Adi Shamir

Affiliations: 
 
Google:
"Adi Shamir"

Parents

Sign in to add mentor
Zohar Manna grad student (Philosophy Tree)

Children

Sign in to add trainee
Uriel Feige grad student
Amos Fiat grad student
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Dinur I, Dunkelman O, Keller N, et al. (2019) Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications Journal of Cryptology. 32: 1448-1490
Dinur I, Dunkelman O, Keller N, et al. (2015) Reflections on slide with a twist attacks Designs, Codes, and Cryptography
Dinur I, Dunkelman O, Keller N, et al. (2015) Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes Journal of Cryptology
Andreeva E, Bouillaguet C, Dunkelman O, et al. (2015) New Second-Preimage Attacks on Hash Functions Journal of Cryptology
Biham E, Dunkelman O, Keller N, et al. (2015) New Attacks on IDEA with at Least 6 Rounds Journal of Cryptology. 28: 209-239
Dunkelman O, Keller N, Shamir A. (2015) Improved Single-Key Attacks on 8-Round AES-192 and AES-256 Journal of Cryptology. 28: 397-422
Dinur I, Dunkelman O, Keller N, et al. (2014) Dissection: A new paradigm for solving bicomposite search problems Communications of the Acm. 57: 98-105
Dunkelman O, Keller N, Shamir A. (2014) Almost universal forgery attacks on AES-based MAC’s Designs, Codes, and Cryptography. 76: 431-449
Dodis Y, Shamir A, Stephens-Davidowitz N, et al. (2014) How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54
Dunkelman O, Keller N, Shamir A. (2014) A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony Journal of Cryptology. 27: 824-849
See more...