Adi Shamir
Orcid: 0000-0002-5422-905XAffiliations:
- Weizmann Institute of Science, Rehovot, Israel
According to our database1,
Adi Shamir
authored at least 225 papers
between 1975 and 2025.
Collaborative distances:
Collaborative distances:
Awards
Turing Prize recipient
Turing Prize 2002, "For RSA (algorithm)|their ingenious contribution for making public-key cryptography useful in practice." awarded to Ronald L. Rivest and Adi Shamir and Leonard M. Adleman.
ACM Fellow
ACM Fellow 2020, "For contributions to the field of cryptography".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
J. Cryptol., September, 2024
CoRR, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons.
CoRR, 2023
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
2021
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
J. Cryptol., 2019
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance.
CoRR, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Commun. ACM, 2014
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES<sup>2</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Cryptogr. Commun., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the ACM Turing Centenary Celebration, 2012
2011
RFID Authentication Efficient Proactive Information Security within Computational Security.
Theory Comput. Syst., 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
IEEE Trans. Computers, 2010
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Theoretical Computer Science, 2006
2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Financial Cryptography, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
SIAM J. Comput., 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Security Protocols, 1996
Proceedings of the Security Protocols, 1996
1994
Proceedings of the Advances in Cryptology, 1994
1993
J. Comput. Syst. Sci., 1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
Practical Cryptography - Recent Trends and Results.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993
Proceedings of the Advances in Cryptology, 1993
Springer, ISBN: 978-1-4613-9316-0, 1993
1992
J. Comput. Syst. Sci., 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990
Multiple Non-Interactive Zero Knowledge Proofs Based on a Single Random String (Extended Abstract)
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Automata, Languages and Programming, 16th International Colloquium, 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Proceedings: Fourth Annual Structure in Complexity Theory Conference, 1989
1988
SIAM J. Comput., 1988
Proceedings of the Advances in Cryptology, 1988
1987
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987
Proceedings of the Advances in Cryptology, 1987
1986
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986
Shear Sort: A True Two-Dimensional Sorting Techniques for VLSI Networks.
Proceedings of the International Conference on Parallel Processing, 1986
Proceedings of the Advances in Cryptology, 1986
1985
Inf. Process. Lett., 1985
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985
Polymorphic Arrays: An Architecture for a Programmable Systolic Machine.
Proceedings of the International Conference on Parallel Processing, 1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1984
Inf. Process. Lett., 1984
Proceedings of the 16th Annual ACM Symposium on Theory of Computing, April 30, 1984
Proceedings of the 25th Annual Symposium on Foundations of Computer Science, 1984
Proceedings of the Advances in Cryptology, 1984
Proceedings of the Advances in Cryptology, 1984
1983
ACM Trans. Comput. Syst., 1983
Inf. Process. Lett., 1983
Commun. ACM, 1983
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983
1982
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982
1981
A T=O(2<sup>n/2</sup>), S=O(2<sup>n/4</sup>) Algorithm for Certain NP-Complete Problems.
SIAM J. Comput., 1981
Proceedings of the Automata, 1981
1980
IEEE Trans. Inf. Theory, 1980
Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980
1979
SIAM J. Comput., 1979
Proceedings of the 11h Annual ACM Symposium on Theory of Computing, April 30, 1979
Proceedings of the 20th Annual Symposium on Foundations of Computer Science, 1979
1978
Theor. Comput. Sci., 1978
Commun. ACM, 1978
1977
1976
SIAM J. Comput., 1976
1975
Proceedings of the 7th Annual ACM Symposium on Theory of Computing, 1975
Proceedings of the 16th Annual Symposium on Foundations of Computer Science, 1975