Adi Shamir

From MaRDI portal
Person:321301


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polynomial time cryptanalytic extraction of neural network models
 
2024-11-13Paper
The retracing boomerang attack, with application to reduced-round AES
Journal of Cryptology
2024-08-30Paper
Quantum time/memory/data tradeoff attacks
Designs, Codes and Cryptography
2024-01-15Paper
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
scientific article; zbMATH DE number 7526293 (Why is no real title available?)
 
2022-05-12Paper
scientific article; zbMATH DE number 7526294 (Why is no real title available?)
 
2022-05-12Paper
Three third generation attacks on the format preserving encryption scheme FF3
 
2021-12-08Paper
New slide attacks on almost self-similar ciphers
 
2021-12-01Paper
The retracing boomerang attack
 
2021-12-01Paper
Tight bounds on online checkpointing algorithms
 
2021-07-28Paper
Tight Bounds on Online Checkpointing Algorithms
ACM Transactions on Algorithms
2021-05-03Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Journal of Cryptology
2020-06-15Paper
Efficient dissection of bicomposite problems with cryptanalytic applications
Journal of Cryptology
2019-11-27Paper
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
Lecture Notes in Computer Science
2018-09-26Paper
Remote Password Extraction from RFID Tags
IEEE Transactions on Computers
2018-06-12Paper
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs
Algorithmica
2018-01-05Paper
Comparative Power Analysis of Modular Exponentiation Algorithms
IEEE Transactions on Computers
2017-07-27Paper
Acoustic cryptanalysis
Journal of Cryptology
2017-05-22Paper
Identity-based cryptosystems and signature schemes
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2017-04-10Paper
Memory-Efficient Algorithms for Finding Needles in Haystacks
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Key recovery attacks on iterated Even-Mansour encryption schemes
Journal of Cryptology
2016-10-13Paper
New second-preimage attacks on hash functions
Journal of Cryptology
2016-10-13Paper
Bug attacks
Journal of Cryptology
2016-10-13Paper
New attacks on Feistel structures with improved memory complexities
Lecture Notes in Computer Science
2015-12-10Paper
Reflections on slide with a twist attacks
Designs, Codes and Cryptography
2015-10-26Paper
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials
Fast Software Encryption
2015-09-18Paper
Improved linear sieving techniques with applications to step-reduced LED-64
Fast Software Encryption
2015-09-18Paper
Improved top-down techniques in differential cryptanalysis
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Using random error correcting codes in near-collision attacks on generic hash-functions
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Almost universal forgery attacks on AES-based MAC's
Designs, Codes and Cryptography
2015-09-01Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Journal of Cryptology
2015-08-03Paper
New attacks on IDEA with at least 6 rounds
Journal of Cryptology
2015-05-12Paper
On the generation of multivariate polynomials which are hard to factor
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93
2015-05-07Paper
Slidex attacks on the Even-Mansour encryption scheme
Journal of Cryptology
2015-03-25Paper
Cryptanalysis of iterated Even-Mansour schemes with two keys
Lecture Notes in Computer Science
2015-01-16Paper
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
Journal of Cryptology
2015-01-07Paper
Improved practical attacks on round-reduced Keccak
Journal of Cryptology
2014-09-25Paper
How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
RSA key extraction via low-bandwidth acoustic cryptanalysis
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Applying cube attacks to stream ciphers in realistic scenarios
Cryptography and Communications
2013-06-24Paper
New attacks on Keccak-224 and Keccak-256
Fast Software Encryption
2013-01-08Paper
Improved Attacks on Full GOST
Fast Software Encryption
2013-01-08Paper
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems
Lecture Notes in Computer Science
2012-09-25Paper
Minimalism in cryptography: the Even-Mansour scheme revisited
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware
Lecture Notes in Computer Science
2011-12-02Paper
An improved algebraic attack on Hamsi-256
Fast Software Encryption
2011-07-07Paper
Breaking Grain-128 with dynamic cube attacks
Fast Software Encryption
2011-07-07Paper
RFID authentication efficient proactive information security within computational security
Theory of Computing Systems
2011-04-01Paper
Improved single-key attacks on 8-round AES-192 and AES-256
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Structural cryptanalysis of SASAS
Journal of Cryptology
2010-11-12Paper
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\)
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Efficient cache attacks on AES, and countermeasures
Journal of Cryptology
2010-03-01Paper
Factoring estimates for a 1024-bit RSA modulus
Lecture Notes in Computer Science
2010-01-05Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Fast Software Encryption
2009-08-11Paper
Cube Attacks on Tweakable Black Box Polynomials
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
Fast Software Encryption
2009-04-02Paper
Improved Related-key Attacks on DESX and DESX+
Cryptologia
2009-03-23Paper
Practical Cryptanalysis of SFLASH
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Bug Attacks
Lecture Notes in Computer Science
2009-02-10Paper
SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
Fast Software Encryption
2008-09-18Paper
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
Automata, Languages and Programming
2008-08-19Paper
Second Preimage Attacks on Dithered Hash Functions
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Length-based cryptanalysis: the case of Thompson's group
Journal of Mathematical Cryptology
2008-02-21Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
Lecture Notes in Computer Science
2007-09-04Paper
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Public Key Cryptography – PKC 2007
2007-09-04Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
Journal of Cryptology
2006-08-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
 
2006-03-01Paper
Analysis and optimization of the twinkle factoring device
 
2006-03-01Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Stream Ciphers: Dead or Alive?
 
2005-08-12Paper
scientific article; zbMATH DE number 2102677 (Why is no real title available?)
 
2004-09-24Paper
scientific article; zbMATH DE number 2088326 (Why is no real title available?)
 
2004-08-12Paper
A Practical Attack on Broadcast RC4
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2085191 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2081086 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 1979303 (Why is no real title available?)
 
2003-09-11Paper
scientific article; zbMATH DE number 1962160 (Why is no real title available?)
 
2003-08-10Paper
Analysis of Neural Cryptography
Lecture Notes in Computer Science
2003-07-16Paper
Analysis of Bernstein’s Factorization Circuit
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942412 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1878330 (Why is no real title available?)
 
2003-03-09Paper
Guaranteeing the diversity of number generators
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1842501 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1759283 (Why is no real title available?)
 
2002-11-28Paper
scientific article; zbMATH DE number 1759258 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1408377 (Why is no real title available?)
 
2002-05-05Paper
scientific article; zbMATH DE number 1722688 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583765 (Why is no real title available?)
 
2001-07-03Paper
scientific article; zbMATH DE number 1418284 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1418249 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1304130 (Why is no real title available?)
 
2000-02-01Paper
scientific article; zbMATH DE number 1303123 (Why is no real title available?)
 
2000-01-10Paper
Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions
SIAM Journal on Computing
1999-10-28Paper
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials
Advances in Cryptology — EUROCRYPT ’99
1999-10-05Paper
scientific article; zbMATH DE number 1341875 (Why is no real title available?)
 
1999-09-22Paper
scientific article; zbMATH DE number 1302851 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1504795 (Why is no real title available?)
 
1999-01-01Paper
scientific article; zbMATH DE number 1088257 (Why is no real title available?)
 
1998-05-12Paper
Fully parallelized multi-prover protocols for NEXP-time
Journal of Computer and System Sciences
1997-12-08Paper
scientific article; zbMATH DE number 1088940 (Why is no real title available?)
 
1997-11-18Paper
scientific article; zbMATH DE number 1088898 (Why is no real title available?)
 
1997-11-18Paper
scientific article; zbMATH DE number 1024040 (Why is no real title available?)
 
1997-06-18Paper
A one-round, two-prover, zero-knowledge protocol for NP
Combinatorica
1996-04-10Paper
scientific article; zbMATH DE number 708826 (Why is no real title available?)
 
1995-03-30Paper
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-09-20Paper
IP = PSPACE
Journal of the ACM
1994-08-21Paper
scientific article; zbMATH DE number 503265 (Why is no real title available?)
 
1994-05-16Paper
scientific article; zbMATH DE number 503238 (Why is no real title available?)
 
1994-03-07Paper
Universal tests for nonuniform distributions
Journal of Cryptology
1994-02-21Paper
scientific article; zbMATH DE number 417582 (Why is no real title available?)
 
1993-09-19Paper
On dice and coins: Models of computation for random generation
Information and Computation
1993-08-30Paper
Differential Cryptanalysis of Feal and N-Hash
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 176551 (Why is no real title available?)
 
1993-05-18Paper
scientific article; zbMATH DE number 176547 (Why is no real title available?)
 
1993-05-18Paper
Multi-oracle interactive protocols with constant space verifiers
Journal of Computer and System Sciences
1992-09-27Paper
scientific article; zbMATH DE number 4191107 (Why is no real title available?)
 
1991-01-01Paper
Differential cryptanalysis of DES-like cryptosystems
Journal of Cryptology
1991-01-01Paper
scientific article; zbMATH DE number 4191106 (Why is no real title available?)
 
1990-01-01Paper
scientific article; zbMATH DE number 4117876 (Why is no real title available?)
 
1989-01-01Paper
How to find a battleship
Networks
1989-01-01Paper
Zero-knowledge proofs of identity
Journal of Cryptology
1988-01-01Paper
Reconstructing Truncated Integer Variables Satisfying Linear Congruences
SIAM Journal on Computing
1988-01-01Paper
scientific article; zbMATH DE number 4123668 (Why is no real title available?)
 
1987-01-01Paper
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
Advances in Cryptology — CRYPTO’ 86
1987-01-01Paper
Efficient Factoring Based on Partial Information
Advances in Cryptology — EUROCRYPT’ 85
1986-01-01Paper
Polymorphic arrays: A novel VLSI layout for systolic computers
Journal of Computer and System Sciences
1986-01-01Paper
scientific article; zbMATH DE number 3963720 (Why is no real title available?)
 
1986-01-01Paper
Number-theoretic functions which are equivalent to number of divisors
Information Processing Letters
1985-01-01Paper
Generalized 'write-once' memories
IEEE Transactions on Information Theory
1984-01-01Paper
A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem
IEEE Transactions on Information Theory
1984-01-01Paper
scientific article; zbMATH DE number 3865148 (Why is no real title available?)
 
1983-01-01Paper
Embedding cryptographic trapdoors in arbitrary knapsack systems
Information Processing Letters
1983-01-01Paper
How to reuse a “write-once≓ memory
Information and Control
1982-01-01Paper
A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
SIAM Journal on Computing
1981-01-01Paper
scientific article; zbMATH DE number 3724342 (Why is no real title available?)
 
1981-01-01Paper
On the power of commutativity in cryptography
Automata, Languages and Programming
1980-01-01Paper
On the security of the Merkle- Hellman cryptographic scheme (Corresp.)
IEEE Transactions on Information Theory
1980-01-01Paper
How to share a secret
Communications of the ACM
1979-01-01Paper
A Linear Time Algorithm for Finding Minimum Cutsets in Reducible Graphs
SIAM Journal on Computing
1979-01-01Paper
Factoring numbers in O(log n) arithmetic steps
Information Processing Letters
1979-01-01Paper
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
1978-01-01Paper
The convergence of functions to fixedpoints of recursive definitions
Theoretical Computer Science
1978-01-01Paper
The optimal approach to recursive programs
Communications of the ACM
1977-01-01Paper
scientific article; zbMATH DE number 3550165 (Why is no real title available?)
 
1977-01-01Paper
scientific article; zbMATH DE number 3657802 (Why is no real title available?)
 
1976-01-01Paper
On the Complexity of Timetable and Multicommodity Flow Problems
SIAM Journal on Computing
1976-01-01Paper
The Theoretical Aspects of the Optimal Fixedpoint
SIAM Journal on Computing
1976-01-01Paper
scientific article; zbMATH DE number 3569796 (Why is no real title available?)
 
1975-01-01Paper


Research outcomes over time


This page was built for person: Adi Shamir