Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
How to share a secret
- A. Shamir
- Computer Science, MathematicsCACM
- 1 November 1979
TLDR
A method for obtaining digital signatures and public-key cryptosystems
- R. Rivest, A. Shamir, L. Adleman
- Computer Science, MathematicsCACM
- 1978
TLDR
A method for obtaining digital signatures and public-key cryptosystems
- R. Rivest, A. Shamir, L. Adleman
- Computer Science, MathematicsCACM
- 1 February 1978
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important…
Identity-Based Cryptosystems and Signature Schemes
- A. Shamir
- Computer Science, MathematicsCRYPTO
- 19 August 1984
TLDR
Visual Cryptography
TLDR
Cache Attacks and Countermeasures: The Case of AES
- Dag Arne Osvik, A. Shamir, Eran Tromer
- Computer Science, MathematicsCT-RSA
- 13 February 2006
TLDR
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
TLDR
Differential cryptanalysis of DES-like cryptosystems
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Bureau of Standards in the mid…
Differential Fault Analysis of Secret Key Cryptosystems
TLDR
How to Leak a Secret
TLDR
...
...