat, Amos; Shamir, Adi 4 1989 Efficient factoring based on partial information. Zbl 0589.94004Rivest, Ronald L.; Shamir, Adi 4 1986 On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031Shamir, Adi; Zippel, Richard E. 4 1980 Data types as objects. Zbl 0353.68050Shamir, Adi; Wadge, William W. 4 1977 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2015 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410Shamir, Adi 3 2008 Factoring large numbers with the TWIRL device. Zbl 1122.94402Shamir, Adi; Tromer, Eran 3 2003 Guaranteeing the diversity of number generators. Zbl 1013.94013Shamir, Adi; Tsaban, Boaz 3 2001 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630Shamir, Adi 3 1999 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050Feige, Uriel; Shamir, Adi 3 1992 The fixedpoints of recursive definitions. Thesis for the degree of doctor of Philosophy. Zbl 0423.03051Shamir, Adi 3 1976 Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2016 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2014 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 2 2014 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057Dinur, Itai; Shamir, Adi 2 2012 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042Lapidot, Dror; Shamir, Adi 2 1992 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200Biham, Eli; Shamir, Adi 2 1992 Generalized ”write-once” memories. Zbl 0543.68054Fiat, Amos; Shamir, Adi 2 1984 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2018 Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2016 Bug attacks. Zbl 1365.94402Biham, Eli; Carmeli, Yaniv; Shamir, Adi 1 2016 New second-preimage attacks on hash functions. Zbl 1365.94397Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien 1 2016 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056Dunkelman, Orr; Keller, Nathan; Shamir, Adi 5 2015 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2015 Reflections on slide with a twist attacks. Zbl 1356.94055Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi 1 2015 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 New attacks on IDEA with at least 6 rounds. Zbl 1377.94037Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063Genkin, Daniel; Shamir, Adi; Tromer, Eran 6 2014 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054Dinur, Itai; Dunkelman, Orr; Shamir, Adi 5 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 5 2014 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064Dinur, Itai; Dunkelman, Orr; Shamir, Adi 4 2014 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2014 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 2 2014 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2013 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065Dunkelman, Orr; Keller, Nathan; Shamir, Adi 23 2012 Improved attacks on full GOST. Zbl 1282.94040Dinur, Itai; Dunkelman, Orr; Shamir, Adi 14 2012 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 12 2012 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044Dinur, Itai; Dunkelman, Orr; Shamir, Adi 6 2012 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057Dinur, Itai; Shamir, Adi 2 2012 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042Dinur, Itai; Shamir, Adi 10 2011 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 4 2011 An improved algebraic attack on Hamsi-256. Zbl 1282.94041Dinur, Itai; Shamir, Adi 1 2011 RFID authentication efficient proactive information security within computational security. Zbl 1208.94055Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi 1 2011 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045Dunkelman, Orr; Keller, Nathan; Shamir, Adi 21 2010 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 10 2010 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064Dunkelman, Orr; Keller, Nathan; Shamir, Adi 9 2010 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 7 2010 Structural cryptanalysis of SASAS. Zbl 1201.94076Biryukov, Alex; Shamir, Adi 6 2010 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 6 2010 Cube attacks on tweakable black box polynomials. Zbl 1239.94045Dinur, Itai; Shamir, Adi 47 2009 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 17 2009 Second preimage attacks on dithered hash functions. Zbl 1149.94302Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 18 2008 Bug attacks. Zbl 1183.94022Biham, Eli; Carmeli, Yaniv; Shamir, Adi 4 2008 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372Hoch, Jonathan J.; Shamir, Adi 4 2008 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410Shamir, Adi 3 2008 Improved related-key attacks on DESX and DESX+. Zbl 1156.94374Phan, Raphael C.-W.; Shamir, Adi 1 2008 Practical cryptanalysis of SFLASH. Zbl 1215.94043Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 17 2007 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 18 2006 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384Barkan, Elad; Biham, Eli; Shamir, Adi 15 2006 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047Hoch, Jonathan J.; Shamir, Adi 6 2006 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023Biham, Eli; Biryukov, Alex; Shamir, Adi 12 2005 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391Klimov, Alexander; Shamir, Adi 7 2005 Fault analysis of stream ciphers. Zbl 1104.68479Hoch, Jonathan J.; Shamir, Adi 10 2004 Cryptographic applications of T-functions. Zbl 1081.94030Klimov, Alexander; Shamir, Adi 8 2004 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547Klimov, Alexander; Shamir, Adi 5 2004 Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523Shamir, Adi 1 2004 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 5 2003 Factoring large numbers with the TWIRL device. Zbl 1122.94402Shamir, Adi; Tromer, Eran 3 2003 The LSD broadcast encryption scheme. Zbl 1026.94528Halevy, Dani; Shamir, Adi 34 2002 A practical attack on broadcast RC4. Zbl 1073.68637Mantin, Itsik; Shamir, Adi 32 2002 A new class of invertible mappings. Zbl 1020.94522Klimov, Alexander; Shamir, Adi 10 2002 Analysis of neural cryptography. Zbl 1065.94554Klimov, Alexander; Mityagin, Anton; Shamir, Adi 1 2002 How to leak a secret. Zbl 1064.94558Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 50 2001 Improved online/offline signature schemes. Zbl 1003.94533Shamir, Adi; Tauman, Yael 29 2001 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 23 2001 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640Biryukov, Alex; Shamir, Adi; Wagner, David 15 2001 Structural cryptanalysis of SASAS. Zbl 0981.94015Biryukov, Alex; Shamir, Adi 15 2001 Guaranteeing the diversity of number generators. Zbl 1013.94013Shamir, Adi; Tsaban, Boaz 3 2001 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 64 2000 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013Biryukov, Alex; Shamir, Adi 30 2000 Analysis and optimization of the twinkle factoring device. Zbl 1082.94525Lenstra, Arjen K.; Shamir, Adi 1 2000 Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656Shamir, Adi 1 2000 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013Biham, Eli; Biryukov, Alex; Shamir, Adi 55 1999 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012Kipnis, Aviad; Shamir, Adi 36 1999 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015Feige, Uriel; Lapidot, Dror; Shamir, Adi 29 1999 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010Biham, Eli; Biryukov, Alex; Shamir, Adi 15 1999 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 4 1999 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630Shamir, Adi 3 1999 How to copyright a function? Zbl 0935.68017Naccache, David; Shamir, Adi; Stern, Julien P. 1 1999 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030Kipnis, Aviad; Shamir, Adi 16 1998 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010Biham, Eli; Shamir, Adi 52 1997 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078Lapidot, Dror; Shamir, Adi 8 1997 Visual cryptography. Zbl 0878.94048Naor, Moni; Shamir, Adi 77 1995 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015Lapidot, Dror; Shamir, Adi 5 1995 Efficient signature schemes based on birational permutations. Zbl 0877.94041Shamir, Adi 9 1994 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005Biham, Eli; Shamir, Adi 72 1993 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017Biham, Eli; Shamir, Adi 26 1993 On the generation of multivariate polynomials which are hard to factor. Zbl 1310.68262Shamir, Adi 1 1993 Universal tests for nonuniform distributions. Zbl 0781.94002Schrift, A. W.; Shamir, A. 1 1993 On dice and coins: Models of computation for random generation. Zbl 0772.68036Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi 1 1993 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096Shamir, Adi 68 1992 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050Feige, Uriel; Shamir, Adi 3 1992 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042Lapidot, Dror; Shamir, Adi 2 1992 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200Biham, Eli; Shamir, Adi 2 1992 Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017Biham, Eli; Shamir, Adi 219 1991 Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014Biham, Eli; Shamir, Adi 62 1991 Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414Lapidot, Dror; Shamir, Adi 17 1991 Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012Biham, Eli; Shamir, Adi 8 1991 On the universality of the next bit test. Zbl 0786.94007Schrift, A. W.; Shamir, A. 4 1991 On expected polynomial time simulation of zero knowledge protocols. Zbl 0722.68046Feige, Uriel; Shamir, Adi 1 1991 Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045Feige, U.; Shamir, A. 31 1990 How to find a battleship. Zbl 0673.90063Fiat, Amos; Shamir, Adi 4 1989 On dice and coins: Models of computation for random generation. Zbl 0682.68073Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi 1 1989 Zero-knowledge proofs of identity. Zbl 0659.94006Feige, Uriel; Fiat, Amos; Shamir, Adi 66 1988 ...and 25 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 4,532 Authors 28 Susilo, Willy 26 Chang, Chin-Chen 26 Shamir, Adi 26 Wang, Huaxiong 24 Cao, Zhenfu 24 De Santis, Alfredo 23 Mu, Yi 23 Yung, Moti 22 Dunkelman, Orr 20 Keller, Nathan 20 Sarkar, Santanu 18 Padró, Carles 18 Rijmen, Vincent 18 Stinson, Douglas Robert 17 Maitra, Subhamoy 15 de Werra, Dominique 15 Herranz, Javier 15 Lin, Dongdai 14 Blundo, Carlo 14 Hwang, Min-Shiang 14 Ishai, Yuval 14 Libert, Benoît 14 Wen, Qiaoyan 14 Wong, Duncan S. 13 Carlet, Claude 13 Chen, Kefei 13 Goldreich, Oded 13 Hu, Yupu 13 Sahai, Amit 13 Sasaki, Yu 13 Yang, Guomin 12 Dinur, Itai 12 Farràs, Oriol 12 Gu, Dawu 12 Knudsen, Lars Ramkilde 12 Li, Chao 12 Paul, Goutam 12 Tan, Chik How 12 Wu, Qianhong 11 Biham, Eli 11 Calderini, Marco 11 Li, Fagen 11 Ling, San 11 Ostrovsky, Rafail 11 Qu, Longjiang 11 Tang, Chunming 11 Wu, Wenling 10 Bellare, Mihir 10 Bitansky, Nir 10 Bogdanov, Andrey 10 Boneh, Dan 10 Gennaro, Rosario 10 Gong, Guang 10 Katz, Jonathan N. 10 Leander, Gregor 10 Naccache, David 10 Sakurai, Kouichi 10 Waters, Brent 10 Wu, Tzong-Sun 10 Yang, Yuguang 9 Blondeau, Celine 9 Budaghyan, Lilya 9 Dai, Yuewei 9 D’Arco, Paolo 9 Harn, Lein 9 Hazay, Carmit 9 Hsu, Chien-Lung 9 Kushilevitz, Eyal 9 Lai, Xuejia 9 Meier, Willi 9 Naor, Moni 9 Nitaj, Abderrahmane 9 Perrin, Léo 9 Phan, Raphael Chung-Wei 9 Qin, Huawang 9 Shparlinski, Igor E. 9 Takagi, Tsuyoshi 9 Vaikuntanathan, Vinod 9 Venturi, Daniele 9 Wu, Chialong 9 Yang, Yixian 9 Youssef, Amr M. 9 Yuan, Pingzhi 9 Zhang, Huanguo 8 Adhikari, Avishek 8 Beimel, Amos 8 Chen, Tzungher 8 Damgård, Ivan Bjerre 8 Desmedt, Yvo G. 8 Ding, Cunsheng 8 Dolev, Shlomi 8 Domingo-Ferrer, Josep 8 Guo, Jian 8 He, Debiao 8 Huang, Qiong 8 Huang, Xinyi 8 Jin, Chenhui 8 Kurosawa, Kaoru 8 Lee, Cheng-Chi 8 Lin, Han-Yu ...and 4,432 more Authors all top 5 Cited in 270 Serials 209 Designs, Codes and Cryptography 186 Theoretical Computer Science 180 Journal of Cryptology 170 Information Processing Letters 136 Information Sciences 87 Discrete Applied Mathematics 72 Applied Mathematics and Computation 63 Cryptography and Communications 53 Journal of Computer and System Sciences 53 Finite Fields and their Applications 47 Quantum Information Processing 44 International Journal of Computer Mathematics 40 Computers & Mathematics with Applications 37 International Journal of Theoretical Physics 33 Information and Computation 32 Wuhan University Journal of Natural Sciences (WUJNS) 28 Journal of Discrete Mathematical Sciences & Cryptography 27 Discrete Mathematics 24 European Journal of Operational Research 24 Pattern Recognition 24 Journal of Mathematical Cryptology 23 Applicable Algebra in Engineering, Communication and Computing 21 Mathematical Problems in Engineering 21 Science China. Information Sciences 20 Advances in Mathematics of Communications 19 International Journal of Foundations of Computer Science 17 Mathematics of Computation 17 Prikladnaya Diskretnaya Matematika 15 Computing 15 Algorithmica 15 Mathematical and Computer Modelling 14 SIAM Journal on Computing 14 International Journal of Quantum Information 13 Computational Complexity 13 Journal of Systems Science and Complexity 13 Journal of Shanghai Jiaotong University (Science) 12 Journal of Symbolic Computation 12 Distributed Computing 11 Cybernetics and Systems Analysis 11 Journal of Combinatorial Optimization 10 Annals of Operations Research 10 Science in China. Series F 10 Groups, Complexity, Cryptology 10 Symmetry 9 Artificial Intelligence 9 Operations Research Letters 9 Journal of Computer Science and Technology 9 Journal of Applied Mathematics 8 Cryptologia 8 Computers & Operations Research 8 Journal of Parallel and Distributed Computing 8 Mathematical Programming. Series A. Series B 8 Soft Computing 7 Chaos, Solitons and Fractals 7 Applied Mathematics Letters 7 Discrete Mathematics and Applications 7 Nonlinear Dynamics 6 Journal of Computational and Applied Mathematics 6 Journal of Number Theory 6 Journal of Complexity 6 SIAM Journal on Discrete Mathematics 6 International Journal of Modern Physics C 6 Electronic Commerce Research 6 Mathematics in Computer Science 6 Science China. Mathematics 6 Frontiers of Computer Science 5 The Mathematical Intelligencer 5 Mathematical Systems Theory 5 Journal of Information & Optimization Sciences 5 New Generation Computing 5 Journal of Mathematical Sciences (New York) 5 Annals of Mathematics and Artificial Intelligence 5 Theory of Computing Systems 5 Journal of Applied Mathematics and Computing 5 EURASIP Journal on Advances in Signal Processing 4 Journal of Algebra 4 Networks 4 Combinatorica 4 Acta Applicandae Mathematicae 4 Journal of Automated Reasoning 4 Linear Algebra and its Applications 4 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 4 Lobachevskii Journal of Mathematics 4 4 Journal of Discrete Algorithms 4 BIT. Nordisk Tidskrift for Informationsbehandling 4 Journal of Zhejiang University. Science A 4 Arabian Journal for Science and Engineering 3 Physics Letters. A 3 Problems of Information Transmission 3 Reviews of Modern Physics 3 BIT 3 Journal of Soviet Mathematics 3 Software. Practice & Experience 3 Acta Mathematicae Applicatae Sinica. English Series 3 Graphs and Combinatorics 3 Statistical Science 3 Signal Processing 3 Computational Geometry 3 Games and Economic Behavior ...and 170 more Serials all top 5 Cited in 45 Fields 2,248 Information and communication theory, circuits (94-XX) 1,056 Computer science (68-XX) 323 Number theory (11-XX) 197 Combinatorics (05-XX) 184 Quantum theory (81-XX) 152 Operations research, mathematical programming (90-XX) 67 Algebraic geometry (14-XX) 52 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 49 Mathematical logic and foundations (03-XX) 46 Numerical analysis (65-XX) 42 Order, lattices, ordered algebraic structures (06-XX) 34 Commutative algebra (13-XX) 33 Dynamical systems and ergodic theory (37-XX) 30 Group theory and generalizations (20-XX) 26 Field theory and polynomials (12-XX) 18 Linear and multilinear algebra; matrix theory (15-XX) 15 Probability theory and stochastic processes (60-XX) 14 Statistics (62-XX) 11 Geometry (51-XX) 9 Biology and other natural sciences (92-XX) 8 Systems theory; control (93-XX) 7 Statistical mechanics, structure of matter (82-XX) 6 Associative rings and algebras (16-XX) 5 History and biography (01-XX) 5 Mathematics education (97-XX) 4 General and overarching topics; collections (00-XX) 4 Convex and discrete geometry (52-XX) 3 Real functions (26-XX) 3 Ordinary differential equations (34-XX) 3 Partial differential equations (35-XX) 3 Harmonic analysis on Euclidean spaces (42-XX) 3 Abstract harmonic analysis (43-XX) 2 Special functions (33-XX) 2 Approximations and expansions (41-XX) 2 Operator theory (47-XX) 2 Fluid mechanics (76-XX) 1 General algebraic systems (08-XX) 1 Difference and functional equations (39-XX) 1 Functional analysis (46-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 Differential geometry (53-XX) 1 Manifolds and cell complexes (57-XX) 1 Mechanics of particles and systems (70-XX) 1 Classical thermodynamics, heat transfer (80-XX) 1 Relativity and gravitational theory (83-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.