default search action
Adi Shamir
Person information
- affiliation: Weizmann Institute of Science, Rehovot, Israel
- award (2002): Turing Award
- award (2017): BBVA Foundation Frontiers of Knowledge Award
- award (1996): Paris Kanellakis Award
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j65]Carsten Baum, Jens Berlips, Walther Chen, Ivan Bjerre Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Commun. Cryptol. 1(3): 10 (2024) - [j64]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum time/memory/data tradeoff attacks. Des. Codes Cryptogr. 92(1): 159-177 (2024) - [j63]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack, with Application to Reduced-Round AES. J. Cryptol. 37(3): 32 (2024) - [c148]Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. EUROCRYPT (3) 2024: 3-33 - [i68]Carsten Baum, Jens Berlips, Walther Chen, Hongrui Cui, Ivan Damgård, Jiangbin Dong, Kevin M. Esvelt, Mingyu Gao, Dana Gretton, Leonard Foner, Martin Kysel, Kaiyi Zhang, Juanru Li, Xiang Li, Omer Paneth, Ronald L. Rivest, Francesca Sage-Ling, Adi Shamir, Yue Shen, Meicen Sun, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Yun Wang, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu, Haoling Zhang:
A system capable of verifiably and privately screening global DNA synthesis. CoRR abs/2403.14023 (2024) - [i67]Odelia Melamed, Gilad Yehudai, Adi Shamir:
MALT Powers Up Adversarial Attacks. CoRR abs/2407.02240 (2024) - [i66]Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting. CoRR abs/2410.05750 (2024) - [i65]Nicholas Carlini, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting. IACR Cryptol. ePrint Arch. 2024: 1580 (2024) - [i64]Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Cryptol. ePrint Arch. 2024: 1613 (2024) - 2023
- [c147]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. EUROCRYPT (4) 2023: 98-127 - [i63]Irad Zehavi, Adi Shamir:
Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons. CoRR abs/2301.03118 (2023) - [i62]Adi Shamir, Isaac Andrés Canales Martinez, Anna Hambitzer, Jorge Chávez-Saab, Francisco Rodríguez-Henríquez, Nitin Satpute:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. CoRR abs/2310.08708 (2023) - [i61]Itai Dinur, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation. IACR Cryptol. ePrint Arch. 2023: 288 (2023) - [i60]Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir:
Polynomial Time Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2023: 1526 (2023) - 2022
- [c146]Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. USENIX Security Symposium 2022: 4401-4417 - 2021
- [j62]Raz Ben-Netanel, Ben Nassi, Adi Shamir, Yuval Elovici:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [c145]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c144]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c143]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. EUROCRYPT (2) 2021: 127-154 - [c142]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Error Resilient Space Partitioning (Invited Talk). ICALP 2021: 4:1-4:22 - [i59]Adi Shamir, Odelia Melamed, Oriel BenShmuel:
The Dimpled Manifold Model of Adversarial Examples in Machine Learning. CoRR abs/2106.10151 (2021) - [i58]Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3. IACR Cryptol. ePrint Arch. 2021: 335 (2021) - [i57]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum Time/Memory/Data Tradeoff Attacks. IACR Cryptol. ePrint Arch. 2021: 1561 (2021) - 2020
- [j61]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. J. Cryptol. 33(3): 1003-1043 (2020) - [j60]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ACM Trans. Algorithms 16(3): 31:1-31:22 (2020) - [c141]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-similar Ciphers. EUROCRYPT (1) 2020: 250-279 - [c140]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. EUROCRYPT (1) 2020: 280-309 - [i56]Orr Dunkelman, Zeev Geyzel, Chaya Keller, Nathan Keller, Eyal Ronen, Adi Shamir, Ran J. Tessler:
Consistent High Dimensional Rounding with Side Information. CoRR abs/2008.03675 (2020) - [i55]Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. IACR Cryptol. ePrint Arch. 2020: 708 (2020) - [i54]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020)
2010 – 2019
- 2019
- [j59]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications. J. Cryptol. 32(4): 1448-1490 (2019) - [j58]Ben Nassi, Adi Shamir, Yuval Elovici:
Xerox Day Vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2): 415-430 (2019) - [c139]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [c138]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Drones' Cryptanalysis - Smashing Cryptography with a Flicker. IEEE Symposium on Security and Privacy 2019: 1397-1414 - [i53]Adi Shamir, Itay Safran, Eyal Ronen, Orr Dunkelman:
A Simple Explanation for the Existence of Adversarial Examples with Small Hamming Distance. CoRR abs/1901.10861 (2019) - [i52]Orr Dunkelman, Nathan Keller, Noam Lasry, Adi Shamir:
New Slide Attacks on Almost Self-Similar Ciphers. IACR Cryptol. ePrint Arch. 2019: 509 (2019) - [i51]Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
The Retracing Boomerang Attack. IACR Cryptol. ePrint Arch. 2019: 1154 (2019) - 2018
- [j57]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a Zigbee Chain Reaction. IEEE Secur. Priv. 16(1): 54-62 (2018) - [c137]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. CCS 2018: 1397-1414 - [c136]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. CRYPTO (2) 2018: 185-212 - [c135]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Tight Bounds on Online Checkpointing Algorithms. ICALP 2018: 13:1-13:13 - [i50]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Streamed POI from Encrypted FPV Channel. CoRR abs/1801.03074 (2018) - [i49]Achiya Bar-On, Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir:
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities. IACR Cryptol. ePrint Arch. 2018: 527 (2018) - [i48]Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. IACR Cryptol. ePrint Arch. 2018: 747 (2018) - [i47]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - 2017
- [j56]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs. Algorithmica 79(4): 1196-1232 (2017) - [j55]Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. J. Cryptol. 30(2): 392-443 (2017) - [c134]Eyal Ronen, Adi Shamir, Achi-Or Weingarten, Colin O'Flynn:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IEEE Symposium on Security and Privacy 2017: 195-212 - [i46]Ben Nassi, Adi Shamir, Yuval Elovici:
Oops!...I think I scanned a malware. CoRR abs/1703.07751 (2017) - [i45]Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir:
Optimal Backup Strategies Against Cyber Attacks. CoRR abs/1704.02659 (2017) - 2016
- [j54]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer:
Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016) - [j53]Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer:
New Second-Preimage Attacks on Hash Functions. J. Cryptol. 29(4): 657-696 (2016) - [j52]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes. J. Cryptol. 29(4): 697-728 (2016) - [j51]Eli Biham, Yaniv Carmeli, Adi Shamir:
Bug Attacks. J. Cryptol. 29(4): 775-805 (2016) - [c133]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. CRYPTO (2) 2016: 185-206 - [c132]Eyal Ronen, Adi Shamir:
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. EuroS&P 2016: 3-12 - [i44]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Memory-Efficient Algorithms for Finding Needles in Haystacks. IACR Cryptol. ePrint Arch. 2016: 560 (2016) - [i43]Eyal Ronen, Colin O'Flynn, Adi Shamir, Achi-Or Weingarten:
IoT Goes Nuclear: Creating a ZigBee Chain Reaction. IACR Cryptol. ePrint Arch. 2016: 1047 (2016) - 2015
- [j50]Orr Dunkelman, Nathan Keller, Adi Shamir:
Almost universal forgery attacks on AES-based MAC's. Des. Codes Cryptogr. 76(3): 431-449 (2015) - [j49]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. Des. Codes Cryptogr. 77(2-3): 633-651 (2015) - [j48]Orr Dunkelman, Nathan Keller, Adi Shamir:
Slidex Attacks on the Even-Mansour Encryption Scheme. J. Cryptol. 28(1): 1-28 (2015) - [j47]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on IDEA with at Least 6 Rounds. J. Cryptol. 28(2): 209-239 (2015) - [j46]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. J. Cryptol. 28(3): 397-422 (2015) - [c131]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. CRYPTO (1) 2015: 433-454 - [c130]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. LATINCRYPT 2015: 139-156 - [i42]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Attacks on Feistel Structures with Improved Memory Complexities. IACR Cryptol. ePrint Arch. 2015: 146 (2015) - [i41]Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:
Improved Top-Down Techniques in Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 268 (2015) - 2014
- [j45]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Dissection: a new paradigm for solving bicomposite search problems. Commun. ACM 57(10): 98-105 (2014) - [j44]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Practical Attacks on Round-Reduced Keccak. J. Cryptol. 27(2): 183-209 (2014) - [j43]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. J. Cryptol. 27(4): 824-849 (2014) - [c129]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. ASIACRYPT (1) 2014: 439-457 - [c128]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs. CRYPTO (2) 2014: 37-54 - [c127]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461 - [c126]Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? Financial Cryptography Workshops 2014: 3-15 - [c125]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - [c124]Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. INDOCRYPT 2014: 219-236 - [i40]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs. IACR Cryptol. ePrint Arch. 2014: 167 (2014) - [i39]Inna Polak, Adi Shamir:
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. IACR Cryptol. ePrint Arch. 2014: 417 (2014) - [i38]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on Slide with a Twist Attacks. IACR Cryptol. ePrint Arch. 2014: 847 (2014) - 2013
- [c123]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. ASIACRYPT (1) 2013: 337-356 - [c122]Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. Financial Cryptography 2013: 6-24 - [c121]Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013: 219-240 - [i37]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2. IACR Cryptol. ePrint Arch. 2013: 391 (2013) - [i36]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. IACR Cryptol. ePrint Arch. 2013: 634 (2013) - [i35]Eli Biham, Yaniv Carmeli, Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. IACR Cryptol. ePrint Arch. 2013: 674 (2013) - [i34]Dorit Ron, Adi Shamir:
How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? IACR Cryptol. ePrint Arch. 2013: 782 (2013) - [i33]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 857 (2013) - 2012
- [j42]Itai Dinur, Adi Shamir:
Applying cube attacks to stream ciphers in realistic scenarios. Cryptogr. Commun. 4(3-4): 217-232 (2012) - [c120]Vint Cerf, John E. Hopcroft, Robert E. Kahn, Ronald L. Rivest, Adi Shamir:
Information, Data, Security in a Networked Future. ACM-TURING 2012: 14:1 - [c119]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. CRYPTO 2012: 719-740 - [c118]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. EUROCRYPT 2012: 336-354 - [c117]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. FSE 2012: 9-28 - [c116]Itai Dinur, Orr Dunkelman, Adi Shamir:
New Attacks on Keccak-224 and Keccak-256. FSE 2012: 442-461 - [i32]Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. IACR Cryptol. ePrint Arch. 2012: 217 (2012) - [i31]Adi Shamir, Eldad Zinger:
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. IACR Cryptol. ePrint Arch. 2012: 339 (2012) - [i30]Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. IACR Cryptol. ePrint Arch. 2012: 584 (2012) - [i29]Itai Dinur, Orr Dunkelman, Adi Shamir:
Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3. IACR Cryptol. ePrint Arch. 2012: 672 (2012) - 2011
- [j41]Shlomi Dolev, Marina Kopeetsky, Adi Shamir:
RFID Authentication Efficient Proactive Information Security within Computational Security. Theory Comput. Syst. 48(1): 132-149 (2011) - [c115]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. ASIACRYPT 2011: 327-343 - [c114]Itai Dinur, Adi Shamir:
An Improved Algebraic Attack on Hamsi-256. FSE 2011: 88-106 - [c113]Itai Dinur, Adi Shamir:
Breaking Grain-128 with Dynamic Cube Attacks. FSE 2011: 167-187 - [r2]Adi Shamir, Eran Tromer:
TWIRL. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1338-1339 - [i28]Orr Dunkelman, Nathan Keller, Adi Shamir:
ALRED Blues: New Attacks on AES-Based MAC's. IACR Cryptol. ePrint Arch. 2011: 95 (2011) - [i27]Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. IACR Cryptol. ePrint Arch. 2011: 282 (2011) - [i26]Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:
New Data-Efficient Attacks on Reduced-Round IDEA. IACR Cryptol. ePrint Arch. 2011: 417 (2011) - [i25]Orr Dunkelman, Nathan Keller, Adi Shamir:
Minimalism in Cryptography: The Even-Mansour Scheme Revisited. IACR Cryptol. ePrint Arch. 2011: 541 (2011) - [i24]Itai Dinur, Orr Dunkelman, Adi Shamir:
Improved Attacks on Full GOST. IACR Cryptol. ePrint Arch. 2011: 558 (2011) - [i23]Itai Dinur, Orr Dunkelman, Adi Shamir:
New attacks on Keccak-224 and Keccak-256. IACR Cryptol. ePrint Arch. 2011: 624 (2011) - 2010
- [j40]Eran Tromer, Dag Arne Osvik, Adi Shamir:
Efficient Cache Attacks on AES, and Countermeasures. J. Cryptol. 23(1): 37-71 (2010) - [j39]Alex Biryukov, Adi Shamir:
Structural Cryptanalysis of SASAS. J. Cryptol. 23(4): 505-518 (2010) - [j38]Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:
Comparative Power Analysis of Modular Exponentiation Algorithms. IEEE Trans. Computers 59(6): 795-807 (2010) - [c112]Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. ASIACRYPT 2010: 158-176 - [c111]Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. CHES 2010: 203-218 - [c110]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony. CRYPTO 2010: 393-410 - [c109]Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir:
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds. EUROCRYPT 2010: 299-319 - [c108]Itai Dinur, Adi Shamir:
Generic Analysis of Small Cryptographic Leaks. FDTC 2010: 39-48 - [i22]Orr Dunkelman, Nathan Keller, Adi Shamir:
A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. IACR Cryptol. ePrint Arch. 2010: 13 (2010)