×
Compute Distance To:
Author ID: shamir.adi Recent zbMATH articles by "Shamir, Adi"
Published as: Shamir, Adi; Shamir, A.
Homepage: https://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html
External Links: MGP · Wikidata · Google Scholar · dblp · GND · IdRef
Awards: Turing Award (2002)
Documents Indexed: 154 Publications since 1975, including 2 Books
1 Further Contribution
Biographic References: 1 Publication
Co-Authors: 93 Co-Authors with 131 Joint Publications
2,528 Co-Co-Authors
all top 5

Co-Authors

24 single-authored
32 Dunkelman, Orr
25 Keller, Nathan
22 Dinur, Itai
15 Biham, Eli
10 Biryukov, Alex
7 Tromer, Eran
6 Klimov, Alexander
6 Rivest, Ronald Linn
6 Ronen, Eyal
5 Feige, Uriel
5 Fiat, Amos
5 Hoch, Jonathan J.
5 Lapidot, Dror
4 Bar-On, Achiya
4 Manna, Zohar
3 Adleman, Leonard Max
3 Bouillaguet, Charles
3 Fouque, Pierre-Alain
3 Lenstra, Arjen K.
3 Naor, Moni
3 Tsaban, Boaz
2 Andreeva, Elena Anatol’evna
2 Carmeli, Yaniv
2 Dodis, Yevgeniy
2 Even, Shimon
2 Feldman, David Victor
2 Genkin, Daniel
2 Hod, Rani
2 Impagliazzo, Russell
2 Kelsey, John
2 Kipnis, Aviad
2 Mantin, Itsik
2 Nisan, Noam
2 Osvik, Dag Arne
2 Rudich, Steven
2 Ruinskiy, Dima
2 Schrift, A. W.
2 Stephens-Davidowitz, Noah
2 Tauman, Yael
2 van Someren, Nicko
2 Wichs, Daniel
2 Zimmer, Sebastien
1 Amon, Ohad
1 Aoki, Takafumi
1 Aumasson, Jean-Philippe
1 Barkan, Elad
1 Chen, Hsieh-Chung
1 Cheng, Chen-Mou
1 Chou, Tung
1 Courtois, Nicolas T.
1 Diffie, Whitfield
1 Dodson, Bruce A.
1 Dolev, Shlomi
1 Dubois, Vivien
1 Fluhrer, Scott R.
1 Frieze, Alan Michael
1 Goldreich, Oded
1 Güneysu, Tim
1 Gutman, Masha
1 Halevy, Dani
1 Håstad, Johan Torkel
1 Hellman, Martin Edward
1 Homma, Naofumi
1 Hughes, James P.
1 Itai, Alon
1 Kannan, Ravindran
1 Khovratovich, Dmitry
1 Kopeetsky, Marina
1 Kortsmit, Wil
1 Lagarias, Jeffrey C.
1 Lasry, Noam
1 Leyland, Paul C.
1 Meier, Willi
1 Merkle, Ralph Charles
1 Mityagin, Anton
1 Miyamoto, Atsushi
1 Naccache, David
1 Niederhagen, Ruben
1 Oren, Yossef
1 Paar, Christof
1 Patarin, Jacques
1 Phan, Raphael Chung-Wei
1 Polak, Inna
1 Richardson, Eran
1 Satoh, Akashi
1 Schnorr, Claus Peter
1 Schroeppel, Richard
1 Shallit, Jeffrey O.
1 Simmons, Gustavus James
1 Stern, Jacques
1 Stern, Julien P.
1 Tomlinson, Jim
1 Wadge, William W.
1 Wagner, David A.
1 Williams, Hugh Cowie
1 Yang, Bo-Yin
1 Zimmermann, Ralf
1 Zippel, Richard E.

Publications by Year

Citations contained in zbMATH Open

138 Publications have been cited 4,696 times in 3,770 Documents Cited by Year
A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005
Rivest, R. L.; Shamir, A.; Adleman, L.
787
1978
How to share a secret. Zbl 0414.94021
Shamir, Adi
778
1979
Identity-based cryptosystems and signature schemes. Zbl 1359.94626
Shamir, Adi
382
1985
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
285
1991
On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021
Even, S.; Itai, A.; Shamir, A.
250
1976
How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012
Fiat, Amos; Shamir, Adi
236
1987
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
93
2000
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
89
1991
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
86
1993
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
85
1995
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
77
2001
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
76
1988
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
75
1999
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
67
1997
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
65
2009
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
53
1999
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
48
1992
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
46
1999
A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015
Schroeppel, Richard; Shamir, Adi
40
1981
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
38
2000
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
35
2002
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
35
2002
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
33
2001
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
33
1993
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
33
2012
Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045
Feige, U.; Shamir, A.
32
1990
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
29
2010
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
28
1998
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
26
2001
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
26
2006
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
25
2007
Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006
Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi
25
1988
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
24
2001
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
21
2009
A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007
Shamir, Adi
21
1984
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
21
2012
A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029
Shamir, Adi
20
1979
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
20
2011
Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414
Lapidot, Dror; Shamir, Adi
20
1991
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
19
2008
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
17
2001
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
17
2006
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
17
2012
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017
Manna, Zohar; Shamir, Adi
15
1976
Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018
Shamir, Adi
15
1979
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
15
2010
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
14
2005
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
14
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
14
2010
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
13
2013
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
11
2002
How to reuse a “write-once” memory. Zbl 0548.68046
Rivest, Ronald L.; Shamir, Adi
11
1982
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
10
2004
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
10
2010
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
10
2014
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
10
1994
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
10
2012
The optimal approach to recursive programs. Zbl 0361.68022
Manna, Zohar; Shamir, Adi
9
1977
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
9
1997
The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016
Manna, Zohar; Shamir, Adi
9
1978
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
8
2005
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
8
1991
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
8
2004
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
8
2011
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
8
2012
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
7
2006
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
7
2010
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
7
2014
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2014
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2015
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
6
2003
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
5
2007
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
5
1995
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
5
1999
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
5
1999
On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017
Shamir, Adi
5
1981
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
5
2014
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
5
2008
How to find a battleship. Zbl 0673.90063
Fiat, Amos; Shamir, Adi
5
1989
Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005
Fiat, Amos; Shamir, Adi
5
1986
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
5
2004
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2015
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
4
1999
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
Data types as objects. Zbl 0353.68050
Shamir, Adi; Wadge, William W.
4
1977
On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031
Shamir, Adi; Zippel, Richard E.
4
1980
Efficient factoring based on partial information. Zbl 0589.94004
Rivest, Ronald L.; Shamir, Adi
4
1986
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
4
2008
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
4
1992
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
On the universality of the next bit test. Zbl 0786.94007
Schrift, A. W.; Shamir, A.
4
1991
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
4
2003
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
3
2001
An improved algebraic attack on Hamsi-256. Zbl 1282.94041
Dinur, Itai; Shamir, Adi
3
2011
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2017
Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523
Shamir, Adi
2
2004
Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656
Shamir, Adi
2
2000
Three third generation attacks on the format preserving encryption scheme FF3. Zbl 1479.94111
Amon, Ohad; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
2
2021
New slide attacks on almost self-similar ciphers. Zbl 1479.94162
Dunkelman, Orr; Keller, Nathan; Lasry, Noam; Shamir, Adi
2
2020
The retracing boomerang attack. Zbl 1479.94163
Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
2
2020
Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2019
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
2
2018
Tight bounds on online checkpointing algorithms. Zbl 1484.68336
Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Hod, Rani; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2018
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2017
New second-preimage attacks on hash functions. Zbl 1365.94397
Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien
2
2016
Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2016
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2015
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
5
2015
Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505
Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi
2
2015
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2015
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2015
Almost universal forgery attacks on AES-based MAC’s. Zbl 1359.94589
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
Reflections on slide with a twist attacks. Zbl 1356.94055
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
10
2014
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
7
2014
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
5
2014
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
4
2014
Using random error correcting codes in near-collision attacks on generic hash-functions. Zbl 1337.94063
Polak, Inna; Shamir, Adi
1
2014
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
13
2013
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
33
2012
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
21
2012
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
17
2012
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
10
2012
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
8
2012
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
20
2011
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
8
2011
An improved algebraic attack on Hamsi-256. Zbl 1282.94041
Dinur, Itai; Shamir, Adi
3
2011
RFID authentication efficient proactive information security within computational security. Zbl 1208.94055
Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi
1
2011
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
29
2010
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
15
2010
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
14
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
14
2010
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
10
2010
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
7
2010
Comparative power analysis of modular exponentiation algorithms. Zbl 1367.65222
Homma, Naofumi; Miyamoto, Atsushi; Aoki, Takafumi; Satoh, Akashi; Shamir, Adi
1
2010
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
65
2009
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
21
2009
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
19
2008
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
5
2008
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
4
2008
Improved related-key attacks on DESX and DESX+. Zbl 1156.94374
Phan, Raphael C.-W.; Shamir, Adi
1
2008
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
25
2007
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
5
2007
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
26
2006
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
17
2006
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
7
2006
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
14
2005
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
8
2005
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
10
2004
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
8
2004
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
5
2004
Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523
Shamir, Adi
2
2004
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
6
2003
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
4
2003
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
35
2002
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
35
2002
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
11
2002
Analysis of neural cryptography. Zbl 1065.94554
Klimov, Alexander; Mityagin, Anton; Shamir, Adi
1
2002
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
77
2001
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
33
2001
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
26
2001
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
24
2001
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
17
2001
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
3
2001
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
93
2000
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
38
2000
Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656
Shamir, Adi
2
2000
Analysis and optimization of the twinkle factoring device. Zbl 1082.94525
Lenstra, Arjen K.; Shamir, Adi
1
2000
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
75
1999
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
53
1999
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
46
1999
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
15
1999
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
5
1999
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
5
1999
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
4
1999
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
28
1998
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
67
1997
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
9
1997
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
85
1995
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
5
1995
Memory efficient variants of public-key schemes for smart card applications. Zbl 0885.94027
Shamir, Adi
1
1995
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
10
1994
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
86
1993
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
33
1993
On the generation of multivariate polynomials which are hard to factor. Zbl 1310.68262
Shamir, Adi
2
1993
Universal tests for nonuniform distributions. Zbl 0781.94002
Schrift, A. W.; Shamir, A.
1
1993
On dice and coins: Models of computation for random generation. Zbl 0772.68036
Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi
1
1993
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
48
1992
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
4
1992
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
2
1992
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042
Lapidot, Dror; Shamir, Adi
1
1992
...and 38 more Documents
all top 5

Cited by 5,501 Authors

37 Susilo, Willy
29 Shamir, Adi
29 Wang, Huaxiong
27 Chang, Chin-Chen
26 Yung, Moti
25 De Santis, Alfredo
25 Dunkelman, Orr
23 Mu, Yi
22 Cao, Zhenfu
22 Rijmen, Vincent
22 Sarkar, Santanu
20 Keller, Nathan
20 Lin, Dongdai
20 Maitra, Subhamoy
19 Ishai, Yuval
19 Libert, Benoît
19 Padró, Carles
18 Leander, Gregor
18 Stinson, Douglas Robert
17 Calderini, Marco
16 Goldreich, Oded
15 Carlet, Claude
15 de Werra, Dominique
15 Dinur, Itai
15 Herranz, Javier
15 Ostrovsky, Rafail
15 Waters, Brent
14 Bitansky, Nir
14 Blundo, Carlo
14 Chen, Kefei
14 Farràs, Oriol
14 Hu, Yupu
14 Hwang, Minshiang
14 Meier, Willi
14 Sahai, Amit
14 Takagi, Tsuyoshi
14 Wang, Meiqin
14 Wen, Qiaoyan
14 Wong, Duncan S.
13 Knudsen, Lars Ramkilde
13 Li, Chao
13 Nitaj, Abderrahmane
13 Qu, Longjiang
13 Sasaki, Yu
13 Vaikuntanathan, Vinod
13 Wu, Qianhong
13 Yang, Guomin
12 Bogdanov, Andrey
12 Gu, Dawu
12 Hazay, Carmit
12 Ling, San
12 Mesnager, Sihem
12 Naccache, David
12 Naya-Plasencia, María
12 Paul, Goutam
12 Perrin, Léo
12 Safavi-Naini, Reihaneh
12 Tan, Chik How
12 Tang, Chunming
11 Bellare, Mihir
11 Biham, Eli
11 Boneh, Dan
11 Gong, Guang
11 Li, Fagen
11 Pointcheval, David
11 Sakurai, Kouichi
11 Smith-Tone, Daniel
11 Wang, Xiaoyun
11 Wu, Wenling
11 Yang, Yuguang
11 Youssef, Amr M.
10 Budaghyan, Lilya
10 Chiesa, Alessandro
10 D’Arco, Paolo
10 Desmedt, Yvo G.
10 Gennaro, Rosario
10 Hu, Lei
10 Huang, Qiong
10 Isobe, Takanori
10 Jin, Chenhui
10 Kunihiro, Noboru
10 Kurosawa, Kaoru
10 Nguyen, Khoa
10 Petzoldt, Albrecht
10 Pieprzyk, Josef P.
10 Smart, Nigel P.
10 Tanaka, Keisuke
10 Venkitasubramaniam, Muthuramakrishnan
10 Wu, Tzong-Sun
10 Yuan, Pingzhi
10 Zhang, Lei
9 Abdalla, Michel
9 Beimel, Amos
9 Biryukov, Alex
9 Blondeau, Celine
9 Dai, Yuewei
9 Ding, Jintai
9 Dolev, Shlomi
9 Guo, Jian
9 Harn, Lein
...and 5,401 more Authors
all top 5

Cited in 311 Serials

239 Designs, Codes and Cryptography
195 Journal of Cryptology
183 Theoretical Computer Science
160 Information Processing Letters
149 Information Sciences
97 Discrete Applied Mathematics
87 Cryptography and Communications
70 Applied Mathematics and Computation
66 Journal of Discrete Mathematical Sciences & Cryptography
59 Finite Fields and their Applications
58 International Journal of Theoretical Physics
55 Quantum Information Processing
44 International Journal of Computer Mathematics
42 Journal of Computer and System Sciences
35 Computers & Mathematics with Applications
34 Journal of Mathematical Cryptology
32 Information and Computation
32 Wuhan University Journal of Natural Sciences (WUJNS)
32 Matematicheskie Voprosy Kriptografii
28 Applicable Algebra in Engineering, Communication and Computing
26 Discrete Mathematics
26 Advances in Mathematics of Communications
25 European Journal of Operational Research
24 Pattern Recognition
22 Mathematical Problems in Engineering
21 International Journal of Foundations of Computer Science
18 SIAM Journal on Computing
18 Prikladnaya Diskretnaya Matematika
17 Algorithmica
17 Science China. Information Sciences
16 Mathematics of Computation
15 Computing
15 Journal of Symbolic Computation
15 Mathematical and Computer Modelling
14 Journal of Systems Science and Complexity
14 International Journal of Quantum Information
13 Computational Complexity
13 Journal of Shanghai Jiaotong University (Science)
12 Distributed Computing
12 Mathematical Biosciences and Engineering
11 Cybernetics and Systems Analysis
11 Journal of Combinatorial Optimization
10 Artificial Intelligence
10 Computers & Operations Research
10 Annals of Operations Research
10 Discrete Mathematics and Applications
10 Science in China. Series F
10 Symmetry
9 Operations Research Letters
9 Journal of Computer Science and Technology
9 Soft Computing
9 Journal of Applied Mathematics
9 Groups, Complexity, Cryptology
8 Chaos, Solitons and Fractals
8 Cryptologia
8 Journal of Parallel and Distributed Computing
8 Mathematical Programming. Series A. Series B
7 Applied Mathematics Letters
7 Nonlinear Dynamics
7 Journal of Applied Mathematics and Computing
6 Journal of Computational and Applied Mathematics
6 Journal of Number Theory
6 Journal of Complexity
6 SIAM Journal on Discrete Mathematics
6 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
6 Journal of Mathematical Sciences (New York)
6 International Journal of Modern Physics C
6 Electronic Commerce Research
6 Mathematics in Computer Science
6 Science China. Mathematics
6 Frontiers of Computer Science
5 The Mathematical Intelligencer
5 Journal of Algebra
5 Mathematical Systems Theory
5 Journal of Information & Optimization Sciences
5 New Generation Computing
5 Journal of Automated Reasoning
5 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
5 Annals of Mathematics and Artificial Intelligence
5 Theory of Computing Systems
5 EURASIP Journal on Advances in Signal Processing
5 Discrete Mathematics, Algorithms and Applications
4 Problems of Information Transmission
4 Networks
4 Combinatorica
4 Acta Applicandae Mathematicae
4 Linear Algebra and its Applications
4 Tatra Mountains Mathematical Publications
4 Informatica (Vilnius)
4 Lobachevskii Journal of Mathematics
4
4 Journal of Discrete Algorithms
4 BIT. Nordisk Tidskrift for Informationsbehandling
4 Journal of Zhejiang University. Science A
4 Arabian Journal for Science and Engineering
4 JSIAM Letters
3 IEEE Transactions on Information Theory
3 Physica A
3 Reviews of Modern Physics
3 BIT
...and 211 more Serials
all top 5

Cited in 49 Fields

2,915 Information and communication theory, circuits (94-XX)
1,227 Computer science (68-XX)
398 Number theory (11-XX)
281 Quantum theory (81-XX)
232 Combinatorics (05-XX)
166 Operations research, mathematical programming (90-XX)
89 Algebraic geometry (14-XX)
72 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
55 Mathematical logic and foundations (03-XX)
54 Numerical analysis (65-XX)
44 Order, lattices, ordered algebraic structures (06-XX)
40 Commutative algebra (13-XX)
40 Group theory and generalizations (20-XX)
34 Dynamical systems and ergodic theory (37-XX)
28 Field theory and polynomials (12-XX)
22 Linear and multilinear algebra; matrix theory (15-XX)
19 Probability theory and stochastic processes (60-XX)
14 Statistics (62-XX)
12 Geometry (51-XX)
12 Biology and other natural sciences (92-XX)
11 Associative rings and algebras (16-XX)
10 Statistical mechanics, structure of matter (82-XX)
9 Systems theory; control (93-XX)
6 Mathematics education (97-XX)
5 History and biography (01-XX)
5 Convex and discrete geometry (52-XX)
4 Real functions (26-XX)
4 Ordinary differential equations (34-XX)
4 Partial differential equations (35-XX)
4 Mechanics of particles and systems (70-XX)
3 General and overarching topics; collections (00-XX)
3 Approximations and expansions (41-XX)
3 Harmonic analysis on Euclidean spaces (42-XX)
3 Abstract harmonic analysis (43-XX)
2 Measure and integration (28-XX)
2 Special functions (33-XX)
2 Difference and functional equations (39-XX)
2 Functional analysis (46-XX)
2 Operator theory (47-XX)
2 Fluid mechanics (76-XX)
2 Relativity and gravitational theory (83-XX)
1 General algebraic systems (08-XX)
1 Nonassociative rings and algebras (17-XX)
1 Sequences, series, summability (40-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 Differential geometry (53-XX)
1 Manifolds and cell complexes (57-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Classical thermodynamics, heat transfer (80-XX)

Citations by Year

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.