Adi Shamir
Orcid: 0000-0002-5422-905XAffiliations:
- Weizmann Institute of Science, Rehovot, Israel
According to our database1,
Adi Shamir
authored at least 224 papers
between 1975 and 2024.
Collaborative distances:
Collaborative distances:
Awards
Turing Prize recipient
Turing Prize 2002, "For RSA (algorithm)|their ingenious contribution for making public-key cryptography useful in practice." awarded to Ronald L. Rivest and Adi Shamir and Leonard M. Adleman.
ACM Fellow
ACM Fellow 2020, "For contributions to the field of cryptography".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cryptol., September, 2024
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting.
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons.
CoRR, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
2019
J. Cryptol., 2019
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs.
Algorithmica, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
J. Cryptol., 2014
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions.
IACR Cryptol. ePrint Arch., 2014
Commun. ACM, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
IACR Cryptol. ePrint Arch., 2012
Cryptogr. Commun., 2012
Proceedings of the ACM Turing Centenary Celebration, 2012
2011
RFID Authentication Efficient Proactive Information Security within Computational Security.
Theory Comput. Syst., 2011
IACR Cryptol. ePrint Arch., 2011
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
IACR Cryptol. ePrint Arch., 2011
2010
IEEE Trans. Computers, 2010
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak.
IACR Cryptol. ePrint Arch., 2008
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Theoretical Computer Science, 2006
2005
J. Cryptol., 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Financial Cryptography, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
SIAM J. Comput., 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
IACR Cryptol. ePrint Arch., 1996
Proceedings of the Security Protocols, 1996
1995
1994
Proceedings of the Advances in Cryptology, 1994
1993
Inf. Comput., June, 1993
J. Comput. Syst. Sci., 1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
Practical Cryptography - Recent Trends and Results.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993
Proceedings of the Advances in Cryptology, 1993
Springer, ISBN: 978-1-4613-9316-0, 1993
1992
J. Comput. Syst. Sci., 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Multiple Non-Interactive Zero Knowledge Proofs Based on a Single Random String (Extended Abstract)
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Proceedings: Fourth Annual Structure in Complexity Theory Conference, 1989
1988
SIAM J. Comput., 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the Advances in Cryptology, 1987
1986
J. Comput. Syst. Sci., 1986
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986
Shear Sort: A True Two-Dimensional Sorting Techniques for VLSI Networks.
Proceedings of the International Conference on Parallel Processing, 1986
Proceedings of the Advances in Cryptology, 1986
1985
Inf. Process. Lett., 1985
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985
Polymorphic Arrays: An Architecture for a Programmable Systolic Machine.
Proceedings of the International Conference on Parallel Processing, 1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1984
IEEE Trans. Inf. Theory, 1984
Inf. Process. Lett., 1984
Proceedings of the 16th Annual ACM Symposium on Theory of Computing, April 30, 1984
Proceedings of the Advances in Cryptology, 1984
Proceedings of the Advances in Cryptology, 1984
1983
ACM Trans. Comput. Syst., 1983
Inf. Process. Lett., 1983
Commun. ACM, 1983
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983
1982
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982
1981
A T=O(2<sup>n/2</sup>), S=O(2<sup>n/4</sup>) Algorithm for Certain NP-Complete Problems.
SIAM J. Comput., 1981
The Generation of Cryptographically Strong Pseudo-Random Sequences.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1980
IEEE Trans. Inf. Theory, 1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
SIAM J. Comput., 1979
Proceedings of the 11h Annual ACM Symposium on Theory of Computing, April 30, 1979
Proceedings of the 20th Annual Symposium on Foundations of Computer Science, 1979
1978
Theor. Comput. Sci., 1978
Commun. ACM, 1978
1977
1976
SIAM J. Comput., 1976
1975
Proceedings of the 7th Annual ACM Symposium on Theory of Computing, 1975
Proceedings of the 16th Annual Symposium on Foundations of Computer Science, 1975