WorldCat Identities

Shamir, Adi

Overview
Works: 77 works in 156 publications in 2 languages and 460 library holdings
Genres: Dissertations, Academic  Juvenile works 
Roles: Author
Classifications: QA76.9.A25, 005.82
Publication Timeline
.
Most widely held works about Adi Shamir
 
Most widely held works by Adi Shamir
Differential cryptanalysis of the data encryption standard by Eli Biham( Book )
10 editions published in 1993 in English and held by 242 WorldCat member libraries worldwide
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970`s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the field`s leading researchers, and describes state-of-the-art research in a clear and completely contained manner
On the cryptocomplexity of knapsack systems by Adi Shamir( Book )
4 editions published in 1979 in English and held by 10 WorldCat member libraries worldwide
The cryptographic security of compact knapsacks : (preliminary report) by Adi Shamir( Book )
3 editions published in 1980 in English and Undetermined and held by 10 WorldCat member libraries worldwide
How to share a secret by Adi Shamir( Book )
5 editions published between 1979 and 1980 in English and Undetermined and held by 10 WorldCat member libraries worldwide
Mental poker by Adi Shamir( Book )
5 editions published in 1979 in English and Undetermined and held by 9 WorldCat member libraries worldwide
Is it possible to play a fair game of 'Mental Poker'. We will give a complete (but paradoxical) answer to this question. We will first prove that the problem is intrinsically insoluble, and then describe a fair method of playing 'Mental Poker'. (Author)
Embedding cryptographic trapdoors in arbitrary knapsack systems by Adi Shamir( Book )
2 editions published in 1982 in English and held by 8 WorldCat member libraries worldwide
On digital signatures and public-key cryptosystems by Ronald L Rivest( Book )
2 editions published in 1977 in English and held by 7 WorldCat member libraries worldwide
Finding minimum cutsets in reducible graphs by Adi Shamir( Book )
3 editions published in 1977 in English and Undetermined and held by 7 WorldCat member libraries worldwide
A method for obtaining digital signatures and public-key cryptosystems by Ronald L Rivest( Book )
3 editions published in 1977 in English and held by 7 WorldCat member libraries worldwide
On the security of the Merkle-Hellman cryptographic scheme by Adi Shamir( Book )
6 editions published in 1978 in English and Undetermined and held by 7 WorldCat member libraries worldwide
In this paper we show that a simplified version of the Merkle-Hellman public-key cryptographic system is breakable. While their full-fledged system seems to be resistant to the cryptanalytic attack we propose, this result suggests some ways in which the security of their system can be further enhanced. (Author)
The noisy oracle problem by U Feige( Book )
4 editions published in 1988 in English and held by 6 WorldCat member libraries worldwide
Abstract: "We describe a model in which a computationally bounded verifier consults with a computationally unbounded oracle, in the presence of malicious faults on the communication lines. We require a fairness condition which in essence says that some of the oracle's messages arrive uncorrupted. We show that a deterministic polynomial time verifier can test membership in any language in P-space, but cannot test membership in languages not in P-space, even if he is allowed to toss random coins in private. We discuss the zero knowledge aspects of our model, and demonstrate zero knowledge tests of membership for any language in P-space."
The fixedpoints of recursive definitions by Adi Shamir( Book )
5 editions published in 1976 in English and Undetermined and held by 6 WorldCat member libraries worldwide
IP = Pspace by Adi Shamir( Book )
2 editions published in 1990 in English and held by 5 WorldCat member libraries worldwide
Abstract: "In this paper we prove that when both randomization and interaction are allowed, the proofs which can be verified in polynomial time are exactly those proofs which can be generated with polynomial space."
Kibuts galuyot : sefer le-limud ha-lashon ha-╩╗Ivrit le-bogrim by Shlomo Kodesh( Book )
2 editions published in 1954 in Hebrew and held by 5 WorldCat member libraries worldwide
Differential cryptanalysis of Feal and N-Hash by Eli Biham( Book )
3 editions published in 1991 in English and held by 5 WorldCat member libraries worldwide
Abstract: "In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES[11] and several of its variants. In this paper we show the applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function. In addition, we show how to transform differential cryptanalytic chosen plaintext attacks into known plaintext attacks."
Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer by Eli Biham( Book )
3 editions published in 1991 in English and held by 5 WorldCat member libraries worldwide
Abstract: "In [1,2] we introduced the notion of differential cryptanalysis based on chosen plaintext attacks. In [3,4] we described the application of differential cryptanalysis to Feal [13,12] and extended the method to known plaintext attacks. In this paper differential cryptanalysis methods are applied to the hash function Snefru[10] and to the cryptosystems Khafre [11], REDOC-II [6,7], LOKI [5] and Lucifer [8]."
Differential cryptanalysis of DES-like cryptosystems by Eli Biham( Book )
3 editions published in 1990 in English and held by 5 WorldCat member libraries worldwide
Abstract: "The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu [sic] of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature. In this paper we develop a new type of cryptanalytic attack which can break DES with up to eight rounds in a few minutes on a PC and can break DES with up to 15 rounds faster than an exhaustive search. The new attack can be applied to a variety of DES-like substitution/permutation cryptosystems, and demonstrates the crucial role of the (unpublished) design rules."
Factoring numbers in 0 (log n) arithmetic steps by Adi Shamir( Book )
2 editions published in 1977 in English and held by 5 WorldCat member libraries worldwide
Bauhaus style the architecture of Hebrew labor in British mandate Tel Aviv, Palestine by Adi Shamir( )
2 editions published in 2008 in English and held by 5 WorldCat member libraries worldwide
This study examines the construct of 'Hebrew labor' --as the ideological, philosophical and strategic underpinning of the Nationalist, Zionist, Socialist settlement in Palestine. The thesis proposes that 'Hebrew labor' was manifest in the institutional structures and buildings of the Histadrut and Labor Movement and asserts that what is typically referred to as 'Bauhaus Style' a term referencing the transference of European architectural modernism must be understood as an architecture that is unique to the context of the Zionist project in Palestine and that it is manifest as the architecture of 'Hebrew labor'
A fast signature scheme by Adi Shamir( Book )
3 editions published in 1978 in English and Undetermined and held by 5 WorldCat member libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.82 (from 0.47 for Classifyin ... to 1.00 for Bauhaus st ...)
Alternative Names
Shamir, Adi
Languages
English (64)
Hebrew (2)
Covers