Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 7 results:
RTF
EndNote XML
Filters:
Author
is
Adi Shamir
[Clear All Filters]
2001
Fluhrer, Scott
,
Itsik Mantin
, and
Adi Shamir
.
"
Weaknesses in the Key Scheduling Algorithm of RC4
."
Lecture Notes in Computer Science
2259 (2001).
DOI
Google Scholar
RTF
EndNote XML
1988
Feige, Uriel
,
Amos Fiat
, and
Adi Shamir
.
"
Zero-Knowledge Proofs of Identity
."
Journal of Cryptology
1 (1988).
DOI
Google Scholar
RTF
EndNote XML
1987
Fiat, Amos
, and
Adi Shamir
.
How to Prove Yourself: Practical Solutions of Identification and Signature Problems
In
Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science
. Vol. 263., 1987.
DOI
Google Scholar
RTF
EndNote XML
1979
Shamir, Adi
.
"
How to Share a Secret
."
Communications of the ACM
22, no. 11 (1979): 612-613.
Google Scholar
RTF
EndNote XML
1978
Rivest, Ronald L.
,
Adi Shamir
, and
Leonard Adleman
.
"
A Method for Obtaining Digital Signatures and Public Key Cryptosystems
."
Communications of the ACM
21, no. 2 (1978): 120-126.
Google Scholar
RTF
EndNote XML
Rivest, Ronald
,
Adi Shamir
, and
Leonard Adleman
.
"
A method for obtaining digital signatures and public-key cryptosystems
."
Communications of the ACM
21, no. 2 (1978): 120-126.
Google Scholar
RTF
EndNote XML
Rivest, Ronald L.
,
Adi Shamir
, and
Leonard Adleman
.
"
A Method of Obtaining Digital Signatures and Public-Key Cryptosystems
."
Communications of the ACM
21, no. 2 (1978): 120-126.
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance