Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Adi Shamir

Structural Cryptanalysis of SASAS

Journal of Cryptology
Applied MathematicsComputer Science ApplicationsSoftware
2010English

The Theoretical Aspects of the Optimal Fixedpoint

SIAM Journal on Computing
MathematicsComputer Science
1976English

Memory Efficient Variants of Public-Key Schemes for Smart Card Applications

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1995English

RSA—Past, Present, Future

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
English

On the Generation of Cryptographically Strong Pseudo-Random Sequences

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1981English

Miss in the Middle Attacks on IDEA and Khufu

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Data Types as Objects

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1977English

Stream Ciphers: Dead or Alive?

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

Cryptographic Applications of T-Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

On the Security of DES

English
  • 1
  • 2
  • ›

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy