Author: Adi Shamir

Publication Overview

Publication period start: 1979
Number of co-authors: 3

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Rivest, Ronald L., Shamir, Adi (1984): How to Expose an Eavesdropper. In Communications of the ACM, 27 (4) pp. 393-395.
Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1983): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). In Communications of the ACM, 26 (1) pp. 96-99.
Shamir, Adi (1979): How to Share a Secret. In Communications of the ACM, 22 (11) pp. 612-613.
Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1978): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, 21 (2) pp. 120-126.
Manna, Zohar, Shamir, Adi (1977): The Optimal Approach to Recursive Programs. In Communications of the ACM, 20 (11) pp. 824-831.
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,052 others.

Learn to design a life you love.

Next email in
6
days
11
hrs
21
mins
43
secs