• Publications
  • Influence
How to share a secret
TLDR
In this paper we show how to divide data into n pieces in such a way that <italic>D</italic» is easily reconstructable from any number of pieces, but even complete knowledge of the pieces reveals absolutely no information about the data. Expand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. Expand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. Expand
Identity-Based Cryptosystems and Signature Schemes
  • A. Shamir
  • Computer Science
  • CRYPTO
  • 19 August 1984
TLDR
In this paper we introduce a novel cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. Expand
Visual Cryptography
TLDR
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. Expand
Cache Attacks and Countermeasures: The Case of AES
TLDR
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache. Expand
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
TLDR
In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. Expand
Differential Fault Analysis of Secret Key Cryptosystems
TLDR
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Expand
How to Leak a Secret
TLDR
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Expand
...
1
2
3
4
5
...