Edit Profile (opens in new tab) Shamir, Adi Compute Distance To: Compute Author ID: shamir.adi Published as: Shamir, Adi; Shamir, A. Homepage: https://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html External Links: MGP · Wikidata · Google Scholar · dblp · GND · IdRef Awards: Turing Award (2002) Documents Indexed: 154 Publications since 1975, including 2 Books 1 Further Contribution Biographic References: 1 Publication Co-Authors: 93 Co-Authors with 131 Joint Publications 2,547 Co-Co-Authors all top 5 Co-Authors 24 single-authored 32 Dunkelman, Orr 25 Keller, Nathan 22 Dinur, Itai 15 Biham, Eli 10 Biryukov, Alex 7 Tromer, Eran 6 Klimov, Alexander 6 Rivest, Ronald Linn 6 Ronen, Eyal 5 Feige, Uriel 5 Fiat, Amos 5 Hoch, Jonathan J. 5 Lapidot, Dror 4 Bar-On, Achiya 4 Manna, Zohar 3 Adleman, Leonard Max 3 Bouillaguet, Charles 3 Fouque, Pierre-Alain 3 Lenstra, Arjen K. 3 Naor, Moni 3 Tsaban, Boaz 2 Andreeva, Elena Anatol’evna 2 Carmeli, Yaniv 2 Dodis, Yevgeniy 2 Even, Shimon 2 Feldman, David Victor 2 Genkin, Daniel 2 Hod, Rani 2 Impagliazzo, Russell 2 Kelsey, John 2 Kipnis, Aviad 2 Mantin, Itsik 2 Nisan, Noam 2 Osvik, Dag Arne 2 Rudich, Steven 2 Ruinskiy, Dima 2 Schrift, A. W. 2 Stephens-Davidowitz, Noah 2 Tauman, Yael 2 van Someren, Nicko 2 Wichs, Daniel 2 Zimmer, Sebastien 1 Amon, Ohad 1 Aoki, Takafumi 1 Aumasson, Jean-Philippe 1 Barkan, Elad 1 Chen, Hsieh-Chung 1 Cheng, Chen-Mou 1 Chou, Tung 1 Courtois, Nicolas T. 1 Diffie, Whitfield 1 Dodson, Bruce A. 1 Dolev, Shlomi 1 Dubois, Vivien 1 Fluhrer, Scott R. 1 Frieze, Alan Michael 1 Goldreich, Oded 1 Güneysu, Tim 1 Gutman, Masha 1 Halevy, Dani 1 Håstad, Johan Torkel 1 Hellman, Martin Edward 1 Homma, Naofumi 1 Hughes, James P. 1 Itai, Alon 1 Kannan, Ravindran 1 Khovratovich, Dmitry 1 Kopeetsky, Marina 1 Kortsmit, Wil 1 Lagarias, Jeffrey C. 1 Lasry, Noam 1 Leyland, Paul C. 1 Meier, Willi 1 Merkle, Ralph Charles 1 Mityagin, Anton 1 Miyamoto, Atsushi 1 Naccache, David 1 Niederhagen, Ruben 1 Oren, Yossef 1 Paar, Christof 1 Patarin, Jacques 1 Phan, Raphael Chung-Wei 1 Polak, Inna 1 Richardson, Eran 1 Satoh, Akashi 1 Schnorr, Claus Peter 1 Schroeppel, Richard 1 Shallit, Jeffrey O. 1 Simmons, Gustavus James 1 Stern, Jacques 1 Stern, Julien P. 1 Tomlinson, Jim 1 Wadge, William W. 1 Wagner, David A. 1 Williams, Hugh Cowie 1 Yang, Bo-Yin 1 Zimmermann, Ralf 1 Zippel, Richard E. all top 5 Serials 17 Journal of Cryptology 6 SIAM Journal on Computing 3 IEEE Transactions on Information Theory 3 Information Processing Letters 3 Journal of Computer and System Sciences 3 Communications of the ACM 2 IEEE Transactions on Computers 2 Information and Computation 2 Designs, Codes and Cryptography 1 Information and Control 1 Journal of the Association for Computing Machinery 1 Networks 1 Theoretical Computer Science 1 Cryptologia 1 Combinatorica 1 Algorithmica 1 Theory of Computing Systems 1 Journal of Mathematical Cryptology 1 Cryptography and Communications 1 ACM Transactions on Algorithms all top 5 Fields 126 Information and communication theory, circuits (94-XX) 68 Computer science (68-XX) 10 Number theory (11-XX) 6 Numerical analysis (65-XX) 4 Combinatorics (05-XX) 3 Mathematical logic and foundations (03-XX) 3 Operations research, mathematical programming (90-XX) 1 General and overarching topics; collections (00-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Field theory and polynomials (12-XX) 1 Group theory and generalizations (20-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 138 Publications have been cited 4,762 times in 3,833 Documents Cited by ▼ Year ▼ A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005Rivest, R. L.; Shamir, A.; Adleman, L. 810 1978 How to share a secret. Zbl 0414.94021Shamir, Adi 804 1979 Identity-based cryptosystems and signature schemes. Zbl 1359.94626Shamir, Adi 381 1985 Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017Biham, Eli; Shamir, Adi 287 1991 On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021Even, S.; Itai, A.; Shamir, A. 250 1976 How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012Fiat, Amos; Shamir, Adi 237 1987 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 96 2000 Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014Biham, Eli; Shamir, Adi 89 1991 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005Biham, Eli; Shamir, Adi 87 1993 Visual cryptography. Zbl 0878.94048Naor, Moni; Shamir, Adi 86 1995 How to leak a secret. Zbl 1064.94558Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 78 2001 Zero-knowledge proofs of identity. Zbl 0659.94006Feige, Uriel; Fiat, Amos; Shamir, Adi 76 1988 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013Biham, Eli; Biryukov, Alex; Shamir, Adi 75 1999 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010Biham, Eli; Shamir, Adi 67 1997 Cube attacks on tweakable black box polynomials. Zbl 1239.94045Dinur, Itai; Shamir, Adi 65 2009 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012Kipnis, Aviad; Shamir, Adi 54 1999 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096Shamir, Adi 48 1992 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015Feige, Uriel; Lapidot, Dror; Shamir, Adi 46 1999 A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015Schroeppel, Richard; Shamir, Adi 40 1981 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013Biryukov, Alex; Shamir, Adi 38 2000 The LSD broadcast encryption scheme. Zbl 1026.94528Halevy, Dani; Shamir, Adi 35 2002 A practical attack on broadcast RC4. Zbl 1073.68637Mantin, Itsik; Shamir, Adi 35 2002 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017Biham, Eli; Shamir, Adi 33 1993 Improved online/offline signature schemes. Zbl 1003.94533Shamir, Adi; Tauman, Yael 33 2001 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065Dunkelman, Orr; Keller, Nathan; Shamir, Adi 33 2012 Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045Feige, U.; Shamir, A. 32 1990 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045Dunkelman, Orr; Keller, Nathan; Shamir, Adi 29 2010 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030Kipnis, Aviad; Shamir, Adi 28 1998 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640Biryukov, Alex; Shamir, Adi; Wagner, David 26 2001 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 26 2006 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 25 2001 Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi 25 1988 Practical cryptanalysis of SFLASH. Zbl 1215.94043Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 25 2007 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 21 2009 Improved attacks on full GOST. Zbl 1282.94040Dinur, Itai; Dunkelman, Orr; Shamir, Adi 21 2012 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042Dinur, Itai; Shamir, Adi 21 2011 A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007Shamir, Adi 21 1984 Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414Lapidot, Dror; Shamir, Adi 20 1991 A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029Shamir, Adi 20 1979 Second preimage attacks on dithered hash functions. Zbl 1149.94302Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 19 2008 Structural cryptanalysis of SASAS. Zbl 0981.94015Biryukov, Alex; Shamir, Adi 17 2001 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384Barkan, Elad; Biham, Eli; Shamir, Adi 17 2006 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 17 2012 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064Dunkelman, Orr; Keller, Nathan; Shamir, Adi 16 2010 Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018Shamir, Adi 16 1979 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010Biham, Eli; Biryukov, Alex; Shamir, Adi 15 1999 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 15 2010 The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017Manna, Zohar; Shamir, Adi 15 1976 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 14 2010 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023Biham, Eli; Biryukov, Alex; Shamir, Adi 13 2005 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 13 2013 A new class of invertible mappings. Zbl 1020.94522Klimov, Alexander; Shamir, Adi 11 2002 How to reuse a “write-once” memory. Zbl 0548.68046Rivest, Ronald L.; Shamir, Adi 11 1982 Efficient signature schemes based on birational permutations. Zbl 0877.94041Shamir, Adi 10 1994 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 10 2010 Fault analysis of stream ciphers. Zbl 1104.68479Hoch, Jonathan J.; Shamir, Adi 10 2004 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063Genkin, Daniel; Shamir, Adi; Tromer, Eran 10 2014 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044Dinur, Itai; Dunkelman, Orr; Shamir, Adi 10 2012 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078Lapidot, Dror; Shamir, Adi 9 1997 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 9 2011 The optimal approach to recursive programs. Zbl 0361.68022Manna, Zohar; Shamir, Adi 9 1977 The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016Manna, Zohar; Shamir, Adi 9 1978 Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012Biham, Eli; Shamir, Adi 8 1991 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391Klimov, Alexander; Shamir, Adi 8 2005 Cryptographic applications of T-functions. Zbl 1081.94030Klimov, Alexander; Shamir, Adi 8 2004 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057Dinur, Itai; Shamir, Adi 8 2012 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2015 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2014 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047Hoch, Jonathan J.; Shamir, Adi 7 2006 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054Dinur, Itai; Dunkelman, Orr; Shamir, Adi 7 2014 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 6 2003 How to find a battleship. Zbl 0673.90063Fiat, Amos; Shamir, Adi 6 1989 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2015 Structural cryptanalysis of SASAS. Zbl 1201.94076Biryukov, Alex; Shamir, Adi 6 2010 On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017Shamir, Adi 5 1981 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 5 1999 How to copyright a function? Zbl 0935.68017Naccache, David; Shamir, Adi; Stern, Julien P. 5 1999 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547Klimov, Alexander; Shamir, Adi 5 2004 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015Lapidot, Dror; Shamir, Adi 5 1995 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 5 2014 Bug attacks. Zbl 1183.94022Biham, Eli; Carmeli, Yaniv; Shamir, Adi 5 2008 Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005Fiat, Amos; Shamir, Adi 5 1986 Factoring large numbers with the TWIRL device. Zbl 1122.94402Shamir, Adi; Tromer, Eran 4 2003 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050Feige, Uriel; Shamir, Adi 4 1992 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630Shamir, Adi 4 1999 On the universality of the next bit test. Zbl 0786.94007Schrift, A. W.; Shamir, A. 4 1991 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372Hoch, Jonathan J.; Shamir, Adi 4 2008 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064Dinur, Itai; Dunkelman, Orr; Shamir, Adi 4 2014 Efficient factoring based on partial information. Zbl 0589.94004Rivest, Ronald L.; Shamir, Adi 4 1986 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410Shamir, Adi 4 2008 Data types as objects. Zbl 0353.68050Shamir, Adi; Wadge, William W. 4 1977 On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031Shamir, Adi; Zippel, Richard E. 4 1980 Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523Shamir, Adi 3 2004 Guaranteeing the diversity of number generators. Zbl 1013.94013Shamir, Adi; Tsaban, Boaz 3 2001 An improved algebraic attack on Hamsi-256. Zbl 1282.94041Dinur, Itai; Shamir, Adi 3 2011 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 2 2018 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200Biham, Eli; Shamir, Adi 2 1992 Three third generation attacks on the format preserving encryption scheme FF3. Zbl 1479.94111Amon, Ohad; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 2 2021 New slide attacks on almost self-similar ciphers. Zbl 1479.94162Dunkelman, Orr; Keller, Nathan; Lasry, Noam; Shamir, Adi 2 2020 The retracing boomerang attack. Zbl 1479.94163Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 2 2020 Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2019 Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi 2 2018 Tight bounds on online checkpointing algorithms. Zbl 1484.68336Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Hod, Rani; Keller, Nathan; Ronen, Eyal; Shamir, Adi 1 2018 How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 2 2017 New second-preimage attacks on hash functions. Zbl 1365.94397Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien 2 2016 Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2016 Bug attacks. Zbl 1365.94402Biham, Eli; Carmeli, Yaniv; Shamir, Adi 1 2016 Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2015 New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 6 2015 New attacks on IDEA with at least 6 rounds. Zbl 1377.94037Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 Almost universal forgery attacks on AES-based MAC’s. Zbl 1359.94589Dunkelman, Orr; Keller, Nathan; Shamir, Adi 2 2015 Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi 2 2015 Reflections on slide with a twist attacks. Zbl 1356.94055Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 1 2015 RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063Genkin, Daniel; Shamir, Adi; Tromer, Eran 10 2014 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2014 Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 7 2014 Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054Dinur, Itai; Dunkelman, Orr; Shamir, Adi 7 2014 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 5 2014 Improved practical attacks on round-reduced Keccak. Zbl 1297.94064Dinur, Itai; Dunkelman, Orr; Shamir, Adi 4 2014 Using random error correcting codes in near-collision attacks on generic hash-functions. Zbl 1337.94063Polak, Inna; Shamir, Adi 1 2014 Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 13 2013 Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065Dunkelman, Orr; Keller, Nathan; Shamir, Adi 33 2012 Improved attacks on full GOST. Zbl 1282.94040Dinur, Itai; Dunkelman, Orr; Shamir, Adi 21 2012 Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi 17 2012 New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044Dinur, Itai; Dunkelman, Orr; Shamir, Adi 10 2012 Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057Dinur, Itai; Shamir, Adi 8 2012 Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042Dinur, Itai; Shamir, Adi 21 2011 An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf 9 2011 An improved algebraic attack on Hamsi-256. Zbl 1282.94041Dinur, Itai; Shamir, Adi 3 2011 RFID authentication efficient proactive information security within computational security. Zbl 1208.94055Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi 1 2011 Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045Dunkelman, Orr; Keller, Nathan; Shamir, Adi 29 2010 A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064Dunkelman, Orr; Keller, Nathan; Shamir, Adi 16 2010 Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi 15 2010 Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin 14 2010 Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106Tromer, Eran; Osvik, Dag Arne; Shamir, Adi 10 2010 Structural cryptanalysis of SASAS. Zbl 1201.94076Biryukov, Alex; Shamir, Adi 6 2010 Comparative power analysis of modular exponentiation algorithms. Zbl 1367.65222Homma, Naofumi; Miyamoto, Atsushi; Aoki, Takafumi; Satoh, Akashi; Shamir, Adi 1 2010 Cube attacks on tweakable black box polynomials. Zbl 1239.94045Dinur, Itai; Shamir, Adi 65 2009 Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi 21 2009 Second preimage attacks on dithered hash functions. Zbl 1149.94302Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien 19 2008 Bug attacks. Zbl 1183.94022Biham, Eli; Carmeli, Yaniv; Shamir, Adi 5 2008 On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372Hoch, Jonathan J.; Shamir, Adi 4 2008 SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410Shamir, Adi 4 2008 Improved related-key attacks on DESX and DESX+. Zbl 1156.94374Phan, Raphael C.-W.; Shamir, Adi 1 2008 Practical cryptanalysis of SFLASH. Zbl 1215.94043Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques 25 2007 Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 5 2007 Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz 4 2007 Cache attacks and countermeasures: the case of AES. Zbl 1125.94326Osvik, Dag Arne; Shamir, Adi; Tromer, Eran 26 2006 Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384Barkan, Elad; Biham, Eli; Shamir, Adi 17 2006 Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047Hoch, Jonathan J.; Shamir, Adi 7 2006 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023Biham, Eli; Biryukov, Alex; Shamir, Adi 13 2005 New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391Klimov, Alexander; Shamir, Adi 8 2005 Fault analysis of stream ciphers. Zbl 1104.68479Hoch, Jonathan J.; Shamir, Adi 10 2004 Cryptographic applications of T-functions. Zbl 1081.94030Klimov, Alexander; Shamir, Adi 8 2004 New cryptographic primitives based on multiword T-functions. Zbl 1079.68547Klimov, Alexander; Shamir, Adi 5 2004 Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523Shamir, Adi 3 2004 Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul 6 2003 Factoring large numbers with the TWIRL device. Zbl 1122.94402Shamir, Adi; Tromer, Eran 4 2003 The LSD broadcast encryption scheme. Zbl 1026.94528Halevy, Dani; Shamir, Adi 35 2002 A practical attack on broadcast RC4. Zbl 1073.68637Mantin, Itsik; Shamir, Adi 35 2002 A new class of invertible mappings. Zbl 1020.94522Klimov, Alexander; Shamir, Adi 11 2002 Analysis of neural cryptography. Zbl 1065.94554Klimov, Alexander; Mityagin, Anton; Shamir, Adi 1 2002 How to leak a secret. Zbl 1064.94558Rivest, Ronald L.; Shamir, Adi; Tauman, Yael 78 2001 Improved online/offline signature schemes. Zbl 1003.94533Shamir, Adi; Tauman, Yael 33 2001 Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640Biryukov, Alex; Shamir, Adi; Wagner, David 26 2001 Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530Fluhrer, Scott; Mantin, Itsik; Shamir, Adi 25 2001 Structural cryptanalysis of SASAS. Zbl 0981.94015Biryukov, Alex; Shamir, Adi 17 2001 Guaranteeing the diversity of number generators. Zbl 1013.94013Shamir, Adi; Tsaban, Boaz 3 2001 Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi 96 2000 Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013Biryukov, Alex; Shamir, Adi 38 2000 Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656Shamir, Adi 2 2000 Analysis and optimization of the twinkle factoring device. Zbl 1082.94525Lenstra, Arjen K.; Shamir, Adi 1 2000 Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013Biham, Eli; Biryukov, Alex; Shamir, Adi 75 1999 Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012Kipnis, Aviad; Shamir, Adi 54 1999 Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015Feige, Uriel; Lapidot, Dror; Shamir, Adi 46 1999 Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010Biham, Eli; Biryukov, Alex; Shamir, Adi 15 1999 Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi 5 1999 How to copyright a function? Zbl 0935.68017Naccache, David; Shamir, Adi; Stern, Julien P. 5 1999 Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630Shamir, Adi 4 1999 Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030Kipnis, Aviad; Shamir, Adi 28 1998 Differential fault analysis of secret key cryptosystems. Zbl 0886.94010Biham, Eli; Shamir, Adi 67 1997 Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078Lapidot, Dror; Shamir, Adi 9 1997 Visual cryptography. Zbl 0878.94048Naor, Moni; Shamir, Adi 86 1995 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015Lapidot, Dror; Shamir, Adi 5 1995 Memory efficient variants of public-key schemes for smart card applications. Zbl 0885.94027Shamir, Adi 1 1995 Efficient signature schemes based on birational permutations. Zbl 0877.94041Shamir, Adi 10 1994 Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005Biham, Eli; Shamir, Adi 87 1993 Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017Biham, Eli; Shamir, Adi 33 1993 On the generation of multivariate polynomials which are hard to factor. Zbl 1310.68262Shamir, Adi 2 1993 On dice and coins: Models of computation for random generation. Zbl 0772.68036Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi 1 1993 Universal tests for nonuniform distributions. Zbl 0781.94002Schrift, A. W.; Shamir, A. 1 1993 \(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096Shamir, Adi 48 1992 Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050Feige, Uriel; Shamir, Adi 4 1992 Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200Biham, Eli; Shamir, Adi 2 1992 A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0764.68042Lapidot, Dror; Shamir, Adi 1 1992 ...and 38 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 5,630 Authors 37 Susilo, Willy 29 Shamir, Adi 29 Wang, Huaxiong 27 Chang, Chin-Chen 26 Yung, Moti 25 De Santis, Alfredo 25 Dunkelman, Orr 23 Mu, Yi 22 Cao, Zhenfu 22 Rijmen, Vincent 22 Sarkar, Santanu 20 Keller, Nathan 20 Lin, Dongdai 20 Maitra, Subhamoy 19 Ishai, Yuval 19 Libert, Benoît 19 Padró, Carles 18 Leander, Gregor 18 Stinson, Douglas Robert 17 Calderini, Marco 16 Goldreich, Oded 15 Carlet, Claude 15 de Werra, Dominique 15 Dinur, Itai 15 Herranz, Javier 15 Ostrovsky, Rafail 15 Waters, Brent 15 Wen, Qiaoyan 14 Bitansky, Nir 14 Blundo, Carlo 14 Chen, Kefei 14 Farràs, Oriol 14 Hu, Yupu 14 Hwang, Minshiang 14 Meier, Willi 14 Mesnager, Sihem 14 Sahai, Amit 14 Takagi, Tsuyoshi 14 Wang, Meiqin 14 Wong, Duncan S. 13 Knudsen, Lars Ramkilde 13 Li, Chao 13 Nitaj, Abderrahmane 13 Qu, Longjiang 13 Sasaki, Yu 13 Vaikuntanathan, Vinod 13 Wu, Qianhong 13 Yang, Guomin 12 Bogdanov, Andrey 12 Gu, Dawu 12 Hazay, Carmit 12 Ling, San 12 Naccache, David 12 Naya-Plasencia, María 12 Paul, Goutam 12 Perrin, Léo 12 Safavi-Naini, Reihaneh 12 Tan, Chik How 12 Tang, Chunming 11 Bellare, Mihir 11 Biham, Eli 11 Boneh, Dan 11 Gong, Guang 11 Li, Fagen 11 Pointcheval, David 11 Sakurai, Kouichi 11 Smith-Tone, Daniel 11 Wang, Xiaoyun 11 Wu, Wenling 11 Yang, Yuguang 11 Youssef, Amr M. 10 Budaghyan, Lilya 10 Chen, Xiu-Bo 10 Chiesa, Alessandro 10 D’Arco, Paolo 10 Desmedt, Yvo G. 10 Dolev, Shlomi 10 Gennaro, Rosario 10 Hu, Lei 10 Huang, Qiong 10 Isobe, Takanori 10 Jin, Chenhui 10 Kunihiro, Noboru 10 Kurosawa, Kaoru 10 Nguyen, Khoa 10 Petzoldt, Albrecht 10 Pieprzyk, Josef P. 10 Qin, Huawang 10 Smart, Nigel Paul 10 Tanaka, Keisuke 10 Venkitasubramaniam, Muthuramakrishnan 10 Wu, Tzong-Sun 10 Yuan, Pingzhi 10 Zhang, Lei 9 Abdalla, Michel 9 Bai, Chenming 9 Beimel, Amos 9 Biryukov, Alex 9 Blondeau, Celine 9 Dai, Yuewei ...and 5,530 more Authors all top 5 Cited in 314 Serials 239 Designs, Codes and Cryptography 195 Journal of Cryptology 183 Theoretical Computer Science 162 Information Processing Letters 149 Information Sciences 99 Quantum Information Processing 97 Discrete Applied Mathematics 87 Cryptography and Communications 70 Applied Mathematics and Computation 68 Journal of Discrete Mathematical Sciences & Cryptography 61 Finite Fields and their Applications 58 International Journal of Theoretical Physics 44 International Journal of Computer Mathematics 42 Journal of Computer and System Sciences 35 Computers & Mathematics with Applications 34 Journal of Mathematical Cryptology 32 Information and Computation 32 Wuhan University Journal of Natural Sciences (WUJNS) 32 Matematicheskie Voprosy Kriptografii 28 Applicable Algebra in Engineering, Communication and Computing 26 Discrete Mathematics 26 Advances in Mathematics of Communications 25 European Journal of Operational Research 24 Pattern Recognition 22 Mathematical Problems in Engineering 21 International Journal of Foundations of Computer Science 18 SIAM Journal on Computing 17 Algorithmica 17 Science China. Information Sciences 17 Prikladnaya Diskretnaya Matematika 16 Mathematics of Computation 15 Computing 15 Journal of Symbolic Computation 15 Mathematical and Computer Modelling 14 Journal of Systems Science and Complexity 14 International Journal of Quantum Information 13 Computational Complexity 13 Mathematical Biosciences and Engineering 13 Journal of Shanghai Jiaotong University (Science) 12 Distributed Computing 12 Cybernetics and Systems Analysis 11 Journal of Combinatorial Optimization 10 Artificial Intelligence 10 Computers & Operations Research 10 Annals of Operations Research 10 Discrete Mathematics and Applications 10 Science in China. Series F 10 Symmetry 9 Operations Research Letters 9 Journal of Computer Science and Technology 9 Soft Computing 9 Journal of Applied Mathematics 9 Groups, Complexity, Cryptology 8 Chaos, Solitons and Fractals 8 Cryptologia 8 Journal of Parallel and Distributed Computing 8 Mathematical Programming. Series A. Series B 7 Physica A 7 Journal of Complexity 7 Applied Mathematics Letters 7 Nonlinear Dynamics 7 Journal of Applied Mathematics and Computing 6 Journal of Algebra 6 Journal of Computational and Applied Mathematics 6 Journal of Number Theory 6 SIAM Journal on Discrete Mathematics 6 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 6 Journal of Mathematical Sciences (New York) 6 International Journal of Modern Physics C 6 Electronic Commerce Research 6 Mathematics in Computer Science 6 Science China. Mathematics 6 Frontiers of Computer Science 5 The Mathematical Intelligencer 5 Mathematical Systems Theory 5 Journal of Information & Optimization Sciences 5 New Generation Computing 5 Journal of Automated Reasoning 5 Tatra Mountains Mathematical Publications 5 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 5 Annals of Mathematics and Artificial Intelligence 5 Theory of Computing Systems 5 EURASIP Journal on Advances in Signal Processing 5 Discrete Mathematics, Algorithms and Applications 4 Problems of Information Transmission 4 Networks 4 Combinatorica 4 Acta Applicandae Mathematicae 4 Linear Algebra and its Applications 4 Informatica (Vilnius) 4 Lobachevskii Journal of Mathematics 4 4 Journal of Discrete Algorithms 4 BIT. Nordisk Tidskrift for Informationsbehandling 4 Journal of Zhejiang University. Science A 4 Arabian Journal for Science and Engineering 4 JSIAM Letters 3 IEEE Transactions on Information Theory 3 Reviews of Modern Physics 3 BIT ...and 214 more Serials all top 5 Cited in 49 Fields 2,926 Information and communication theory, circuits (94-XX) 1,228 Computer science (68-XX) 406 Number theory (11-XX) 329 Quantum theory (81-XX) 235 Combinatorics (05-XX) 166 Operations research, mathematical programming (90-XX) 90 Algebraic geometry (14-XX) 73 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 55 Mathematical logic and foundations (03-XX) 54 Numerical analysis (65-XX) 45 Order, lattices, ordered algebraic structures (06-XX) 42 Group theory and generalizations (20-XX) 41 Commutative algebra (13-XX) 34 Dynamical systems and ergodic theory (37-XX) 28 Field theory and polynomials (12-XX) 22 Linear and multilinear algebra; matrix theory (15-XX) 19 Probability theory and stochastic processes (60-XX) 14 Statistics (62-XX) 13 Biology and other natural sciences (92-XX) 12 Associative rings and algebras (16-XX) 12 Geometry (51-XX) 12 Statistical mechanics, structure of matter (82-XX) 9 Systems theory; control (93-XX) 6 Convex and discrete geometry (52-XX) 6 Mathematics education (97-XX) 5 History and biography (01-XX) 4 Real functions (26-XX) 4 Ordinary differential equations (34-XX) 4 Partial differential equations (35-XX) 4 Mechanics of particles and systems (70-XX) 3 General and overarching topics; collections (00-XX) 3 Approximations and expansions (41-XX) 3 Harmonic analysis on Euclidean spaces (42-XX) 3 Abstract harmonic analysis (43-XX) 2 Measure and integration (28-XX) 2 Special functions (33-XX) 2 Difference and functional equations (39-XX) 2 Functional analysis (46-XX) 2 Operator theory (47-XX) 2 Fluid mechanics (76-XX) 2 Relativity and gravitational theory (83-XX) 1 General algebraic systems (08-XX) 1 Nonassociative rings and algebras (17-XX) 1 Sequences, series, summability (40-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 Differential geometry (53-XX) 1 Manifolds and cell complexes (57-XX) 1 Global analysis, analysis on manifolds (58-XX) 1 Classical thermodynamics, heat transfer (80-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.