×
Author ID: shamir.adi Recent zbMATH articles by "Shamir, Adi"
Published as: Shamir, Adi; Shamir, A.
Homepage: https://www.wisdom.weizmann.ac.il/profile04/scientists/shamir-prof04.html
External Links: MGP · Wikidata · Google Scholar · dblp · GND · IdRef
Awards: Turing Award (2002)
Documents Indexed: 156 Publications since 1975, including 2 Books
1 Further Contribution
Biographic References: 1 Publication
Co-Authors: 93 Co-Authors with 133 Joint Publications
2,718 Co-Co-Authors
all top 5

Co-Authors

24 single-authored
34 Dunkelman, Orr
27 Keller, Nathan
23 Dinur, Itai
15 Biham, Eli
10 Biryukov, Alex
8 Ronen, Eyal
7 Tromer, Eran
6 Klimov, Alexander
6 Rivest, Ronald Linn
5 Feige, Uriel
5 Fiat, Amos
5 Hoch, Jonathan J.
5 Lapidot, Dror
4 Bar-On, Achiya
4 Manna, Zohar
3 Adleman, Leonard Max
3 Bouillaguet, Charles
3 Fouque, Pierre-Alain
3 Lenstra, Arjen K.
3 Naor, Moni
3 Tsaban, Boaz
2 Andreeva, Elena Anatol’evna
2 Carmeli, Yaniv
2 Dodis, Yevgeniy
2 Even, Shimon
2 Feldman, David Victor
2 Genkin, Daniel
2 Hod, Rani
2 Impagliazzo, Russell
2 Kelsey, John
2 Kipnis, Aviad
2 Mantin, Itsik
2 Nisan, Noam
2 Osvik, Dag Arne
2 Rudich, Steven
2 Ruinskiy, Dima
2 Schrift, A. W.
2 Stephens-Davidowitz, Noah
2 Tauman, Yael
2 van Someren, Nicko
2 Wichs, Daniel
2 Zimmer, Sebastien
1 Amon, Ohad
1 Aoki, Takafumi
1 Aumasson, Jean-Philippe
1 Barkan, Elad
1 Chen, Hsieh-Chung
1 Cheng, Chen-Mou
1 Chou, Tung
1 Courtois, Nicolas T.
1 Diffie, Whitfield
1 Dodson, Bruce A.
1 Dolev, Shlomi
1 Dubois, Vivien
1 Fluhrer, Scott R.
1 Frieze, Alan Michael
1 Goldreich, Oded
1 Güneysu, Tim
1 Gutman, Masha
1 Halevy, Dani
1 Håstad, Johan Torkel
1 Hellman, Martin Edward
1 Homma, Naofumi
1 Hughes, James P.
1 Itai, Alon
1 Kannan, Ravindran
1 Khovratovich, Dmitry
1 Kopeetsky, Marina
1 Kortsmit, Wil
1 Lagarias, Jeffrey C.
1 Lasry, Noam
1 Leyland, Paul C.
1 Meier, Willi
1 Merkle, Ralph Charles
1 Mityagin, Anton
1 Miyamoto, Atsushi
1 Naccache, David
1 Niederhagen, Ruben
1 Oren, Yossef
1 Paar, Christof
1 Patarin, Jacques
1 Phan, Raphael Chung-Wei
1 Polak, Inna
1 Richardson, Eran
1 Satoh, Akashi
1 Schnorr, Claus Peter
1 Schroeppel, Richard
1 Shallit, Jeffrey Outlaw
1 Simmons, Gustavus James
1 Stern, Jacques
1 Stern, Julien P.
1 Tomlinson, Jim
1 Wadge, William W.
1 Wagner, David A.
1 Williams, Hugh Cowie
1 Yang, Bo-Yin
1 Zimmermann, Ralf
1 Zippel, Richard E.

Publications by Year

Citations contained in zbMATH Open

145 Publications have been cited 6,427 times in 5,095 Documents Cited by Year
How to share a secret. Zbl 0414.94021
Shamir, Adi
1979
A method for obtaining digital signatures and public-key cryptosystems. Zbl 0368.94005
Rivest, R. L.; Shamir, A.; Adleman, L.
992
1978
Identity-based cryptosystems and signature schemes. Zbl 1359.94626
Shamir, Adi
500
1985
How to prove yourself: Practical solutions to identification and signature problems. Zbl 0636.94012
Fiat, Amos; Shamir, Adi
494
1987
Differential cryptanalysis of DES-like cryptosystems. Zbl 0729.68017
Biham, Eli; Shamir, Adi
365
1991
On the complexity of timetable and multicommodity flow problems. Zbl 0358.90021
Even, S.; Itai, A.; Shamir, A.
276
1976
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
143
2000
Differential cryptanalysis of DES-like cryptosystems. (Extended abstract). Zbl 0787.94014
Biham, Eli; Shamir, Adi
140
1991
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
135
2001
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
111
1995
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
110
1993
\(\mathrm{IP}=\mathrm{PSPACE}\). Zbl 0799.68096
Shamir, Adi
108
1992
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
99
1999
Zero-knowledge proofs of identity. Zbl 0659.94006
Feige, Uriel; Fiat, Amos; Shamir, Adi
93
1988
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
92
1997
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
89
2009
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
80
1999
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
75
1999
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
52
2000
A \(T=O(2^{n/2})\), \(S=O(2^{n/4})\) algorithm for certain NP-complete problems. Zbl 0462.68015
Schroeppel, Richard; Shamir, Adi
50
1981
Zero knowledge proofs of knowledge in two rounds. Zbl 0722.68045
Feige, U.; Shamir, A.
48
1990
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
47
2002
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
45
2002
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
44
1993
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
41
1998
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
41
2012
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
41
2010
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
39
2001
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
39
2006
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
36
2001
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
35
2007
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
33
2001
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
30
2011
Publicly verifiable non-interactive zero-knowledge proofs. Zbl 0800.68414
Lapidot, Dror; Shamir, Adi
29
1991
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
29
2009
Reconstructing truncated integer variables satisfying linear congruences. Zbl 0654.10006
Frieze, Alan M.; Håstad, Johan; Kannan, Ravi; Lagarias, Jeffrey C.; Shamir, Adi
28
1988
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
24
2006
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
24
2012
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
23
2012
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
23
1999
A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. Zbl 0552.94007
Shamir, Adi
22
1984
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
22
2001
A linear time algorithm for finding minimum cutsets in reducible graphs. Zbl 0422.05029
Shamir, Adi
22
1979
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
21
2008
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
20
2010
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
19
2004
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
18
2005
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
18
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
18
2010
Factoring numbers in O(log n) arithmetic steps. Zbl 0401.68018
Shamir, Adi
17
1979
The theoretical aspects of the optimal fixedpoint. Zbl 0358.68017
Manna, Zohar; Shamir, Adi
16
1976
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
15
2010
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
15
2012
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
15
2002
Efficient factoring based on partial information. Zbl 0589.94004
Rivest, Ronald L.; Shamir, Adi
14
1986
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
14
2014
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
13
1994
How to reuse a “write-once” memory. Zbl 0548.68046
Rivest, Ronald L.; Shamir, Adi
13
1982
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
13
2014
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
13
2013
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
12
2014
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
11
2004
On the generation of cryptographically strong pseudo-random sequences. Zbl 0462.94017
Shamir, Adi
11
1981
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
11
2011
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
10
2006
Differential cryptanalysis of Feal and \(N\)-Hash. Zbl 0777.94012
Biham, Eli; Shamir, Adi
9
1991
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
9
1997
The optimal approach to recursive programs. Zbl 0361.68022
Manna, Zohar; Shamir, Adi
9
1977
The convergence of functions to fixedpoints of recursive definitions. Zbl 0401.03016
Manna, Zohar; Shamir, Adi
9
1978
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
9
2015
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
9
2012
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
9
2005
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
9
2015
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
9
1999
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. (Extended abstract). Zbl 0825.94200
Biham, Eli; Shamir, Adi
8
1992
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
8
1999
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
8
2004
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
8
2010
How to find a battleship. Zbl 0673.90063
Fiat, Amos; Shamir, Adi
7
1989
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
7
2008
The retracing boomerang attack. Zbl 1479.94163
Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
7
2020
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
7
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2014
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
6
2001
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
6
2007
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
6
2003
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
6
2018
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
6
2014
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
6
2008
Polymorphic arrays: A novel VLSI layout for systolic computers. Zbl 0612.68005
Fiat, Amos; Shamir, Adi
5
1986
On the universality of the next bit test. Zbl 0786.94007
Schrift, A. W.; Shamir, A.
5
1991
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
5
1999
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
5
2003
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
5
1995
On the power of commutativity in cryptography. Zbl 0443.94014
Shamir, Adi
5
1980
Data types as objects. Zbl 0353.68050
Shamir, Adi; Wadge, William W.
5
1977
Secure communications and asymmetric cryptosystems. Zbl 0638.94012
4
1982
Multi-oracle interactive protocols with constant space verifiers. Zbl 0757.68050
Feige, Uriel; Shamir, Adi
4
1992
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
On the security of the Merkle-Hellman cryptographic scheme. Zbl 0431.94031
Shamir, Adi; Zippel, Richard E.
4
1980
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation. Zbl 1528.94044
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2023
Three third generation attacks on the format preserving encryption scheme FF3. Zbl 1479.94111
Amon, Ohad; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
3
2021
A method for obtaining digital signatures and public-key cryptosystems (1978). Zbl 1529.94001
Rivest, Ronald; Shamir, Adi; Adleman, Len
1
2021
The retracing boomerang attack. Zbl 1479.94163
Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
7
2020
New slide attacks on almost self-similar ciphers. Zbl 1479.94162
Dunkelman, Orr; Keller, Nathan; Lasry, Noam; Shamir, Adi
2
2020
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1457.94097
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2020
Efficient dissection of bicomposite problems with cryptanalytic applications. Zbl 1435.94127
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
3
2019
Improved key recovery attacks on reduced-round AES with practical data and memory complexities. Zbl 1436.94037
Bar-On, Achiya; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi
6
2018
Tight bounds on online checkpointing algorithms. Zbl 1484.68336
Bar-On, Achiya; Dinur, Itai; Dunkelman, Orr; Hod, Rani; Keller, Nathan; Ronen, Eyal; Shamir, Adi
1
2018
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2017
Acoustic cryptanalysis. Zbl 1377.94048
Genkin, Daniel; Shamir, Adi; Tromer, Eran
1
2017
Key recovery attacks on iterated Even-Mansour encryption schemes. Zbl 1365.94422
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
4
2016
Memory-efficient algorithms for finding needles in haystacks. Zbl 1372.94423
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
3
2016
New second-preimage attacks on hash functions. Zbl 1365.94397
Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien
2
2016
Bug attacks. Zbl 1365.94402
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
1
2016
Slidex attacks on the Even-Mansour encryption scheme. Zbl 1356.94056
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
9
2015
New attacks on Feistel structures with improved memory complexities. Zbl 1375.94120
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
9
2015
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1321.94055
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
4
2015
Improved top-down techniques in differential cryptanalysis. Zbl 1370.94505
Dinur, Itai; Dunkelman, Orr; Gutman, Masha; Shamir, Adi
3
2015
New attacks on IDEA with at least 6 rounds. Zbl 1377.94037
Biham, Eli; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
3
2015
Reflections on slide with a twist attacks. Zbl 1356.94055
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2015
Almost universal forgery attacks on AES-based MAC’s. Zbl 1359.94589
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
2
2015
Improved linear sieving techniques with applications to step-reduced LED-64. Zbl 1382.94090
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
1
2015
RSA key extraction via low-bandwidth acoustic cryptanalysis. Zbl 1345.94063
Genkin, Daniel; Shamir, Adi; Tromer, Eran
14
2014
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. Zbl 1321.94054
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
13
2014
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1301.94113
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
12
2014
Improved practical attacks on round-reduced Keccak. Zbl 1297.94064
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
7
2014
Cryptanalysis of iterated Even-Mansour schemes with two keys. Zbl 1306.94048
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
7
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
6
2014
Using random error correcting codes in near-collision attacks on generic hash-functions. Zbl 1337.94063
Polak, Inna; Shamir, Adi
2
2014
Key recovery attacks on 3-round Even-Mansour, 8-step LED-128, and full \(\mathrm{AES}^{2}\). Zbl 1327.94040
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
13
2013
Minimalism in cryptography: the Even-Mansour scheme revisited. Zbl 1297.94065
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
41
2012
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. Zbl 1294.94042
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi
24
2012
Improved attacks on full GOST. Zbl 1282.94040
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
23
2012
New attacks on Keccak-224 and Keccak-256. Zbl 1312.94044
Dinur, Itai; Dunkelman, Orr; Shamir, Adi
15
2012
Applying cube attacks to stream ciphers in realistic scenarios. Zbl 1285.94057
Dinur, Itai; Shamir, Adi
9
2012
Breaking Grain-128 with dynamic cube attacks. Zbl 1282.94042
Dinur, Itai; Shamir, Adi
30
2011
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. Zbl 1227.94042
Dinur, Itai; Güneysu, Tim; Paar, Christof; Shamir, Adi; Zimmermann, Ralf
11
2011
An improved algebraic attack on Hamsi-256. Zbl 1282.94041
Dinur, Itai; Shamir, Adi
3
2011
RFID authentication efficient proactive information security within computational security. Zbl 1208.94055
Dolev, Shlomi; Kopeetsky, Marina; Shamir, Adi
1
2011
Improved single-key attacks on 8-round AES-192 and AES-256. Zbl 1253.94045
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
41
2010
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. Zbl 1283.94064
Dunkelman, Orr; Keller, Nathan; Shamir, Adi
20
2010
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. Zbl 1280.94040
Biryukov, Alex; Dunkelman, Orr; Keller, Nathan; Khovratovich, Dmitry; Shamir, Adi
18
2010
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\). Zbl 1297.94055
Bouillaguet, Charles; Chen, Hsieh-Chung; Cheng, Chen-Mou; Chou, Tung; Niederhagen, Ruben; Shamir, Adi; Yang, Bo-Yin
18
2010
Efficient cache attacks on AES, and countermeasures. Zbl 1181.94106
Tromer, Eran; Osvik, Dag Arne; Shamir, Adi
15
2010
Structural cryptanalysis of SASAS. Zbl 1201.94076
Biryukov, Alex; Shamir, Adi
8
2010
Comparative power analysis of modular exponentiation algorithms. Zbl 1367.65222
Homma, Naofumi; Miyamoto, Atsushi; Aoki, Takafumi; Satoh, Akashi; Shamir, Adi
3
2010
Cube attacks on tweakable black box polynomials. Zbl 1239.94045
Dinur, Itai; Shamir, Adi
89
2009
Cube testers and key recovery attacks on reduced-round MD6 and Trivium. Zbl 1291.94051
Aumasson, Jean-Philippe; Dinur, Itai; Meier, Willi; Shamir, Adi
29
2009
Second preimage attacks on dithered hash functions. Zbl 1149.94302
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien
21
2008
Bug attacks. Zbl 1183.94022
Biham, Eli; Carmeli, Yaniv; Shamir, Adi
7
2008
SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. Zbl 1154.68410
Shamir, Adi
6
2008
On the strength of the concatenated hash combiner when all the hash functions are weak. Zbl 1155.94372
Hoch, Jonathan J.; Shamir, Adi
4
2008
Improved related-key attacks on DESX and DESX+. Zbl 1156.94374
Phan, Raphael C.-W.; Shamir, Adi
1
2008
Practical cryptanalysis of SFLASH. Zbl 1215.94043
Dubois, Vivien; Fouque, Pierre-Alain; Shamir, Adi; Stern, Jacques
35
2007
Length-based cryptanalysis: the case of Thompson’s group. Zbl 1130.94016
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
6
2007
Cryptanalysis of group-based key agreement protocols using subgroup distance functions. Zbl 1127.94026
Ruinskiy, Dima; Shamir, Adi; Tsaban, Boaz
4
2007
Remote password extraction from RFID tags. Zbl 1390.68282
Oren, Yossef; Shamir, Adi
1
2007
Cache attacks and countermeasures: the case of AES. Zbl 1125.94326
Osvik, Dag Arne; Shamir, Adi; Tromer, Eran
39
2006
Rigorous bounds on cryptanalytic time/memory tradeoffs. Zbl 1161.94384
Barkan, Elad; Biham, Eli; Shamir, Adi
24
2006
Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. Zbl 1234.94047
Hoch, Jonathan J.; Shamir, Adi
10
2006
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 1096.94023
Biham, Eli; Biryukov, Alex; Shamir, Adi
18
2005
New applications of T-functions in block ciphers and hash functions. Zbl 1140.68391
Klimov, Alexander; Shamir, Adi
9
2005
Fault analysis of stream ciphers. Zbl 1104.68479
Hoch, Jonathan J.; Shamir, Adi
19
2004
Cryptographic applications of T-functions. Zbl 1081.94030
Klimov, Alexander; Shamir, Adi
11
2004
New cryptographic primitives based on multiword T-functions. Zbl 1079.68547
Klimov, Alexander; Shamir, Adi
8
2004
Stream ciphers: dead or alive? (Abstract). Zbl 1094.94523
Shamir, Adi
3
2004
Factoring estimates for a 1024-bit RSA modulus. Zbl 1205.11129
Lenstra, Arjen; Tromer, Eran; Shamir, Adi; Kortsmit, Wil; Dodson, Bruce; Hughes, James; Leyland, Paul
6
2003
Factoring large numbers with the TWIRL device. Zbl 1122.94402
Shamir, Adi; Tromer, Eran
5
2003
A practical attack on broadcast RC4. Zbl 1073.68637
Mantin, Itsik; Shamir, Adi
47
2002
The LSD broadcast encryption scheme. Zbl 1026.94528
Halevy, Dani; Shamir, Adi
45
2002
A new class of invertible mappings. Zbl 1020.94522
Klimov, Alexander; Shamir, Adi
15
2002
Analysis of neural cryptography. Zbl 1065.94554
Klimov, Alexander; Mityagin, Anton; Shamir, Adi
2
2002
How to leak a secret. Zbl 1064.94558
Rivest, Ronald L.; Shamir, Adi; Tauman, Yael
135
2001
Improved online/offline signature schemes. Zbl 1003.94533
Shamir, Adi; Tauman, Yael
39
2001
Real time cryptanalysis of A5/1 on a PC. Zbl 0994.68640
Biryukov, Alex; Shamir, Adi; Wagner, David
36
2001
Weaknesses in the key scheduling algorithm of RC4. Zbl 1067.94530
Fluhrer, Scott; Mantin, Itsik; Shamir, Adi
33
2001
Structural cryptanalysis of SASAS. Zbl 0981.94015
Biryukov, Alex; Shamir, Adi
22
2001
Guaranteeing the diversity of number generators. Zbl 1013.94013
Shamir, Adi; Tsaban, Boaz
6
2001
Efficient algorithms for solving overdefined systems of multivariate polynomial equations. Zbl 1082.94514
Courtois, Nicolas; Klimov, Alexander; Patarin, Jacques; Shamir, Adi
143
2000
Cryptanalytic time/memory/data tradeoffs for stream ciphers. Zbl 0980.94013
Biryukov, Alex; Shamir, Adi
52
2000
Protecting smart cards from passive power analysis with detached power supplies. Zbl 0998.68656
Shamir, Adi
2
2000
Analysis and optimization of the twinkle factoring device. Zbl 1082.94525
Lenstra, Arjen K.; Shamir, Adi
1
2000
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. Zbl 0927.94013
Biham, Eli; Biryukov, Alex; Shamir, Adi
99
1999
Cryptanalysis of the HFE public key cryptosystem by relinearization. Zbl 0940.94012
Kipnis, Aviad; Shamir, Adi
80
1999
Multiple noninteractive zero knowledge proofs under general assumptions. Zbl 1018.94015
Feige, Uriel; Lapidot, Dror; Shamir, Adi
75
1999
Miss in the middle attacks on IDEA and Khufu. Zbl 0942.94010
Biham, Eli; Biryukov, Alex; Shamir, Adi
23
1999
How to copyright a function? Zbl 0935.68017
Naccache, David; Shamir, Adi; Stern, Julien P.
9
1999
Initial observations on skipjack: Cryptanalysis of Skipjack-3XOR. Zbl 0929.94009
Biham, Eli; Biryukov, Alex; Dunkelman, Orr; Richardson, Eran; Shamir, Adi
8
1999
Factoring large numbers with the TWINKLE device. (Extended abstract). Zbl 1044.11630
Shamir, Adi
5
1999
Cryptanalysis of the oil and vinegar signature scheme. Zbl 0931.94030
Kipnis, Aviad; Shamir, Adi
41
1998
Differential fault analysis of secret key cryptosystems. Zbl 0886.94010
Biham, Eli; Shamir, Adi
92
1997
Fully parallelized multi-prover protocols for NEXP-time. Zbl 0877.68078
Lapidot, Dror; Shamir, Adi
9
1997
Visual cryptography. Zbl 0878.94048
Naor, Moni; Shamir, Adi
111
1995
A one-round, two-prover, zero-knowledge protocol for NP. Zbl 0834.94015
Lapidot, Dror; Shamir, Adi
5
1995
Memory efficient variants of public-key schemes for smart card applications. Zbl 0885.94027
Shamir, Adi
2
1995
Efficient signature schemes based on birational permutations. Zbl 0877.94041
Shamir, Adi
13
1994
Differential cryptanalysis of the Data Encryption Standard. Zbl 0778.94005
Biham, Eli; Shamir, Adi
110
1993
Differential cryptanalysis of the full 16-round DES. Zbl 0809.94017
Biham, Eli; Shamir, Adi
44
1993
On dice and coins: Models of computation for random generation. Zbl 0772.68036
Feldman, David; Impagliazzo, Russell; Naor, Moni; Nisan, Noam; Rudich, Steven; Shamir, Adi
2
1993
...and 45 more Documents
all top 5

Cited by 7,008 Authors

50 Susilo, Willy
41 Wang, Huaxiong
37 Shamir, Adi
36 Dunkelman, Orr
36 Yung, Moti
30 Libert, Benoît
30 Maitra, Subhamoy
29 Sarkar, Santanu
28 Chang, Chin-Chen
28 De Santis, Alfredo
28 Keller, Nathan
28 Mu, Yi
27 Leander, Gregor
27 Lin, Dongdai
26 Cao, Zhenfu
26 Rijmen, Vincent
25 Ishai, Yuval
25 Waters, Brent
23 Nitaj, Abderrahmane
23 Wang, Meiqin
21 Padró, Carles
21 Takagi, Tsuyoshi
20 Calderini, Marco
20 Meier, Willi
20 Vaikuntanathan, Vinod
19 Stinson, Douglas Robert
19 Wu, Wenling
18 Dinur, Itai
18 Hazay, Carmit
18 Isobe, Takanori
18 Wen, Qiaoyan
17 Carlet, Claude
17 Goldreich, Oded
17 Herranz, Javier
17 Naya-Plasencia, María
17 Ostrovsky, Rafail
17 Paul, Goutam
17 Pointcheval, David
17 Preneel, Bart
17 Sahai, Amit
16 Bitansky, Nir
16 Chiesa, Alessandro
16 Gu, Dawu
16 Hu, Yupu
16 Komargodski, Ilan
16 Li, Chao
16 Ling, San
16 Qu, Longjiang
16 Smith-Tone, Daniel
16 Weng, Jian
15 Biham, Eli
15 Boneh, Dan
15 de Werra, Dominique
15 Knudsen, Lars Ramkilde
15 Mesnager, Sihem
15 Perrin, Léo
15 Pieprzyk, Josef P.
15 Safavi-Naini, Reihaneh
15 Sasaki, Yu
15 Todo, Yosuke
15 Venkitasubramaniam, Muthuramakrishnan
15 Wang, Xiaoyun
15 Yang, Guomin
14 Blundo, Carlo
14 Bogdanov, Andrey
14 Damgård, Ivan Bjerre
14 Ding, Jintai
14 Farràs, Oriol
14 Guo, Jian
14 Hu, Lei
14 Huang, Xinyi
14 Hwang, Minshiang
14 Li, Fagen
14 Nguyen, Khoa
14 Sakurai, Kouichi
14 Tan, Chik How
14 Venturi, Daniele
14 Wong, Duncan S.
14 Wu, Qianhong
14 Yuan, Pingzhi
13 Beimel, Amos
13 Budaghyan, Lilya
13 Chen, Xiu-Bo
13 Desmedt, Yvo G.
13 Dolev, Shlomi
13 Feng, Dengguo
13 Fouque, Pierre-Alain
13 Gaborit, Philippe
13 Garg, Sanjam
13 Gennaro, Rosario
13 Gong, Guang
13 Goyal, Vipul
13 Grassi, Lorenzo
13 Katsumata, Shuichi
13 Kunihiro, Noboru
13 Liu, Joseph K. K.
13 Naccache, David
13 Rothblum, Ron D.
13 Tang, Chunming
13 Tessaro, Stefano
...and 6,908 more Authors
all top 5

Cited in 343 Serials

278 Designs, Codes and Cryptography
224 Journal of Cryptology
219 Theoretical Computer Science
185 Information Sciences
175 Information Processing Letters
129 Quantum Information Processing
101 Discrete Applied Mathematics
97 Cryptography and Communications
71 Applied Mathematics and Computation
71 Finite Fields and their Applications
70 Journal of Discrete Mathematical Sciences & Cryptography
66 International Journal of Theoretical Physics
51 Journal of Computer and System Sciences
44 International Journal of Computer Mathematics
44 Journal of Mathematical Cryptology
41 Advances in Mathematics of Communications
39 Computers & Mathematics with Applications
38 Information and Computation
34 Matematicheskie Voprosy Kriptografii
33 Applicable Algebra in Engineering, Communication and Computing
32 Discrete Mathematics
32 Wuhan University Journal of Natural Sciences (WUJNS)
30 Science China. Information Sciences
25 European Journal of Operational Research
25 Pattern Recognition
24 SIAM Journal on Computing
24 Prikladnaya Diskretnaya Matematika
23 Physics Letters. A
23 International Journal of Foundations of Computer Science
22 Mathematical Problems in Engineering
19 Algorithmica
19 International Journal of Quantum Information
17 Mathematics of Computation
16 Computing
16 Journal of Systems Science and Complexity
15 Journal of Symbolic Computation
15 Mathematical and Computer Modelling
15 Computational Complexity
14 Cybernetics and Systems Analysis
13 Journal of Combinatorial Optimization
13 Journal of Shanghai Jiaotong University (Science)
12 Physica A
12 Distributed Computing
12 Mathematical Biosciences and Engineering
11 Artificial Intelligence
11 Soft Computing
10 Computers & Operations Research
10 Annals of Operations Research
10 Discrete Mathematics and Applications
10 Science in China. Series F
10 Groups, Complexity, Cryptology
10 Symmetry
9 Operations Research Letters
9 Journal of Computer Science and Technology
9 Journal of Applied Mathematics
8 Chaos, Solitons and Fractals
8 Cryptologia
8 Journal of Parallel and Distributed Computing
8 Mathematical Programming. Series A. Series B
8 Nonlinear Dynamics
8 Journal of Applied Mathematics and Computing
7 Journal of Complexity
7 Applied Mathematics Letters
7 SIAM Journal on Discrete Mathematics
7 Journal of Mathematical Sciences (New York)
6 Journal of Algebra
6 Journal of Computational and Applied Mathematics
6 Journal of Number Theory
6 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
6 Theory of Computing Systems
6 Informatica (Vilnius)
6 International Journal of Modern Physics C
6 Electronic Commerce Research
6 Mathematics in Computer Science
6 Science China. Mathematics
6 Frontiers of Computer Science
5 Problems of Information Transmission
5 The Mathematical Intelligencer
5 Mathematical Systems Theory
5 Networks
5 Journal of Information & Optimization Sciences
5 New Generation Computing
5 Journal of Automated Reasoning
5 Tatra Mountains Mathematical Publications
5 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
5 Annals of Mathematics and Artificial Intelligence
5 Lobachevskii Journal of Mathematics
5 EURASIP Journal on Advances in Signal Processing
5 Discrete Mathematics, Algorithms and Applications
5 Arabian Journal for Science and Engineering
5 JSIAM Letters
4 Acta Informatica
4 Combinatorica
4 Acta Applicandae Mathematicae
4 Graphs and Combinatorics
4 Linear Algebra and its Applications
4 Communications in Nonlinear Science and Numerical Simulation
4 International Journal of Applied Mathematics and Computer Science
4 Journal of Algebra and its Applications
4 Journal of Discrete Algorithms
...and 243 more Serials
all top 5

Cited in 54 Fields

4,015 Information and communication theory, circuits (94-XX)
1,598 Computer science (68-XX)
501 Quantum theory (81-XX)
486 Number theory (11-XX)
285 Combinatorics (05-XX)
194 Operations research, mathematical programming (90-XX)
117 Algebraic geometry (14-XX)
95 Game theory, economics, finance, and other social and behavioral sciences (91-XX)
65 Numerical analysis (65-XX)
60 Mathematical logic and foundations (03-XX)
54 Commutative algebra (13-XX)
49 Group theory and generalizations (20-XX)
45 Order, lattices, ordered algebraic structures (06-XX)
40 Dynamical systems and ergodic theory (37-XX)
38 Field theory and polynomials (12-XX)
26 Linear and multilinear algebra; matrix theory (15-XX)
24 Probability theory and stochastic processes (60-XX)
19 Statistical mechanics, structure of matter (82-XX)
18 Statistics (62-XX)
15 Associative rings and algebras (16-XX)
14 Systems theory; control (93-XX)
13 Geometry (51-XX)
12 Biology and other natural sciences (92-XX)
9 Convex and discrete geometry (52-XX)
7 Mechanics of particles and systems (70-XX)
6 Ordinary differential equations (34-XX)
6 Harmonic analysis on Euclidean spaces (42-XX)
6 Mathematics education (97-XX)
5 History and biography (01-XX)
4 General and overarching topics; collections (00-XX)
4 Real functions (26-XX)
4 Partial differential equations (35-XX)
3 General algebraic systems (08-XX)
3 Measure and integration (28-XX)
3 Difference and functional equations (39-XX)
3 Approximations and expansions (41-XX)
3 Abstract harmonic analysis (43-XX)
3 Functional analysis (46-XX)
3 Fluid mechanics (76-XX)
2 Special functions (33-XX)
2 Sequences, series, summability (40-XX)
2 Operator theory (47-XX)
2 Relativity and gravitational theory (83-XX)
1 Nonassociative rings and algebras (17-XX)
1 Category theory; homological algebra (18-XX)
1 Topological groups, Lie groups (22-XX)
1 Functions of a complex variable (30-XX)
1 Calculus of variations and optimal control; optimization (49-XX)
1 Differential geometry (53-XX)
1 General topology (54-XX)
1 Manifolds and cell complexes (57-XX)
1 Global analysis, analysis on manifolds (58-XX)
1 Optics, electromagnetic theory (78-XX)
1 Classical thermodynamics, heat transfer (80-XX)

Citations by Year

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.