Cryptographers' World
 

Adi Shamir


Author's Web Page Link

79 papers in database with 25384 citations StarStarStarStarStarStar

H-number: 44

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Eli Biham,  Alex Biryukov,  Adi Shamir,  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, Journal of Cryptology, Volume 18(4), pp. 291 - 311, Springer, 2005.

[Cited 156 times Red StarRed Star]

2. A. W. Schrift,  Adi Shamir,  Universal Tests for Nonuniform Distributions, Journal of Cryptology, Volume 6(3), pp. 119 - 133, Springer, 1993.

[Cited 5 times ]

3. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology, Volume 4(1), pp. 3 - 72, Springer, 1991.

[Cited 927 times Red StarRed StarRed StarRed Star]

4. Uriel Feige,  Amos Fiat,  Adi Shamir,  Zero-Knowledge Proofs of Identity, Journal of Cryptology, Volume 1(2), pp. 77 - 94, Springer, 1988.

[Cited 694 times Red StarRed StarRed StarRed Star]

5. Adi Shamir,  A Polynomial-Time Algorithm for Breaking the Basic Merkle - Hellman Cryptosystem, IEEE Transactions on Information Theory, Volume 30(5), pp. 699 - 704, IEEE Information Theory Society, 1984.

[Cited 223 times Red StarRed Star]

6. Adi Shamir,  How to Share a Secret, Communications of the ACM, Volume 22(11), pp. 612 - 613, Association for Computing Machinery, 1979.

[Cited 3672 times Red StarRed StarRed StarRed StarRed StarRed Star]

7. Ronald L. Rivest,  Adi Shamir,  Leonard M. Adleman,  A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Volume 21(2), pp. 120 - 126, Association for Computing Machinery, 1978.

[Cited 7536 times Red StarRed StarRed StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Itai Dinur,  Adi Shamir,  Cube Attacks on Tweakable Black Box Polynomials, pp. 278 - 299, EUROCRYPT 2009.

[Electronic Edition][Cited 77 times Red Star]

2. Jean-Philippe Aumasson,  Itai Dinur,  Willi Meier,  Adi Shamir,  Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium, pp. 1 - 22, FSE 2009.

[Electronic Edition][Cited 33 times ]

3. Adi Shamir,  RSA-Past, Present, Future, pp. 443 - 443, CHES 2008.

[Electronic Edition][No citation]

4. Naofumi Homma,  Atsushi Miyamoto,  Takafumi Aoki,  Akashi Satoh,  Adi Shamir,  Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs, pp. 15 - 29, CHES 2008.

[Electronic Edition][Cited 7 times ]

5. Eli Biham,  Yaniv Carmeli,  Adi Shamir,  Bug Attacks, pp. 221 - 240, CRYPTO 2008.

[Electronic Edition][Cited 7 times ]

6. Elena Andreeva,  Charles Bouillaguet,  Pierre-Alain Fouque,  Jonathan J. Hoch,  John Kelsey,  Adi Shamir,  Sébastien Zimmer,  Second Preimage Attacks on Dithered Hash Functions, pp. 270 - 288, EUROCRYPT 2008.

[Electronic Edition][Cited 33 times ]

7. Adi Shamir,  SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags, pp. 144 - 157, FSE 2008.

[Electronic Edition][Cited 49 times ]

8. Vivien Dubois,  Pierre-Alain Fouque,  Adi Shamir,  Jacques Stern,  Practical Cryptanalysis of SFLASH, pp. 1 - 12, CRYPTO 2007.

[Electronic Edition][Cited 47 times ]

9. Dima Ruinskiy,  Adi Shamir,  Boaz Tsaban,  Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions, pp. 61 - 75, PKC 2007.

[Electronic Edition][Cited 10 times ]

10. Jonathan J. Hoch,  Adi Shamir,  Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions, pp. 179 - 194, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 29 times ]

11. Dag Arne Osvik,  Adi Shamir,  Eran Tromer,  Cache Attacks and Countermeasures: The Case of AES, pp. 1 - 20, CT-RSA 2006.

[Electronic Edition][Cited 193 times Red StarRed Star]

12. Elad Barkan,  Eli Biham,  Adi Shamir,  Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs, pp. 1 - 21, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

13. Willi Geiselmann,  Adi Shamir,  Rainer Steinwandt,  Eran Tromer,  Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization, pp. 131 - 146, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

14. Alex Biryukov,  Adi Shamir,  Analysis of the Non-linear Part of Mugi, pp. 320 - 329, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

15. Alexander Klimov,  Adi Shamir,  New Applications of T-Functions in Block Ciphers and Hash Functions, pp. 18 - 31, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

16. Adi Shamir,  Stream Ciphers: Dead or Alive?, pp. 78 - 78, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

17. Jonathan J. Hoch,  Adi Shamir,  Fault Analysis of Stream Ciphers, pp. 240 - 253, CHES 2004.

[Electronic Edition][Cited 57 times Red Star]

18. Alexander Klimov,  Adi Shamir,  New Cryptographic Primitives Based on Multiword T-Functions, pp. 1 - 15, FSE 2004.

[Electronic Edition][Cited 55 times Red Star]

19. Arjen K. Lenstra,  Eran Tromer,  Adi Shamir,  Wil Kortsmit,  Bruce Dodson,  James Hughes,  Paul C. Leyland,  Factoring Estimates for a 1024-Bit RSA Modulus, pp. 55 - 74, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 43 times ]

20. Adi Shamir,  Eran Tromer,  Factoring Large Numbers with the TWIRL Device, pp. 1 - 26, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

21. Alexander Klimov,  Adi Shamir,  Cryptographic Applications of T-Functions, pp. 248 - 261, SAC 2003.

[Electronic Edition][Cited 75 times Red Star]

22. Adi Shamir,  RSA Shortcuts, pp. 327 - 327, CT-RSA 2003.

[Electronic Edition][Cited 1 times ]

23. Alexander Klimov,  Anton Mityagin,  Adi Shamir,  Analysis of Neural Cryptography, pp. 288 - 298, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 34 times ]

24. Arjen K. Lenstra,  Adi Shamir,  Jim Tomlinson,  Eran Tromer,  Analysis of Bernstein's Factorization Circuit, pp. 1 - 26, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

25. Dani Halevy,  Adi Shamir,  The LSD Broadcast Encryption Scheme, pp. 47 - 60, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 265 times Red StarRed StarRed Star]

26. Alexander Klimov,  Adi Shamir,  A New Class of Invertible Mappings, pp. 470 - 483, CHES 2002.

[Electronic Edition][Cited 86 times Red Star]

27. Ronald L. Rivest,  Adi Shamir,  Yael Tauman,  How to Leak a Secret, pp. 552 - 565, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 601 times Red StarRed StarRed StarRed Star]

28. Adi Shamir,  Yael Tauman,  Improved Online/Offline Signature Schemes, pp. 355 - 367, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 168 times Red StarRed Star]

29. Scott R. Fluhrer,  Itsik Mantin,  Adi Shamir,  Weaknesses in the Key Scheduling Algorithm of RC4, pp. 1 - 24, SAC 2001.

[Electronic Edition][Cited 830 times Red StarRed StarRed StarRed Star]

30. Adi Shamir,  New Directions in Croptography, pp. 159 - 159, CHES 2001.

[Electronic Edition][No citation]

31. Alex Biryukov,  Adi Shamir,  Structural Cryptanalysis of SASAS, pp. 394 - 405, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

32. Itsik Mantin,  Adi Shamir,  A Practical Attack on Broadcast RC4, pp. 152 - 164, FSE 2001.

[Electronic Edition][Cited 133 times Red StarRed Star]

33. Adi Shamir,  SecureClick: A Web Payment System with Disposable Credit Card Numbers, pp. 223 - 233, FC 2001.

[Electronic Edition][Cited 29 times ]

34. Alex Biryukov,  Adi Shamir,  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, pp. 1 - 13, ASIACRYPT 2000.

[Electronic Edition][Cited 176 times Red StarRed Star]

35. Arjen K. Lenstra,  Adi Shamir,  Analysis and Optimization of the TWINKLE Factoring Device, pp. 35 - 52, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

36. Nicolas Courtois,  Alexander Klimov,  Jacques Patarin,  Adi Shamir,  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, pp. 392 - 407, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 340 times Red StarRed StarRed Star]

37. Alex Biryukov,  Adi Shamir,  David Wagner,  Real Time Cryptanalysis of A5/1 on a PC, pp. 1 - 18, FSE 2000.

[Electronic Edition][Cited 254 times Red StarRed StarRed Star]

38. Adi Shamir,  Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, pp. 71 - 77, CHES 2000.

[Electronic Edition][Cited 118 times Red StarRed Star]

39. Aviad Kipnis,  Adi Shamir,  Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization, pp. 19 - 30, CRYPTO 1999.

[Electronic Edition][Cited 189 times Red StarRed Star]

40. Adi Shamir,  Factoring Large Numbers with the Twinkle Device (Extended Abstract), pp. 2 - 12, CHES 1999.

[Electronic Edition][Cited 58 times Red Star]

41. Eli Biham,  Alex Biryukov,  Adi Shamir,  Miss in the Middle Attacks on IDEA and Khufu, pp. 124 - 138, FSE 1999.

[Electronic Edition][Cited 99 times Red Star]

42. Eli Biham,  Alex Biryukov,  Adi Shamir,  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials, pp. 12 - 23, EUROCRYPT 1999.

[Electronic Edition][Cited 218 times Red StarRed Star]

43. David Naccache,  Adi Shamir,  Julien P. Stern,  How to Copyright a Function?, pp. 188 - 196, PKC 1999.

[Electronic Edition][Cited 11 times ]

44. Adi Shamir,  Nicko van Someren,  Playing "Hide and Seek" with Stored Keys, pp. 118 - 124, FC 1999.

[Electronic Edition][Cited 76 times Red Star]

45. Eli Biham,  Alex Biryukov,  Orr Dunkelman,  Eran Richardson,  Adi Shamir,  Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR, pp. 362 - 376, SAC 1998.

[Electronic Edition][Cited 25 times ]

46. Aviad Kipnis,  Adi Shamir,  Cryptanalysis of the Oil & Vinegar Signature Scheme, pp. 257 - 266, CRYPTO 1998.

[Electronic Edition][Cited 45 times ]

47. Adi Shamir,  Visual Cryptanalysis, pp. 201 - 210, EUROCRYPT 1998.

[Electronic Edition][Cited 9 times ]

48. Eli Biham,  Adi Shamir,  Differential Fault Analysis of Secret Key Cryptosystems, pp. 513 - 525, CRYPTO 1997.

[Electronic Edition][Cited 519 times Red StarRed StarRed StarRed Star]

49. Don Coppersmith,  Adi Shamir,  Lattice Attacks on NTRU, pp. 52 - 61, EUROCRYPT 1997.

[Electronic Edition][Cited 118 times Red StarRed Star]

50. Moni Naor,  Adi Shamir,  Visual Cryptography, pp. 1 - 12, EUROCRYPT 1994.

[Electronic Edition][Cited 678 times Red StarRed StarRed StarRed Star]

51. Adi Shamir,  Memory Efficient Variants of Public-Key Schemes for Smart Card Applications, pp. 445 - 449, EUROCRYPT 1994.

[Electronic Edition][Cited 13 times ]

52. Adi Shamir,  Efficient Signature Schemes Based on Birational Permutations, pp. 1 - 12, CRYPTO 1993.

[Electronic Edition][Cited 5 times ]

53. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of the Full 16-Round DES, pp. 487 - 496, CRYPTO 1992.

[Electronic Edition][Cited 285 times Red StarRed StarRed Star]

54. Dror Lapidot,  Adi Shamir,  A One-Round, Two-Prover, Zero-Knowledge Protocol for NP, pp. 213 - 224, CRYPTO 1991.

[Electronic Edition][Cited 20 times ]

55. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer, pp. 156 - 171, CRYPTO 1991.

[Electronic Edition][Cited 101 times Red StarRed Star]

56. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of Feal and N-Hash, pp. 1 - 16, EUROCRYPT 1991.

[Electronic Edition][Cited 81 times Red Star]

57. Dror Lapidot,  Adi Shamir,  Publicly Verifiable Non-Interactive Zero-Knowledge Proofs, pp. 353 - 365, CRYPTO 1990.

[Electronic Edition][Cited 20 times ]

58. Eli Biham,  Adi Shamir,  Differential Cryptanalysis of DES-like Cryptosystems, pp. 2 - 21, CRYPTO 1990.

[Electronic Edition][Cited 1262 times Red StarRed StarRed StarRed StarRed Star]

59. A. W. Schrift,  Adi Shamir,  On the Universality of the Next Bit Test, pp. 394 - 408, CRYPTO 1990.

[Electronic Edition][Cited 15 times ]

60. Uriel Feige,  Adi Shamir,  Zero Knowledge Proofs of Knowledge in Two Rounds, pp. 526 - 544, CRYPTO 1989.

[Electronic Edition][Cited 189 times Red StarRed Star]

61. Adi Shamir,  An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract), pp. 606 - 609, CRYPTO 1989.

[Electronic Edition][Cited 73 times Red Star]

62. Uriel Feige,  Adi Shamir,  Moshe Tennenholtz,  The Noisy Oracle Problem, pp. 284 - 296, CRYPTO 1988.

[Electronic Edition][Cited 19 times ]

63. Silvio Micali,  Adi Shamir,  An Improvement of the Fiat-Shamir Identification and Signature Scheme, pp. 244 - 247, CRYPTO 1988.

[Electronic Edition][Cited 60 times Red Star]

64. Yossi Matias,  Adi Shamir,  A Video Scrambling Technique Based On Space Filling Curves, pp. 398 - 417, CRYPTO 1987.

[Electronic Edition][Cited 63 times Red Star]

65. Amos Fiat,  Adi Shamir,  How to Prove Yourself: Practical Solutions to Identification and Signature Problems, pp. 186 - 194, CRYPTO 1986.

[Electronic Edition][Cited 1793 times Red StarRed StarRed StarRed StarRed Star]

66. Shimon Even,  Oded Goldreich,  Adi Shamir,  On the Security of Ping-Pong Protocols when Implemented using the RSA, pp. 58 - 72, CRYPTO 1985.

[Electronic Edition][Cited 28 times ]

67. Adi Shamir,  On the Security of DES, pp. 280 - 281, CRYPTO 1985.

[Electronic Edition][Cited 44 times ]

68. Ronald L. Rivest,  Adi Shamir,  Efficient Factoring Based on Partial Information, pp. 31 - 34, EUROCRYPT 1985.

[Electronic Edition][Cited 42 times ]

69. Adi Shamir,  Identity-Based Cryptosystems and Signature Schemes, pp. 47 - 53, CRYPTO 1984.

[Electronic Edition][Cited 2519 times Red StarRed StarRed StarRed StarRed StarRed Star]

70. H. Ong,  Claus-Peter Schnorr,  Adi Shamir,  Efficient Signature Schemes Based on Polynomial Equations, pp. 37 - 46, CRYPTO 1984.

[Electronic Edition][Cited 22 times ]

71. Adi Shamir,  A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem, pp. 279 - 288, CRYPTO 1982.

[Electronic Edition][Cited 312 times Red StarRed StarRed Star]

72. Adi Shamir,  The Generation of Cryptographically Strong Pseudo-Random Sequences, pp. 1 - 1, CRYPTO 1981.

[Electronic Edition][Cited 218 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...