Edit Profile (opens in new tab) Shamir, Adi Compute Distance To: Compute Author ID: shamir.adi Published as: Shamir, Adi; Shamir, A. Homepage: http://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html External Links: MGP · Wikidata · dblp · GND · IdRef Awards: Turing Award (2002) Documents Indexed: 154 Publications since 1975, including 2 Books 1 Further Contribution Biographic References: 1 Publication Co-Authors: 93 Co-Authors with 131 Joint Publications 2,461 Co-Co-Authors all top 5 Co-Authors 24 single-authored 32 Dunkelman, Orr 25 Keller, Nathan 22 Dinur, Itai 15 Biham, Eli 10 Biryukov, Alex 7 Tromer, Eran 6 Klimov, Alexander 6 Rivest, Ronald Linn 6 Ronen, Eyal 5 Feige, Uriel 5 Fiat, Amos 5 Hoch, Jonathan J. 5 Lapidot, Dror 4 Bar-On, Achiya 4 Manna, Zohar 3 Adleman, Leonard Max 3 Bouillaguet, Charles 3 Fouque, Pierre-Alain 3 Lenstra, Arjen K. 3 Naor, Moni 3 Tsaban, Boaz 2 Andreeva, Elena Anatol’evna 2 Carmeli, Yaniv 2 Dodis, Yevgeniy 2 Even, Shimon 2 Feldman, David Victor 2 Genkin, Daniel 2 Hod, Rani 2 Impagliazzo, Russell 2 Kelsey, John 2 Kipnis, Aviad 2 Mantin, Itsik 2 Nisan, Noam 2 Osvik, Dag Arne 2 Rudich, Steven 2 Ruinskiy, Dima 2 Schrift, A. W. 2 Stephens-Davidowitz, Noah 2 Tauman, Yael 2 van Someren, Nicko 2 Wichs, Daniel 2 Zimmer, Sebastien 1 Amon, Ohad 1 Aoki, Takafumi 1 Aumasson, Jean-Philippe 1 Barkan, Elad 1 Chen, Hsieh-Chung 1 Cheng, Chen-Mou 1 Chou, Tung 1 Courtois, Nicolas T. 1 Diffie, Whitfield 1 Dodson, Bruce A. 1 Dolev, Shlomi 1 Dubois, Vivien 1 Fluhrer, Scott R. 1 Frieze, Alan Michael 1 Goldreich, Oded 1 Güneysu, Tim 1 Gutman, Masha 1 Halevy, Dani 1 Håstad, Johan Torkel 1 Hellman, Martin Edward 1 Homma, Naofumi 1 Hughes, James P. 1 Itai, Alon 1 Kannan, Ravindran 1 Khovratovich, Dmitry 1 Kopeetsky, Marina 1 Kortsmit, Wil 1 Lagarias, Jeffrey C. 1 Lasry, Noam 1 Leyland, Paul C. 1 Meier, Willi 1 Merkle, Ralph C. 1 Mityagin, Anton 1 Miyamoto, Atsushi 1 Naccache, David 1 Niederhagen, Ruben 1 Oren, Yossef 1 Paar, Christof 1 Patarin, Jacques 1 Phan, Raphael Chung-Wei 1 Polak, Inna 1 Richardson, Eran 1 Satoh, Akashi 1 Schnorr, Claus Peter 1 Schroeppel, Richard 1 Shallit, Jeffrey O. 1 Simmons, Gustavus James 1 Stern, Jacques 1 Stern, Julien P. 1 Tomlinson, Jim 1 Wadge, William W. 1 Wagner, David A. 1 Williams, Hugh Cowie 1 Yang, Bo-Yin 1 Zimmermann, Ralf 1 Zippel, Richard E. all top 5 Serials 17 Journal of Cryptology 6 SIAM Journal on Computing 3 IEEE Transactions on Information Theory 3 Information Processing Letters 3 Journal of Computer and System Sciences 3 Communications of the ACM 2 IEEE Transactions on Computers 2 Information and Computation 2 Designs, Codes and Cryptography 1 Information and Control 1 Journal of the Association for Computing Machinery 1 Networks 1 Theoretical Computer Science 1 Cryptologia 1 Combinatorica 1 Algorithmica 1 Theory of Computing Systems 1 Journal of Mathematical Cryptology 1 Cryptography and Communications 1 ACM Transactions on Algorithms all top 5 Fields 126 Information and communication theory, circuits (94-XX) 68 Computer science (68-XX) 10 Number theory (11-XX) 6 Numerical analysis (65-XX) 4 Combinatorics (05-XX) 3 Mathematical logic and foundations (03-XX) 3 Operations research, mathematical programming (90-XX) 1 General and overarching topics; collections (00-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Field theory and polynomials (12-XX) 1 Group theory and generalizations (20-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 135 Publications have been cited 4,252 times in 3,462 Documents Cited by ▼ Year ▼ A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005Rivest, R. L.; Shamir, A.; Adleman, L. 718 1978 How to share a secret. Zbl 0414.94021Shamir, Adi 704 1979 Identity-based cryptosystems and signature schemes. Zbl 1359.94626Shamir, Adi 358 1985 Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017Biham, Eli; Shamir, Adi 262 1991 On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021Even, S.; Itai, A.; Shamir, A. 244 1976 How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012Fiat, Amos; Shamir, Adi 188 1987 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 86 2000 Visual cryptography. Zbl 0878.94048Naor, Moni; Shamir, Adi 84 1995 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005Biham, Eli; Shamir, Adi 80 1993 Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014Biham, Eli; Shamir, Adi 78 1991 Zero-knowledge proofs of identity. Zbl 0659.94006Feige, Uriel; Fiat, Amos; Shamir, Adi 67 1988 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013Biham, Eli; Biryukov, Alex; Shamir, Adi 64 1999 How to leak a secret. Zbl 1064.94558Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 62 2001 Cube attacks on tweakable black box polynomials. Zbl 1239.94045Dinur, Itai; Shamir, Adi 60 2009 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010Biham, Eli; Shamir, Adi 58 1997 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012Kipnis, Aviad; Shamir, Adi 48 1999 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015Feige, Uriel; Lapidot, Dror; Shamir, Adi 43 1999 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096Shamir, Adi 39 1992 A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015Schroeppel, Richard; Shamir, Adi 36 1981 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013Biryukov, Alex; Shamir, Adi 36 2000 The LSD broadcast encryption scheme. Zbl 1026.94528Halevy, Dani; Shamir, Adi 34 2002 A practical attack on broadcast RC4. Zbl 1073.68637Mantin, Itsik; Shamir, Adi 33 2002 Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045Feige, U.; Shamir, A. 30 1990 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017Biham, Eli; Shamir, Adi 29 1993 Improved online/offline signature schemes. Zbl 1003.94533Shamir, Adi; Tauman, Yael 29 2001 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065Dunkelman, Orr; Keller, Nathan; Shamir, Adi 26 2012 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045Dunkelman, Orr; Keller, Nathan; Shamir, Adi 26 2010 Practical cryptanalysis of SFLASH. Zbl 1215.94043Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 23 2007 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 22 2001 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030Kipnis, Aviad; Shamir, Adi 21 1998 Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi 21 1988 A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007Shamir, Adi 21 1984 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 21 2009 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 21 2006 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640Biryukov, Alex; Shamir, Adi; Wagner, David 20 2001 Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414Lapidot, Dror; Shamir, Adi 20 1991 A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029Shamir, Adi 20 1979 Improved attacks on full GOST. Zbl 1282.94040Dinur, Itai; Dunkelman, Orr; Shamir, Adi 19 2012 Second preimage attacks on dithered hash functions. Zbl 1149.94302Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 19 2008 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042Dinur, Itai; Shamir, Adi 17 2011 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384Barkan, Elad; Biham, Eli; Shamir, Adi 16 2006 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010Biham, Eli; Biryukov, Alex; Shamir, Adi 15 1999 Structural cryptanalysis of SASAS. Zbl 0981.94015Biryukov, Alex; Shamir, Adi 15 2001 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 15 2012 The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017Manna, Zohar; Shamir, Adi 15 1976 Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018Shamir, Adi 14 1979 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023Biham, Eli; Biryukov, Alex; Shamir, Adi 13 2005 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 13 2010 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064Dunkelman, Orr; Keller, Nathan; Shamir, Adi 12 2010 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 11 2010 How to reuse a “write-once” memory. Zbl 0548.68046Rivest, Ronald L.; Shamir, Adi 10 1982 Efficient signature schemes based on birational permutations. Zbl 0877.94041Shamir, Adi 10 1994 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 10 2013 Fault analysis of stream ciphers. Zbl 1104.68479Hoch, Jonathan J.; Shamir, Adi 10 2004 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 10 2010 A new class of invertible mappings. Zbl 1020.94522Klimov, Alexander; Shamir, Adi 10 2002 Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012Biham, Eli; Shamir, Adi 9 1991 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063Genkin, Daniel; Shamir, Adi; Tromer, Eran 9 2014 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078Lapidot, Dror; Shamir, Adi 9 1997 The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016Manna, Zohar; Shamir, Adi 9 1978 The optimal approach to recursive programs. Zbl 0361.68022Manna, Zohar; Shamir, Adi 9 1977 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044Dinur, Itai; Dunkelman, Orr; Shamir, Adi 8 2012 Cryptographic applications of T-functions. Zbl 1081.94030Klimov, Alexander; Shamir, Adi 8 2004 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 7 2011 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391Klimov, Alexander; Shamir, Adi 7 2005 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047Hoch, Jonathan J.; Shamir, Adi 7 2006 Structural cryptanalysis of SASAS. Zbl 1201.94076Biryukov, Alex; Shamir, Adi 7 2010 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2015 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2014 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 6 2003 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054Dinur, Itai; Dunkelman, Orr; Shamir, Adi 6 2014 How to find a battleship. Zbl 0673.90063Fiat, Amos; Shamir, Adi 5 1989 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 5 2014 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057Dinur, Itai; Shamir, Adi 5 2012 On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017Shamir, Adi 5 1981 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547Klimov, Alexander; Shamir, Adi 5 2004 Bug attacks. Zbl 1183.94022Biham, Eli; Carmeli, Yaniv; Shamir, Adi 5 2008 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 4 1999 Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005Fiat, Amos; Shamir, Adi 4 1986 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015Lapidot, Dror; Shamir, Adi 4 1995 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630Shamir, Adi 4 1999 Factoring large numbers with the TWIRL device. Zbl 1122.94402Shamir, Adi; Tromer, Eran 4 2003 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064Dinur, Itai; Dunkelman, Orr; Shamir, Adi 4 2014 On the universality of the next bit test. Zbl 0786.94007Schrift, A. W.; Shamir, A. 4 1991 On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031Shamir, Adi; Zippel, Richard E. 4 1980 Data types as objects. Zbl 0353.68050Shamir, Adi; Wadge, William W. 4 1977 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372Hoch, Jonathan J.; Shamir, Adi 4 2008 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 4 2015 How to copyright a function? Zbl 0935.68017Naccache, David; Shamir, Adi; Stern, Julien P. 3 1999 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050Feige, Uriel; Shamir, Adi 3 1992 Efficient factoring based on partial information. Zbl 0589.94004Rivest, Ronald L.; Shamir, Adi 3 1986 Guaranteeing the diversity of number generators. Zbl 1013.94013Shamir, Adi; Tsaban, Boaz 3 2001 An improved algebraic attack on Hamsi-256. Zbl 1282.94041Dinur, Itai; Shamir, Adi 3 2011 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410Shamir, Adi 3 2008 Generalized ”write-once” memories. Zbl 0543.68054Fiat, Amos; Shamir, Adi 2 1984 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200Biham, Eli; Shamir, Adi 2 1992 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 2 2018 Three third generation attacks on the format preserving encryption scheme FF3. Zbl 1479.94111Amon, Ohad; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2021 New slide attacks on almost self-similar ciphers. Zbl 1479.94162Dunkelman, Orr; Keller, Nathan; Lasry, Noam; Shamir, Adi 1 2020 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 2 2018 Tight bounds on online checkpointing algorithms. Zbl 07375940Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Hod, Rani; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2018 How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 1 2017 New second-preimage attacks on hash functions. Zbl 1365.94397Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien 2 2016 Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2016 Bug attacks. Zbl 1365.94402Biham, Eli; Carmeli, Yaniv; Shamir, Adi 1 2016 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2015 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 4 2015 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 New attacks on IDEA with at least 6 rounds. Zbl 1377.94037Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi 2 2015 Almost universal forgery attacks on AES-based MAC’s. Zbl 1359.94589Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 Reflections on slide with a twist attacks. Zbl 1356.94055Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063Genkin, Daniel; Shamir, Adi; Tromer, Eran 9 2014 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2014 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054Dinur, Itai; Dunkelman, Orr; Shamir, Adi 6 2014 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 5 2014 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064Dinur, Itai; Dunkelman, Orr; Shamir, Adi 4 2014 Using random error correcting codes in near-collision attacks on generic hash-functions. Zbl 1337.94063Polak, Inna; Shamir, Adi 1 2014 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 10 2013 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065Dunkelman, Orr; Keller, Nathan; Shamir, Adi 26 2012 Improved attacks on full GOST. Zbl 1282.94040Dinur, Itai; Dunkelman, Orr; Shamir, Adi 19 2012 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 15 2012 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044Dinur, Itai; Dunkelman, Orr; Shamir, Adi 8 2012 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057Dinur, Itai; Shamir, Adi 5 2012 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042Dinur, Itai; Shamir, Adi 17 2011 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 7 2011 An improved algebraic attack on Hamsi-256. Zbl 1282.94041Dinur, Itai; Shamir, Adi 3 2011 RFID authentication efficient proactive information security within computational security. Zbl 1208.94055Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi 1 2011 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045Dunkelman, Orr; Keller, Nathan; Shamir, Adi 26 2010 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 13 2010 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064Dunkelman, Orr; Keller, Nathan; Shamir, Adi 12 2010 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 11 2010 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 10 2010 Structural cryptanalysis of SASAS. Zbl 1201.94076Biryukov, Alex; Shamir, Adi 7 2010 Comparative power analysis of modular exponentiation algorithms. Zbl 1367.65222Homma, Naofumi; Miyamoto, Atsushi; Aoki, Takafumi; Satoh, Akashi; Shamir, Adi 1 2010 Cube attacks on tweakable black box polynomials. Zbl 1239.94045Dinur, Itai; Shamir, Adi 60 2009 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 21 2009 Second preimage attacks on dithered hash functions. Zbl 1149.94302Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 19 2008 Bug attacks. Zbl 1183.94022Biham, Eli; Carmeli, Yaniv; Shamir, Adi 5 2008 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372Hoch, Jonathan J.; Shamir, Adi 4 2008 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410Shamir, Adi 3 2008 Improved related-key attacks on DESX and DESX+. Zbl 1156.94374Phan, Raphael C.-W.; Shamir, Adi 1 2008 Practical cryptanalysis of SFLASH. Zbl 1215.94043Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 23 2007 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 21 2006 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384Barkan, Elad; Biham, Eli; Shamir, Adi 16 2006 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047Hoch, Jonathan J.; Shamir, Adi 7 2006 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023Biham, Eli; Biryukov, Alex; Shamir, Adi 13 2005 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391Klimov, Alexander; Shamir, Adi 7 2005 Fault analysis of stream ciphers. Zbl 1104.68479Hoch, Jonathan J.; Shamir, Adi 10 2004 Cryptographic applications of T-functions. Zbl 1081.94030Klimov, Alexander; Shamir, Adi 8 2004 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547Klimov, Alexander; Shamir, Adi 5 2004 Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523Shamir, Adi 1 2004 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 6 2003 Factoring large numbers with the TWIRL device. Zbl 1122.94402Shamir, Adi; Tromer, Eran 4 2003 The LSD broadcast encryption scheme. Zbl 1026.94528Halevy, Dani; Shamir, Adi 34 2002 A practical attack on broadcast RC4. Zbl 1073.68637Mantin, Itsik; Shamir, Adi 33 2002 A new class of invertible mappings. Zbl 1020.94522Klimov, Alexander; Shamir, Adi 10 2002 Analysis of neural cryptography. Zbl 1065.94554Klimov, Alexander; Mityagin, Anton; Shamir, Adi 1 2002 How to leak a secret. Zbl 1064.94558Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 62 2001 Improved online/offline signature schemes. Zbl 1003.94533Shamir, Adi; Tauman, Yael 29 2001 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 22 2001 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640Biryukov, Alex; Shamir, Adi; Wagner, David 20 2001 Structural cryptanalysis of SASAS. Zbl 0981.94015Biryukov, Alex; Shamir, Adi 15 2001 Guaranteeing the diversity of number generators. Zbl 1013.94013Shamir, Adi; Tsaban, Boaz 3 2001 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 86 2000 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013Biryukov, Alex; Shamir, Adi 36 2000 Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656Shamir, Adi 1 2000 Analysis and optimization of the twinkle factoring device. Zbl 1082.94525Lenstra, Arjen K.; Shamir, Adi 1 2000 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013Biham, Eli; Biryukov, Alex; Shamir, Adi 64 1999 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012Kipnis, Aviad; Shamir, Adi 48 1999 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015Feige, Uriel; Lapidot, Dror; Shamir, Adi 43 1999 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010Biham, Eli; Biryukov, Alex; Shamir, Adi 15 1999 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 4 1999 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630Shamir, Adi 4 1999 How to copyright a function? Zbl 0935.68017Naccache, David; Shamir, Adi; Stern, Julien P. 3 1999 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030Kipnis, Aviad; Shamir, Adi 21 1998 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010Biham, Eli; Shamir, Adi 58 1997 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078Lapidot, Dror; Shamir, Adi 9 1997 Visual cryptography. Zbl 0878.94048Naor, Moni; Shamir, Adi 84 1995 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015Lapidot, Dror; Shamir, Adi 4 1995 Memory efficient variants of public-key schemes for smart card applications. Zbl 0885.94027Shamir, Adi 1 1995 Efficient signature schemes based on birational permutations. Zbl 0877.94041Shamir, Adi 10 1994 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005Biham, Eli; Shamir, Adi 80 1993 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017Biham, Eli; Shamir, Adi 29 1993 On the generation of multivariate polynomials which are hard to factor. Zbl 1310.68262Shamir, Adi 1 1993 On dice and coins: Models of computation for random generation. Zbl 0772.68036Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi 1 1993 Universal tests for nonuniform distributions. Zbl 0781.94002Schrift, A. W.; Shamir, A. 1 1993 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096Shamir, Adi 39 1992 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050Feige, Uriel; Shamir, Adi 3 1992 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200Biham, Eli; Shamir, Adi 2 1992 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042Lapidot, Dror; Shamir, Adi 1 1992 Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017Biham, Eli; Shamir, Adi 262 1991 Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014Biham, Eli; Shamir, Adi 78 1991 ...and 35 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 5,025 Authors 32 Susilo, Willy 28 Shamir, Adi 27 Wang, Huaxiong 26 Chang, Chin-Chen 25 De Santis, Alfredo 24 Yung, Moti 23 Dunkelman, Orr 23 Mu, Yi 22 Cao, Zhenfu 20 Keller, Nathan 20 Sarkar, Santanu 19 Maitra, Subhamoy 19 Padró, Carles 19 Rijmen, Vincent 18 Ishai, Yuval 18 Stinson, Douglas Robert 17 Lin, Dongdai 16 Calderini, Marco 16 Libert, Benoît 15 Carlet, Claude 15 de Werra, Dominique 15 Herranz, Javier 15 Leander, Gregor 14 Blundo, Carlo 14 Chen, Kefei 14 Farràs, Oriol 14 Goldreich, Oded 14 Hwang, Minshiang 14 Ostrovsky, Rafail 14 Wen, Qiaoyan 14 Wong, Duncan S. 13 Bitansky, Nir 13 Dinur, Itai 13 Hu, Yupu 13 Li, Chao 13 Qu, Longjiang 13 Sahai, Amit 13 Sasaki, Yu 13 Vaikuntanathan, Vinod 13 Wu, Qianhong 13 Yang, Guomin 12 Gu, Dawu 12 Knudsen, Lars Ramkilde 12 Meier, Willi 12 Paul, Goutam 12 Perrin, Léo 12 Tan, Chik How 12 Tang, Chunming 11 Biham, Eli 11 Boneh, Dan 11 Hazay, Carmit 11 Li, Fagen 11 Ling, San 11 Naccache, David 11 Nitaj, Abderrahmane 11 Sakurai, Kouichi 11 Takagi, Tsuyoshi 11 Wang, Meiqin 11 Waters, Brent 11 Wu, Wenling 10 Bellare, Mihir 10 Bogdanov, Andrey 10 Budaghyan, Lilya 10 D’Arco, Paolo 10 Desmedt, Yvo G. 10 Gennaro, Rosario 10 Gong, Guang 10 Naya-Plasencia, María 10 Pointcheval, David 10 Safavi-Naini, Reihaneh 10 Wu, Tzong-Sun 10 Yang, Yuguang 10 Youssef, Amr M. 10 Yuan, Pingzhi 9 Beimel, Amos 9 Blondeau, Celine 9 Dai, Yuewei 9 Ding, Jintai 9 Guo, Jian 9 Harn, Lein 9 Hsu, Chien-Lung 9 Hu, Lei 9 Jin, Chenhui 9 Joye, Marc 9 Katz, Jonathan N. 9 Kurosawa, Kaoru 9 Kushilevitz, Eyal 9 Naor, Moni 9 Nguyen, Khoa 9 Phan, Raphael Chung-Wei 9 Qin, Huawang 9 Segev, Gil 9 Shparlinski, Igor E. 9 Tanaka, Keisuke 9 Venkitasubramaniam, Muthuramakrishnan 9 Wang, Xiaoyun 9 Wu, Chialong 9 Yang, Yixian 8 Abdalla, Michel 8 Adhikari, Avishek ...and 4,925 more Authors all top 5 Cited in 299 Serials 231 Designs, Codes and Cryptography 191 Journal of Cryptology 181 Theoretical Computer Science 159 Information Processing Letters 149 Information Sciences 94 Discrete Applied Mathematics 79 Cryptography and Communications 70 Applied Mathematics and Computation 62 Journal of Discrete Mathematical Sciences & Cryptography 56 Finite Fields and their Applications 52 International Journal of Theoretical Physics 47 Quantum Information Processing 44 International Journal of Computer Mathematics 42 Journal of Computer and System Sciences 35 Computers & Mathematics with Applications 33 Journal of Mathematical Cryptology 32 Wuhan University Journal of Natural Sciences (WUJNS) 30 Information and Computation 30 Matematicheskie Voprosy Kriptografii 28 Applicable Algebra in Engineering, Communication and Computing 26 Discrete Mathematics 26 Advances in Mathematics of Communications 25 European Journal of Operational Research 24 Pattern Recognition 22 Mathematical Problems in Engineering 21 International Journal of Foundations of Computer Science 18 Prikladnaya Diskretnaya Matematika 17 SIAM Journal on Computing 17 Algorithmica 17 Science China. Information Sciences 16 Mathematics of Computation 15 Computing 15 Mathematical and Computer Modelling 14 Journal of Symbolic Computation 14 Journal of Systems Science and Complexity 14 International Journal of Quantum Information 13 Computational Complexity 13 Journal of Shanghai Jiaotong University (Science) 12 Distributed Computing 11 Cybernetics and Systems Analysis 11 Journal of Combinatorial Optimization 10 Artificial Intelligence 10 Computers & Operations Research 10 Annals of Operations Research 10 Science in China. Series F 10 Symmetry 9 Operations Research Letters 9 Journal of Computer Science and Technology 9 Journal of Applied Mathematics 9 Groups, Complexity, Cryptology 8 Chaos, Solitons and Fractals 8 Cryptologia 8 Journal of Parallel and Distributed Computing 8 Discrete Mathematics and Applications 8 Mathematical Programming. Series A. Series B 8 Soft Computing 7 Applied Mathematics Letters 7 Nonlinear Dynamics 6 Journal of Computational and Applied Mathematics 6 Journal of Number Theory 6 Journal of Complexity 6 SIAM Journal on Discrete Mathematics 6 International Journal of Modern Physics C 6 Electronic Commerce Research 6 Mathematical Biosciences and Engineering 6 Mathematics in Computer Science 6 Science China. Mathematics 6 Frontiers of Computer Science 5 The Mathematical Intelligencer 5 Journal of Algebra 5 Mathematical Systems Theory 5 Journal of Information & Optimization Sciences 5 New Generation Computing 5 Journal of Automated Reasoning 5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 5 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 5 Journal of Mathematical Sciences (New York) 5 Annals of Mathematics and Artificial Intelligence 5 Theory of Computing Systems 5 Journal of Applied Mathematics and Computing 5 EURASIP Journal on Advances in Signal Processing 4 Problems of Information Transmission 4 Networks 4 Combinatorica 4 Acta Applicandae Mathematicae 4 Linear Algebra and its Applications 4 Tatra Mountains Mathematical Publications 4 Informatica (Vilnius) 4 Lobachevskii Journal of Mathematics 4 4 Journal of Discrete Algorithms 4 BIT. Nordisk Tidskrift for Informationsbehandling 4 Journal of Zhejiang University. Science A 4 Discrete Mathematics, Algorithms and Applications 4 Arabian Journal for Science and Engineering 3 IEEE Transactions on Information Theory 3 Reviews of Modern Physics 3 BIT 3 Journal of Soviet Mathematics 3 Software. Practice & Experience ...and 199 more Serials all top 5 Cited in 48 Fields 2,642 Information and communication theory, circuits (94-XX) 1,147 Computer science (68-XX) 373 Number theory (11-XX) 229 Quantum theory (81-XX) 223 Combinatorics (05-XX) 162 Operations research, mathematical programming (90-XX) 84 Algebraic geometry (14-XX) 62 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 52 Numerical analysis (65-XX) 51 Mathematical logic and foundations (03-XX) 46 Order, lattices, ordered algebraic structures (06-XX) 40 Commutative algebra (13-XX) 39 Group theory and generalizations (20-XX) 34 Dynamical systems and ergodic theory (37-XX) 28 Field theory and polynomials (12-XX) 22 Linear and multilinear algebra; matrix theory (15-XX) 18 Probability theory and stochastic processes (60-XX) 14 Statistics (62-XX) 12 Geometry (51-XX) 9 Biology and other natural sciences (92-XX) 9 Systems theory; control (93-XX) 8 Associative rings and algebras (16-XX) 7 Statistical mechanics, structure of matter (82-XX) 6 Mathematics education (97-XX) 5 History and biography (01-XX) 4 General and overarching topics; collections (00-XX) 4 Real functions (26-XX) 4 Ordinary differential equations (34-XX) 4 Convex and discrete geometry (52-XX) 3 Partial differential equations (35-XX) 3 Harmonic analysis on Euclidean spaces (42-XX) 3 Abstract harmonic analysis (43-XX) 3 Mechanics of particles and systems (70-XX) 3 Relativity and gravitational theory (83-XX) 2 Special functions (33-XX) 2 Difference and functional equations (39-XX) 2 Approximations and expansions (41-XX) 2 Operator theory (47-XX) 2 Fluid mechanics (76-XX) 1 General algebraic systems (08-XX) 1 Nonassociative rings and algebras (17-XX) 1 Measure and integration (28-XX) 1 Sequences, series, summability (40-XX) 1 Functional analysis (46-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 Differential geometry (53-XX) 1 Manifolds and cell complexes (57-XX) 1 Classical thermodynamics, heat transfer (80-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.