


default search action
Adi Shamir
Person information
- affiliation: Weizmann Institute of Science, Rehovot, Israel
- award (2002): Turing Award
- award (2017): BBVA Foundation Frontiers of Knowledge Award
- award (1996): Paris Kanellakis Award
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i69]David Gérault, Anna Hambitzer, Eyal Ronen, Adi Shamir:
How to Securely Implement Cryptography in Deep Neural Networks. IACR Cryptol. ePrint Arch. 2025: 288 (2025) - 2024
- [j65]Carsten Baum
, Jens Berlips, Walther Chen, Ivan Bjerre Damgård
, Kevin M. Esvelt
, Leonard Foner, Dana Gretton
, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling
, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun
, Daniel Wichs, Stephen Wooster, Andrew C. Yao
, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Commun. Cryptol. 1(3): 10 (2024) - [j64]Orr Dunkelman
, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum time/memory/data tradeoff attacks. Des. Codes Cryptogr. 92(1): 159-177 (2024) - [j63]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack, with Application to Reduced-Round AES. J. Cryptol. 37(3): 32 (2024) - [c149]Isaac Andrés Canales Martinez
, Jorge Chávez-Saab
, Anna Hambitzer
, Francisco Rodríguez-Henríquez
, Nitin Satpute
, Adi Shamir
:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. EUROCRYPT (3) 2024: 3-33 - [c148]Odelia Melamed, Gilad Yehudai, Adi Shamir:
MALT Powers Up Adversarial Attacks. NeurIPS 2024 - [i68]Carsten Baum, Jens Berlips, Walther Chen, Hongrui Cui, Ivan Damgård, Jiangbin Dong, Kevin M. Esvelt, Mingyu Gao, Dana Gretton, Leonard Foner, Martin Kysel, Kaiyi Zhang, Juanru Li, Xiang Li, Omer Paneth, Ronald L. Rivest, Francesca Sage-Ling, Adi Shamir, Yue Shen, Meicen Sun
, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun
, Yun Wang, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu, Haoling Zhang:
A system capable of verifiably and privately screening global DNA synthesis. CoRR abs/2403.14023 (2024) - [i67]Odelia Melamed, Gilad Yehudai, Adi Shamir:
MALT Powers Up Adversarial Attacks. CoRR abs/2407.02240 (2024) - [i66]Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting. CoRR abs/2410.05750 (2024) - [i65]Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting. IACR Cryptol. ePrint Arch. 2024: 1580 (2024) - [i64]Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Cryptol. ePrint Arch. 2024: 1613 (2024) - 2023
- [c147]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [i63]Irad Zehavi, Adi Shamir:
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons. CoRR abs/2301.03118 (2023) - [i62]Adi Shamir, Isaac Andrés Canales Martinez, Anna Hambitzer, Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Nitin Satpute:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. CoRR abs/2310.08708 (2023) - [i61]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i60]Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2023: 1526 (2023) - 2022
- [c146]Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. USENIX Security Symposium 2022: 4401-4417 - 2021
- [j62]Raz Ben-Netanel, Ben Nassi
, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [c145]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c144]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c143]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c142]Orr Dunkelman, Zeev Geyzel, Chaya Keller
, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [i59]Adi Shamir, Odelia Melamed, Oriel BenShmuel:
The Dimpled Manifold Model of Adversarial Examples in Machine Learning. CoRR abs/2106.10151 (2021) - [i58]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i57]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j61]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j60]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod
, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c141]Orr Dunkelman
, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-similar Ciphers. EUROCRYPT (1) 2020: 250-279 - [c140]Orr Dunkelman
, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [i56]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i55]Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. IACR Cryptol. ePrint Arch. 2020: 708 (2020) - [i54]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020)
2010 – 2019
- 2019
- [j59]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [j58]Ben Nassi
, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2): 415-430 (2019) - [c139]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [c138]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Drones' Cryptanalysis - Smashing Cryptography with a Flicker. IEEE Symposium on Security and Privacy 2019: 1397-1414 - [i53]Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman:
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance. CoRR abs/1901.10861 (2019) - [i52]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. IACR Cryptol. ePrint Arch. 2019: 509 (2019) - [i51]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - 2018
- [j57]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a Zigbee Chain Reaction. IEEE Secur. Priv. 16(1): 54-62 (2018) - [c137]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c136]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c135]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod
, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i50]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Streamed POI from Encrypted FPV Channel. CoRR abs/1801.03074 (2018) - [i49]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i48]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i47]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - 2017
- [j56]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs. Algorithmica 79(4): 1196-1232 (2017) - [j55]Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. J. Cryptol. 30(2): 392-443 (2017) - [c134]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE Symposium on Security and Privacy 2017: 195-212 - [i46]Ben Nassi, Adi Shamir, Yuval Elovici:
Oops!...I think I scanned a malware. CoRR abs/1703.07751 (2017) - [i45]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - 2016
- [j54]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer
:
Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016) - [j53]Elena Andreeva
, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque
, Jonathan J. Hoch, John Kelsey
, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - [j52]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [j51]Eli Biham, Yaniv Carmeli, Adi Shamir:
Bug Attacks. J. Cryptol. 29(4): 775-805 (2016) - [c133]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c132]Eyal Ronen, Adi Shamir:
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. EuroS&P 2016: 3-12 - [i44]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - [i43]Eyal Ronen, Colin O'Flynn, Adi Shamir, Achi-Or Weingarten:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IACR Cryptol. ePrint Arch. 2016: 1047 (2016) - 2015
- [j50]Orr Dunkelman, Nathan Keller, Adi Shamir:
Almost universal forgery attacks on AES-based MAC's. Des. Codes Cryptogr. 76(3): 431-449 (2015) - [j49]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [j48]Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. J. Cryptol. 28(1): 1-28 (2015) - [j47]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. J. Cryptol. 28(2): 209-239 (2015) - [j46]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. J. Cryptol. 28(3): 397-422 (2015) - [c131]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c130]Itai Dinur, Orr Dunkelman
, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. LATINCRYPT 2015: 139-156 - [i42]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - [i41]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 268 (2015) - 2014
- [j45]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j44]Itai Dinur, Orr Dunkelman
, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. J. Cryptol. 27(2): 183-209 (2014) - [j43]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. J. Cryptol. 27(4): 824-849 (2014) - [c129]Itai Dinur, Orr Dunkelman
, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c128]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs. CRYPTO (2) 2014: 37-54 - [c127]Daniel Genkin, Adi Shamir, Eran Tromer
:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461 - [c126]Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? Financial Cryptography Workshops 2014: 3-15 - [c125]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [c124]Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. INDOCRYPT 2014: 219-236 - [i40]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs. IACR Cryptol. ePrint Arch. 2014: 167 (2014) - [i39]Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. IACR Cryptol. ePrint Arch. 2014: 417 (2014) - [i38]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on Slide with a Twist Attacks. IACR Cryptol. ePrint Arch. 2014: 847 (2014) - 2013
- [c123]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. ASIACRYPT (1) 2013: 337-356 - [c122]Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. Financial Cryptography 2013: 6-24 - [c121]Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013: 219-240 - [i37]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. IACR Cryptol. ePrint Arch. 2013: 391 (2013) - [i36]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. IACR Cryptol. ePrint Arch. 2013: 634 (2013) - [i35]Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. IACR Cryptol. ePrint Arch. 2013: 674 (2013) - [i34]Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? IACR Cryptol. ePrint Arch. 2013: 782 (2013) - [i33]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 857 (2013) - 2012
- [j42]Itai Dinur, Adi Shamir:
Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3-4): 217-232 (2012) - [c120]Vint Cerf, John E. Hopcroft, Robert E. Kahn, Ronald L. Rivest, Adi Shamir:
Information, Data, Security in a Networked Future. ACM-TURING 2012: 14:1 - [c119]Itai Dinur, Orr Dunkelman
, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. CRYPTO 2012: 719-740 - [c118]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. EUROCRYPT 2012: 336-354 - [c117]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. FSE 2012: 9-28 - [c116]Itai Dinur, Orr Dunkelman, Adi Shamir:
New Attacks on Keccak-224 and Keccak-256. FSE 2012: 442-461 - [i32]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. IACR Cryptol. ePrint Arch. 2012: 217 (2012) - [i31]Adi Shamir, Eldad Zinger:
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. IACR Cryptol. ePrint Arch. 2012: 339 (2012) - [i30]Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. IACR Cryptol. ePrint Arch. 2012: 584 (2012) - [i29]Itai Dinur, Orr Dunkelman, Adi Shamir:
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3. IACR Cryptol. ePrint Arch. 2012: 672 (2012) - 2011
- [j41]Shlomi Dolev
, Marina Kopeetsky, Adi Shamir:
RFID Authentication Efficient Proactive Information Security within Computational Security. Theory Comput. Syst. 48(1): 132-149 (2011) - [c115]Itai Dinur, Tim Güneysu
, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. ASIACRYPT 2011: 327-343 - [c114]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. FSE 2011: 88-106 - [c113]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. FSE 2011: 167-187 - [r2]Adi Shamir, Eran Tromer:
TWIRL. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1338-1339 - [i28]Orr Dunkelman, Nathan Keller, Adi Shamir:
ALRED Blues: New Attacks on AES-Based MAC's. IACR Cryptol. ePrint Arch. 2011: 95 (2011) - [i27]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2011: 282 (2011) - [i26]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Data-Efficient Attacks on Reduced-Round IDEA. IACR Cryptol. ePrint Arch. 2011: 417 (2011) - [i25]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. IACR Cryptol. ePrint Arch. 2011: 541 (2011) - [i24]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. IACR Cryptol. ePrint Arch. 2011: 558 (2011) - [i23]Itai Dinur, Orr Dunkelman, Adi Shamir:
New attacks on Keccak-224 and Keccak-256. IACR Cryptol. ePrint Arch. 2011: 624 (2011) - 2010
- [j40]Eran Tromer
, Dag Arne Osvik, Adi Shamir:
Efficient Cache Attacks on AES, and Countermeasures. J. Cryptol. 23(1): 37-71 (2010) - [j39]Alex Biryukov
, Adi Shamir:
Structural Cryptanalysis of SASAS. J. Cryptol. 23(4): 505-518 (2010) - [j38]Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Comparative Power Analysis of Modular Exponentiation Algorithms. IEEE Trans. Computers 59(6): 795-807 (2010) - [c112]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. ASIACRYPT 2010: 158-176 - [c111]Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou
, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. CHES 2010: 203-218 - [c110]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. CRYPTO 2010: 393-410 - [c109]Alex Biryukov
, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [c108]Itai Dinur, Adi Shamir:
Generic Analysis of Small Cryptographic Leaks. FDTC 2010: 39-48 - [i22]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. IACR Cryptol. ePrint Arch. 2010: 13 (2010) - [i21]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. IACR Cryptol. ePrint Arch. 2010: 313 (2010) - [i20]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-round AES. IACR Cryptol. ePrint Arch. 2010: 322 (2010) - [i19]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. IACR Cryptol. ePrint Arch. 2010: 570 (2010) - [i18]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 602 (2010)
2000 – 2009
- 2009
- [c107]Itai Dinur, Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials. EUROCRYPT 2009: 278-299 - [c106]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. FSE 2009: 1-22 - [i17]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. Symmetric Cryptography 2009 - [i16]Shlomi Dolev, Marina Kopeetsky, Adi Shamir:
RFID Authentication, Efficient Proactive Information Security within Computational Security. CoRR abs/0903.5177 (2009) - [i15]Dmitry Frumkin, Adi Shamir:
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. IACR Cryptol. ePrint Arch. 2009: 44 (2009) - [i14]Itai Dinur, Adi Shamir:
Side Channel Cube Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2009: 127 (2009) - [i13]Jean-Philippe Aumasson, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir:
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128. IACR Cryptol. ePrint Arch. 2009: 218 (2009) - [i12]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds. IACR Cryptol. ePrint Arch. 2009: 374 (2009) - 2008
- [j37]Raphael Chung-Wei Phan
, Adi Shamir:
Improved Related-key Attacks on Desx and Desx+. Cryptologia 32(1): 13-22 (2008) - [c105]Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. CHES 2008: 15-29 - [c104]Adi Shamir:
RSA-Past, Present, Future. CHES 2008: 443 - [c103]Eli Biham, Yaniv Carmeli, Adi Shamir:
Bug Attacks. CRYPTO 2008: 221-240 - [c102]Elena Andreeva
, Charles Bouillaguet, Pierre-Alain Fouque
, Jonathan J. Hoch, John Kelsey
, Adi Shamir, Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions. EUROCRYPT 2008: 270-288 - [c101]Adi Shamir:
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. FSE 2008: 144-157 - [c100]Jonathan J. Hoch, Adi Shamir:
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. ICALP (2) 2008: 616-630 - [i11]Jonathan J. Hoch, Adi Shamir:
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak. IACR Cryptol. ePrint Arch. 2008: 75 (2008) - [i10]Itai Dinur, Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials. IACR Cryptol. ePrint Arch. 2008: 385 (2008) - 2007
- [j36]Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Length-based cryptanalysis: the case of Thompson's group. J. Math. Cryptol. 1(4): 359-372 (2007) - [j35]Yossef Oren
, Adi Shamir:
Remote Password Extraction from RFID Tags. IEEE Trans. Computers 56(9): 1292-1296 (2007) - [c99]Vivien Dubois, Pierre-Alain Fouque
, Adi Shamir, Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme. Inscrypt 2007: 1-4 - [c98]Vivien Dubois, Pierre-Alain Fouque
, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. CRYPTO 2007: 1-12 - [c97]Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. Public Key Cryptography 2007: 61-75 - [i9]Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. CoRR abs/0705.2862 (2007) - [i8]Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern:
Practical Cryptanalysis of SFLASH. IACR Cryptol. ePrint Arch. 2007: 141 (2007) - [i7]Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions. IACR Cryptol. ePrint Arch. 2007: 395 (2007) - 2006
- [c96]Ronald L. Rivest, Adi Shamir, Yael Tauman:
How to Leak a Secret: Theory and Applications of Ring Signatures. Essays in Memory of Shimon Even 2006: 164-186 - [c95]Elad Barkan, Eli Biham, Adi Shamir:
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21 - [c94]Dag Arne Osvik, Adi Shamir, Eran Tromer
:
Cache Attacks and Countermeasures: The Case of AES. CT-RSA 2006: 1-20 - [c93]Jonathan J. Hoch, Adi Shamir:
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. FSE 2006: 179-194 - [i6]Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Length-based cryptanalysis: The case of Thompson's Group. CoRR abs/cs/0607079 (2006) - [i5]Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Length-based cryptanalysis: The case of Thompson's Group. IACR Cryptol. ePrint Arch. 2006: 244 (2006) - 2005
- [j34]Eli Biham, Alex Biryukov
, Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptol. 18(4): 291-311 (2005) - [c92]Willi Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer
:
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. CHES 2005: 131-146 - [c91]Alexander Klimov, Adi Shamir:
New Applications of T-Functions in Block Ciphers and Hash Functions. FSE 2005: 18-31 - [c90]Alex Biryukov
, Adi Shamir:
Analysis of the Non-linear Part of Mugi. FSE 2005: 320-329 - [r1]Adi Shamir, Eran Tromer
:
TWIRL. Encyclopedia of Cryptography and Security 2005 - [i4]Dag Arne Osvik, Adi Shamir, Eran Tromer:
Cache attacks and Countermeasures: the Case of AES. IACR Cryptol. ePrint Arch. 2005: 271 (2005) - 2004
- [c89]Adi Shamir:
Stream Ciphers: Dead or Alive? ASIACRYPT 2004: 78 - [c88]Jonathan J. Hoch, Adi Shamir:
Fault Analysis of Stream Ciphers. CHES 2004: 240-253 - [c87]Alexander Klimov, Adi Shamir:
New Cryptographic Primitives Based on Multiword T-Functions. FSE 2004: 1-15 - 2003
- [c86]Arjen K. Lenstra, Eran Tromer
, Adi Shamir, Wil Kortsmit, Bruce Dodson, James P. Hughes, Paul C. Leyland:
Factoring Estimates for a 1024-Bit RSA Modulus. ASIACRYPT 2003: 55-74 - [c85]Adi Shamir, Eran Tromer:
Factoring Large Number with the TWIRL Device. CRYPTO 2003: 1-26 - [c84]Adi Shamir:
RSA Shortcuts. CT-RSA 2003: 327 - [c83]Alexander Klimov, Adi Shamir:
Cryptographic Applications of T-Functions. Selected Areas in Cryptography 2003: 248-261 - [i3]Adi Shamir, Boaz Tsaban:
Guaranteeing the diversity of number generators. IACR Cryptol. ePrint Arch. 2003: 132 (2003) - 2002
- [c82]Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer
:
Analysis of Bernstein's Factorization Circuit. ASIACRYPT 2002: 1-26 - [c81]Alexander Klimov, Anton Mityagin, Adi Shamir:
Analysis of Neural Cryptography. ASIACRYPT 2002: 288-298 - [c80]Alexander Klimov, Adi Shamir:
A New Class of Invertible Mappings. CHES 2002: 470-483 - [c79]Dani Halevy, Adi Shamir:
The LSD Broadcast Encryption Scheme. CRYPTO 2002: 47-60 - 2001
- [j33]Adi Shamir, Boaz Tsaban:
Guaranteeing the Diversity of Number Generators. Inf. Comput. 171(2): 350-363 (2001) - [c78]Ronald L. Rivest, Adi Shamir, Yael Tauman:
How to Leak a Secret. ASIACRYPT 2001: 552-565 - [c77]Adi Shamir:
New Directions in Croptography. CHES 2001: 159 - [c76]Adi Shamir, Yael Tauman:
Improved Online/Offline Signature Schemes. CRYPTO 2001: 355-367 - [c75]Alex Biryukov
, Adi Shamir:
Structural Cryptanalysis of SASAS. EUROCRYPT 2001: 394-405 - [c74]Adi Shamir:
SecureClick: A Web Payment System with Disposable Credit Card Numbers. Financial Cryptography 2001: 223-233 - [c73]Itsik Mantin, Adi Shamir:
A Practical Attack on Broadcast RC4. FSE 2001: 152-164 - [c72]Scott R. Fluhrer, Itsik Mantin, Adi Shamir:
Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography 2001: 1-24 - [i2]Adi Shamir, Boaz Tsaban:
Guaranteeing the diversity of number generators. CoRR cs.CR/0112014 (2001) - 2000
- [c71]Alex Biryukov, Adi Shamir:
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. ASIACRYPT 2000: 1-13 - [c70]Adi Shamir:
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. CHES 2000: 71-77 - [c69]Arjen K. Lenstra, Adi Shamir:
Analysis and Optimization of the TWINKLE Factoring Device. EUROCRYPT 2000: 35-52 - [c68]Nicolas T. Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir:
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. EUROCRYPT 2000: 392-407 - [c67]Alex Biryukov, Adi Shamir, David A. Wagner:
Real Time Cryptanalysis of A5/1 on a PC. FSE 2000: 1-18
1990 – 1999
- 1999
- [j32]Uriel Feige, Dror Lapidot, Adi Shamir:
Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions. SIAM J. Comput. 29(1): 1-28 (1999) - [c66]Adi Shamir:
Factoring Large Numbers with the Twinkle Device (Extended Abstract). CHES 1999: 2-12 - [c65]Aviad Kipnis, Adi Shamir:
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. CRYPTO 1999: 19-30 - [c64]Eli Biham, Alex Biryukov
, Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23 - [c63]Adi Shamir, Nicko van Someren:
Playing "Hide and Seek" with Stored Keys. Financial Cryptography 1999: 118-124 - [c62]Eli Biham, Alex Biryukov
, Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138 - [c61]David Naccache, Adi Shamir, Julien P. Stern:
How to Copyright a Function? Public Key Cryptography 1999: 188-196 - 1998
- [c60]Aviad Kipnis, Adi Shamir:
Cryptanalysis of the Oil & Vinegar Signature Scheme. CRYPTO 1998: 257-266 - [c59]Adi Shamir:
Visual Cryptanalysis. EUROCRYPT 1998: 201-210 - [c58]Ross J. Anderson, Roger M. Needham, Adi Shamir:
The Steganographic File System. Information Hiding 1998: 73-82 - [c57]Eli Biham, Alex Biryukov, Orr Dunkelman
, Eran Richardson, Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376 - 1997
- [j31]Dror Lapidot, Adi Shamir:
Fully Parallelized Multi-Prover Protocols for NEXP-Time. J. Comput. Syst. Sci. 54(2): 215-220 (1997) - [c56]Eli Biham, Adi Shamir:
Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997: 513-525 - [c55]Don Coppersmith, Adi Shamir:
Lattice Attacks on NTRU. EUROCRYPT 1997: 52-61 - 1996
- [c54]Ronald L. Rivest, Adi Shamir:
PayWord and MicroMint: Two Simple Micropayment Schemes. Security Protocols Workshop 1996: 69-87 - [c53]Moni Naor, Adi Shamir:
Visual Cryptography II: Improving the Contrast Via the Cover Base. Security Protocols Workshop 1996: 197-202 - [i1]Moni Naor, Adi Shamir:
Visual Cryptography II: Improving the Contrast Via the Cover Base. IACR Cryptol. ePrint Arch. 1996: 7 (1996) - 1995
- [j30]Dror Lapidot, Adi Shamir:
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. Comb. 15(2): 204-214 (1995) - 1994
- [c52]Moni Naor, Adi Shamir:
Visual Cryptography. EUROCRYPT 1994: 1-12 - [c51]Adi Shamir:
Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. EUROCRYPT 1994: 445-449 - 1993
- [b1]Eli Biham, Adi Shamir:
Differential Cryptanalysis of the Data Encryption Standard. Springer 1993, ISBN 978-1-4613-9316-0, pp. I-IX, 1-188 - [j29]David Feldman, Russell Impagliazzo
, Moni Naor, Noam Nisan, Steven Rudich, Adi Shamir:
On Dice and Coins: Models of Computation for Random Generation. Inf. Comput. 104(2): 159-174 (1993) - [j28]Johan Håstad
, A. W. Schrift, Adi Shamir:
The Discrete Logarithm Modulo a Composite Hides O(n) Bits. J. Comput. Syst. Sci. 47(3): 376-404 (1993) - [j27]A. W. Schrift, Adi Shamir:
Universal Tests for Nonuniform Distributions. J. Cryptol. 6(3): 119-133 (1993) - [c50]Adi Shamir:
Efficient Signature Schemes Based on Birational Permutations. CRYPTO 1993: 1-12 - [c49]Adi Shamir:
Practical Cryptography - Recent Trends and Results. ISTCS 1993: 127 - [c48]Adi Shamir:
On the generation of multivariate polynomials which are hard to factor. STOC 1993: 796-804 - 1992
- [j26]Adi Shamir:
IP = PSPACE. J. ACM 39(4): 869-877 (1992) - [j25]Uriel Feige, Adi Shamir:
Multi-Oracle Interactive Protocols with Constant Space Verifiers. J. Comput. Syst. Sci. 44(2): 259-271 (1992) - [c47]Eli Biham, Adi Shamir:
Differential Cryptanalysis of the Full 16-Round DES. CRYPTO 1992: 487-496 - 1991
- [j24]Eli Biham, Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptol. 4(1): 3-72 (1991) - [c46]Eli Biham, Adi Shamir:
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. CRYPTO 1991: 156-171 - [c45]Dror Lapidot, Adi Shamir:
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. CRYPTO 1991: 213-224 - [c44]Eli Biham, Adi Shamir:
Differential Cryptanalysis of Feal and N-Hash. EUROCRYPT 1991: 1-16 - [c43]Dror Lapidot, Adi Shamir:
Fully Parallelized Multi Prover Protocols for NEXP-Time (Extended Abstract). FOCS 1991: 13-18 - 1990
- [c42]Eli Biham, Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems. CRYPTO 1990: 2-21 - [c41]Dror Lapidot, Adi Shamir:
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs. CRYPTO 1990: 353-365 - [c40]A. W. Schrift, Adi Shamir:
On the Universality of the Next Bit Test. CRYPTO 1990: 394-408 - [c39]Adi Shamir:
IP=PSPACE. FOCS 1990: 11-15 - [c38]Uriel Feige, Dror Lapidot, Adi Shamir:
Multiple Non-Interactive Zero Knowledge Proofs Based on a Single Random String (Extended Abstract). FOCS 1990: 308-317 - [c37]A. W. Schrift, Adi Shamir:
The Discrete Log is Very Discreet. STOC 1990: 405-415 - [c36]Uriel Feige, Adi Shamir:
Witness Indistinguishable and Witness Hiding Protocols. STOC 1990: 416-426
1980 – 1989
- 1989
- [j23]Amos Fiat, Adi Shamir:
How to find a battleship. Networks 19(3): 361-371 (1989) - [c35]Uriel Feige, Adi Shamir:
Multi-Oracle Interactive Protocols with Space Bounded Verifiers. SCT 1989: 158-164 - [c34]Uriel Feige, Adi Shamir:
Zero Knowledge Proofs of Knowledge in Two Rounds. CRYPTO 1989: 526-544 - [c33]Adi Shamir:
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). CRYPTO 1989: 606-609 - [c32]Uriel Feige, Adi Shamir:
On Expected Polynomial Time Simulation of Zero Knowledge Protocols. Distributed Computing And Cryptography 1989: 155-160 - [c31]Amos Fiat, Shahar Moses, Adi Shamir, Ilan Shimshoni
, Gábor Tardos
:
Planning and Learning in Permutation Groups. FOCS 1989: 274-279 - [c30]David Feldman, Russell Impagliazzo
, Moni Naor, Noam Nisan, Steven Rudich, Adi Shamir:
On Dice and Coins: Models of Computation for Random Generation. ICALP 1989: 319-340 - 1988
- [j22]Uriel Feige, Amos Fiat, Adi Shamir:
Zero-Knowledge Proofs of Identity. J. Cryptol. 1(2): 77-94 (1988) - [j21]Alan M. Frieze
, Johan Håstad
, Ravi Kannan, J. C. Lagarias, Adi Shamir:
Reconstructing Truncated Integer Variables Satisfying Linear Congruences. SIAM J. Comput. 17(2): 262-280 (1988) - [c29]Silvio Micali, Adi Shamir:
An Improvement of the Fiat-Shamir Identification and Signature Scheme. CRYPTO 1988: 244-247 - [c28]Uriel Feige, Adi Shamir, Moshe Tennenholtz:
The Noisy Oracle Problem. CRYPTO 1988: 284-296 - 1987
- [c27]Yossi Matias, Adi Shamir:
A Video Scrambling Technique Based On Space Filling Curves. CRYPTO 1987: 398-417 - [c26]Uriel Feige, Amos Fiat, Adi Shamir:
Zero Knowledge Proofs of Identity. STOC 1987: 210-217 - 1986
- [j20]Amos Fiat, Adi Shamir:
Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers. J. Comput. Syst. Sci. 33(1): 47-65 (1986) - [c25]Amos Fiat, Adi Shamir:
How to Prove Yourself: Practical Solutions to Identification and Signature Problems. CRYPTO 1986: 186-194 - [c24]Sandeep Sen, Isaac D. Scherson, Adi Shamir:
Shear Sort: A True Two-Dimensional Sorting Techniques for VLSI Networks. ICPP 1986: 903-908 - [c23]Claus-Peter Schnorr, Adi Shamir:
An Optimal Sorting Algorithm for Mesh Connected Computers. STOC 1986: 255-263 - 1985
- [j19]Jeffrey O. Shallit, Adi Shamir:
Number-Theoretic Functions Which Are Equivalent to Number of Divisors. Inf. Process. Lett. 20(3): 151-153 (1985) - [c22]Shimon Even, Oded Goldreich
, Adi Shamir:
On the Security of Ping-Pong Protocols when Implemented using the RSA. CRYPTO 1985: 58-72 - [c21]Adi Shamir:
On the Security of DES. CRYPTO 1985: 280-281 - [c20]Ronald L. Rivest, Adi Shamir:
Efficient Factoring Based on Partial Information. EUROCRYPT 1985: 31-34 - [c19]Amos Fiat, Adi Shamir, Ehud Shapiro:
Polymorphic Arrays: An Architecture for a Programmable Systolic Machine. ICPP 1985: 112-117 - [c18]Johan Håstad, Adi Shamir:
The Cryptographic Security of Truncated Linearly Related Variables. STOC 1985: 356-362 - 1984
- [j18]Ronald L. Rivest, Adi Shamir:
How to Expose an Eavesdropper. Commun. ACM 27(4): 393-395 (1984) - [j17]Adi Shamir, Claus-Peter Schnorr:
Cryptanalysis of Certain Variants of Rabin's Signature Scheme. Inf. Process. Lett. 19(3): 113-115 (1984) - [j16]Amos Fiat, Adi Shamir:
Generalized 'write-once' memories. IEEE Trans. Inf. Theory 30(3): 470-479 (1984) - [j15]Adi Shamir:
A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Trans. Inf. Theory 30(5): 699-704 (1984) - [c17]H. Ong, Claus-Peter Schnorr, Adi Shamir:
Efficient Signature Schemes Based on Polynomial Equations. CRYPTO 1984: 37-46 - [c16]Adi Shamir:
Identity-Based Cryptosystems and Signature Schemes. CRYPTO 1984: 47-53 - [c15]Amos Fiat, Adi Shamir:
Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers. FOCS 1984: 37-45 - [c14]H. Ong, Claus-Peter Schnorr, Adi Shamir:
An Efficient Signature Scheme Based on Quadratic Equations. STOC 1984: 208-216 - 1983
- [j14]Ronald L. Rivest, Adi Shamir, Leonard M. Adleman:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). Commun. ACM 26(1): 96-99 (1983) - [j13]Adi Shamir:
Embedding Cryptographic Trapdoors in Arbitrary Knapsack Systems. Inf. Process. Lett. 17(2): 77-79 (1983) - [j12]Adi Shamir:
On the Generation of Cryptographically Strong Pseudorandom Sequences. ACM Trans. Comput. Syst. 1(1): 38-44 (1983) - [c13]Michael Ben-Or, Benny Chor, Adi Shamir:
On the Cryptographic Security of Single RSA Bits. STOC 1983: 421-430 - 1982
- [j11]Ronald L. Rivest, Adi Shamir:
How to Reuse a "Write-Once" Memory. Inf. Control. 55(1-3): 1-19 (1982) - [c12]Adi Shamir:
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem. CRYPTO 1982: 279-288 - [c11]Adi Shamir:
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem. FOCS 1982: 145-152 - [c10]Ronald L. Rivest, Adi Shamir:
How to Reuse a "Write-Once" Memory (Preliminary Version). STOC 1982: 105-113 - 1981
- [j10]Richard Schroeppel, Adi Shamir:
A T=O(2n/2), S=O(2n/4) Algorithm for Certain NP-Complete Problems. SIAM J. Comput. 10(3): 456-464 (1981) - [c9]Adi Shamir:
The Generation of Cryptographically Strong Pseudo-Random Sequences. CRYPTO 1981: 1 - [c8]Adi Shamir:
On the Generation of Cryptographically Strong Pseudo-Random Sequences. ICALP 1981: 544-550 - 1980
- [j9]Adi Shamir, Richard Zippel:
On the security of the Merkle- Hellman cryptographic scheme (Corresp.). IEEE Trans. Inf. Theory 26(3): 339-340 (1980) - [c7]Adi Shamir:
On the Power of Commutativity in Cryptography. ICALP 1980: 582-595 - [c6]Adi Shamir:
The Cryptographic Security of Compact Knapsacks (Preliminary Report). S&P 1980: 94-99
1970 – 1979
- 1979
- [j8]Adi Shamir:
How to Share a Secret. Commun. ACM 22(11): 612-613 (1979) - [j7]Adi Shamir:
Factoring Numbers in O(log n) Arithmetic Steps. Inf. Process. Lett. 8(1): 28-31 (1979) - [j6]Adi Shamir:
A Linear Time Algorithm for Finding Minimum Cutsets in Reducible Graphs. SIAM J. Comput. 8(4): 645-655 (1979) - [c5]Richard Schroeppel, Adi Shamir:
A T S^2 = O(2^n) Time/Space Tradeoff for Certain NP-Complete Problems. FOCS 1979: 328-336 - [c4]Adi Shamir:
On the Cryptocomplexity of Knapsack Systems. STOC 1979: 118-129 - 1978
- [j5]Ronald L. Rivest, Adi Shamir, Leonard M. Adleman:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21(2): 120-126 (1978) - [j4]Zohar Manna, Adi Shamir:
The Convergence of Functions to Fixedpoints of Recursive Definitions. Theor. Comput. Sci. 6: 109-141 (1978) - 1977
- [j3]Zohar Manna, Adi Shamir:
The Optimal Approach to Recursive Programs. Commun. ACM 20(11): 824-831 (1977) - [c3]Adi Shamir, William W. Wadge:
Data Types as Objects. ICALP 1977: 465-479 - 1976
- [j2]Zohar Manna, Adi Shamir:
The Theoretical Aspects of the Optimal Fixed Point. SIAM J. Comput. 5(3): 414-426 (1976) - [j1]Shimon Even, Alon Itai, Adi Shamir:
On the Complexity of Timetable and Multicommodity Flow Problems. SIAM J. Comput. 5(4): 691-703 (1976) - 1975
- [c2]Shimon Even, Alon Itai, Adi Shamir:
On the Complexity of Timetable and Multi-Commodity Flow Problems. FOCS 1975: 184-193 - [c1]Zohar Manna, Adi Shamir:
The Optimal Fixedpoint of Recursive Programs. STOC 1975: 194-206
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 01:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint