Adi Shamir

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
1977
Publication period end
1984
Number of co-authors
3

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Rivest, Ronald L., Shamir, Adi (1984): How to Expose an Eavesdropper. In Communications of the ACM, 27 (4) pp. 393-395.

Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1983): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). In Communications of the ACM, 26 (1) pp. 96-99.

Shamir, Adi (1979): How to Share a Secret. In Communications of the ACM, 22 (11) pp. 612-613.

Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1978): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, 21 (2) pp. 120-126.

Manna, Zohar, Shamir, Adi (1977): The Optimal Approach to Recursive Programs. In Communications of the ACM, 20 (11) pp. 824-831.