A method for obtaining digital signatures and public-key cryptosystems RL Rivest, A Shamir, L Adleman Communications of the ACM 21 (2), 120-126, 1978 | 28651 | 1978 |
How to share a secret A Shamir Communications of the ACM 22 (11), 612-613, 1979 | 20064 | 1979 |
Identity-based cryptosystems and signature schemes A Shamir Advances in Cryptology: Proceedings of CRYPTO 84 4, 47-53, 1985 | 10491 | 1985 |
Differential cryptanalysis of DES-like cryptosystems E Biham, A Shamir Journal of CRYPTOLOGY 4, 3-72, 1991 | 6379* | 1991 |
How to prove yourself: Practical solutions to identification and signature problems A Fiat, A Shamir Conference on the theory and application of cryptographic techniques, 186-194, 1986 | 6239 | 1986 |
Visual cryptography M Naor, A Shamir Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 4206 | 1995 |
How to leak a secret RL Rivest, A Shamir, Y Tauman Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001 | 2552 | 2001 |
Differential fault analysis of secret key cryptosystems E Biham, A Shamir Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997 | 2374 | 1997 |
On the complexity of time table and multi-commodity flow problems S Even, A Itai, A Shamir 16th annual symposium on foundations of computer science (sfcs 1975), 184-193, 1975 | 2194 | 1975 |
Cache attacks and countermeasures: the case of AES DA Osvik, A Shamir, E Tromer Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006 | 1982 | 2006 |
Zero knowledge proofs of identity U Fiege, A Fiat, A Shamir Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987 | 1961 | 1987 |
Weaknesses in the key scheduling algorithm of RC4 S Fluhrer, I Mantin, A Shamir Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 …, 2001 | 1868 | 2001 |
Cryptographic communications system and method RL Rivest, A Shamir, LM Adleman US Patent 4,405,829, 1983 | 1830 | 1983 |
Quantitative analysis of the full bitcoin transaction graph D Ron, A Shamir Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 1478 | 2013 |
Ip= pspace A Shamir Journal of the ACM (JACM) 39 (4), 869-877, 1992 | 1272 | 1992 |
Efficient algorithms for solving overdefined systems of multivariate polynomial equations N Courtois, A Klimov, J Patarin, A Shamir International Conference on the Theory and Applications of Cryptographic …, 2000 | 1195 | 2000 |
PayWord and MicroMint: Two simple micropayment schemes RL Rivest, A Shamir International workshop on security protocols, 69-87, 1996 | 1118 | 1996 |
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials E Biham, A Biryukov, A Shamir Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999 | 1087* | 1999 |
Time-lock puzzles and timed-release crypto RL Rivest, A Shamir, DA Wagner | 874 | 1996 |
Differential cryptanalysis of the full 16-round DES E Biham, A Shamir Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993 | 799 | 1993 |