Edit Profile (opens in new tab) Shamir, Adi Co-Author Distance Author ID: shamir.adi Published as: Shamir, Adi; Shamir, A. Homepage: https://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html External Links: MGP · Wikidata · Google Scholar · dblp · GND · IdRef Awards: Turing Award (2002) Documents Indexed: 156 Publications since 1975, including 2 Books 1 Further Contribution Biographic References: 1 Publication Co-Authors: 93 Co-Authors with 133 Joint Publications 2,705 Co-Co-Authors all top 5 Co-Authors 24 single-authored 34 Dunkelman, Orr 27 Keller, Nathan 23 Dinur, Itai 15 Biham, Eli 10 Biryukov, Alex 8 Ronen, Eyal 7 Tromer, Eran 6 Klimov, Alexander 6 Rivest, Ronald Linn 5 Feige, Uriel 5 Fiat, Amos 5 Hoch, Jonathan J. 5 Lapidot, Dror 4 Bar-On, Achiya 4 Manna, Zohar 3 Adleman, Leonard Max 3 Bouillaguet, Charles 3 Fouque, Pierre-Alain 3 Lenstra, Arjen K. 3 Naor, Moni 3 Tsaban, Boaz 2 Andreeva, Elena Anatol’evna 2 Carmeli, Yaniv 2 Dodis, Yevgeniy 2 Even, Shimon 2 Feldman, David Victor 2 Genkin, Daniel 2 Hod, Rani 2 Impagliazzo, Russell 2 Kelsey, John 2 Kipnis, Aviad 2 Mantin, Itsik 2 Nisan, Noam 2 Osvik, Dag Arne 2 Rudich, Steven 2 Ruinskiy, Dima 2 Schrift, A. W. 2 Stephens-Davidowitz, Noah 2 Tauman, Yael 2 van Someren, Nicko 2 Wichs, Daniel 2 Zimmer, Sebastien 1 Amon, Ohad 1 Aoki, Takafumi 1 Aumasson, Jean-Philippe 1 Barkan, Elad 1 Chen, Hsieh-Chung 1 Cheng, Chen-Mou 1 Chou, Tung 1 Courtois, Nicolas T. 1 Diffie, Whitfield 1 Dodson, Bruce A. 1 Dolev, Shlomi 1 Dubois, Vivien 1 Fluhrer, Scott R. 1 Frieze, Alan Michael 1 Goldreich, Oded 1 Güneysu, Tim 1 Gutman, Masha 1 Halevy, Dani 1 Håstad, Johan Torkel 1 Hellman, Martin Edward 1 Homma, Naofumi 1 Hughes, James P. 1 Itai, Alon 1 Kannan, Ravindran 1 Khovratovich, Dmitry 1 Kopeetsky, Marina 1 Kortsmit, Wil 1 Lagarias, Jeffrey C. 1 Lasry, Noam 1 Leyland, Paul C. 1 Meier, Willi 1 Merkle, Ralph Charles 1 Mityagin, Anton 1 Miyamoto, Atsushi 1 Naccache, David 1 Niederhagen, Ruben 1 Oren, Yossef 1 Paar, Christof 1 Patarin, Jacques 1 Phan, Raphael Chung-Wei 1 Polak, Inna 1 Richardson, Eran 1 Satoh, Akashi 1 Schnorr, Claus Peter 1 Schroeppel, Richard 1 Shallit, Jeffrey Outlaw 1 Simmons, Gustavus James 1 Stern, Jacques 1 Stern, Julien P. 1 Tomlinson, Jim 1 Wadge, William W. 1 Wagner, David A. 1 Williams, Hugh Cowie 1 Yang, Bo-Yin 1 Zimmermann, Ralf 1 Zippel, Richard E. all top 5 Serials 17 Journal of Cryptology 6 SIAM Journal on Computing 3 IEEE Transactions on Information Theory 3 Information Processing Letters 3 Journal of Computer and System Sciences 3 Designs, Codes and Cryptography 3 Communications of the ACM 2 IEEE Transactions on Computers 2 Information and Computation 1 Information and Control 1 Journal of the Association for Computing Machinery 1 Networks 1 Theoretical Computer Science 1 Cryptologia 1 Combinatorica 1 Algorithmica 1 Theory of Computing Systems 1 Journal of Mathematical Cryptology 1 Cryptography and Communications 1 ACM Transactions on Algorithms all top 5 Fields 130 Information and communication theory, circuits (94-XX) 67 Computer science (68-XX) 10 Number theory (11-XX) 7 Numerical analysis (65-XX) 4 Combinatorics (05-XX) 3 Mathematical logic and foundations (03-XX) 3 Operations research, mathematical programming (90-XX) 2 History and biography (01-XX) 1 General and overarching topics; collections (00-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Field theory and polynomials (12-XX) 1 Group theory and generalizations (20-XX) 1 Quantum theory (81-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 145 Publications have been cited 6,169 times in 4,901 Documents Cited by ▼ Year ▼ How to share a secret. Zbl 0414.94021 Shamir, Adi 977 1979 A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005 Rivest, R. L.; Shamir, A.; Adleman, L. 959 1978 Identity-based cryptosystems and signature schemes. Zbl 1359.94626 Shamir, Adi 478 1985 How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012 Fiat, Amos; Shamir, Adi 451 1987 Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017 Biham, Eli; Shamir, Adi 359 1991 On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021 Even, S.; Itai, A.; Shamir, A. 271 1976 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514 Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 141 2000 Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014 Biham, Eli; Shamir, Adi 138 1991 How to leak a secret. Zbl 1064.94558 Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 133 2001 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005 Biham, Eli; Shamir, Adi 108 1993 Visual cryptography. Zbl 0878.94048 Naor, Moni; Shamir, Adi 105 1995 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013 Biham, Eli; Biryukov, Alex; Shamir, Adi 98 1999 Zero-knowledge proofs of identity. Zbl 0659.94006 Feige, Uriel; Fiat, Amos; Shamir, Adi 92 1988 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010 Biham, Eli; Shamir, Adi 91 1997 Cube attacks on tweakable black box polynomials. Zbl 1239.94045 Dinur, Itai; Shamir, Adi 87 2009 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012 Kipnis, Aviad; Shamir, Adi 79 1999 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015 Feige, Uriel; Lapidot, Dror; Shamir, Adi 72 1999 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096 Shamir, Adi 64 1992 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013 Biryukov, Alex; Shamir, Adi 51 2000 A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015 Schroeppel, Richard; Shamir, Adi 48 1981 A practical attack on broadcast RC4. Zbl 1073.68637 Mantin, Itsik; Shamir, Adi 47 2002 The LSD broadcast encryption scheme. Zbl 1026.94528 Halevy, Dani; Shamir, Adi 44 2002 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017 Biham, Eli; Shamir, Adi 43 1993 Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045 Feige, U.; Shamir, A. 42 1990 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030 Kipnis, Aviad; Shamir, Adi 41 1998 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 41 2012 Improved online/offline signature schemes. Zbl 1003.94533 Shamir, Adi; Tauman, Yael 39 2001 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326 Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 39 2006 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 39 2010 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640 Biryukov, Alex; Shamir, Adi; Wagner, David 34 2001 Practical cryptanalysis of SFLASH. Zbl 1215.94043 Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 34 2007 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530 Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 33 2001 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042 Dinur, Itai; Shamir, Adi 29 2011 Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006 Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi 28 1988 Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414 Lapidot, Dror; Shamir, Adi 28 1991 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051 Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 28 2009 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 24 2012 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384 Barkan, Elad; Biham, Eli; Shamir, Adi 24 2006 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010 Biham, Eli; Biryukov, Alex; Shamir, Adi 23 1999 Improved attacks on full GOST. Zbl 1282.94040 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 23 2012 A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029 Shamir, Adi 22 1979 Structural cryptanalysis of SASAS. Zbl 0981.94015 Biryukov, Alex; Shamir, Adi 22 2001 A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007 Shamir, Adi 22 1984 Second preimage attacks on dithered hash functions. Zbl 1149.94302 Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 21 2008 Fault analysis of stream ciphers. Zbl 1104.68479 Hoch, Jonathan J.; Shamir, Adi 19 2004 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 19 2010 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040 Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 18 2010 Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018 Shamir, Adi 17 1979 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055 Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 17 2010 The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017 Manna, Zohar; Shamir, Adi 16 1976 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023 Biham, Eli; Biryukov, Alex; Shamir, Adi 16 2005 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106 Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 16 2010 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 15 2012 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063 Genkin, Daniel; Shamir, Adi; Tromer, Eran 14 2014 A new class of invertible mappings. Zbl 1020.94522 Klimov, Alexander; Shamir, Adi 14 2002 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 13 2014 How to reuse a “write-once” memory. Zbl 0548.68046 Rivest, Ronald L.; Shamir, Adi 13 1982 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 13 2013 Efficient signature schemes based on birational permutations. Zbl 0877.94041 Shamir, Adi 12 1994 Cryptographic applications of T-functions. Zbl 1081.94030 Klimov, Alexander; Shamir, Adi 11 2004 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 11 2014 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042 Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 11 2011 Efficient factoring based on partial information. Zbl 0589.94004 Rivest, Ronald L.; Shamir, Adi 10 1986 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047 Hoch, Jonathan J.; Shamir, Adi 10 2006 On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017 Shamir, Adi 9 1981 The optimal approach to recursive programs. Zbl 0361.68022 Manna, Zohar; Shamir, Adi 9 1977 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391 Klimov, Alexander; Shamir, Adi 9 2005 The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016 Manna, Zohar; Shamir, Adi 9 1978 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078 Lapidot, Dror; Shamir, Adi 9 1997 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 9 2015 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057 Dinur, Itai; Shamir, Adi 9 2012 Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012 Biham, Eli; Shamir, Adi 9 1991 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009 Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 8 1999 How to copyright a function? Zbl 0935.68017 Naccache, David; Shamir, Adi; Stern, Julien P. 8 1999 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 8 2015 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547 Klimov, Alexander; Shamir, Adi 8 2004 Structural cryptanalysis of SASAS. Zbl 1201.94076 Biryukov, Alex; Shamir, Adi 8 2010 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 7 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2014 How to find a battleship. Zbl 0673.90063 Fiat, Amos; Shamir, Adi 7 1989 Bug attacks. Zbl 1183.94022 Biham, Eli; Carmeli, Yaniv; Shamir, Adi 7 2008 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073 Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 6 2014 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129 Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 6 2003 The retracing boomerang attack. Zbl 1479.94163 Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 6 2020 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037 Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 6 2018 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410 Shamir, Adi 6 2008 On the power of commutativity in cryptography. Zbl 0443.94014 Shamir, Adi 5 1980 Data types as objects. Zbl 0353.68050 Shamir, Adi; Wadge, William W. 5 1977 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630 Shamir, Adi 5 1999 Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005 Fiat, Amos; Shamir, Adi 5 1986 On the universality of the next bit test. Zbl 0786.94007 Schrift, A. W.; Shamir, A. 5 1991 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015 Lapidot, Dror; Shamir, Adi 5 1995 Factoring large numbers with the TWIRL device. Zbl 1122.94402 Shamir, Adi; Tromer, Eran 5 2003 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016 Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031 Shamir, Adi; Zippel, Richard E. 4 1980 Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 4 2016 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050 Feige, Uriel; Shamir, Adi 4 1992 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372 Hoch, Jonathan J.; Shamir, Adi 4 2008 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200 Biham, Eli; Shamir, Adi 4 1992 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026 Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation. Zbl 1528.94044 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2023 Three third generation attacks on the format preserving encryption scheme FF3. Zbl 1479.94111 Amon, Ohad; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 3 2021 A method for obtaining digital signatures and public-key cryptosystems (1978). Zbl 07526293 Rivest, Ronald; Shamir, Adi; Adleman, Len 1 2021 The retracing boomerang attack. Zbl 1479.94163 Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 6 2020 New slide attacks on almost self-similar ciphers. Zbl 1479.94162 Dunkelman, Orr; Keller, Nathan; Lasry, Noam; Shamir, Adi 2 2020 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1457.94097 Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2020 Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2019 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037 Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 6 2018 Tight bounds on online checkpointing algorithms. Zbl 1484.68336 Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Hod, Rani; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2018 How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032 Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 2 2017 Acoustic cryptanalysis. Zbl 1377.94048 Genkin, Daniel; Shamir, Adi; Tromer, Eran 1 2017 Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 4 2016 Memory-efficient algorithms for finding needles in haystacks. Zbl 1372.94423 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2016 New second-preimage attacks on hash functions. Zbl 1365.94397 Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien 2 2016 Bug attacks. Zbl 1365.94402 Biham, Eli; Carmeli, Yaniv; Shamir, Adi 1 2016 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 9 2015 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 8 2015 Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505 Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi 3 2015 New attacks on IDEA with at least 6 rounds. Zbl 1377.94037 Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2015 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 3 2015 Almost universal forgery attacks on AES-based MAC’s. Zbl 1359.94589 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 Reflections on slide with a twist attacks. Zbl 1356.94055 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063 Genkin, Daniel; Shamir, Adi; Tromer, Eran 14 2014 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 13 2014 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 11 2014 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 7 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2014 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073 Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 6 2014 Using random error correcting codes in near-collision attacks on generic hash-functions. Zbl 1337.94063 Polak, Inna; Shamir, Adi 2 2014 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 13 2013 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 41 2012 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042 Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 24 2012 Improved attacks on full GOST. Zbl 1282.94040 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 23 2012 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044 Dinur, Itai; Dunkelman, Orr; Shamir, Adi 15 2012 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057 Dinur, Itai; Shamir, Adi 9 2012 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042 Dinur, Itai; Shamir, Adi 29 2011 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042 Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 11 2011 An improved algebraic attack on Hamsi-256. Zbl 1282.94041 Dinur, Itai; Shamir, Adi 3 2011 RFID authentication efficient proactive information security within computational security. Zbl 1208.94055 Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi 1 2011 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 39 2010 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064 Dunkelman, Orr; Keller, Nathan; Shamir, Adi 19 2010 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040 Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 18 2010 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055 Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 17 2010 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106 Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 16 2010 Structural cryptanalysis of SASAS. Zbl 1201.94076 Biryukov, Alex; Shamir, Adi 8 2010 Comparative power analysis of modular exponentiation algorithms. Zbl 1367.65222 Homma, Naofumi; Miyamoto, Atsushi; Aoki, Takafumi; Satoh, Akashi; Shamir, Adi 3 2010 Cube attacks on tweakable black box polynomials. Zbl 1239.94045 Dinur, Itai; Shamir, Adi 87 2009 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051 Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 28 2009 Second preimage attacks on dithered hash functions. Zbl 1149.94302 Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 21 2008 Bug attacks. Zbl 1183.94022 Biham, Eli; Carmeli, Yaniv; Shamir, Adi 7 2008 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410 Shamir, Adi 6 2008 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372 Hoch, Jonathan J.; Shamir, Adi 4 2008 Improved related-key attacks on DESX and DESX+. Zbl 1156.94374 Phan, Raphael C.-W.; Shamir, Adi 1 2008 Practical cryptanalysis of SFLASH. Zbl 1215.94043 Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 34 2007 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016 Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026 Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Remote password extraction from RFID tags. Zbl 1390.68282 Oren, Yossef; Shamir, Adi 1 2007 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326 Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 39 2006 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384 Barkan, Elad; Biham, Eli; Shamir, Adi 24 2006 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047 Hoch, Jonathan J.; Shamir, Adi 10 2006 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023 Biham, Eli; Biryukov, Alex; Shamir, Adi 16 2005 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391 Klimov, Alexander; Shamir, Adi 9 2005 Fault analysis of stream ciphers. Zbl 1104.68479 Hoch, Jonathan J.; Shamir, Adi 19 2004 Cryptographic applications of T-functions. Zbl 1081.94030 Klimov, Alexander; Shamir, Adi 11 2004 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547 Klimov, Alexander; Shamir, Adi 8 2004 Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523 Shamir, Adi 3 2004 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129 Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 6 2003 Factoring large numbers with the TWIRL device. Zbl 1122.94402 Shamir, Adi; Tromer, Eran 5 2003 A practical attack on broadcast RC4. Zbl 1073.68637 Mantin, Itsik; Shamir, Adi 47 2002 The LSD broadcast encryption scheme. Zbl 1026.94528 Halevy, Dani; Shamir, Adi 44 2002 A new class of invertible mappings. Zbl 1020.94522 Klimov, Alexander; Shamir, Adi 14 2002 Analysis of neural cryptography. Zbl 1065.94554 Klimov, Alexander; Mityagin, Anton; Shamir, Adi 1 2002 How to leak a secret. Zbl 1064.94558 Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 133 2001 Improved online/offline signature schemes. Zbl 1003.94533 Shamir, Adi; Tauman, Yael 39 2001 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640 Biryukov, Alex; Shamir, Adi; Wagner, David 34 2001 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530 Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 33 2001 Structural cryptanalysis of SASAS. Zbl 0981.94015 Biryukov, Alex; Shamir, Adi 22 2001 Guaranteeing the diversity of number generators. Zbl 1013.94013 Shamir, Adi; Tsaban, Boaz 3 2001 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514 Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 141 2000 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013 Biryukov, Alex; Shamir, Adi 51 2000 Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656 Shamir, Adi 2 2000 Analysis and optimization of the twinkle factoring device. Zbl 1082.94525 Lenstra, Arjen K.; Shamir, Adi 1 2000 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013 Biham, Eli; Biryukov, Alex; Shamir, Adi 98 1999 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012 Kipnis, Aviad; Shamir, Adi 79 1999 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015 Feige, Uriel; Lapidot, Dror; Shamir, Adi 72 1999 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010 Biham, Eli; Biryukov, Alex; Shamir, Adi 23 1999 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009 Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 8 1999 How to copyright a function? Zbl 0935.68017 Naccache, David; Shamir, Adi; Stern, Julien P. 8 1999 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630 Shamir, Adi 5 1999 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030 Kipnis, Aviad; Shamir, Adi 41 1998 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010 Biham, Eli; Shamir, Adi 91 1997 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078 Lapidot, Dror; Shamir, Adi 9 1997 Visual cryptography. Zbl 0878.94048 Naor, Moni; Shamir, Adi 105 1995 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015 Lapidot, Dror; Shamir, Adi 5 1995 Memory efficient variants of public-key schemes for smart card applications. Zbl 0885.94027 Shamir, Adi 2 1995 Efficient signature schemes based on birational permutations. Zbl 0877.94041 Shamir, Adi 12 1994 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005 Biham, Eli; Shamir, Adi 108 1993 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017 Biham, Eli; Shamir, Adi 43 1993 On dice and coins: Models of computation for random generation. Zbl 0772.68036 Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi 2 1993 ...and 45 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 6,787 Authors 50 Susilo, Willy 39 Wang, Huaxiong 37 Shamir, Adi 36 Dunkelman, Orr 35 Yung, Moti 30 Maitra, Subhamoy 29 Sarkar, Santanu 28 De Santis, Alfredo 28 Keller, Nathan 28 Libert, Benoît 28 Mu, Yi 27 Chang, Chin-Chen 27 Leander, Gregor 26 Lin, Dongdai 26 Rijmen, Vincent 25 Waters, Brent 24 Cao, Zhenfu 23 Ishai, Yuval 23 Wang, Meiqin 22 Nitaj, Abderrahmane 20 Calderini, Marco 20 Meier, Willi 20 Padró, Carles 19 Takagi, Tsuyoshi 19 Vaikuntanathan, Vinod 18 Dinur, Itai 18 Hazay, Carmit 18 Stinson, Douglas Robert 18 Wu, Wenling 17 Carlet, Claude 17 Herranz, Javier 17 Ostrovsky, Rafail 17 Paul, Goutam 17 Preneel, Bart 16 Bitansky, Nir 16 Goldreich, Oded 16 Gu, Dawu 16 Hu, Yupu 16 Isobe, Takanori 16 Li, Chao 16 Naya-Plasencia, María 16 Pointcheval, David 16 Sahai, Amit 16 Smith-Tone, Daniel 16 Wen, Qiaoyan 15 Biham, Eli 15 Boneh, Dan 15 de Werra, Dominique 15 Knudsen, Lars Ramkilde 15 Komargodski, Ilan 15 Mesnager, Sihem 15 Perrin, Léo 15 Pieprzyk, Josef P. 15 Qu, Longjiang 15 Safavi-Naini, Reihaneh 15 Sasaki, Yu 15 Todo, Yosuke 15 Venkitasubramaniam, Muthuramakrishnan 15 Wang, Xiaoyun 15 Yang, Guomin 14 Blundo, Carlo 14 Chiesa, Alessandro 14 Farràs, Oriol 14 Guo, Jian 14 Hu, Lei 14 Huang, Xinyi 14 Hwang, Minshiang 14 Ling, San 14 Sakurai, Kouichi 14 Tan, Chik How 14 Weng, Jian 14 Wong, Duncan S. 13 Bogdanov, Andrey 13 Budaghyan, Lilya 13 Ding, Jintai 13 Dolev, Shlomi 13 Fouque, Pierre-Alain 13 Gaborit, Philippe 13 Garg, Sanjam 13 Gennaro, Rosario 13 Gong, Guang 13 Goyal, Vipul 13 Grassi, Lorenzo 13 Katsumata, Shuichi 13 Kunihiro, Noboru 13 Liu, Joseph K. K. 13 Naccache, David 13 Tang, Chunming 13 Tessaro, Stefano 13 Vergnaud, Damien 13 Wu, Qianhong 13 Yuan, Pingzhi 12 Beimel, Amos 12 Bellare, Mihir 12 Biryukov, Alex 12 Chen, Xiu-Bo 12 Damgård, Ivan Bjerre 12 D’Arco, Paolo 12 Desmedt, Yvo G. 12 Dong, Xiaoyang ...and 6,687 more Authors all top 5 Cited in 335 Serials 270 Designs, Codes and Cryptography 216 Journal of Cryptology 200 Theoretical Computer Science 167 Information Sciences 166 Information Processing Letters 119 Quantum Information Processing 99 Discrete Applied Mathematics 97 Cryptography and Communications 70 Applied Mathematics and Computation 70 Journal of Discrete Mathematical Sciences & Cryptography 68 Finite Fields and their Applications 65 International Journal of Theoretical Physics 44 International Journal of Computer Mathematics 44 Journal of Mathematical Cryptology 42 Journal of Computer and System Sciences 41 Advances in Mathematics of Communications 35 Computers & Mathematics with Applications 34 Information and Computation 34 Matematicheskie Voprosy Kriptografii 33 Applicable Algebra in Engineering, Communication and Computing 32 Wuhan University Journal of Natural Sciences (WUJNS) 30 Discrete Mathematics 29 Science China. Information Sciences 25 European Journal of Operational Research 24 Pattern Recognition 23 International Journal of Foundations of Computer Science 22 Mathematical Problems in Engineering 22 Prikladnaya Diskretnaya Matematika 20 SIAM Journal on Computing 19 Algorithmica 16 Mathematics of Computation 15 Computing 15 Journal of Symbolic Computation 15 Mathematical and Computer Modelling 15 Journal of Systems Science and Complexity 15 International Journal of Quantum Information 14 Cybernetics and Systems Analysis 14 Computational Complexity 13 Journal of Shanghai Jiaotong University (Science) 12 Artificial Intelligence 12 Distributed Computing 12 Journal of Combinatorial Optimization 12 Mathematical Biosciences and Engineering 10 Computers & Operations Research 10 Annals of Operations Research 10 Discrete Mathematics and Applications 10 Soft Computing 10 Science in China. Series F 10 Groups, Complexity, Cryptology 10 Symmetry 9 Physica A 9 Operations Research Letters 9 Journal of Computer Science and Technology 9 Journal of Applied Mathematics 8 Chaos, Solitons and Fractals 8 Cryptologia 8 Journal of Parallel and Distributed Computing 8 Mathematical Programming. Series A. Series B 8 Nonlinear Dynamics 8 Journal of Applied Mathematics and Computing 7 Journal of Complexity 7 Applied Mathematics Letters 7 SIAM Journal on Discrete Mathematics 7 Journal of Mathematical Sciences (New York) 6 Journal of Algebra 6 Journal of Computational and Applied Mathematics 6 Journal of Number Theory 6 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 6 Informatica (Vilnius) 6 International Journal of Modern Physics C 6 Electronic Commerce Research 6 Mathematics in Computer Science 6 Science China. Mathematics 6 Frontiers of Computer Science 5 Problems of Information Transmission 5 The Mathematical Intelligencer 5 Mathematical Systems Theory 5 Networks 5 Journal of Information & Optimization Sciences 5 New Generation Computing 5 Journal of Automated Reasoning 5 Tatra Mountains Mathematical Publications 5 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 5 Annals of Mathematics and Artificial Intelligence 5 Theory of Computing Systems 5 Lobachevskii Journal of Mathematics 5 EURASIP Journal on Advances in Signal Processing 5 Discrete Mathematics, Algorithms and Applications 5 Arabian Journal for Science and Engineering 5 JSIAM Letters 4 Acta Informatica 4 Combinatorica 4 Acta Applicandae Mathematicae 4 Graphs and Combinatorics 4 Linear Algebra and its Applications 4 Communications in Nonlinear Science and Numerical Simulation 4 International Journal of Applied Mathematics and Computer Science 4 Journal of Algebra and its Applications 4 Journal of Discrete Algorithms 4 BIT. Nordisk Tidskrift for Informationsbehandling ...and 235 more Serials all top 5 Cited in 51 Fields 3,901 Information and communication theory, circuits (94-XX) 1,520 Computer science (68-XX) 474 Number theory (11-XX) 443 Quantum theory (81-XX) 273 Combinatorics (05-XX) 189 Operations research, mathematical programming (90-XX) 113 Algebraic geometry (14-XX) 91 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 62 Numerical analysis (65-XX) 60 Mathematical logic and foundations (03-XX) 50 Commutative algebra (13-XX) 49 Group theory and generalizations (20-XX) 46 Order, lattices, ordered algebraic structures (06-XX) 36 Field theory and polynomials (12-XX) 36 Dynamical systems and ergodic theory (37-XX) 26 Linear and multilinear algebra; matrix theory (15-XX) 21 Probability theory and stochastic processes (60-XX) 16 Statistical mechanics, structure of matter (82-XX) 15 Statistics (62-XX) 14 Associative rings and algebras (16-XX) 13 Geometry (51-XX) 12 Biology and other natural sciences (92-XX) 12 Systems theory; control (93-XX) 9 Convex and discrete geometry (52-XX) 7 Mechanics of particles and systems (70-XX) 6 Harmonic analysis on Euclidean spaces (42-XX) 6 Mathematics education (97-XX) 5 History and biography (01-XX) 5 Ordinary differential equations (34-XX) 4 General and overarching topics; collections (00-XX) 4 Real functions (26-XX) 4 Partial differential equations (35-XX) 4 Relativity and gravitational theory (83-XX) 3 General algebraic systems (08-XX) 3 Difference and functional equations (39-XX) 3 Approximations and expansions (41-XX) 3 Abstract harmonic analysis (43-XX) 3 Functional analysis (46-XX) 3 Operator theory (47-XX) 2 Measure and integration (28-XX) 2 Special functions (33-XX) 2 Sequences, series, summability (40-XX) 2 Fluid mechanics (76-XX) 1 Nonassociative rings and algebras (17-XX) 1 Functions of a complex variable (30-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 Differential geometry (53-XX) 1 General topology (54-XX) 1 Manifolds and cell complexes (57-XX) 1 Global analysis, analysis on manifolds (58-XX) 1 Classical thermodynamics, heat transfer (80-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.