Adi Shamir


Ontology type: schema:Person     


Person Info

NAME

Adi

SURNAME

Shamir

Publications in SciGraph latest 50 shown

  • 2018-08-21 Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications in JOURNAL OF CRYPTOLOGY
  • 2018-07-24 Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities in ADVANCES IN CRYPTOLOGY – CRYPTO 2018
  • 2017-04 Acoustic Cryptanalysis in JOURNAL OF CRYPTOLOGY
  • 2016-10 Key Recovery Attacks on Iterated Even–Mansour Encryption Schemes in JOURNAL OF CRYPTOLOGY
  • 2016-10 New Second-Preimage Attacks on Hash Functions in JOURNAL OF CRYPTOLOGY
  • 2016-10 Bug Attacks in JOURNAL OF CRYPTOLOGY
  • 2016 Memory-Efficient Algorithms for Finding Needles in Haystacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2015-12 Reflections on slide with a twist attacks in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-09 Almost universal forgery attacks on AES-based MAC’s in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-07 Improved Single-Key Attacks on 8-Round AES-192 and AES-256 in JOURNAL OF CRYPTOLOGY
  • 2015-04 New Attacks on IDEA with at Least 6 Rounds in JOURNAL OF CRYPTOLOGY
  • 2015 Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 in FAST SOFTWARE ENCRYPTION
  • 2015 Improved Top-Down Techniques in Differential Cryptanalysis in PROGRESS IN CRYPTOLOGY -- LATINCRYPT 2015
  • 2015 New Attacks on Feistel Structures with Improved Memory Complexities in ADVANCES IN CRYPTOLOGY -- CRYPTO 2015
  • 2015-01 Slidex Attacks on the Even–Mansour Encryption Scheme in JOURNAL OF CRYPTOLOGY
  • 2014-10-25 Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions in CSR UND SOCIAL ENTERPRISE
  • 2014-10 A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony in JOURNAL OF CRYPTOLOGY
  • 2014-04 Improved Practical Attacks on Round-Reduced Keccak in JOURNAL OF CRYPTOLOGY
  • 2014 Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2014 RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2014 Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials in FAST SOFTWARE ENCRYPTION
  • 2014 How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth? in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2013 Quantitative Analysis of the Full Bitcoin Transaction Graph in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2013 Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013
  • 2012-12 Applying cube attacks to stream ciphers in realistic scenarios in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2012 Improved Attacks on Full GOST in FAST SOFTWARE ENCRYPTION
  • 2012 Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems in ADVANCES IN CRYPTOLOGY – CRYPTO 2012
  • 2012 New Attacks on Keccak-224 and Keccak-256 in FAST SOFTWARE ENCRYPTION
  • 2012 Minimalism in Cryptography: The Even-Mansour Scheme Revisited in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2011 An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011 An Improved Algebraic Attack on Hamsi-256 in FAST SOFTWARE ENCRYPTION
  • 2011 Breaking Grain-128 with Dynamic Cube Attacks in FAST SOFTWARE ENCRYPTION
  • 2011-01 RFID Authentication Efficient Proactive Information Security within Computational Security in THEORY OF COMPUTING SYSTEMS
  • 2010-10 Structural Cryptanalysis of SASAS in JOURNAL OF CRYPTOLOGY
  • 2010 Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • 2010 A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2010 Improved Single-Key Attacks on 8-Round AES-192 and AES-256 in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010
  • 2010 Fast Exhaustive Search for Polynomial Systems in in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2010-01 Efficient Cache Attacks on AES, and Countermeasures in JOURNAL OF CRYPTOLOGY
  • 2009 Cube Attacks on Tweakable Black Box Polynomials in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2009 Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium in FAST SOFTWARE ENCRYPTION
  • 2008 On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2008 RSA—Past, Present, Future in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2008
  • 2008 Second Preimage Attacks on Dithered Hash Functions in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2008
  • 2008 Bug Attacks in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2008 Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2008
  • 2008 SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags in FAST SOFTWARE ENCRYPTION
  • 2008 Cryptanalysis of the SFLASH Signature Scheme in INFORMATION SECURITY AND CRYPTOLOGY
  • 2007 Practical Cryptanalysis of SFLASH in ADVANCES IN CRYPTOLOGY - CRYPTO 2007
  • 2007 Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions in PUBLIC KEY CRYPTOGRAPHY – PKC 2007
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "familyName": "Shamir", 
        "givenName": "Adi", 
        "id": "sg:person.013052746407.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052746407.28"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:51", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1634.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.013052746407.28'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.013052746407.28'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.013052746407.28'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.013052746407.28'


     

    This table displays all metadata directly associated to this object as RDF triples.

    11 TRIPLES      9 PREDICATES      10 URIs      6 LITERALS      1 BLANK NODES

    Subject Predicate Object
    1 sg:person.013052746407.28 schema:familyName Shamir
    2 schema:givenName Adi
    3 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013052746407.28
    4 schema:sdDatePublished 2019-03-07T13:51
    5 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    6 schema:sdPublisher N4802cf80be06460aaa7bca4c604280de
    7 sgo:license sg:explorer/license/
    8 sgo:sdDataset persons
    9 rdf:type schema:Person
    10 N4802cf80be06460aaa7bca4c604280de schema:name Springer Nature - SN SciGraph project
    11 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...