


Остановите войну!
for scientists:


default search action
Adi Shamir
Person information

- affiliation: Weizmann Institute of Science, Rehovot, Israel
- award (2002): Turing Award
- award (2017): BBVA Foundation Frontiers of Knowledge Award
- award (1996): Paris Kanellakis Award
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c147]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [i63]Irad Zehavi, Adi Shamir:
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons. CoRR abs/2301.03118 (2023) - [i62]Adi Shamir, Isaac Canales-Martínez, Anna Hambitzer, Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Nitin Satpute:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. CoRR abs/2310.08708 (2023) - [i61]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i60]Isaac Canales-Martínez, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2023: 1526 (2023) - 2022
- [c146]Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. USENIX Security Symposium 2022: 4401-4417 - 2021
- [j62]Raz Ben-Netanel, Ben Nassi
, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [c145]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c144]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c143]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c142]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [i59]Adi Shamir, Odelia Melamed, Oriel BenShmuel:
The Dimpled Manifold Model of Adversarial Examples in Machine Learning. CoRR abs/2106.10151 (2021) - [i58]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i57]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j61]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j60]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod
, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c141]Orr Dunkelman
, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-similar Ciphers. EUROCRYPT (1) 2020: 250-279 - [c140]Orr Dunkelman
, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [i56]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i55]Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. IACR Cryptol. ePrint Arch. 2020: 708 (2020) - [i54]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020)
2010 – 2019
- 2019
- [j59]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [j58]Ben Nassi
, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2): 415-430 (2019) - [c139]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [c138]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Drones' Cryptanalysis - Smashing Cryptography with a Flicker. IEEE Symposium on Security and Privacy 2019: 1397-1414 - [i53]Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman:
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance. CoRR abs/1901.10861 (2019) - [i52]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. IACR Cryptol. ePrint Arch. 2019: 509 (2019) - [i51]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - 2018
- [j57]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a Zigbee Chain Reaction. IEEE Secur. Priv. 16(1): 54-62 (2018) - [c137]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c136]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c135]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod
, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i50]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Streamed POI from Encrypted FPV Channel. CoRR abs/1801.03074 (2018) - [i49]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i48]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i47]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - 2017
- [j56]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs. Algorithmica 79(4): 1196-1232 (2017) - [j55]Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. J. Cryptol. 30(2): 392-443 (2017) - [c134]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE Symposium on Security and Privacy 2017: 195-212 - [i46]Ben Nassi, Adi Shamir, Yuval Elovici:
Oops!...I think I scanned a malware. CoRR abs/1703.07751 (2017) - [i45]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - 2016
- [j54]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer:
Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016) - [j53]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque
, Jonathan J. Hoch, John Kelsey
, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - [j52]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [j51]Eli Biham, Yaniv Carmeli, Adi Shamir:
Bug Attacks. J. Cryptol. 29(4): 775-805 (2016) - [c133]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c132]Eyal Ronen, Adi Shamir:
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. EuroS&P 2016: 3-12 - [i44]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - [i43]Eyal Ronen, Colin O'Flynn, Adi Shamir, Achi-Or Weingarten:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IACR Cryptol. ePrint Arch. 2016: 1047 (2016) - 2015
- [j50]Orr Dunkelman, Nathan Keller, Adi Shamir:
Almost universal forgery attacks on AES-based MAC's. Des. Codes Cryptogr. 76(3): 431-449 (2015) - [j49]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [j48]Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. J. Cryptol. 28(1): 1-28 (2015) - [j47]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. J. Cryptol. 28(2): 209-239 (2015) - [j46]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. J. Cryptol. 28(3): 397-422 (2015) - [c131]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c130]Itai Dinur, Orr Dunkelman
, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. LATINCRYPT 2015: 139-156 - [i42]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - [i41]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 268 (2015) - 2014
- [j45]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j44]Itai Dinur, Orr Dunkelman
, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. J. Cryptol. 27(2): 183-209 (2014) - [j43]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. J. Cryptol. 27(4): 824-849 (2014) - [c129]Itai Dinur, Orr Dunkelman
, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c128]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs. CRYPTO (2) 2014: 37-54 - [c127]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461 - [c126]Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? Financial Cryptography Workshops 2014: 3-15 - [c125]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [c124]Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. INDOCRYPT 2014: 219-236 - [i40]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs. IACR Cryptol. ePrint Arch. 2014: 167 (2014) - [i39]Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. IACR Cryptol. ePrint Arch. 2014: 417 (2014) - [i38]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on Slide with a Twist Attacks. IACR Cryptol. ePrint Arch. 2014: 847 (2014) - 2013
- [c123]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. ASIACRYPT (1) 2013: 337-356 - [c122]Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. Financial Cryptography 2013: 6-24 - [c121]Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013: 219-240 - [i37]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. IACR Cryptol. ePrint Arch. 2013: 391 (2013) - [i36]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. IACR Cryptol. ePrint Arch. 2013: 634 (2013) - [i35]Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. IACR Cryptol. ePrint Arch. 2013: 674 (2013) - [i34]Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? IACR Cryptol. ePrint Arch. 2013: 782 (2013) - [i33]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 857 (2013) - 2012
- [j42]Itai Dinur, Adi Shamir:
Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3-4): 217-232 (2012) - [c120]Vint Cerf, John E. Hopcroft, Robert E. Kahn, Ronald L. Rivest, Adi Shamir:
Information, Data, Security in a Networked Future. ACM-TURING 2012: 14:1 - [c119]Itai Dinur, Orr Dunkelman
, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. CRYPTO 2012: 719-740 - [c118]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. EUROCRYPT 2012: 336-354 - [c117]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. FSE 2012: 9-28 - [c116]Itai Dinur, Orr Dunkelman, Adi Shamir:
New Attacks on Keccak-224 and Keccak-256. FSE 2012: 442-461 - [i32]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. IACR Cryptol. ePrint Arch. 2012: 217 (2012) - [i31]Adi Shamir, Eldad Zinger:
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. IACR Cryptol. ePrint Arch. 2012: 339 (2012) - [i30]Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. IACR Cryptol. ePrint Arch. 2012: 584 (2012) - [i29]Itai Dinur, Orr Dunkelman, Adi Shamir:
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3. IACR Cryptol. ePrint Arch. 2012: 672 (2012) - 2011
- [j41]Shlomi Dolev
, Marina Kopeetsky, Adi Shamir:
RFID Authentication Efficient Proactive Information Security within Computational Security. Theory Comput. Syst. 48(1): 132-149 (2011) - [c115]Itai Dinur, Tim Güneysu
, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. ASIACRYPT 2011: 327-343 - [c114]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. FSE 2011: 88-106 - [c113]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. FSE 2011: 167-187 - [r2]Adi Shamir, Eran Tromer:
TWIRL. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1338-1339 - [i28]Orr Dunkelman, Nathan Keller, Adi Shamir:
ALRED Blues: New Attacks on AES-Based MAC's. IACR Cryptol. ePrint Arch. 2011: 95 (2011) - [i27]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2011: 282 (2011) - [i26]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Data-Efficient Attacks on Reduced-Round IDEA. IACR Cryptol. ePrint Arch. 2011: 417 (2011) - [i25]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. IACR Cryptol. ePrint Arch. 2011: 541 (2011) - [i24]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. IACR Cryptol. ePrint Arch. 2011: 558 (2011) - [i23]Itai Dinur, Orr Dunkelman, Adi Shamir:
New attacks on Keccak-224 and Keccak-256. IACR Cryptol. ePrint Arch. 2011: 624 (2011) - 2010
- [j40]Eran Tromer, Dag Arne Osvik, Adi Shamir:
Efficient Cache Attacks on AES, and Countermeasures. J. Cryptol. 23(1): 37-71 (2010) - [j39]Alex Biryukov
, Adi Shamir:
Structural Cryptanalysis of SASAS. J. Cryptol. 23(4): 505-518 (2010) - [j38]Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Comparative Power Analysis of Modular Exponentiation Algorithms. IEEE Trans. Computers 59(6): 795-807 (2010) - [c112]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. ASIACRYPT 2010: 158-176 - [c111]Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou
, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. CHES 2010: 203-218 - [c110]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. CRYPTO 2010: 393-410 - [c109]Alex Biryukov
, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [c108]Itai Dinur, Adi Shamir:
Generic Analysis of Small Cryptographic Leaks. FDTC 2010: 39-48 - [i22]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. IACR Cryptol. ePrint Arch. 2010: 13 (2010) - [i21]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. IACR Cryptol. ePrint Arch. 2010: 313 (2010) - [i20]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-round AES. IACR Cryptol. ePrint Arch. 2010: 322 (2010) - [i19]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. IACR Cryptol. ePrint Arch. 2010: 570 (2010) - [i18]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. IACR Cryptol. ePrint Arch. 2010: 602 (2010)
2000 – 2009
- 2009
- [c107]Itai Dinur, Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials. EUROCRYPT 2009: 278-299 - [c106]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. FSE 2009: 1-22 - [i17]Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir:
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium. Symmetric Cryptography 2009 - [i16]Shlomi Dolev, Marina Kopeetsky, Adi Shamir:
RFID Authentication, Efficient Proactive Information Security within Computational Security. CoRR abs/0903.5177 (2009) - [i15]Dmitry Frumkin, Adi Shamir:
Un-Trusted-HB: Security Vulnerabilities of Trusted-HB. IACR Cryptol. ePrint Arch. 2009: 44 (2009) - [i14]Itai Dinur, Adi Shamir:
Side Channel Cube Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2009: 127 (2009) - [i13]