Παρακολούθηση
Adi Shamir
Adi Shamir
Άγνωστη συνεργασία
Μη επαληθευμένη διεύθυνση ηλ. ταχυδρομείου
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
A method for obtaining digital signatures and public-key cryptosystems
RL Rivest, A Shamir, L Adleman
Communications of the ACM 21 (2), 120-126, 1978
278101978
How to share a secret
A Shamir
Communications of the ACM 22 (11), 612-613, 1979
194131979
Identity-based cryptosystems and signature schemes
A Shamir
Advances in Cryptology: Proceedings of CRYPTO 84 4, 47-53, 1985
102991985
Differential cryptanalysis of DES-like cryptosystems
E Biham, A Shamir
Journal of CRYPTOLOGY 4, 3-72, 1991
6157*1991
How to prove yourself: Practical solutions to identification and signature problems
A Fiat, A Shamir
Conference on the theory and application of cryptographic techniques, 186-194, 1986
59311986
Visual cryptography
M Naor, A Shamir
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
41131995
How to leak a secret
RL Rivest, A Shamir, Y Tauman
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
24472001
Differential fault analysis of secret key cryptosystems
E Biham, A Shamir
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997
23381997
On the complexity of time table and multi-commodity flow problems
S Even, A Itai, A Shamir
16th annual symposium on foundations of computer science (sfcs 1975), 184-193, 1975
21541975
Cache attacks and countermeasures: the case of AES
DA Osvik, A Shamir, E Tromer
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
18952006
Zero knowledge proofs of identity
U Fiege, A Fiat, A Shamir
Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987
18751987
Weaknesses in the key scheduling algorithm of RC4
S Fluhrer, I Mantin, A Shamir
Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 …, 2001
18442001
Cryptographic communications system and method
RL Rivest, A Shamir, LM Adleman
US Patent 4,405,829, 1983
18141983
Quantitative analysis of the full bitcoin transaction graph
D Ron, A Shamir
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
14282013
Ip= pspace
A Shamir
Journal of the ACM (JACM) 39 (4), 869-877, 1992
12541992
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
N Courtois, A Klimov, J Patarin, A Shamir
International Conference on the Theory and Applications of Cryptographic …, 2000
11622000
PayWord and MicroMint: Two simple micropayment schemes
RL Rivest, A Shamir
International workshop on security protocols, 69-87, 1996
11001996
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
E Biham, A Biryukov, A Shamir
Advances in Cryptology—EUROCRYPT’99: International Conference on the Theory …, 1999
1050*1999
Time-lock puzzles and timed-release crypto
RL Rivest, A Shamir, DA Wagner
8191996
Differential cryptanalysis of the full 16-round DES
E Biham, A Shamir
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
7811993
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20