×

zbMATH — the first resource for mathematics

Shamir, Adi

Compute Distance To:
Author ID: shamir.adi Recent zbMATH articles by "Shamir, Adi"
Published as: Shamir, A.; Shamir, Adi
Homepage: http://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html
External Links: MGP · Wikidata · dblp · GND
Awards: Turing Award (2002)
Documents Indexed: 147 Publications since 1975, including 2 Books
Biographic References: 1 Publication
all top 5

Co-Authors

23 single-authored
27 Dunkelman, Orr
20 Dinur, Itai
20 Keller, Nathan
15 Biham, Eli
10 Biryukov, Alex
7 Tromer, Eran
6 Klimov, Alexander
5 Feige, Uriel
5 Fiat, Amos
5 Hoch, Jonathan J.
5 Lapidot, Dror
4 Manna, Zohar
4 Rivest, Ronald Linn
3 Bouillaguet, Charles
3 Fouque, Pierre-Alain
3 Lenstra, Arjen K.
3 Naor, Moni
3 Tsaban, Boaz
2 Andreeva, Elena Anatol’evna
2 Bar-On, Achiya
2 Carmeli, Yaniv
2 Dodis, Yevgeniy
2 Even, Shimon
2 Feldman, David Victor
2 Genkin, Daniel
2 Impagliazzo, Russell
2 Kelsey, John
2 Kipnis, Aviad
2 Mantin, Itsik
2 Nisan, Noam
2 Osvik, Dag Arne
2 Ronen, Eyal
2 Rudich, Steven
2 Ruinskiy, Dima
2 Schrift, A. W.
2 Stephens-Davidowitz, Noah
2 Tauman, Yael
2 van Someren, Nicko
2 Wichs, Daniel
2 Zimmer, Sebastien
1 Adleman, Leonard Max
1 Aoki, Takafumi
1 Aumasson, Jean-Philippe
1 Barkan, Elad
1 Chen, Hsieh-Chung
1 Cheng, Chen-Mou
1 Chou, Tung
1 Courtois, Nicolas T.
1 Dodson, Bruce A.
1 Dolev, Shlomi
1 Dubois, Vivien
1 Fluhrer, Scott R.
1 Frieze, Alan Michael
1 Goldreich, Oded
1 Güneysu, Tim
1 Gutman, Masha
1 Halevy, Dani
1 Håstad, Johan Torkel
1 Homma, Naofumi
1 Hughes, James P.
1 Itai, Alon
1 Kannan, Ravindran
1 Khovratovich, Dmitry
1 Kopeetsky, Marina
1 Kortsmit, Wil
1 Lagarias, Jeffrey C.
1 Leyland, Paul C.
1 Meier, Willi
1 Mityagin, Anton
1 Miyamoto, Atsushi
1 Naccache, David
1 Niederhagen, Ruben
1 Ong, Hooi Jin
1 Oren, Yossef
1 Paar, Christof
1 Patarin, Jacques
1 Phan, Raphael Chung-Wei
1 Polak, Inna
1 Richardson, Eran
1 Satoh, Akashi
1 Schnorr, Claus Peter
1 Schroeppel, Richard
1 Shallit, Jeffrey O.
1 Stern, Jacques
1 Stern, Julien P.
1 Tomlinson, Jim
1 Wadge, William W.
1 Wagner, David A.
1 Yang, Bo-Yin
1 Zimmermann, Ralf
1 Zippel, Richard E.

Publications by Year

Citations contained in zbMATH

125 Publications have been cited 3,745 times in 3,054 Documents Cited by Year
A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005
Rivest, R. L.; Shamir, A.; Adleman, L.
648
1978
How to share a secret. Zbl 0414.94021
Shamir, Adi
608
1979
Identity-based cryptosystems and signature schemes. Zbl 1359.94626
Shamir, Adi
325
1985
On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021
Even, S.; Itai, A.; Shamir, A.
239
1976
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
219
1991
How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012
Fiat, Amos; Shamir, Adi
149
1987
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
77
1995
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
72
1993
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
68
1992
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
66
1988
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
64
2000
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
62
1991
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
55
1999
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
52
1997
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
50
2001
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
47
2009
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
36
1999
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
34
2002
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
32
2002
Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045
Feige, U.; Shamir, A.
31
1990
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
30
2000
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
29
2001
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
29
1999
A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015
Schroeppel, Richard; Shamir, Adi
29
1981
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
26
1993
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
23
2012
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
23
2001
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
21
2010
Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006
Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi
20
1988
A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007
Shamir, Adi
19
1984
A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029
Shamir, Adi
19
1979
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
18
2008
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
18
2006
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
17
2009
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
17
2007
Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414
Lapidot, Dror; Shamir, Adi
17
1991
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
16
1998
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
15
2006
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
15
2001
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
15
2001
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018
Shamir, Adi
15
1979
The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017
Manna, Zohar; Shamir, Adi
15
1976
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
14
2012
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
12
2012
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
12
2005
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
10
2011
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
10
2010
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
10
2004
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
10
2002
How to reuse a “write-once” memory. Zbl 0548.68046
Rivest, Ronald L.; Shamir, Adi
10
1982
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
9
2010
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
9
1994
The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016
Manna, Zohar; Shamir, Adi
9
1978
The optimal approach to recursive programs. Zbl 0361.68022
Manna, Zohar; Shamir, Adi
9
1977
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
8
2004
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
8
1997
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
8
1991
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2013
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
7
2010
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
7
2005
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
6
2014
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
6
2012
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
6
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
6
2010
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
6
2006
On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017
Shamir, Adi
6
1981
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2015
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
5
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2014
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
5
2004
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
5
2003
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
5
1995
Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005
Fiat, Amos; Shamir, Adi
5
1986
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
4
2011
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
4
2008
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
4
1999
On the universality of the next bit test. Zbl 0786.94007
Schrift, A. W.; Shamir, A.
4
1991
How to find a battleship. Zbl 0673.90063
Fiat, Amos; Shamir, Adi
4
1989
Efficient factoring based on partial information. Zbl 0589.94004
Rivest, Ronald L.; Shamir, Adi
4
1986
On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031
Shamir, Adi; Zippel, Richard E.
4
1980
Data types as objects. Zbl 0353.68050
Shamir, Adi; Wadge, William W.
4
1977
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
3
2015
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
3
2008
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
3
2003
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
3
2001
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
3
1999
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
3
1992
The fixedpoints of recursive definitions. Thesis for the degree of doctor of Philosophy. Zbl 0423.03051
Shamir, Adi
3
1976
Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2016
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2014
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
2
2012
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042
Lapidot, Dror; Shamir, Adi
2
1992
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
Generalized ”write-once” memories. Zbl 0543.68054
Fiat, Amos; Shamir, Adi
2
1984
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2018
Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2016
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
New second-preimage attacks on hash functions. Zbl 1365.94397
Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien
1
2016
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2015
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
3
2015
Reflections on slide with a twist attacks. Zbl 1356.94055
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505
Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi
1
2015
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
6
2014
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
5
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2014
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2014
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2013
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
23
2012
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
14
2012
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
12
2012
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
6
2012
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
2
2012
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
10
2011
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
4
2011
An improved algebraic attack on Hamsi-256. Zbl 1282.94041
Dinur, Itai; Shamir, Adi
1
2011
RFID authentication efficient proactive information security within computational security. Zbl 1208.94055
Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi
1
2011
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
21
2010
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
10
2010
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
9
2010
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
7
2010
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
6
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
6
2010
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
47
2009
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
17
2009
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
18
2008
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
4
2008
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
3
2008
Improved related-key attacks on DESX and DESX+. Zbl 1156.94374
Phan, Raphael C.-W.; Shamir, Adi
1
2008
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
17
2007
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
18
2006
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
15
2006
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
6
2006
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
12
2005
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
7
2005
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
10
2004
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
8
2004
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
5
2004
Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523
Shamir, Adi
1
2004
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
5
2003
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
3
2003
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
34
2002
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
32
2002
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
10
2002
Analysis of neural cryptography. Zbl 1065.94554
Klimov, Alexander; Mityagin, Anton; Shamir, Adi
1
2002
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
50
2001
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
29
2001
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
23
2001
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
15
2001
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
15
2001
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
3
2001
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
64
2000
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
30
2000
Analysis and optimization of the twinkle factoring device. Zbl 1082.94525
Lenstra, Arjen K.; Shamir, Adi
1
2000
Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656
Shamir, Adi
1
2000
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
55
1999
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
36
1999
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
29
1999
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
4
1999
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
3
1999
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
1
1999
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
16
1998
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
52
1997
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
8
1997
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
77
1995
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
5
1995
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
9
1994
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
72
1993
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
26
1993
On the generation of multivariate polynomials which are hard to factor. Zbl 1310.68262
Shamir, Adi
1
1993
Universal tests for nonuniform distributions. Zbl 0781.94002
Schrift, A. W.; Shamir, A.
1
1993
On dice and coins: Models of computation for random generation. Zbl 0772.68036
Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi
1
1993
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
68
1992
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
3
1992
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042
Lapidot, Dror; Shamir, Adi
2
1992
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
219
1991
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
62
1991
Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414
Lapidot, Dror; Shamir, Adi
17
1991
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
8
1991
On the universality of the next bit test. Zbl 0786.94007
Schrift, A. W.; Shamir, A.
4
1991
On expected polynomial time simulation of zero knowledge protocols. Zbl 0722.68046
Feige, Uriel; Shamir, Adi
1
1991
Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045
Feige, U.; Shamir, A.
31
1990
How to find a battleship. Zbl 0673.90063
Fiat, Amos; Shamir, Adi
4
1989
On dice and coins: Models of computation for random generation. Zbl 0682.68073
Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi
1
1989
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
66
1988
...and 25 more Documents
all top 5

Cited by 4,532 Authors

28 Susilo, Willy
26 Chang, Chin-Chen
26 Shamir, Adi
26 Wang, Huaxiong
24 Cao, Zhenfu
24 De Santis, Alfredo
23 Mu, Yi
23 Yung, Moti
22 Dunkelman, Orr
20 Keller, Nathan
20 Sarkar, Santanu
18 Padró, Carles
18 Rijmen, Vincent
18 Stinson, Douglas Robert
17 Maitra, Subhamoy
15 de Werra, Dominique
15 Herranz, Javier
15 Lin, Dongdai
14 Blundo, Carlo
14 Hwang, Min-Shiang
14 Ishai, Yuval
14 Libert, Benoît
14 Wen, Qiaoyan
14 Wong, Duncan S.
13 Carlet, Claude
13 Chen, Kefei
13 Goldreich, Oded
13 Hu, Yupu
13 Sahai, Amit
13 Sasaki, Yu
13 Yang, Guomin
12 Dinur, Itai
12 Farràs, Oriol
12 Gu, Dawu
12 Knudsen, Lars Ramkilde
12 Li, Chao
12 Paul, Goutam
12 Tan, Chik How
12 Wu, Qianhong
11 Biham, Eli
11 Calderini, Marco
11 Li, Fagen
11 Ling, San
11 Ostrovsky, Rafail
11 Qu, Longjiang
11 Tang, Chunming
11 Wu, Wenling
10 Bellare, Mihir
10 Bitansky, Nir
10 Bogdanov, Andrey
10 Boneh, Dan
10 Gennaro, Rosario
10 Gong, Guang
10 Katz, Jonathan N.
10 Leander, Gregor
10 Naccache, David
10 Sakurai, Kouichi
10 Waters, Brent
10 Wu, Tzong-Sun
10 Yang, Yuguang
9 Blondeau, Celine
9 Budaghyan, Lilya
9 Dai, Yuewei
9 D’Arco, Paolo
9 Harn, Lein
9 Hazay, Carmit
9 Hsu, Chien-Lung
9 Kushilevitz, Eyal
9 Lai, Xuejia
9 Meier, Willi
9 Naor, Moni
9 Nitaj, Abderrahmane
9 Perrin, Léo
9 Phan, Raphael Chung-Wei
9 Qin, Huawang
9 Shparlinski, Igor E.
9 Takagi, Tsuyoshi
9 Vaikuntanathan, Vinod
9 Venturi, Daniele
9 Wu, Chialong
9 Yang, Yixian
9 Youssef, Amr M.
9 Yuan, Pingzhi
9 Zhang, Huanguo
8 Adhikari, Avishek
8 Beimel, Amos
8 Chen, Tzungher
8 Damgård, Ivan Bjerre
8 Desmedt, Yvo G.
8 Ding, Cunsheng
8 Dolev, Shlomi
8 Domingo-Ferrer, Josep
8 Guo, Jian
8 He, Debiao
8 Huang, Qiong
8 Huang, Xinyi
8 Jin, Chenhui
8 Kurosawa, Kaoru
8 Lee, Cheng-Chi
8 Lin, Han-Yu
...and 4,432 more Authors
all top 5

Cited in 270 Serials

209 Designs, Codes and Cryptography
186 Theoretical Computer Science
180 Journal of Cryptology
170 Information Processing Letters
136 Information Sciences
87 Discrete Applied Mathematics
72 Applied Mathematics and Computation
63 Cryptography and Communications
53 Journal of Computer and System Sciences
53 Finite Fields and their Applications
47 Quantum Information Processing
44 International Journal of Computer Mathematics
40 Computers & Mathematics with Applications
37 International Journal of Theoretical Physics
33 Information and Computation
32 Wuhan University Journal of Natural Sciences (WUJNS)
28 Journal of Discrete Mathematical Sciences & Cryptography
27 Discrete Mathematics
24 European Journal of Operational Research
24 Pattern Recognition
24 Journal of Mathematical Cryptology
23 Applicable Algebra in Engineering, Communication and Computing
21 Mathematical Problems in Engineering
21 Science China. Information Sciences
20 Advances in Mathematics of Communications
19 International Journal of Foundations of Computer Science
17 Mathematics of Computation
17 Prikladnaya Diskretnaya Matematika
15 Computing
15 Algorithmica
15 Mathematical and Computer Modelling
14 SIAM Journal on Computing
14 International Journal of Quantum Information
13 Computational Complexity
13 Journal of Systems Science and Complexity
13 Journal of Shanghai Jiaotong University (Science)
12 Journal of Symbolic Computation
12 Distributed Computing
11 Cybernetics and Systems Analysis
11 Journal of Combinatorial Optimization
10 Annals of Operations Research
10 Science in China. Series F
10 Groups, Complexity, Cryptology
10 Symmetry
9 Artificial Intelligence
9 Operations Research Letters
9 Journal of Computer Science and Technology
9 Journal of Applied Mathematics
8 Cryptologia
8 Computers & Operations Research
8 Journal of Parallel and Distributed Computing
8 Mathematical Programming. Series A. Series B
8 Soft Computing
7 Chaos, Solitons and Fractals
7 Applied Mathematics Letters
7 Discrete Mathematics and Applications
7 Nonlinear Dynamics
6 Journal of Computational and Applied Mathematics
6 Journal of Number Theory
6 Journal of Complexity
6 SIAM Journal on Discrete Mathematics
6 International Journal of Modern Physics C
6 Electronic Commerce Research
6 Mathematics in Computer Science
6 Science China. Mathematics
6 Frontiers of Computer Science
5 The Mathematical Intelligencer
5 Mathematical Systems Theory
5 Journal of Information & Optimization Sciences
5 New Generation Computing
5 Journal of Mathematical Sciences (New York)
5 Annals of Mathematics and Artificial Intelligence
5 Theory of Computing Systems
5 Journal of Applied Mathematics and Computing
5 EURASIP Journal on Advances in Signal Processing
4 Journal of Algebra
4 Networks
4 Combinatorica
4 Acta Applicandae Mathematicae
4 Journal of Automated Reasoning
4 Linear Algebra and its Applications
4 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
4 Lobachevskii Journal of Mathematics
4
4 Journal of Discrete Algorithms
4 BIT. Nordisk Tidskrift for Informationsbehandling
4 Journal of Zhejiang University. Science A
4 Arabian Journal for Science and Engineering
3 Physics Letters. A
3 Problems of Information Transmission
3 Reviews of Modern Physics
3 BIT
3 Journal of Soviet Mathematics
3 Software. Practice & Experience
3 Acta Mathematicae Applicatae Sinica. English Series
3 Graphs and Combinatorics
3 Statistical Science
3 Signal Processing
3 Computational Geometry
3 Games and Economic Behavior
...and 170 more Serials
all top 5

Cited in 45 Fields

2,248 Information and communication theory, circuits (94-XX)
1,056 Computer science (68-XX)
323 Number theory (11-XX)
197 Combinatorics (05-XX)
184 Quantum theory (81-XX)
152 Operations research, mathematical programming (90-XX)
67 Algebraic geometry (14-XX)
52 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
49 Mathematical logic and foundations (03-XX)
46 Numerical analysis (65-XX)
42 Order, lattices, ordered algebraic structures (06-XX)
34 Commutative algebra (13-XX)
33 Dynamical systems and ergodic theory (37-XX)
30 Group theory and generalizations (20-XX)
26 Field theory and polynomials (12-XX)
18 Linear and multilinear algebra; matrix theory (15-XX)
15 Probability theory and stochastic processes (60-XX)
14 Statistics (62-XX)
11 Geometry (51-XX)
9 Biology and other natural sciences (92-XX)
8 Systems theory; control (93-XX)
7 Statistical mechanics, structure of matter (82-XX)
6 Associative rings and algebras (16-XX)
5 History and biography (01-XX)
5 Mathematics education (97-XX)
4 General and overarching topics; collections (00-XX)
4 Convex and discrete geometry (52-XX)
3 Real functions (26-XX)
3 Ordinary differential equations (34-XX)
3 Partial differential equations (35-XX)
3 Harmonic analysis on Euclidean spaces (42-XX)
3 Abstract harmonic analysis (43-XX)
2 Special functions (33-XX)
2 Approximations and expansions (41-XX)
2 Operator theory (47-XX)
2 Fluid mechanics (76-XX)
1 General algebraic systems (08-XX)
1 Difference and functional equations (39-XX)
1 Functional analysis (46-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 Differential geometry (53-XX)
1 Manifolds and cell complexes (57-XX)
1 Mechanics of particles and systems (70-XX)
1 Classical thermodynamics, heat transfer (80-XX)
1 Relativity and gravitational theory (83-XX)

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.