145 relations: A5/1, Acoustic cryptanalysis, Adi, Adi (name), Advanced Encryption Standard, Aircrack-ng, Alan Turing Centenary Conference, Alex Biryukov, Alice and Bob, Amos Fiat, BBVA Foundation Frontiers of Knowledge Award, Block cipher, Bytecoin (cryptocurrency), C&C Prize, Cisco Videoscape, Clifford Cocks, Commitment scheme, Computer and network surveillance, Cryptography, Cube attack, Culture of Israel, Daniel J. Bernstein, Data Encryption Standard, David A. Wagner, Differential cryptanalysis, Digital signature, Distinguishing attack, Eli Biham, Erdős Prize, FEAL, Feige–Fiat–Shamir identification scheme, Fluhrer, Mantin and Shamir attack, GDES, Geometric cryptography, George Blakley, Grande Médaille, Hidden Field Equations, History of bitcoin, ID-based cryptography, ID-based encryption, IEEE Koji Kobayashi Computers and Communications Award, IEEE W.R.G. Baker Award, Impossible differential cryptanalysis, Index of cryptography articles, Interactive proof system, Interlock protocol, International Association for Cryptologic Research, Internet Key Exchange, IP (complexity), Israel Academy of Sciences and Humanities, ..., James H. Ellis, Japan Prize, Jewish culture, KASUMI, Key finding attacks, Key-agreement protocol, Khufu and Khafre, Knapsack cryptosystems, Lance Fortnow, Lee Segel, Leonard Adleman, List of companies named after people, List of company name etymologies, List of computer scientists, List of computer term etymologies, List of computing people, List of cryptographers, List of English inventions and discoveries, List of eponyms (L–Z), List of Fellows of the Royal Society elected in 2018, List of International Congresses of Mathematicians Plenary and Invited Speakers, List of invited speakers at cryptology conferences, List of Israel Prize recipients, List of Israeli Ashkenazi Jews, List of Israeli inventions and discoveries, List of Israelis, List of Jewish American computer scientists, List of mathematicians (S), List of members of the National Academy of Sciences (computer and information sciences), List of multiple discoveries, List of people by Erdős number, List of programmers, List of Turing Award laureates by university affiliation, LOKI, MAGENTA, Massachusetts Institute of Technology, Member of the Academia Europaea, Mental poker, Michael Karin, MISTY1, MIT Computer Science and Artificial Intelligence Laboratory, MIT150, Mitsuru Matsui, Moni Naor, MUGI, N-Hash, National Cyber Security Hall of Fame, Neural cryptography, Nicko van Someren, Non-interactive zero-knowledge proof, Nothing up my sleeve number, Paris Kanellakis, Paris Kanellakis Award, Pius XI Medal, Polynomial identity testing, Public key infrastructure, Public-key cryptography, Random oracle, RC4, Ring signature, Ron Rivest, RSA (cryptosystem), RSA Security, Satoshi Nakamoto, Scrambler, Secret sharing, Shamir, Shamir's Secret Sharing, Shlomi Dolev, Side-channel attack, Skipjack (cipher), Snefru, Spycatcher, Stefan Brands, Steganographic file system, Stream cipher, T-function, Tel Aviv University, Three-pass protocol, Time/memory/data tradeoff attack, Timeline of algorithms, Timeline of cryptography, Turing Award, TWINKLE, TWIRL, Uriel Feige, VideoCrypt, Visual cryptography, Weizmann Institute of Science, Wired Equivalent Privacy, XSL attack, Yvo G. Desmedt, 1952, 1978 in science, 2002 in science. Expand index (95 more) »
A5/1
A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.
New!!: Adi Shamir and A5/1 · See more »
Acoustic cryptanalysis
Acoustic cryptanalysis is a type of side channel attack that exploits sounds emitted by computers or other devices.
New!!: Adi Shamir and Acoustic cryptanalysis · See more »
Adi
Adi may refer to.
New!!: Adi Shamir and Adi · See more »
Adi (name)
Adi (עדִי) is a unisex Semitic language given name, which means "jewel" or "ornament".
New!!: Adi Shamir and Adi (name) · See more »
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
New!!: Adi Shamir and Advanced Encryption Standard · See more »
Aircrack-ng
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.
New!!: Adi Shamir and Aircrack-ng · See more »
Alan Turing Centenary Conference
The Alan Turing Centenary Conference was an academic conference celebrating the life and research of Alan Turing by bringing together distinguished scientists to understand and analyse the history and development of Computer Science and Artificial intelligence.
New!!: Adi Shamir and Alan Turing Centenary Conference · See more »
Alex Biryukov
Alex Biryukov is a cryptographer, currently a full professor at the University of Luxembourg.
New!!: Adi Shamir and Alex Biryukov · See more »
Alice and Bob
Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature.
New!!: Adi Shamir and Alice and Bob · See more »
Amos Fiat
Amos Fiat (born December 1, 1956 in Haifa, Israel) is an Israeli computer scientist, a professor of computer science at Tel Aviv University.
New!!: Adi Shamir and Amos Fiat · See more »
BBVA Foundation Frontiers of Knowledge Award
The BBVA Foundation Frontiers of Knowledge Awards, Premios Fundación BBVA Fronteras del Conocimiento, in Spanish, are an international award programme recognizing significant contributions in the areas of scientific research and cultural creation.
New!!: Adi Shamir and BBVA Foundation Frontiers of Knowledge Award · See more »
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.
New!!: Adi Shamir and Block cipher · See more »
Bytecoin (cryptocurrency)
Bytecoin (ticker symbol BCN) is the first cryptocurrency based on the CryptoNote technology with an open source code designed for anonymous cash settlement.
New!!: Adi Shamir and Bytecoin (cryptocurrency) · See more »
C&C Prize
C&C Prizes (C&C賞) is an award given by the NEC Corporation "in recognition of outstanding contributions to research and development and/or pioneering work in the fields of semiconductors, computers, telecommunications and their integrated technologies." Established in 1985, through the NEC's nonprofit C&C Foundation, C&C Prizes are awarded to two groups or individuals annually.
New!!: Adi Shamir and C&C Prize · See more »
Cisco Videoscape
Cisco Videoscape (Formerly NDS Group Ltd.) is a former Israeli development group that has been acquired by Cisco, which develops software for the pay TV industry (including cable, satellite and others). NDS Group was established in 1988 as an Israeli start up company. It was acquired by Cisco in 2012. The company is currently headquartered in Staines, United Kingdom. Filling The Executive Chairman and CEO roles at NDS is Abe Peled with former CEO Dave Habiger having left in 2012. The company's major product is the VideoGuard conditional access system, which is used by more than 85 leading pay TV operators around the world. NDS technology includes end to end connections for satellite, broadband IPTV, Hybrid, OTT, and EPGs. It has launched VideoGuard Connect, the DRM for Pay-TV, designed to help TV operators to seamlessly extend their pay-TV services to connected media devices, enabling secure ingestion, delivery and consumption of premium content over both managed and OTT networks while maintaining subscription privileges across devices. NDS also provides advanced advertising, professional services and system integration services. New ways to secure content on PCs, tablets, and other devices are displayed at IBC and CES. Cisco Systems announced the acquisition of the company in March, 2012. It was later acquired successfully and in 2014 its name was changed into Videoscape, becoming a part of Cisco.
New!!: Adi Shamir and Cisco Videoscape · See more »
Clifford Cocks
Clifford Christopher Cocks CB FRS (born 28 December 1950) is a British mathematician and cryptographer.
New!!: Adi Shamir and Clifford Cocks · See more »
Commitment scheme
A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later.
New!!: Adi Shamir and Commitment scheme · See more »
Computer and network surveillance
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
New!!: Adi Shamir and Computer and network surveillance · See more »
Cryptography
Cryptography or cryptology (from κρυπτός|translit.
New!!: Adi Shamir and Cryptography · See more »
Cube attack
The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint.
New!!: Adi Shamir and Cube attack · See more »
Culture of Israel
The roots of the culture of Israel developed long before modern Israel's independence in 1948 and traces back to ancient Israel (1000 BCE).
New!!: Adi Shamir and Culture of Israel · See more »
Daniel J. Bernstein
Daniel Julius Bernstein (sometimes known simply as djb; born October 29, 1971) is a German-American mathematician, cryptologist, and programmer.
New!!: Adi Shamir and Daniel J. Bernstein · See more »
Data Encryption Standard
The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.
New!!: Adi Shamir and Data Encryption Standard · See more »
David A. Wagner
David A. Wagner (born 1974) is a Professor of Computer Science at the University of California, Berkeley and a well-known researcher in cryptography and computer security.
New!!: Adi Shamir and David A. Wagner · See more »
Differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions.
New!!: Adi Shamir and Differential cryptanalysis · See more »
Digital signature
A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.
New!!: Adi Shamir and Digital signature · See more »
Distinguishing attack
In cryptography, a distinguishing attack is any form of cryptanalysis on data encrypted by a cipher that allows an attacker to distinguish the encrypted data from random data.
New!!: Adi Shamir and Distinguishing attack · See more »
Eli Biham
Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.
New!!: Adi Shamir and Eli Biham · See more »
Erdős Prize
The Anna and Lajos Erdős Prize in Mathematics is a prize given by the Israel Mathematical Union to an Israeli mathematician (in any field of mathematics and computer science), "with preference to candidates up to the age of 40." The prize was established by Paul Erdős in 1977 in honor of his parents, and is awarded annually or biannually.
New!!: Adi Shamir and Erdős Prize · See more »
FEAL
In cryptography, FEAL (the Fast data Encipherment ALgorithm) is a block cipher proposed as an alternative to the Data Encryption Standard (DES), and designed to be much faster in software.
New!!: Adi Shamir and FEAL · See more »
Feige–Fiat–Shamir identification scheme
In cryptography, the Feige–Fiat–Shamir identification scheme is a type of parallel zero-knowledge proof developed by Uriel Feige, Amos Fiat, and Adi Shamir in 1988.
New!!: Adi Shamir and Feige–Fiat–Shamir identification scheme · See more »
Fluhrer, Mantin and Shamir attack
In cryptography, the Fluhrer, Mantin and Shamir attack is a stream cipher attack on the widely used RC4 stream cipher.
New!!: Adi Shamir and Fluhrer, Mantin and Shamir attack · See more »
GDES
In cryptography, the Generalized DES Scheme (GDES or G-DES) is a variant of the DES symmetric-key block cipher designed with the intention of speeding up the encryption process while improving its security.
New!!: Adi Shamir and GDES · See more »
Geometric cryptography
Geometric cryptography is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and where computations are performed by ruler and compass constructions.
New!!: Adi Shamir and Geometric cryptography · See more »
George Blakley
George Robert (Bob) Blakley Jr. is an American cryptographer and a professor of mathematics at Texas A&M University, best known for inventing a secret sharing scheme in 1979.
New!!: Adi Shamir and George Blakley · See more »
Grande Médaille
The Grande Médaille of the French Academy of Sciences, established in 1997, is awarded annually to a researcher who has contributed decisively to the development of science.
New!!: Adi Shamir and Grande Médaille · See more »
Hidden Field Equations
Hidden Fields Equations (HFE), also known as HFE trapdoor function, is a public key cryptosystem which was introduced at Eurocrypt in 1996 and proposed by Jacques Patarin following the idea of the Matsumoto and Imai system.
New!!: Adi Shamir and Hidden Field Equations · See more »
History of bitcoin
Bitcoin is a cryptocurrency, a digital asset designed to work as a medium of exchange that uses cryptography to control its creation and management, rather than relying on central authorities.
New!!: Adi Shamir and History of bitcoin · See more »
ID-based cryptography
Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used as a public key.
New!!: Adi Shamir and ID-based cryptography · See more »
ID-based encryption
ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography.
New!!: Adi Shamir and ID-based encryption · See more »
IEEE Koji Kobayashi Computers and Communications Award
The IEEE Koji Kobayashi Computers and Communications Award is a Technical Field Award of the IEEE established in 1986.
New!!: Adi Shamir and IEEE Koji Kobayashi Computers and Communications Award · See more »
IEEE W.R.G. Baker Award
IEEE W.R.G. Baker Award provided by the Institute of Radio Engineers (IRE), was created in 1956 from a donation from Walter R. G. Baker (1892-1960) to the IRE.
New!!: Adi Shamir and IEEE W.R.G. Baker Award · See more »
Impossible differential cryptanalysis
In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers.
New!!: Adi Shamir and Impossible differential cryptanalysis · See more »
Index of cryptography articles
Articles related to cryptography include.
New!!: Adi Shamir and Index of cryptography articles · See more »
Interactive proof system
In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties.
New!!: Adi Shamir and Interactive proof system · See more »
Interlock protocol
The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation.
New!!: Adi Shamir and Interlock protocol · See more »
International Association for Cryptologic Research
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.
New!!: Adi Shamir and International Association for Cryptologic Research · See more »
Internet Key Exchange
In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite.
New!!: Adi Shamir and Internet Key Exchange · See more »
IP (complexity)
In computational complexity theory, the class IP (which stands for Interactive Polynomial time) is the class of problems solvable by an interactive proof system.
New!!: Adi Shamir and IP (complexity) · See more »
Israel Academy of Sciences and Humanities
Israel Academy of Sciences and Humanities, based in Jerusalem, was established in 1961 by the State of Israel to foster contact between Israeli scholars in the sciences and humanities and create a think tank for advising the government on research projects of national importance.
New!!: Adi Shamir and Israel Academy of Sciences and Humanities · See more »
James H. Ellis
James Henry Ellis (25 September 1924 – 25 November 1997) was a British engineer and cryptographer.
New!!: Adi Shamir and James H. Ellis · See more »
Japan Prize
is awarded to people from all parts of the world whose "original and outstanding achievements in science and technology are recognized as having advanced the frontiers of knowledge and served the cause of peace and prosperity for mankind." The Prize is presented by the Japan Prize Foundation.
New!!: Adi Shamir and Japan Prize · See more »
Jewish culture
Jewish culture is the culture of the Jewish people from the formation of the Jewish nation in biblical times through life in the diaspora and the modern state of Israel.
New!!: Adi Shamir and Jewish culture · See more »
KASUMI
KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.
New!!: Adi Shamir and KASUMI · See more »
Key finding attacks
Key Finding Attacks are attacks on computer systems that make use of cryptography in which computer memory or non-volatile storage is searched for private cryptographic keys that can be used to decrypt or sign data.
New!!: Adi Shamir and Key finding attacks · See more »
Key-agreement protocol
In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome.
New!!: Adi Shamir and Key-agreement protocol · See more »
Khufu and Khafre
In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center.
New!!: Adi Shamir and Khufu and Khafre · See more »
Knapsack cryptosystems
Knapsack Cryptosystems are cryptosystems which security is based on the hardness of solving the knapsack problem.
New!!: Adi Shamir and Knapsack cryptosystems · See more »
Lance Fortnow
Lance Jeremy Fortnow (born August 15, 1963) is a computer scientist known for major results in computational complexity and interactive proof systems.
New!!: Adi Shamir and Lance Fortnow · See more »
Lee Segel
Lee Aaron Segel (1932–2005) was an applied mathematician primarily at the Rensselaer Polytechnic Institute and the Weizmann Institute of Science.
New!!: Adi Shamir and Lee Segel · See more »
Leonard Adleman
Leonard Adleman (born December 31, 1945) is an American computer scientist.
New!!: Adi Shamir and Leonard Adleman · See more »
List of companies named after people
This is a list of companies named after people.
New!!: Adi Shamir and List of companies named after people · See more »
List of company name etymologies
This is a list of company names with their name origins explained.
New!!: Adi Shamir and List of company name etymologies · See more »
List of computer scientists
This is a list of computer scientists, people who do work in computer science, in particular researchers and authors.
New!!: Adi Shamir and List of computer scientists · See more »
List of computer term etymologies
This is a list of the origins of computer-related terms or terms used in the computing world (i.e., a list of computer term etymologies).
New!!: Adi Shamir and List of computer term etymologies · See more »
List of computing people
This is a list of people who are important or notable in the field of computing, but who are not primarily computer scientists or programmers.
New!!: Adi Shamir and List of computing people · See more »
List of cryptographers
List of cryptographers.
New!!: Adi Shamir and List of cryptographers · See more »
List of English inventions and discoveries
English inventions and discoveries are objects, processes or techniques invented, innovated or discovered, partially or entirely, in England by a person from England (that is, someone born in England - including to non-English parents - or born abroad with at least one English parent and who had the majority of their education or career in England).
New!!: Adi Shamir and List of English inventions and discoveries · See more »
List of eponyms (L–Z)
An eponym is a person (real or fictitious) whose name has become identified with a particular object or activity.
New!!: Adi Shamir and List of eponyms (L–Z) · See more »
List of Fellows of the Royal Society elected in 2018
This page lists Fellows of the Royal Society who were elected on 9 May 2018.
New!!: Adi Shamir and List of Fellows of the Royal Society elected in 2018 · See more »
List of International Congresses of Mathematicians Plenary and Invited Speakers
This is a list of International Congresses of Mathematicians Plenary and Invited Speakers.
New!!: Adi Shamir and List of International Congresses of Mathematicians Plenary and Invited Speakers · See more »
List of invited speakers at cryptology conferences
This is a list of invited speakers at selected cryptography conferences.
New!!: Adi Shamir and List of invited speakers at cryptology conferences · See more »
List of Israel Prize recipients
This is a complete list of recipients of the Israel Prize from the inception of the Prize in 1953 through 2017.
New!!: Adi Shamir and List of Israel Prize recipients · See more »
List of Israeli Ashkenazi Jews
This is a list of notable Israeli Ashkenazi Jews, including both original immigrants who obtained Israeli citizenship and their Israeli descendants.
New!!: Adi Shamir and List of Israeli Ashkenazi Jews · See more »
List of Israeli inventions and discoveries
This is a list of inventions and discoveries by Israeli scientists and researchers, working locally or overseas.
New!!: Adi Shamir and List of Israeli inventions and discoveries · See more »
List of Israelis
This is a list of prominent Israelis.
New!!: Adi Shamir and List of Israelis · See more »
List of Jewish American computer scientists
This is a list of famous Jewish American computer scientists.
New!!: Adi Shamir and List of Jewish American computer scientists · See more »
List of mathematicians (S)
No description.
New!!: Adi Shamir and List of mathematicians (S) · See more »
List of members of the National Academy of Sciences (computer and information sciences)
*National Academy of Sciences (Computer and information sciences) Category:Lists of computer scientists.
New!!: Adi Shamir and List of members of the National Academy of Sciences (computer and information sciences) · See more »
List of multiple discoveries
Historians and sociologists have remarked the occurrence, in science, of "multiple independent discovery".
New!!: Adi Shamir and List of multiple discoveries · See more »
List of people by Erdős number
Paul Erdős (1913–1996) was the most prolifically published mathematician of all time.
New!!: Adi Shamir and List of people by Erdős number · See more »
List of programmers
This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions.
New!!: Adi Shamir and List of programmers · See more »
List of Turing Award laureates by university affiliation
The following list comprehensively shows Turing Award laureates by university affiliations since 1966 (as of 2018, 67 winners in total), grouped by their current and past affiliation to academic institutions.
New!!: Adi Shamir and List of Turing Award laureates by university affiliation · See more »
LOKI
In cryptography, LOKI89 and LOKI91 are symmetric-key block ciphers designed as possible replacements for the Data Encryption Standard (DES).
New!!: Adi Shamir and LOKI · See more »
MAGENTA
In cryptography, MAGENTA is a symmetric key block cipher developed by Michael Jacobson Jr.
New!!: Adi Shamir and MAGENTA · See more »
Massachusetts Institute of Technology
The Massachusetts Institute of Technology (MIT) is a private research university located in Cambridge, Massachusetts, United States.
New!!: Adi Shamir and Massachusetts Institute of Technology · See more »
Member of the Academia Europaea
Membership of the Academia Europaea (MAE) is an award conferred by the Academia Europaea to individuals that have demonstrated “sustained academic excellence”.
New!!: Adi Shamir and Member of the Academia Europaea · See more »
Mental poker
Mental poker is the common name for a set of cryptographic problems that concerns playing a fair game over distance without the need for a trusted third party.
New!!: Adi Shamir and Mental poker · See more »
Michael Karin
Michael Karin is a Distinguished Professor of Pharmacology, Ben and Wanda Hildyard Chair for Mitochondrial and Metabolic Diseases, American Cancer Society Research Professor at the University of California San Diego.
New!!: Adi Shamir and Michael Karin · See more »
MISTY1
In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric.
New!!: Adi Shamir and MISTY1 · See more »
MIT Computer Science and Artificial Intelligence Laboratory
MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) is a research institute at the Massachusetts Institute of Technology formed by the 2003 merger of the Laboratory for Computer Science and the Artificial Intelligence Laboratory.
New!!: Adi Shamir and MIT Computer Science and Artificial Intelligence Laboratory · See more »
MIT150
The MIT150 is a list published by the Boston Globe, in honor of the 150th anniversary of the Massachusetts Institute of Technology (MIT) in 2011, listing 150 of the most significant innovators, inventions or ideas from MIT, its alumni, faculty, and related people and organizations in the 150 year history of the institute.
New!!: Adi Shamir and MIT150 · See more »
Mitsuru Matsui
is a Japanese cryptographer and senior researcher for Mitsubishi Electric Company.
New!!: Adi Shamir and Mitsuru Matsui · See more »
Moni Naor
Moni Naor (מוני נאור) is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science.
New!!: Adi Shamir and Moni Naor · See more »
MUGI
In cryptography, MUGI is a pseudorandom number generator (PRNG) designed for use as a stream cipher.
New!!: Adi Shamir and MUGI · See more »
N-Hash
In cryptography, N-Hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure.
New!!: Adi Shamir and N-Hash · See more »
National Cyber Security Hall of Fame
The National Cyber Security Hall of Fame was established in 2012 to recognize the contributions of key individuals in the field of cyber security, its mission statement is, Respect the Past - Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the Cyber Security Industry.
New!!: Adi Shamir and National Cyber Security Hall of Fame · See more »
Neural cryptography
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network algorithms, for use in encryption and cryptanalysis.
New!!: Adi Shamir and Neural cryptography · See more »
Nicko van Someren
Dr.
New!!: Adi Shamir and Nicko van Someren · See more »
Non-interactive zero-knowledge proof
Non-interactive zero-knowledge proofs are a variant of zero-knowledge proofs in which no interaction is necessary between prover and verifier.
New!!: Adi Shamir and Non-interactive zero-knowledge proof · See more »
Nothing up my sleeve number
In cryptography, nothing-up-my-sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties.
New!!: Adi Shamir and Nothing up my sleeve number · See more »
Paris Kanellakis
Paris Christos Kanellakis (Πάρις Χρήστος Κανελλάκης; December 3, 1953 – December 20, 1995) was a Greek American computer scientist.
New!!: Adi Shamir and Paris Kanellakis · See more »
Paris Kanellakis Award
The Paris Kanellakis Theory and Practice Award is granted yearly by the Association for Computing Machinery (ACM) to honor "specific theoretical accomplishments that have had a significant and demonstrable effect on the practice of computing".
New!!: Adi Shamir and Paris Kanellakis Award · See more »
Pius XI Medal
The Pius XI Medal is an award presented every second year by the Pontifical Academy of Sciences to a promising scientist under the age of 45.
New!!: Adi Shamir and Pius XI Medal · See more »
Polynomial identity testing
In mathematics, polynomial identity testing (PIT) is the problem of efficiently determining whether two multivariate polynomials are identical.
New!!: Adi Shamir and Polynomial identity testing · See more »
Public key infrastructure
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
New!!: Adi Shamir and Public key infrastructure · See more »
Public-key cryptography
Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.
New!!: Adi Shamir and Public-key cryptography · See more »
Random oracle
In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every unique query with a (truly) random response chosen uniformly from its output domain.
New!!: Adi Shamir and Random oracle · See more »
RC4
In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.
New!!: Adi Shamir and RC4 · See more »
Ring signature
In cryptography, a ring signature is a type of digital signature that can be performed by any member of a group of users that each have keys.
New!!: Adi Shamir and Ring signature · See more »
Ron Rivest
Ronald Linn Rivest (born May 6, 1947) is a cryptographer and an Institute Professor at MIT.
New!!: Adi Shamir and Ron Rivest · See more »
RSA (cryptosystem)
RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.
New!!: Adi Shamir and RSA (cryptosystem) · See more »
RSA Security
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company.
New!!: Adi Shamir and RSA Security · See more »
Satoshi Nakamoto
Satoshi Nakamoto is the name used by the unknown person or people who developed bitcoin, authored the bitcoin white paper, created and deployed bitcoin's original reference implementation.
New!!: Adi Shamir and Satoshi Nakamoto · See more »
Scrambler
In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the sender's side to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device.
New!!: Adi Shamir and Scrambler · See more »
Secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret.
New!!: Adi Shamir and Secret sharing · See more »
Shamir
Shamir may refer to: dill or fenel.
New!!: Adi Shamir and Shamir · See more »
Shamir's Secret Sharing
Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir.
New!!: Adi Shamir and Shamir's Secret Sharing · See more »
Shlomi Dolev
Shlomi Dolev (שלומי דולב, born December 5, 1958) is a Rita Altura Trust Chair Professor in Computer Science at Ben-Gurion University of the Negev (BGU) and the head of the Frankel Center for Computer Science.
New!!: Adi Shamir and Shlomi Dolev · See more »
Side-channel attack
In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).
New!!: Adi Shamir and Side-channel attack · See more »
Skipjack (cipher)
In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA).
New!!: Adi Shamir and Skipjack (cipher) · See more »
Snefru
Snefru is a cryptographic hash function invented by Ralph Merkle in 1990 while working at Xerox PARC.
New!!: Adi Shamir and Snefru · See more »
Spycatcher
Spycatcher: The Candid Autobiography of a Senior Intelligence Officer (1987) is a book written by Peter Wright, former MI5 officer and Assistant Director, and co-author Paul Greengrass.
New!!: Adi Shamir and Spycatcher · See more »
Stefan Brands
Dr.
New!!: Adi Shamir and Stefan Brands · See more »
Steganographic file system
Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir.
New!!: Adi Shamir and Steganographic file system · See more »
Stream cipher
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).
New!!: Adi Shamir and Stream cipher · See more »
T-function
In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as x_i'.
New!!: Adi Shamir and T-function · See more »
Tel Aviv University
Tel Aviv University (TAU) (אוּנִיבֶרְסִיטַת תֵּל-אָבִיב Universitat Tel Aviv) is a public research university in the neighborhood of Ramat Aviv in Tel Aviv, Israel.
New!!: Adi Shamir and Tel Aviv University · See more »
Three-pass protocol
In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys.
New!!: Adi Shamir and Three-pass protocol · See more »
Time/memory/data tradeoff attack
A time/memory/data tradeoff attack is a type of cryptographic attack where an attacker tries to achieve a situation similar to the space–time tradeoff but with one more parameter data: amount of data available to the attacker at real time.
New!!: Adi Shamir and Time/memory/data tradeoff attack · See more »
Timeline of algorithms
The following timeline outlines the development of algorithms (mainly "mathematical recipes") since their inception.
New!!: Adi Shamir and Timeline of algorithms · See more »
Timeline of cryptography
Below is a timeline of notable events related to cryptography.
New!!: Adi Shamir and Timeline of cryptography · See more »
Turing Award
The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions "of lasting and major technical importance to the computer field".
New!!: Adi Shamir and Turing Award · See more »
TWINKLE
TWINKLE (The Weizmann Institute Key Locating Engine) is a hypothetical integer factorization device described in 1999 by Adi Shamir and purported to be capable of factoring 512-bit integers.
New!!: Adi Shamir and TWINKLE · See more »
TWIRL
In cryptography and number theory, TWIRL (The Weizmann Institute Relation Locator) is a hypothetical hardware device designed to speed up the sieving step of the general number field sieve integer factorization algorithm.
New!!: Adi Shamir and TWIRL · See more »
Uriel Feige
Uriel Feige (אוריאל פייגה) is an Israeli computer scientist who was a doctoral student of Adi Shamir.
New!!: Adi Shamir and Uriel Feige · See more »
VideoCrypt
VideoCrypt is a cryptographic, smartcard-based conditional access television encryption system that scrambles analogue pay-TV signals.
New!!: Adi Shamir and VideoCrypt · See more »
Visual cryptography
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading.
New!!: Adi Shamir and Visual cryptography · See more »
Weizmann Institute of Science
The Weizmann Institute of Science (מכון ויצמן למדע Machon Weizmann LeMada) is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel.
New!!: Adi Shamir and Weizmann Institute of Science · See more »
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.
New!!: Adi Shamir and Wired Equivalent Privacy · See more »
XSL attack
In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers.
New!!: Adi Shamir and XSL attack · See more »
Yvo G. Desmedt
Dr.
New!!: Adi Shamir and Yvo G. Desmedt · See more »
1952
No description.
New!!: Adi Shamir and 1952 · See more »
1978 in science
The year 1978 in science and technology involved some significant events, listed below.
New!!: Adi Shamir and 1978 in science · See more »
2002 in science
The year 2002 in science and technology involved some significant events.
New!!: Adi Shamir and 2002 in science · See more »
Redirects here:
References
[1] https://en.wikipedia.org/wiki/Adi_Shamir