×
Compute Distance To:
Author ID: shamir.adi Recent zbMATH articles by "Shamir, Adi"
Published as: Shamir, Adi; Shamir, A.
Homepage: http://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html
External Links: MGP · Wikidata · dblp · GND · IdRef
Awards: Turing Award (2002)
Documents Indexed: 154 Publications since 1975, including 2 Books
1 Further Contribution
Biographic References: 1 Publication
Co-Authors: 93 Co-Authors with 131 Joint Publications
2,461 Co-Co-Authors
all top 5

Co-Authors

24 single-authored
32 Dunkelman, Orr
25 Keller, Nathan
22 Dinur, Itai
15 Biham, Eli
10 Biryukov, Alex
7 Tromer, Eran
6 Klimov, Alexander
6 Rivest, Ronald Linn
6 Ronen, Eyal
5 Feige, Uriel
5 Fiat, Amos
5 Hoch, Jonathan J.
5 Lapidot, Dror
4 Bar-On, Achiya
4 Manna, Zohar
3 Adleman, Leonard Max
3 Bouillaguet, Charles
3 Fouque, Pierre-Alain
3 Lenstra, Arjen K.
3 Naor, Moni
3 Tsaban, Boaz
2 Andreeva, Elena Anatol’evna
2 Carmeli, Yaniv
2 Dodis, Yevgeniy
2 Even, Shimon
2 Feldman, David Victor
2 Genkin, Daniel
2 Hod, Rani
2 Impagliazzo, Russell
2 Kelsey, John
2 Kipnis, Aviad
2 Mantin, Itsik
2 Nisan, Noam
2 Osvik, Dag Arne
2 Rudich, Steven
2 Ruinskiy, Dima
2 Schrift, A. W.
2 Stephens-Davidowitz, Noah
2 Tauman, Yael
2 van Someren, Nicko
2 Wichs, Daniel
2 Zimmer, Sebastien
1 Amon, Ohad
1 Aoki, Takafumi
1 Aumasson, Jean-Philippe
1 Barkan, Elad
1 Chen, Hsieh-Chung
1 Cheng, Chen-Mou
1 Chou, Tung
1 Courtois, Nicolas T.
1 Diffie, Whitfield
1 Dodson, Bruce A.
1 Dolev, Shlomi
1 Dubois, Vivien
1 Fluhrer, Scott R.
1 Frieze, Alan Michael
1 Goldreich, Oded
1 Güneysu, Tim
1 Gutman, Masha
1 Halevy, Dani
1 Håstad, Johan Torkel
1 Hellman, Martin Edward
1 Homma, Naofumi
1 Hughes, James P.
1 Itai, Alon
1 Kannan, Ravindran
1 Khovratovich, Dmitry
1 Kopeetsky, Marina
1 Kortsmit, Wil
1 Lagarias, Jeffrey C.
1 Lasry, Noam
1 Leyland, Paul C.
1 Meier, Willi
1 Merkle, Ralph C.
1 Mityagin, Anton
1 Miyamoto, Atsushi
1 Naccache, David
1 Niederhagen, Ruben
1 Oren, Yossef
1 Paar, Christof
1 Patarin, Jacques
1 Phan, Raphael Chung-Wei
1 Polak, Inna
1 Richardson, Eran
1 Satoh, Akashi
1 Schnorr, Claus Peter
1 Schroeppel, Richard
1 Shallit, Jeffrey O.
1 Simmons, Gustavus James
1 Stern, Jacques
1 Stern, Julien P.
1 Tomlinson, Jim
1 Wadge, William W.
1 Wagner, David A.
1 Williams, Hugh Cowie
1 Yang, Bo-Yin
1 Zimmermann, Ralf
1 Zippel, Richard E.

Publications by Year

Citations contained in zbMATH Open

135 Publications have been cited 4,252 times in 3,462 Documents Cited by Year
A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005
Rivest, R. L.; Shamir, A.; Adleman, L.
718
1978
How to share a secret. Zbl 0414.94021
Shamir, Adi
704
1979
Identity-based cryptosystems and signature schemes. Zbl 1359.94626
Shamir, Adi
358
1985
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
262
1991
On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021
Even, S.; Itai, A.; Shamir, A.
244
1976
How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012
Fiat, Amos; Shamir, Adi
188
1987
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
86
2000
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
84
1995
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
80
1993
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
78
1991
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
67
1988
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
64
1999
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
62
2001
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
60
2009
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
58
1997
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
48
1999
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
43
1999
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
39
1992
A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015
Schroeppel, Richard; Shamir, Adi
36
1981
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
36
2000
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
34
2002
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
33
2002
Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045
Feige, U.; Shamir, A.
30
1990
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
29
1993
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
29
2001
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
26
2012
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
26
2010
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
23
2007
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
22
2001
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
21
1998
Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006
Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi
21
1988
A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007
Shamir, Adi
21
1984
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
21
2009
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
21
2006
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
20
2001
Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414
Lapidot, Dror; Shamir, Adi
20
1991
A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029
Shamir, Adi
20
1979
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
19
2012
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
19
2008
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
17
2011
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
16
2006
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
15
2001
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
15
2012
The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017
Manna, Zohar; Shamir, Adi
15
1976
Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018
Shamir, Adi
14
1979
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
13
2005
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
13
2010
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
12
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
11
2010
How to reuse a “write-once” memory. Zbl 0548.68046
Rivest, Ronald L.; Shamir, Adi
10
1982
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
10
1994
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
10
2013
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
10
2004
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
10
2010
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
10
2002
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
9
1991
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
9
2014
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
9
1997
The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016
Manna, Zohar; Shamir, Adi
9
1978
The optimal approach to recursive programs. Zbl 0361.68022
Manna, Zohar; Shamir, Adi
9
1977
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
8
2012
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
8
2004
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
7
2011
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
7
2005
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
7
2006
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
7
2010
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
6
2015
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
6
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
6
2014
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
6
2003
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
6
2014
How to find a battleship. Zbl 0673.90063
Fiat, Amos; Shamir, Adi
5
1989
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
5
2007
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
5
2014
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
5
2012
On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017
Shamir, Adi
5
1981
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
5
2004
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
5
2008
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
4
1999
Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005
Fiat, Amos; Shamir, Adi
4
1986
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
4
1995
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
4
1999
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
4
2003
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
On the universality of the next bit test. Zbl 0786.94007
Schrift, A. W.; Shamir, A.
4
1991
On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031
Shamir, Adi; Zippel, Richard E.
4
1980
Data types as objects. Zbl 0353.68050
Shamir, Adi; Wadge, William W.
4
1977
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
4
2015
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
3
1999
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
3
1992
Efficient factoring based on partial information. Zbl 0589.94004
Rivest, Ronald L.; Shamir, Adi
3
1986
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
3
2001
An improved algebraic attack on Hamsi-256. Zbl 1282.94041
Dinur, Itai; Shamir, Adi
3
2011
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
3
2008
Generalized ”write-once” memories. Zbl 0543.68054
Fiat, Amos; Shamir, Adi
2
1984
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
2
2018
Three third generation attacks on the format preserving encryption scheme FF3. Zbl 1479.94111
Amon, Ohad; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2021
New slide attacks on almost self-similar ciphers. Zbl 1479.94162
Dunkelman, Orr; Keller, Nathan; Lasry, Noam; Shamir, Adi
1
2020
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
2
2018
Tight bounds on online checkpointing algorithms. Zbl 07375940
Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Hod, Rani; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2018
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
1
2017
New second-preimage attacks on hash functions. Zbl 1365.94397
Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien
2
2016
Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2016
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
6
2015
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
4
2015
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2015
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2015
Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505
Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi
2
2015
Almost universal forgery attacks on AES-based MAC’s. Zbl 1359.94589
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Reflections on slide with a twist attacks. Zbl 1356.94055
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
9
2014
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
6
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
6
2014
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
6
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
5
2014
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
Using random error correcting codes in near-collision attacks on generic hash-functions. Zbl 1337.94063
Polak, Inna; Shamir, Adi
1
2014
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
10
2013
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
26
2012
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
19
2012
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
15
2012
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
8
2012
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
5
2012
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
17
2011
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
7
2011
An improved algebraic attack on Hamsi-256. Zbl 1282.94041
Dinur, Itai; Shamir, Adi
3
2011
RFID authentication efficient proactive information security within computational security. Zbl 1208.94055
Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi
1
2011
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
26
2010
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
13
2010
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
12
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
11
2010
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
10
2010
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
7
2010
Comparative power analysis of modular exponentiation algorithms. Zbl 1367.65222
Homma, Naofumi; Miyamoto, Atsushi; Aoki, Takafumi; Satoh, Akashi; Shamir, Adi
1
2010
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
60
2009
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
21
2009
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
19
2008
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
5
2008
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
3
2008
Improved related-key attacks on DESX and DESX+. Zbl 1156.94374
Phan, Raphael C.-W.; Shamir, Adi
1
2008
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
23
2007
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
5
2007
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
21
2006
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
16
2006
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
7
2006
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
13
2005
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
7
2005
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
10
2004
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
8
2004
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
5
2004
Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523
Shamir, Adi
1
2004
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
6
2003
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
4
2003
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
34
2002
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
33
2002
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
10
2002
Analysis of neural cryptography. Zbl 1065.94554
Klimov, Alexander; Mityagin, Anton; Shamir, Adi
1
2002
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
62
2001
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
29
2001
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
22
2001
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
20
2001
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
15
2001
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
3
2001
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
86
2000
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
36
2000
Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656
Shamir, Adi
1
2000
Analysis and optimization of the twinkle factoring device. Zbl 1082.94525
Lenstra, Arjen K.; Shamir, Adi
1
2000
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
64
1999
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
48
1999
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
43
1999
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
4
1999
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
4
1999
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
3
1999
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
21
1998
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
58
1997
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
9
1997
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
84
1995
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
4
1995
Memory efficient variants of public-key schemes for smart card applications. Zbl 0885.94027
Shamir, Adi
1
1995
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
10
1994
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
80
1993
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
29
1993
On the generation of multivariate polynomials which are hard to factor. Zbl 1310.68262
Shamir, Adi
1
1993
On dice and coins: Models of computation for random generation. Zbl 0772.68036
Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi
1
1993
Universal tests for nonuniform distributions. Zbl 0781.94002
Schrift, A. W.; Shamir, A.
1
1993
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
39
1992
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
3
1992
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042
Lapidot, Dror; Shamir, Adi
1
1992
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
262
1991
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
78
1991
...and 35 more Documents
all top 5

Cited by 5,025 Authors

32 Susilo, Willy
28 Shamir, Adi
27 Wang, Huaxiong
26 Chang, Chin-Chen
25 De Santis, Alfredo
24 Yung, Moti
23 Dunkelman, Orr
23 Mu, Yi
22 Cao, Zhenfu
20 Keller, Nathan
20 Sarkar, Santanu
19 Maitra, Subhamoy
19 Padró, Carles
19 Rijmen, Vincent
18 Ishai, Yuval
18 Stinson, Douglas Robert
17 Lin, Dongdai
16 Calderini, Marco
16 Libert, Benoît
15 Carlet, Claude
15 de Werra, Dominique
15 Herranz, Javier
15 Leander, Gregor
14 Blundo, Carlo
14 Chen, Kefei
14 Farràs, Oriol
14 Goldreich, Oded
14 Hwang, Minshiang
14 Ostrovsky, Rafail
14 Wen, Qiaoyan
14 Wong, Duncan S.
13 Bitansky, Nir
13 Dinur, Itai
13 Hu, Yupu
13 Li, Chao
13 Qu, Longjiang
13 Sahai, Amit
13 Sasaki, Yu
13 Vaikuntanathan, Vinod
13 Wu, Qianhong
13 Yang, Guomin
12 Gu, Dawu
12 Knudsen, Lars Ramkilde
12 Meier, Willi
12 Paul, Goutam
12 Perrin, Léo
12 Tan, Chik How
12 Tang, Chunming
11 Biham, Eli
11 Boneh, Dan
11 Hazay, Carmit
11 Li, Fagen
11 Ling, San
11 Naccache, David
11 Nitaj, Abderrahmane
11 Sakurai, Kouichi
11 Takagi, Tsuyoshi
11 Wang, Meiqin
11 Waters, Brent
11 Wu, Wenling
10 Bellare, Mihir
10 Bogdanov, Andrey
10 Budaghyan, Lilya
10 D’Arco, Paolo
10 Desmedt, Yvo G.
10 Gennaro, Rosario
10 Gong, Guang
10 Naya-Plasencia, María
10 Pointcheval, David
10 Safavi-Naini, Reihaneh
10 Wu, Tzong-Sun
10 Yang, Yuguang
10 Youssef, Amr M.
10 Yuan, Pingzhi
9 Beimel, Amos
9 Blondeau, Celine
9 Dai, Yuewei
9 Ding, Jintai
9 Guo, Jian
9 Harn, Lein
9 Hsu, Chien-Lung
9 Hu, Lei
9 Jin, Chenhui
9 Joye, Marc
9 Katz, Jonathan N.
9 Kurosawa, Kaoru
9 Kushilevitz, Eyal
9 Naor, Moni
9 Nguyen, Khoa
9 Phan, Raphael Chung-Wei
9 Qin, Huawang
9 Segev, Gil
9 Shparlinski, Igor E.
9 Tanaka, Keisuke
9 Venkitasubramaniam, Muthuramakrishnan
9 Wang, Xiaoyun
9 Wu, Chialong
9 Yang, Yixian
8 Abdalla, Michel
8 Adhikari, Avishek
...and 4,925 more Authors
all top 5

Cited in 299 Serials

231 Designs, Codes and Cryptography
191 Journal of Cryptology
181 Theoretical Computer Science
159 Information Processing Letters
149 Information Sciences
94 Discrete Applied Mathematics
79 Cryptography and Communications
70 Applied Mathematics and Computation
62 Journal of Discrete Mathematical Sciences & Cryptography
56 Finite Fields and their Applications
52 International Journal of Theoretical Physics
47 Quantum Information Processing
44 International Journal of Computer Mathematics
42 Journal of Computer and System Sciences
35 Computers & Mathematics with Applications
33 Journal of Mathematical Cryptology
32 Wuhan University Journal of Natural Sciences (WUJNS)
30 Information and Computation
30 Matematicheskie Voprosy Kriptografii
28 Applicable Algebra in Engineering, Communication and Computing
26 Discrete Mathematics
26 Advances in Mathematics of Communications
25 European Journal of Operational Research
24 Pattern Recognition
22 Mathematical Problems in Engineering
21 International Journal of Foundations of Computer Science
18 Prikladnaya Diskretnaya Matematika
17 SIAM Journal on Computing
17 Algorithmica
17 Science China. Information Sciences
16 Mathematics of Computation
15 Computing
15 Mathematical and Computer Modelling
14 Journal of Symbolic Computation
14 Journal of Systems Science and Complexity
14 International Journal of Quantum Information
13 Computational Complexity
13 Journal of Shanghai Jiaotong University (Science)
12 Distributed Computing
11 Cybernetics and Systems Analysis
11 Journal of Combinatorial Optimization
10 Artificial Intelligence
10 Computers & Operations Research
10 Annals of Operations Research
10 Science in China. Series F
10 Symmetry
9 Operations Research Letters
9 Journal of Computer Science and Technology
9 Journal of Applied Mathematics
9 Groups, Complexity, Cryptology
8 Chaos, Solitons and Fractals
8 Cryptologia
8 Journal of Parallel and Distributed Computing
8 Discrete Mathematics and Applications
8 Mathematical Programming. Series A. Series B
8 Soft Computing
7 Applied Mathematics Letters
7 Nonlinear Dynamics
6 Journal of Computational and Applied Mathematics
6 Journal of Number Theory
6 Journal of Complexity
6 SIAM Journal on Discrete Mathematics
6 International Journal of Modern Physics C
6 Electronic Commerce Research
6 Mathematical Biosciences and Engineering
6 Mathematics in Computer Science
6 Science China. Mathematics
6 Frontiers of Computer Science
5 The Mathematical Intelligencer
5 Journal of Algebra
5 Mathematical Systems Theory
5 Journal of Information & Optimization Sciences
5 New Generation Computing
5 Journal of Automated Reasoning
5 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
5 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
5 Journal of Mathematical Sciences (New York)
5 Annals of Mathematics and Artificial Intelligence
5 Theory of Computing Systems
5 Journal of Applied Mathematics and Computing
5 EURASIP Journal on Advances in Signal Processing
4 Problems of Information Transmission
4 Networks
4 Combinatorica
4 Acta Applicandae Mathematicae
4 Linear Algebra and its Applications
4 Tatra Mountains Mathematical Publications
4 Informatica (Vilnius)
4 Lobachevskii Journal of Mathematics
4
4 Journal of Discrete Algorithms
4 BIT. Nordisk Tidskrift for Informationsbehandling
4 Journal of Zhejiang University. Science A
4 Discrete Mathematics, Algorithms and Applications
4 Arabian Journal for Science and Engineering
3 IEEE Transactions on Information Theory
3 Reviews of Modern Physics
3 BIT
3 Journal of Soviet Mathematics
3 Software. Practice & Experience
...and 199 more Serials
all top 5

Cited in 48 Fields

2,642 Information and communication theory, circuits (94-XX)
1,147 Computer science (68-XX)
373 Number theory (11-XX)
229 Quantum theory (81-XX)
223 Combinatorics (05-XX)
162 Operations research, mathematical programming (90-XX)
84 Algebraic geometry (14-XX)
62 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
52 Numerical analysis (65-XX)
51 Mathematical logic and foundations (03-XX)
46 Order, lattices, ordered algebraic structures (06-XX)
40 Commutative algebra (13-XX)
39 Group theory and generalizations (20-XX)
34 Dynamical systems and ergodic theory (37-XX)
28 Field theory and polynomials (12-XX)
22 Linear and multilinear algebra; matrix theory (15-XX)
18 Probability theory and stochastic processes (60-XX)
14 Statistics (62-XX)
12 Geometry (51-XX)
9 Biology and other natural sciences (92-XX)
9 Systems theory; control (93-XX)
8 Associative rings and algebras (16-XX)
7 Statistical mechanics, structure of matter (82-XX)
6 Mathematics education (97-XX)
5 History and biography (01-XX)
4 General and overarching topics; collections (00-XX)
4 Real functions (26-XX)
4 Ordinary differential equations (34-XX)
4 Convex and discrete geometry (52-XX)
3 Partial differential equations (35-XX)
3 Harmonic analysis on Euclidean spaces (42-XX)
3 Abstract harmonic analysis (43-XX)
3 Mechanics of particles and systems (70-XX)
3 Relativity and gravitational theory (83-XX)
2 Special functions (33-XX)
2 Difference and functional equations (39-XX)
2 Approximations and expansions (41-XX)
2 Operator theory (47-XX)
2 Fluid mechanics (76-XX)
1 General algebraic systems (08-XX)
1 Nonassociative rings and algebras (17-XX)
1 Measure and integration (28-XX)
1 Sequences, series, summability (40-XX)
1 Functional analysis (46-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 Differential geometry (53-XX)
1 Manifolds and cell complexes (57-XX)
1 Classical thermodynamics, heat transfer (80-XX)

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.