Search filters

List of works by Adi Shamir

A method for obtaining digital signatures and public-key cryptosystems

article

A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem

Applying cube attacks to stream ciphers in realistic scenarios

scientific article published in 2012

Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials

scholarly article

Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization

Differential Cryptanalysis of DES-like Cryptosystems

Differential Cryptanalysis of Feal and N-Hash

scholarly article

Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer

article

Differential Cryptanalysis of the Data Encryption Standard

scholarly article published 1993

Differential cryptanalysis of DES-like cryptosystems

scholarly article by Eli Biham & Adi Shamir published 1991 in Journal of Cryptology

Factoring Large Numbers with the TWINKLE Device

Factoring Large Numbers with the TWIRL Device

scholarly article

How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?

conference paper published in 2014

How to Prove Yourself: Practical Solutions to Identification and Signature Problems

scientific article

How to share a secret

scientific article by Adi Shamir

IP = PSPACE

Improved Attacks on Full GOST

Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes

scientific article published in 2015

Miss in the Middle Attacks on IDEA and Khufu

scholarly article

New Second-Preimage Attacks on Hash Functions

Power Analysis of the Key Scheduling of the AES Candidates

Quantitative Analysis of the Full Bitcoin Transaction Graph

conference paper published in 2013

Reconstructing Truncated Integer Variables Satisfying Linear Congruences

Remote Password Extraction from RFID Tags

Second Preimage Attacks on Dithered Hash Functions

scholarly article

Slidex Attacks on the Even–Mansour Encryption Scheme

scientific article published in 2013

The Steganographic File System

scientific article (publication date: 1998)

Tight Bounds on Online Checkpointing Algorithms

scientific article published in 2020

Time-Memory Trade-offs

article

Weaknesses in the Key Scheduling Algorithm of RC4

Xerox Day Vulnerability

scientific article published in 2019

Zero-Knowledge Proofs of Identity

scholarly article