关注
Adi Shamir
Adi Shamir
未知所在单位机构
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
286511978
How to share a secret
A Shamir
Communications of the ACM 22 (11), 612-613, 1979
200641979
Identity-based cryptosystems and signature schemes
A Shamir
Advances in Cryptology: Proceedings of CRYPTO 84 4, 47-53, 1985
104911985
Differential cryptanalysis of DES-like cryptosystems
E Biham, A Shamir
Journal of CRYPTOLOGY 4, 3-72, 1991
6379*1991
How to prove yourself: Practical solutions to identification and signature problems
A Fiat, A Shamir
Conference on the theory and application of cryptographic techniques, 186-194, 1986
62391986
Visual cryptography
M Naor, A Shamir
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
42061995
How to leak a secret
RL Rivest, A Shamir, Y Tauman
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
25522001
Differential fault analysis of secret key cryptosystems
E Biham, A Shamir
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997
23741997
On the complexity of time table and multi-commodity flow problems
S Even, A Itai, A Shamir
16th annual symposium on foundations of computer science (sfcs 1975), 184-193, 1975
21941975
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
19822006
Zero knowledge proofs of identity
U Fiege, A Fiat, A Shamir
Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987
19611987
Weaknesses in the key scheduling algorithm of RC4
S Fluhrer, I Mantin, A Shamir
Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 …, 2001
18682001
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
18301983
Quantitative analysis of the full bitcoin transaction graph
D Ron, A Shamir
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
14782013
Ip= pspace
A Shamir
Journal of the ACM (JACM) 39 (4), 869-877, 1992
12721992
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
N Courtois, A Klimov, J Patarin, A Shamir
International Conference on the Theory and Applications of Cryptographic …, 2000
11952000
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
11181996
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
E Biham, A Biryukov, A Shamir
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
1087*1999
Time-lock puzzles and timed-release crypto
RL Rivest, A Shamir, DA Wagner
8741996
Differential cryptanalysis of the full 16-round DES
E Biham, A Shamir
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
7991993
系统目前无法执行此操作,请稍后再试。
文章 1–20