D-Index & Metrics Best Publications
Computer Science
Israel
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 91 Citations 107,204 239 World Ranking 336 National Ranking 8

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in Israel Leader Award

2022 - Research.com Computer Science in Israel Leader Award

2020 - ACM Fellow For contributions to the field of cryptography

2018 - Fellow of the Royal Society, United Kingdom

2017 - BBVA Foundation Frontiers of Knowledge Award

2017 - Japan Prize for his significant contributions to the fields of cryptography and computer science.

2007 - Member of Academia Europaea

2005 - Member of the National Academy of Sciences

2002 - A. M. Turing Award Together with Leonard M. Adleman and Ronald Rivest, for their ingenious contribution to making public-key cryptography useful in practice.

2000 - IEEE Koji Kobayashi Computers and Communications Award “For the revolutionary invention of the RSA public key cryptosystem which is the first to be widelyadopted.”

1996 - ACM Paris Kanellakis Theory and Practice Award Public-Key Cryptography

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Algorithm
  • Algebra

His primary areas of study are Cryptography, Theoretical computer science, Encryption, Computer security and Discrete mathematics. His Cryptography research incorporates elements of Authentication and Arithmetic. His Authentication study combines topics in areas such as Discrete logarithm and Digital signature.

His work deals with themes such as Signature, Visual cryptography, Symmetric-key algorithm and Zero-knowledge proof, which intersect with Theoretical computer science. Adi Shamir combines subjects such as Communication source, Side channel attack, Key and Electronic money with his study of Encryption. His study in Distributed key generation, Ring signature, Strong cryptography and Hybrid cryptosystem is done as part of Computer security.

His most cited work include:

  • A method for obtaining digital signatures and public-key cryptosystems (13139 citations)
  • How to share a secret (10874 citations)
  • Identity-based cryptosystems and signature schemes (5502 citations)

What are the main themes of his work throughout his whole career to date?

Adi Shamir focuses on Cryptography, Theoretical computer science, Computer security, Discrete mathematics and Algorithm. The study incorporates disciplines such as Key, Encryption and Public-key cryptography in addition to Cryptography. His research investigates the connection between Theoretical computer science and topics such as Block cipher that intersect with problems in Stream cipher, Cryptosystem and Arithmetic.

His work is connected to Authentication and Plaintext, as a part of Computer security. In his work, Open problem is strongly intertwined with Gas meter prover, which is a subfield of Discrete mathematics. His Algorithm research includes themes of Hash function and Cipher.

He most often published in these fields:

  • Cryptography (25.42%)
  • Theoretical computer science (24.07%)
  • Computer security (20.68%)

What were the highlights of his more recent work (between 2011-2021)?

  • Block cipher (16.95%)
  • Computer security (20.68%)
  • Algorithm (19.32%)

In recent papers he was focusing on the following fields of study:

Block cipher, Computer security, Algorithm, Cryptanalysis and Theoretical computer science are his primary areas of study. The various areas that Adi Shamir examines in his Block cipher study include Cryptosystem and Discrete mathematics. His work on Key, Side channel attack, Ciphertext and Encryption as part of general Computer security research is frequently linked to Drone, bridging the gap between disciplines.

His Cryptanalysis study is associated with Cryptography. His Cryptography research is multidisciplinary, incorporating perspectives in World Wide Web and Modular exponentiation. The concepts of his Theoretical computer science study are interwoven with issues in GOST, Collision attack, Cube and Brute-force search.

Between 2011 and 2021, his most popular works were:

  • Quantitative Analysis of the Full Bitcoin Transaction Graph (564 citations)
  • IoT Goes Nuclear: Creating a ZigBee Chain Reaction (243 citations)
  • RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis (229 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Algorithm
  • Algebra

His primary scientific interests are in Computer security, Theoretical computer science, Block cipher, Cryptanalysis and Algorithm. His work on Encryption, Key and Side channel attack as part of his general Computer security study is frequently connected to Database transaction and Distributed transaction, thereby bridging the divide between different branches of science. His Theoretical computer science research includes elements of Discrete mathematics, Order, Metric, Artificial neural network and Differential cryptanalysis.

As part of one scientific family, Adi Shamir deals mainly with the area of Cryptanalysis, narrowing it down to issues related to the Hash function, and often Collision and Knapsack problem. His studies in Algorithm integrate themes in fields like Entropy and Mathematical optimization. As a part of the same scientific study, Adi Shamir usually deals with the Concrete security, concentrating on Upper and lower bounds and frequently concerns with Cryptography.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A method for obtaining digital signatures and public-key cryptosystems

R. L. Rivest;A. Shamir;L. Adleman.
Communications of The ACM (1978)

24875 Citations

How to share a secret

Adi Shamir.
Communications of The ACM (1979)

17218 Citations

Identity-based cryptosystems and signature schemes

Adi Shamir.
international cryptology conference (1985)

9349 Citations

How to prove yourself: practical solutions to identification and signature problems

Amos Fiat;Adi Shamir.
international cryptology conference (1987)

4897 Citations

Visual Cryptography

M. Naor;A. Shamir.
(1994)

3701 Citations

Differential cryptanalysis of DES-like cryptosystems

Eli Biham;Adi Shamir.
international cryptology conference (1990)

3498 Citations

Differential fault analysis of secret key cryptosystems

E. Biham;A. Shamir.
Lecture Notes in Computer Science (1997)

2469 Citations

How to Leak a Secret

Ronald L. Rivest;Adi Shamir;Yael Tauman.
international conference on the theory and application of cryptology and information security (2001)

2110 Citations

On the complexity of time table and multi-commodity flow problems

S. Even;A. Itai;A. Shamir.
foundations of computer science (1975)

2025 Citations

Weaknesses in the Key Scheduling Algorithm of RC4

Scott R. Fluhrer;Itsik Mantin;Adi Shamir.
selected areas in cryptography (2001)

1745 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Adi Shamir

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 242

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 237

Bart Preneel

Bart Preneel

KU Leuven

Publications: 208

Yi Mu

Yi Mu

Fujian Normal University

Publications: 178

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 133

Timothy W. Markison

Timothy W. Markison

IBM (United States)

Publications: 128

Yvo Desmedt

Yvo Desmedt

The University of Texas at Dallas

Publications: 115

Lein Harn

Lein Harn

University of Missouri–Kansas City

Publications: 114

Moti Yung

Moti Yung

Columbia University

Publications: 112

Dan Boneh

Dan Boneh

Stanford University

Publications: 110

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 109

Josef Pieprzyk

Josef Pieprzyk

Commonwealth Scientific and Industrial Research Organisation

Publications: 106

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 104

Jean-Jacques Quisquater

Jean-Jacques Quisquater

Université Catholique de Louvain

Publications: 96

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 94

Hideki Imai

Hideki Imai

Chuo University

Publications: 93

Trending Scientists

Giovanni P. Galdi

Giovanni P. Galdi

University of Pittsburgh

Thomas G. Bifano

Thomas G. Bifano

Boston University

Hedi Mattoussi

Hedi Mattoussi

Florida State University

Christian Altenbach

Christian Altenbach

University of California, Los Angeles

Olivier Bouaziz

Olivier Bouaziz

University of Lorraine

Haydn N. G. Wadley

Haydn N. G. Wadley

University of Virginia

Scot A. Wolfe

Scot A. Wolfe

University of Massachusetts Medical School

John C. Gerhart

John C. Gerhart

University of California, Berkeley

Marvin Whiteley

Marvin Whiteley

Georgia Institute of Technology

Zhijun Jin

Zhijun Jin

Sinopec (China)

Peter Copeland

Peter Copeland

University of Houston

Kengo Ito

Kengo Ito

Nagoya University

Elizabeth Nardin

Elizabeth Nardin

New York University

Thomas F. Cash

Thomas F. Cash

Old Dominion University

Stephen B. Hulley

Stephen B. Hulley

University of California, San Francisco

Robert Rosner

Robert Rosner

University of Chicago

Something went wrong. Please try again later.