Biblio
Export 7 results:
Filters: Author is Adi Shamir [Clear All Filters]
Weaknesses in the Key Scheduling Algorithm of RC4." Lecture Notes in Computer Science 2259 (2001).
"Zero-Knowledge Proofs of Identity." Journal of Cryptology 1 (1988).
"How to Prove Yourself: Practical Solutions of Identification and Signature Problems In Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science. Vol. 263., 1987.
How to Share a Secret." Communications of the ACM 22, no. 11 (1979): 612-613.
"A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.
"A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.
"A Method of Obtaining Digital Signatures and Public-Key Cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.
"