dblp.uni-trier.dewww.uni-trier.de

Adi Shamir Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
144EEItai Dinur, Adi Shamir: Cube Attacks on Tweakable Black Box Polynomials. EUROCRYPT 2009: 278-299
143EEJean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. FSE 2009: 1-22
142EEShlomi Dolev, Marina Kopeetsky, Adi Shamir: RFID Authentication, Efficient Proactive Information Security within Computational Security CoRR abs/0903.5177: (2009)
2008
141EENaofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir: Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs. CHES 2008: 15-29
140EEAdi Shamir: RSA-Past, Present, Future. CHES 2008: 443
139EEEli Biham, Yaniv Carmeli, Adi Shamir: Bug Attacks. CRYPTO 2008: 221-240
138EEElena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer: Second Preimage Attacks on Dithered Hash Functions. EUROCRYPT 2008: 270-288
137EEAdi Shamir: SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. FSE 2008: 144-157
136EEJonathan J. Hoch, Adi Shamir: On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. ICALP (2) 2008: 616-630
135EERaphael Chung-Wei Phan, Adi Shamir: Improved Related-key Attacks on Desx and Desx+. Cryptologia 32(1): 13-22 (2008)
2007
134EEVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern: Practical Cryptanalysis of SFLASH. CRYPTO 2007: 1-12
133EEVivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern: Cryptanalysis of the SFLASH Signature Scheme. Inscrypt 2007: 1-4
132EEDima Ruinskiy, Adi Shamir, Boaz Tsaban: Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. Public Key Cryptography 2007: 61-75
131EEDima Ruinskiy, Adi Shamir, Boaz Tsaban: Cryptanalysis of group-based key agreement protocols using subgroup distance functions CoRR abs/0705.2862: (2007)
130EEYossef Oren, Adi Shamir: Remote Password Extraction from RFID Tags. IEEE Trans. Computers 56(9): 1292-1296 (2007)
2006
129EEElad Barkan, Eli Biham, Adi Shamir: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. CRYPTO 2006: 1-21
128EEDag Arne Osvik, Adi Shamir, Eran Tromer: Cache Attacks and Countermeasures: The Case of AES. CT-RSA 2006: 1-20
127EERonald L. Rivest, Adi Shamir, Yael Tauman: How to Leak a Secret: Theory and Applications of Ring Signatures. Essays in Memory of Shimon Even 2006: 164-186
126EEJonathan J. Hoch, Adi Shamir: Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. FSE 2006: 179-194
125EEDima Ruinskiy, Adi Shamir, Boaz Tsaban: Length-based cryptanalysis: The case of Thompson's Group CoRR abs/cs/0607079: (2006)
2005
124EEWilli Geiselmann, Adi Shamir, Rainer Steinwandt, Eran Tromer: Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization. CHES 2005: 131-146
123EEAlexander Klimov, Adi Shamir: New Applications of T-Functions in Block Ciphers and Hash Functions. FSE 2005: 18-31
122EEAlex Biryukov, Adi Shamir: Analysis of the Non-linear Part of Mugi. FSE 2005: 320-329
121EEAdi Shamir, Eran Tromer: TWIRL. Encyclopedia of Cryptography and Security 2005
120EEEli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. J. Cryptology 18(4): 291-311 (2005)
2004
119EEAdi Shamir: Stream Ciphers: Dead or Alive? ASIACRYPT 2004: 78
118EEJonathan J. Hoch, Adi Shamir: Fault Analysis of Stream Ciphers. CHES 2004: 240-253
117EEAlexander Klimov, Adi Shamir: New Cryptographic Primitives Based on Multiword T-Functions. FSE 2004: 1-15
2003
116EEArjen K. Lenstra, Eran Tromer, Adi Shamir, Wil Kortsmit, Bruce Dodson, James Hughes, Paul C. Leyland: Factoring Estimates for a 1024-Bit RSA Modulus. ASIACRYPT 2003: 55-74
115EEAdi Shamir, Eran Tromer: Factoring Large Number with the TWIRL Device. CRYPTO 2003: 1-26
114EEAdi Shamir: RSA Shortcuts. CT-RSA 2003: 327
113EEAlexander Klimov, Adi Shamir: Cryptographic Applications of T-Functions. Selected Areas in Cryptography 2003: 248-261
2002
112EEArjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer: Analysis of Bernstein's Factorization Circuit. ASIACRYPT 2002: 1-26
111EEAlexander Klimov, Anton Mityagin, Adi Shamir: Analysis of Neural Cryptography. ASIACRYPT 2002: 288-298
110EEAlexander Klimov, Adi Shamir: A New Class of Invertible Mappings. CHES 2002: 470-483
109EEDani Halevy, Adi Shamir: The LSD Broadcast Encryption Scheme. CRYPTO 2002: 47-60
2001
108EERonald L. Rivest, Adi Shamir, Yael Tauman: How to Leak a Secret. ASIACRYPT 2001: 552-565
107EEAdi Shamir: New Directions in Croptography. CHES 2001: 159
106EEAdi Shamir, Yael Tauman: Improved Online/Offline Signature Schemes. CRYPTO 2001: 355-367
105EEAlex Biryukov, Adi Shamir: Structural Cryptanalysis of SASAS. EUROCRYPT 2001: 394-405
104EEItsik Mantin, Adi Shamir: A Practical Attack on Broadcast RC4. FSE 2001: 152-164
103EEAdi Shamir: SecureClick: A Web Payment System with Disposable Credit Card Numbers. Financial Cryptography 2001: 223-233
102EEScott R. Fluhrer, Itsik Mantin, Adi Shamir: Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography 2001: 1-24
101EEAdi Shamir, Boaz Tsaban: Guaranteeing the diversity of number generators CoRR cs.CR/0112014: (2001)
100EEAdi Shamir, Boaz Tsaban: Guaranteeing the Diversity of Number Generators. Inf. Comput. 171(2): 350-363 (2001)
2000
99EEAlex Biryukov, Adi Shamir: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. ASIACRYPT 2000: 1-13
98EEAdi Shamir: Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. CHES 2000: 71-77
97EEArjen K. Lenstra, Adi Shamir: Analysis and Optimization of the TWINKLE Factoring Device. EUROCRYPT 2000: 35-52
96EENicolas Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. EUROCRYPT 2000: 392-407
95EEAlex Biryukov, Adi Shamir, David Wagner: Real Time Cryptanalysis of A5/1 on a PC. FSE 2000: 1-18
1999
94EEAdi Shamir: Factoring Large Numbers with the Twinkle Device (Extended Abstract). CHES 1999: 2-12
93EEAviad Kipnis, Adi Shamir: Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. CRYPTO 1999: 19-30
92EEEli Biham, Alex Biryukov, Adi Shamir: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. EUROCRYPT 1999: 12-23
91EEEli Biham, Alex Biryukov, Adi Shamir: Miss in the Middle Attacks on IDEA and Khufu. FSE 1999: 124-138
90EEAdi Shamir, Nicko van Someren: Playing "Hide and Seek" with Stored Keys. Financial Cryptography 1999: 118-124
89EEDavid Naccache, Adi Shamir, Julien P. Stern: How to Copyright a Function? Public Key Cryptography 1999: 188-196
88 Uriel Feige, Dror Lapidot, Adi Shamir: Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions. SIAM J. Comput. 29(1): 1-28 (1999)
1998
87EEAviad Kipnis, Adi Shamir: Cryptanalysis of the Oil & Vinegar Signature Scheme. CRYPTO 1998: 257-266
86EEAdi Shamir: Visual Cryptanalysis. EUROCRYPT 1998: 201-210
85EERoss J. Anderson, Roger M. Needham, Adi Shamir: The Steganographic File System. Information Hiding 1998: 73-82
84EEEli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir: Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Selected Areas in Cryptography 1998: 362-376
1997
83EEEli Biham, Adi Shamir: Differential Fault Analysis of Secret Key Cryptosystems. CRYPTO 1997: 513-525
82EEDon Coppersmith, Adi Shamir: Lattice Attacks on NTRU. EUROCRYPT 1997: 52-61
81 Dror Lapidot, Adi Shamir: Fully Parallelized Multi-Prover Protocols for NEXP-Time. J. Comput. Syst. Sci. 54(2): 215-220 (1997)
1996
80 Moni Naor, Adi Shamir: Visual Cryptography II: Improving the Contrast Via the Cover Base. Security Protocols Workshop 1996: 197-202
79 Ronald L. Rivest, Adi Shamir: PayWord and MicroMint: Two Simple Micropayment Schemes. Security Protocols Workshop 1996: 69-87
1995
78 Dror Lapidot, Adi Shamir: A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. Combinatorica 15(2): 204-214 (1995)
1994
77EEMoni Naor, Adi Shamir: Visual Cryptography. EUROCRYPT 1994: 1-12
76EEAdi Shamir: Memory Efficient Variants of Public-Key Schemes for Smart Card Applications. EUROCRYPT 1994: 445-449
1993
75EEAdi Shamir: Efficient Signature Schemes Based on Birational Permutations. CRYPTO 1993: 1-12
74 Adi Shamir: Practical Cryptography - Recent Trends and Results. ISTCS 1993: 127
73EEAdi Shamir: On the generation of multivariate polynomials which are hard to factor. STOC 1993: 796-804
72 David Feldman, Russell Impagliazzo, Moni Naor, Noam Nisan, Steven Rudich, Adi Shamir: On Dice and Coins: Models of Computation for Random Generation Inf. Comput. 104(2): 159-174 (1993)
71 Johan Håstad, A. W. Schrift, Adi Shamir: The Discrete Logarithm Modulo a Composite Hides O(n) Bits. J. Comput. Syst. Sci. 47(3): 376-404 (1993)
70 A. W. Schrift, Adi Shamir: Universal Tests for Nonuniform Distributions. J. Cryptology 6(3): 119-133 (1993)
1992
69EEEli Biham, Adi Shamir: Differential Cryptanalysis of the Full 16-Round DES. CRYPTO 1992: 487-496
68EEAdi Shamir: IP = PSPACE. J. ACM 39(4): 869-877 (1992)
67 Uriel Feige, Adi Shamir: Multi-Oracle Interactive Protocols with Constant Space Verifiers. J. Comput. Syst. Sci. 44(2): 259-271 (1992)
1991
66EEEli Biham, Adi Shamir: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. CRYPTO 1991: 156-171
65EEDror Lapidot, Adi Shamir: A One-Round, Two-Prover, Zero-Knowledge Protocol for NP. CRYPTO 1991: 213-224
64EEEli Biham, Adi Shamir: Differential Cryptoanalysis of Feal and N-Hash. EUROCRYPT 1991: 1-16
63 Dror Lapidot, Adi Shamir: Fully Parallelized Multi Prover Protocols for NEXP-Time (Extended Abstract) FOCS 1991: 13-18
62 Eli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. J. Cryptology 4(1): 3-72 (1991)
1990
61EEEli Biham, Adi Shamir: Differential Cryptanalysis of DES-like Cryptosystems. CRYPTO 1990: 2-21
60EEDror Lapidot, Adi Shamir: Publicly Verifiable Non-Interactive Zero-Knowledge Proofs. CRYPTO 1990: 353-365
59 Adi Shamir: IP=PSPACE FOCS 1990: 11-15
58 Uriel Feige, Dror Lapidot, Adi Shamir: Multiple Non-Interactive Zero Knowledge Proofs Based on a Single Random String (Extended Abstract) FOCS 1990: 308-317
57 A. W. Schrift, Adi Shamir: The Discrete Log is Very Discreet STOC 1990: 405-415
56 Uriel Feige, Adi Shamir: Witness Indistinguishable and Witness Hiding Protocols STOC 1990: 416-426
1989
55EEUriel Feige, Adi Shamir: Zero Knowledge Proofs of Knowledge in Two Rounds. CRYPTO 1989: 526-544
54EEAdi Shamir: An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract). CRYPTO 1989: 606-609
53 Amos Fiat, Shahar Moses, Adi Shamir, Ilan Shimshoni, Gábor Tardos: Planning and Learning in Permutation Groups FOCS 1989: 274-279
52EEDavid Feldman, Russell Impagliazzo, Moni Naor, Noam Nisan, Steven Rudich, Adi Shamir: On Dice and Coins: Models of Computation for Random Generation. ICALP 1989: 319-340
51 Uriel Feige, Adi Shamir: Multi-Oracle Interactive Protocols with Space Bounded Verifiers. Structure in Complexity Theory Conference 1989: 158-164
1988
50EESilvio Micali, Adi Shamir: An Improvement of the Fiat-Shamir Identification and Signature Scheme. CRYPTO 1988: 244-247
49EEUriel Feige, Adi Shamir, Moshe Tennenholtz: The Noisy Oracle Problem. CRYPTO 1988: 284-296
48 Uriel Feige, Amos Fiat, Adi Shamir: Zero-Knowledge Proofs of Identity. J. Cryptology 1(2): 77-94 (1988)
47 Alan M. Frieze, Johan Håstad, Ravi Kannan, J. C. Lagarias, Adi Shamir: Reconstructing Truncated Integer Variables Satisfying Linear Congruences. SIAM J. Comput. 17(2): 262-280 (1988)
1987
46EEYossi Matias, Adi Shamir: A Video Scrambling Technique Based On Space Filling Curves. CRYPTO 1987: 398-417
45 Uriel Feige, Amos Fiat, Adi Shamir: Zero Knowledge Proofs of Identity STOC 1987: 210-217
1986
44EEAmos Fiat, Adi Shamir: How to Prove Yourself: Practical Solutions to Identification and Signature Problems. CRYPTO 1986: 186-194
43 Sandeep Sen, Isaac D. Scherson, Adi Shamir: Shear Sort: A True Two-Dimensional Sorting Techniques for VLSI Networks. ICPP 1986: 903-908
42 Claus-Peter Schnorr, Adi Shamir: An Optimal Sorting Algorithm for Mesh Connected Computers STOC 1986: 255-263
41 Amos Fiat, Adi Shamir: Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers. J. Comput. Syst. Sci. 33(1): 47-65 (1986)
1985
40EEAdi Shamir: On the Security of DES. CRYPTO 1985: 280-281
39EEShimon Even, Oded Goldreich, Adi Shamir: On the Security of Ping-Pong Protocols when Implemented using the RSA. CRYPTO 1985: 58-72
38EERonald L. Rivest, Adi Shamir: Efficient Factoring Based on Partial Information. EUROCRYPT 1985: 31-34
37 Amos Fiat, Adi Shamir, Ehud Y. Shapiro: Polymorphic Arrays: An Architecture for a Programmable Systolic Machine. ICPP 1985: 112-117
36 Johan Håstad, Adi Shamir: The Cryptographic Security of Truncated Linearly Related Variables STOC 1985: 356-362
35 Jeffrey Shallit, Adi Shamir: Number-Theoretic Functions Which Are Equivalent to Number of Divisors. Inf. Process. Lett. 20(3): 151-153 (1985)
1984
34EEH. Ong, Claus-Peter Schnorr, Adi Shamir: Efficient Signature Schemes Based on Polynomial Equations. CRYPTO 1984: 37-46
33EEAdi Shamir: Identity-Based Cryptosystems and Signature Schemes. CRYPTO 1984: 47-53
32 Amos Fiat, Adi Shamir: Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers FOCS 1984: 37-45
31 H. Ong, Claus-Peter Schnorr, Adi Shamir: An Efficient Signature Scheme Based on Quadratic Equations STOC 1984: 208-216
30 Ronald L. Rivest, Adi Shamir: How to Expose an Eavesdropper. Commun. ACM 27(4): 393-395 (1984)
29 Amos Fiat, Adi Shamir: Generalized 'write-once' memories. IEEE Transactions on Information Theory 30(3): 470-479 (1984)
28 Adi Shamir: A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Transactions on Information Theory 30(5): 699-704 (1984)
27 Adi Shamir, Claus-Peter Schnorr: Cryptanalysis of Certain Variants of Rabin's Signature Scheme. Inf. Process. Lett. 19(3): 113-115 (1984)
1983
26 Michael Ben-Or, Benny Chor, Adi Shamir: On the Cryptographic Security of Single RSA Bits STOC 1983: 421-430
25EEAdi Shamir: On the Generation of Cryptographically Strong Pseudorandom Sequences ACM Trans. Comput. Syst. 1(1): 38-44 (1983)
24 Ronald L. Rivest, Adi Shamir, Leonard M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). Commun. ACM 26(1): 96-99 (1983)
23 Adi Shamir: Embedding Cryptographic Trapdoors in Arbitrary Knapsack Systems. Inf. Process. Lett. 17(2): 77-79 (1983)
1982
22 Adi Shamir: A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem. CRYPTO 1982: 279-288
21 Adi Shamir: A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem FOCS 1982: 145-152
20 Ronald L. Rivest, Adi Shamir: How to Reuse a ``Write-Once'' Memory (Preliminary Version) STOC 1982: 105-113
19 Ronald L. Rivest, Adi Shamir: How to Reuse a ``Write-Once'' Memory Information and Control 55(1-3): 1-19 (1982)
1981
18 Adi Shamir: The Generation of Cryptographically Strong Pseudo-Random Sequences. CRYPTO 1981: 1
17EEAdi Shamir: On the Generation of Cryptographically Strong Pseudo-Random Sequences. ICALP 1981: 544-550
16 Richard Schroeppel, Adi Shamir: A T=O(2^(n/2)), S=O(2^(n/4)) Algorithm for Certain NP-Complete Problems. SIAM J. Comput. 10(3): 456-464 (1981)
1980
15EEAdi Shamir: On the Power of Commutativity in Cryptography. ICALP 1980: 582-595
14 Adi Shamir: The Cryptographic Security of Compact Knapsacks (Preliminary Report). IEEE Symposium on Security and Privacy 1980: 94-99
1979
13 Richard Schroeppel, Adi Shamir: A T S^2 = O(2^n) Time/Space Tradeoff for Certain NP-Complete Problems FOCS 1979: 328-336
12 Adi Shamir: On the Cryptocomplexity of Knapsack Systems STOC 1979: 118-129
11 Adi Shamir: How to Share a Secret. Commun. ACM 22(11): 612-613 (1979)
10 Adi Shamir: Factoring Numbers in O(log n) Arithmetic Steps. Inf. Process. Lett. 8(1): 28-31 (1979)
9 Adi Shamir: A Linear Time Algorithm for Finding Minimum Cutsets in Reducible Graphs. SIAM J. Comput. 8(4): 645-655 (1979)
1978
8 Ronald L. Rivest, Adi Shamir, Leonard M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21(2): 120-126 (1978)
7 Zohar Manna, Adi Shamir: The Convergence of Functions to Fixedpoints of Recursive Definitions. Theor. Comput. Sci. 6: 109-141 (1978)
1977
6EEAdi Shamir, William W. Wadge: Data Types as Objects. ICALP 1977: 465-479
5 Zohar Manna, Adi Shamir: The Optimal Approach to Recursive Programs. Commun. ACM 20(11): 824-831 (1977)
1976
4 Zohar Manna, Adi Shamir: The Theoretical Aspects of the Optimal Fixed Point. SIAM J. Comput. 5(3): 414-426 (1976)
3 Shimon Even, Alon Itai, Adi Shamir: On the Complexity of Timetable and Multicommodity Flow Problems. SIAM J. Comput. 5(4): 691-703 (1976)
1975
2 Shimon Even, Alon Itai, Adi Shamir: On the Complexity of Timetable and Multi-Commodity Flow Problems FOCS 1975: 184-193
1 Zohar Manna, Adi Shamir: The Optimal Fixedpoint of Recursive Programs STOC 1975: 194-206

Coauthor Index

1Leonard M. Adleman [8] [24]
2Ross J. Anderson [85]
3Elena Andreeva [138]
4Takafumi Aoki [141]
5Jean-Philippe Aumasson [143]
6Elad Barkan [129]
7Michael Ben-Or [26]
8Eli Biham [61] [62] [64] [66] [69] [83] [84] [91] [92] [120] [129] [139]
9Alex Biryukov [84] [91] [92] [95] [99] [105] [120] [122]
10Charles Bouillaguet [138]
11Yaniv Carmeli [139]
12Benny Chor [26]
13Don Coppersmith [82]
14Nicolas Courtois [96]
15Itai Dinur [143] [144]
16Bruce Dodson [116]
17Shlomi Dolev [142]
18Vivien Dubois [133] [134]
19Orr Dunkelman [84]
20Shimon Even [2] [3] [39]
21Uriel Feige [45] [48] [49] [51] [55] [56] [58] [67] [88]
22David Feldman [52] [72]
23Amos Fiat [29] [32] [37] [41] [44] [45] [48] [53]
24Scott R. Fluhrer [102]
25Pierre-Alain Fouque [133] [134] [138]
26Alan M. Frieze [47]
27Willi Geiselmann [124]
28Oded Goldreich [39]
29Dani Halevy [109]
30Johan Håstad [36] [47] [71]
31Jonathan J. Hoch [118] [126] [136] [138]
32Naofumi Homma [141]
33James Hughes [116]
34Russell Impagliazzo [52] [72]
35Alon Itai [2] [3]
36Yael Tauman Kalai (Yael Tauman) [106] [108] [127]
37Ravi Kannan (Ravindran Kannan) [47]
38John Kelsey [138]
39Aviad Kipnis [87] [93]
40Alexander Klimov [96] [110] [111] [113] [117] [123]
41Marina Kopeetsky [142]
42Wil Kortsmit [116]
43Jeffrey C. Lagarias (J. C. Lagarias) [47]
44Dror Lapidot [58] [60] [63] [65] [78] [81] [88]
45Arjen K. Lenstra [97] [112] [116]
46Paul C. Leyland [116]
47Zohar Manna [1] [4] [5] [7]
48Itsik Mantin [102] [104]
49Yossi Matias [46]
50Willi Meier [143]
51Silvio Micali [50]
52Anton Mityagin [111]
53Atsushi Miyamoto [141]
54Shahar Moses [53]
55David Naccache [89]
56Moni Naor [52] [72] [77] [80]
57Roger M. Needham [85]
58Noam Nisan [52] [72]
59H. Ong [31] [34]
60Yossef Oren [130]
61Dag Arne Osvik [128]
62Jacques Patarin [96]
63Raphael Chung-Wei Phan (Raphael C.-W. Phan) [135]
64Eran Richardson [84]
65Ronald L. Rivest [8] [19] [20] [24] [30] [38] [79] [108] [127]
66Steven Rudich [52] [72]
67Dima Ruinskiy [125] [131] [132]
68Akashi Satoh [141]
69Isaac D. Scherson [43]
70Claus-Peter Schnorr [27] [31] [34] [42]
71A. W. Schrift [57] [70] [71]
72Richard Schroeppel [13] [16]
73Sandeep Sen [43]
74Jeffrey Shallit [35]
75Ehud Y. Shapiro [37]
76Ilan Shimshoni [53]
77Nicko van Someren [90]
78Rainer Steinwandt [124]
79Jacques Stern [133] [134]
80Julien P. Stern [89]
81Gábor Tardos [53]
82Moshe Tennenholtz [49]
83Jim Tomlinson [112]
84Eran Tromer [112] [115] [116] [121] [124] [128]
85Boaz Tsaban [100] [101] [125] [131] [132]
86William W. Wadge [6]
87David Wagner [95]
88Sébastien Zimmer [138]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)