2023 - Research.com Computer Science in Israel Leader Award
2022 - Research.com Computer Science in Israel Leader Award
2020 - ACM Fellow For contributions to the field of cryptography
2018 - Fellow of the Royal Society, United Kingdom
2017 - BBVA Foundation Frontiers of Knowledge Award
2017 - Japan Prize for his significant contributions to the fields of cryptography and computer science.
2007 - Member of Academia Europaea
2005 - Member of the National Academy of Sciences
2002 - A. M. Turing Award Together with Leonard M. Adleman and Ronald Rivest, for their ingenious contribution to making public-key cryptography useful in practice.
2000 - IEEE Koji Kobayashi Computers and Communications Award “For the revolutionary invention of the RSA public key cryptosystem which is the first to be widelyadopted.”
1996 - ACM Paris Kanellakis Theory and Practice Award Public-Key Cryptography
His primary areas of study are Cryptography, Theoretical computer science, Encryption, Computer security and Discrete mathematics. His Cryptography research incorporates elements of Authentication and Arithmetic. His Authentication study combines topics in areas such as Discrete logarithm and Digital signature.
His work deals with themes such as Signature, Visual cryptography, Symmetric-key algorithm and Zero-knowledge proof, which intersect with Theoretical computer science. Adi Shamir combines subjects such as Communication source, Side channel attack, Key and Electronic money with his study of Encryption. His study in Distributed key generation, Ring signature, Strong cryptography and Hybrid cryptosystem is done as part of Computer security.
Adi Shamir focuses on Cryptography, Theoretical computer science, Computer security, Discrete mathematics and Algorithm. The study incorporates disciplines such as Key, Encryption and Public-key cryptography in addition to Cryptography. His research investigates the connection between Theoretical computer science and topics such as Block cipher that intersect with problems in Stream cipher, Cryptosystem and Arithmetic.
His work is connected to Authentication and Plaintext, as a part of Computer security. In his work, Open problem is strongly intertwined with Gas meter prover, which is a subfield of Discrete mathematics. His Algorithm research includes themes of Hash function and Cipher.
Block cipher, Computer security, Algorithm, Cryptanalysis and Theoretical computer science are his primary areas of study. The various areas that Adi Shamir examines in his Block cipher study include Cryptosystem and Discrete mathematics. His work on Key, Side channel attack, Ciphertext and Encryption as part of general Computer security research is frequently linked to Drone, bridging the gap between disciplines.
His Cryptanalysis study is associated with Cryptography. His Cryptography research is multidisciplinary, incorporating perspectives in World Wide Web and Modular exponentiation. The concepts of his Theoretical computer science study are interwoven with issues in GOST, Collision attack, Cube and Brute-force search.
His primary scientific interests are in Computer security, Theoretical computer science, Block cipher, Cryptanalysis and Algorithm. His work on Encryption, Key and Side channel attack as part of his general Computer security study is frequently connected to Database transaction and Distributed transaction, thereby bridging the divide between different branches of science. His Theoretical computer science research includes elements of Discrete mathematics, Order, Metric, Artificial neural network and Differential cryptanalysis.
As part of one scientific family, Adi Shamir deals mainly with the area of Cryptanalysis, narrowing it down to issues related to the Hash function, and often Collision and Knapsack problem. His studies in Algorithm integrate themes in fields like Entropy and Mathematical optimization. As a part of the same scientific study, Adi Shamir usually deals with the Concrete security, concentrating on Upper and lower bounds and frequently concerns with Cryptography.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A method for obtaining digital signatures and public-key cryptosystems
R. L. Rivest;A. Shamir;L. Adleman.
Communications of The ACM (1978)
How to share a secret
Communications of The ACM (1979)
Identity-based cryptosystems and signature schemes
international cryptology conference (1985)
How to prove yourself: practical solutions to identification and signature problems
Amos Fiat;Adi Shamir.
international cryptology conference (1987)
M. Naor;A. Shamir.
Differential cryptanalysis of DES-like cryptosystems
Eli Biham;Adi Shamir.
international cryptology conference (1990)
Differential fault analysis of secret key cryptosystems
E. Biham;A. Shamir.
Lecture Notes in Computer Science (1997)
How to Leak a Secret
Ronald L. Rivest;Adi Shamir;Yael Tauman.
international conference on the theory and application of cryptology and information security (2001)
On the complexity of time table and multi-commodity flow problems
S. Even;A. Itai;A. Shamir.
foundations of computer science (1975)
Weaknesses in the Key Scheduling Algorithm of RC4
Scott R. Fluhrer;Itsik Mantin;Adi Shamir.
selected areas in cryptography (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: