Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Adi Shamir

Index Adi Shamir

Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer. [1]

145 relations: A5/1, Acoustic cryptanalysis, Adi, Adi (name), Advanced Encryption Standard, Aircrack-ng, Alan Turing Centenary Conference, Alex Biryukov, Alice and Bob, Amos Fiat, BBVA Foundation Frontiers of Knowledge Award, Block cipher, Bytecoin (cryptocurrency), C&C Prize, Cisco Videoscape, Clifford Cocks, Commitment scheme, Computer and network surveillance, Cryptography, Cube attack, Culture of Israel, Daniel J. Bernstein, Data Encryption Standard, David A. Wagner, Differential cryptanalysis, Digital signature, Distinguishing attack, Eli Biham, Erdős Prize, FEAL, Feige–Fiat–Shamir identification scheme, Fluhrer, Mantin and Shamir attack, GDES, Geometric cryptography, George Blakley, Grande Médaille, Hidden Field Equations, History of bitcoin, ID-based cryptography, ID-based encryption, IEEE Koji Kobayashi Computers and Communications Award, IEEE W.R.G. Baker Award, Impossible differential cryptanalysis, Index of cryptography articles, Interactive proof system, Interlock protocol, International Association for Cryptologic Research, Internet Key Exchange, IP (complexity), Israel Academy of Sciences and Humanities, ..., James H. Ellis, Japan Prize, Jewish culture, KASUMI, Key finding attacks, Key-agreement protocol, Khufu and Khafre, Knapsack cryptosystems, Lance Fortnow, Lee Segel, Leonard Adleman, List of companies named after people, List of company name etymologies, List of computer scientists, List of computer term etymologies, List of computing people, List of cryptographers, List of English inventions and discoveries, List of eponyms (L–Z), List of Fellows of the Royal Society elected in 2018, List of International Congresses of Mathematicians Plenary and Invited Speakers, List of invited speakers at cryptology conferences, List of Israel Prize recipients, List of Israeli Ashkenazi Jews, List of Israeli inventions and discoveries, List of Israelis, List of Jewish American computer scientists, List of mathematicians (S), List of members of the National Academy of Sciences (computer and information sciences), List of multiple discoveries, List of people by Erdős number, List of programmers, List of Turing Award laureates by university affiliation, LOKI, MAGENTA, Massachusetts Institute of Technology, Member of the Academia Europaea, Mental poker, Michael Karin, MISTY1, MIT Computer Science and Artificial Intelligence Laboratory, MIT150, Mitsuru Matsui, Moni Naor, MUGI, N-Hash, National Cyber Security Hall of Fame, Neural cryptography, Nicko van Someren, Non-interactive zero-knowledge proof, Nothing up my sleeve number, Paris Kanellakis, Paris Kanellakis Award, Pius XI Medal, Polynomial identity testing, Public key infrastructure, Public-key cryptography, Random oracle, RC4, Ring signature, Ron Rivest, RSA (cryptosystem), RSA Security, Satoshi Nakamoto, Scrambler, Secret sharing, Shamir, Shamir's Secret Sharing, Shlomi Dolev, Side-channel attack, Skipjack (cipher), Snefru, Spycatcher, Stefan Brands, Steganographic file system, Stream cipher, T-function, Tel Aviv University, Three-pass protocol, Time/memory/data tradeoff attack, Timeline of algorithms, Timeline of cryptography, Turing Award, TWINKLE, TWIRL, Uriel Feige, VideoCrypt, Visual cryptography, Weizmann Institute of Science, Wired Equivalent Privacy, XSL attack, Yvo G. Desmedt, 1952, 1978 in science, 2002 in science. Expand index (95 more) »

A5/1

A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard.

New!!: Adi Shamir and A5/1 · See more »

Acoustic cryptanalysis

Acoustic cryptanalysis is a type of side channel attack that exploits sounds emitted by computers or other devices.

New!!: Adi Shamir and Acoustic cryptanalysis · See more »

Adi

Adi may refer to.

New!!: Adi Shamir and Adi · See more »

Adi (name)

Adi (עדִי) is a unisex Semitic language given name, which means "jewel" or "ornament".

New!!: Adi Shamir and Adi (name) · See more »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Adi Shamir and Advanced Encryption Standard · See more »

Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.

New!!: Adi Shamir and Aircrack-ng · See more »

Alan Turing Centenary Conference

The Alan Turing Centenary Conference was an academic conference celebrating the life and research of Alan Turing by bringing together distinguished scientists to understand and analyse the history and development of Computer Science and Artificial intelligence.

New!!: Adi Shamir and Alan Turing Centenary Conference · See more »

Alex Biryukov

Alex Biryukov is a cryptographer, currently a full professor at the University of Luxembourg.

New!!: Adi Shamir and Alex Biryukov · See more »

Alice and Bob

Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature.

New!!: Adi Shamir and Alice and Bob · See more »

Amos Fiat

Amos Fiat (born December 1, 1956 in Haifa, Israel) is an Israeli computer scientist, a professor of computer science at Tel Aviv University.

New!!: Adi Shamir and Amos Fiat · See more »

BBVA Foundation Frontiers of Knowledge Award

The BBVA Foundation Frontiers of Knowledge Awards, Premios Fundación BBVA Fronteras del Conocimiento, in Spanish, are an international award programme recognizing significant contributions in the areas of scientific research and cultural creation.

New!!: Adi Shamir and BBVA Foundation Frontiers of Knowledge Award · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Adi Shamir and Block cipher · See more »

Bytecoin (cryptocurrency)

Bytecoin (ticker symbol BCN) is the first cryptocurrency based on the CryptoNote technology with an open source code designed for anonymous cash settlement.

New!!: Adi Shamir and Bytecoin (cryptocurrency) · See more »

C&C Prize

C&C Prizes (C&C賞) is an award given by the NEC Corporation "in recognition of outstanding contributions to research and development and/or pioneering work in the fields of semiconductors, computers, telecommunications and their integrated technologies." Established in 1985, through the NEC's nonprofit C&C Foundation, C&C Prizes are awarded to two groups or individuals annually.

New!!: Adi Shamir and C&C Prize · See more »

Cisco Videoscape

Cisco Videoscape (Formerly NDS Group Ltd.) is a former Israeli development group that has been acquired by Cisco, which develops software for the pay TV industry (including cable, satellite and others). NDS Group was established in 1988 as an Israeli start up company. It was acquired by Cisco in 2012. The company is currently headquartered in Staines, United Kingdom. Filling The Executive Chairman and CEO roles at NDS is Abe Peled with former CEO Dave Habiger having left in 2012. The company's major product is the VideoGuard conditional access system, which is used by more than 85 leading pay TV operators around the world. NDS technology includes end to end connections for satellite, broadband IPTV, Hybrid, OTT, and EPGs. It has launched VideoGuard Connect, the DRM for Pay-TV, designed to help TV operators to seamlessly extend their pay-TV services to connected media devices, enabling secure ingestion, delivery and consumption of premium content over both managed and OTT networks while maintaining subscription privileges across devices. NDS also provides advanced advertising, professional services and system integration services. New ways to secure content on PCs, tablets, and other devices are displayed at IBC and CES. Cisco Systems announced the acquisition of the company in March, 2012. It was later acquired successfully and in 2014 its name was changed into Videoscape, becoming a part of Cisco.

New!!: Adi Shamir and Cisco Videoscape · See more »

Clifford Cocks

Clifford Christopher Cocks CB FRS (born 28 December 1950) is a British mathematician and cryptographer.

New!!: Adi Shamir and Clifford Cocks · See more »

Commitment scheme

A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later.

New!!: Adi Shamir and Commitment scheme · See more »

Computer and network surveillance

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

New!!: Adi Shamir and Computer and network surveillance · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Adi Shamir and Cryptography · See more »

Cube attack

The cube attack is a method of cryptanalysis applicable to a wide variety of symmetric-key algorithms, published by Itai Dinur and Adi Shamir in a September 2008 preprint.

New!!: Adi Shamir and Cube attack · See more »

Culture of Israel

The roots of the culture of Israel developed long before modern Israel's independence in 1948 and traces back to ancient Israel (1000 BCE).

New!!: Adi Shamir and Culture of Israel · See more »

Daniel J. Bernstein

Daniel Julius Bernstein (sometimes known simply as djb; born October 29, 1971) is a German-American mathematician, cryptologist, and programmer.

New!!: Adi Shamir and Daniel J. Bernstein · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Adi Shamir and Data Encryption Standard · See more »

David A. Wagner

David A. Wagner (born 1974) is a Professor of Computer Science at the University of California, Berkeley and a well-known researcher in cryptography and computer security.

New!!: Adi Shamir and David A. Wagner · See more »

Differential cryptanalysis

Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions.

New!!: Adi Shamir and Differential cryptanalysis · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Adi Shamir and Digital signature · See more »

Distinguishing attack

In cryptography, a distinguishing attack is any form of cryptanalysis on data encrypted by a cipher that allows an attacker to distinguish the encrypted data from random data.

New!!: Adi Shamir and Distinguishing attack · See more »

Eli Biham

Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.

New!!: Adi Shamir and Eli Biham · See more »

Erdős Prize

The Anna and Lajos Erdős Prize in Mathematics is a prize given by the Israel Mathematical Union to an Israeli mathematician (in any field of mathematics and computer science), "with preference to candidates up to the age of 40." The prize was established by Paul Erdős in 1977 in honor of his parents, and is awarded annually or biannually.

New!!: Adi Shamir and Erdős Prize · See more »

FEAL

In cryptography, FEAL (the Fast data Encipherment ALgorithm) is a block cipher proposed as an alternative to the Data Encryption Standard (DES), and designed to be much faster in software.

New!!: Adi Shamir and FEAL · See more »

Feige–Fiat–Shamir identification scheme

In cryptography, the Feige–Fiat–Shamir identification scheme is a type of parallel zero-knowledge proof developed by Uriel Feige, Amos Fiat, and Adi Shamir in 1988.

New!!: Adi Shamir and Feige–Fiat–Shamir identification scheme · See more »

Fluhrer, Mantin and Shamir attack

In cryptography, the Fluhrer, Mantin and Shamir attack is a stream cipher attack on the widely used RC4 stream cipher.

New!!: Adi Shamir and Fluhrer, Mantin and Shamir attack · See more »

GDES

In cryptography, the Generalized DES Scheme (GDES or G-DES) is a variant of the DES symmetric-key block cipher designed with the intention of speeding up the encryption process while improving its security.

New!!: Adi Shamir and GDES · See more »

Geometric cryptography

Geometric cryptography is an area of cryptology where messages and ciphertexts are represented by geometric quantities such as angles or intervals and where computations are performed by ruler and compass constructions.

New!!: Adi Shamir and Geometric cryptography · See more »

George Blakley

George Robert (Bob) Blakley Jr. is an American cryptographer and a professor of mathematics at Texas A&M University, best known for inventing a secret sharing scheme in 1979.

New!!: Adi Shamir and George Blakley · See more »

Grande Médaille

The Grande Médaille of the French Academy of Sciences, established in 1997, is awarded annually to a researcher who has contributed decisively to the development of science.

New!!: Adi Shamir and Grande Médaille · See more »

Hidden Field Equations

Hidden Fields Equations (HFE), also known as HFE trapdoor function, is a public key cryptosystem which was introduced at Eurocrypt in 1996 and proposed by Jacques Patarin following the idea of the Matsumoto and Imai system.

New!!: Adi Shamir and Hidden Field Equations · See more »

History of bitcoin

Bitcoin is a cryptocurrency, a digital asset designed to work as a medium of exchange that uses cryptography to control its creation and management, rather than relying on central authorities.

New!!: Adi Shamir and History of bitcoin · See more »

ID-based cryptography

Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used as a public key.

New!!: Adi Shamir and ID-based cryptography · See more »

ID-based encryption

ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography.

New!!: Adi Shamir and ID-based encryption · See more »

IEEE Koji Kobayashi Computers and Communications Award

The IEEE Koji Kobayashi Computers and Communications Award is a Technical Field Award of the IEEE established in 1986.

New!!: Adi Shamir and IEEE Koji Kobayashi Computers and Communications Award · See more »

IEEE W.R.G. Baker Award

IEEE W.R.G. Baker Award provided by the Institute of Radio Engineers (IRE), was created in 1956 from a donation from Walter R. G. Baker (1892-1960) to the IRE.

New!!: Adi Shamir and IEEE W.R.G. Baker Award · See more »

Impossible differential cryptanalysis

In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers.

New!!: Adi Shamir and Impossible differential cryptanalysis · See more »

Index of cryptography articles

Articles related to cryptography include.

New!!: Adi Shamir and Index of cryptography articles · See more »

Interactive proof system

In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties.

New!!: Adi Shamir and Interactive proof system · See more »

Interlock protocol

The interlock protocol, as described by Ron Rivest and Adi Shamir, was designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation.

New!!: Adi Shamir and Interlock protocol · See more »

International Association for Cryptologic Research

The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

New!!: Adi Shamir and International Association for Cryptologic Research · See more »

Internet Key Exchange

In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite.

New!!: Adi Shamir and Internet Key Exchange · See more »

IP (complexity)

In computational complexity theory, the class IP (which stands for Interactive Polynomial time) is the class of problems solvable by an interactive proof system.

New!!: Adi Shamir and IP (complexity) · See more »

Israel Academy of Sciences and Humanities

Israel Academy of Sciences and Humanities, based in Jerusalem, was established in 1961 by the State of Israel to foster contact between Israeli scholars in the sciences and humanities and create a think tank for advising the government on research projects of national importance.

New!!: Adi Shamir and Israel Academy of Sciences and Humanities · See more »

James H. Ellis

James Henry Ellis (25 September 1924 – 25 November 1997) was a British engineer and cryptographer.

New!!: Adi Shamir and James H. Ellis · See more »

Japan Prize

is awarded to people from all parts of the world whose "original and outstanding achievements in science and technology are recognized as having advanced the frontiers of knowledge and served the cause of peace and prosperity for mankind." The Prize is presented by the Japan Prize Foundation.

New!!: Adi Shamir and Japan Prize · See more »

Jewish culture

Jewish culture is the culture of the Jewish people from the formation of the Jewish nation in biblical times through life in the diaspora and the modern state of Israel.

New!!: Adi Shamir and Jewish culture · See more »

KASUMI

KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.

New!!: Adi Shamir and KASUMI · See more »

Key finding attacks

Key Finding Attacks are attacks on computer systems that make use of cryptography in which computer memory or non-volatile storage is searched for private cryptographic keys that can be used to decrypt or sign data.

New!!: Adi Shamir and Key finding attacks · See more »

Key-agreement protocol

In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome.

New!!: Adi Shamir and Key-agreement protocol · See more »

Khufu and Khafre

In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center.

New!!: Adi Shamir and Khufu and Khafre · See more »

Knapsack cryptosystems

Knapsack Cryptosystems are cryptosystems which security is based on the hardness of solving the knapsack problem.

New!!: Adi Shamir and Knapsack cryptosystems · See more »

Lance Fortnow

Lance Jeremy Fortnow (born August 15, 1963) is a computer scientist known for major results in computational complexity and interactive proof systems.

New!!: Adi Shamir and Lance Fortnow · See more »

Lee Segel

Lee Aaron Segel (1932–2005) was an applied mathematician primarily at the Rensselaer Polytechnic Institute and the Weizmann Institute of Science.

New!!: Adi Shamir and Lee Segel · See more »

Leonard Adleman

Leonard Adleman (born December 31, 1945) is an American computer scientist.

New!!: Adi Shamir and Leonard Adleman · See more »

List of companies named after people

This is a list of companies named after people.

New!!: Adi Shamir and List of companies named after people · See more »

List of company name etymologies

This is a list of company names with their name origins explained.

New!!: Adi Shamir and List of company name etymologies · See more »

List of computer scientists

This is a list of computer scientists, people who do work in computer science, in particular researchers and authors.

New!!: Adi Shamir and List of computer scientists · See more »

List of computer term etymologies

This is a list of the origins of computer-related terms or terms used in the computing world (i.e., a list of computer term etymologies).

New!!: Adi Shamir and List of computer term etymologies · See more »

List of computing people

This is a list of people who are important or notable in the field of computing, but who are not primarily computer scientists or programmers.

New!!: Adi Shamir and List of computing people · See more »

List of cryptographers

List of cryptographers.

New!!: Adi Shamir and List of cryptographers · See more »

List of English inventions and discoveries

English inventions and discoveries are objects, processes or techniques invented, innovated or discovered, partially or entirely, in England by a person from England (that is, someone born in England - including to non-English parents - or born abroad with at least one English parent and who had the majority of their education or career in England).

New!!: Adi Shamir and List of English inventions and discoveries · See more »

List of eponyms (L–Z)

An eponym is a person (real or fictitious) whose name has become identified with a particular object or activity.

New!!: Adi Shamir and List of eponyms (L–Z) · See more »

List of Fellows of the Royal Society elected in 2018

This page lists Fellows of the Royal Society who were elected on 9 May 2018.

New!!: Adi Shamir and List of Fellows of the Royal Society elected in 2018 · See more »

List of International Congresses of Mathematicians Plenary and Invited Speakers

This is a list of International Congresses of Mathematicians Plenary and Invited Speakers.

New!!: Adi Shamir and List of International Congresses of Mathematicians Plenary and Invited Speakers · See more »

List of invited speakers at cryptology conferences

This is a list of invited speakers at selected cryptography conferences.

New!!: Adi Shamir and List of invited speakers at cryptology conferences · See more »

List of Israel Prize recipients

This is a complete list of recipients of the Israel Prize from the inception of the Prize in 1953 through 2017.

New!!: Adi Shamir and List of Israel Prize recipients · See more »

List of Israeli Ashkenazi Jews

This is a list of notable Israeli Ashkenazi Jews, including both original immigrants who obtained Israeli citizenship and their Israeli descendants.

New!!: Adi Shamir and List of Israeli Ashkenazi Jews · See more »

List of Israeli inventions and discoveries

This is a list of inventions and discoveries by Israeli scientists and researchers, working locally or overseas.

New!!: Adi Shamir and List of Israeli inventions and discoveries · See more »

List of Israelis

This is a list of prominent Israelis.

New!!: Adi Shamir and List of Israelis · See more »

List of Jewish American computer scientists

This is a list of famous Jewish American computer scientists.

New!!: Adi Shamir and List of Jewish American computer scientists · See more »

List of mathematicians (S)

No description.

New!!: Adi Shamir and List of mathematicians (S) · See more »

List of members of the National Academy of Sciences (computer and information sciences)

*National Academy of Sciences (Computer and information sciences) Category:Lists of computer scientists.

New!!: Adi Shamir and List of members of the National Academy of Sciences (computer and information sciences) · See more »

List of multiple discoveries

Historians and sociologists have remarked the occurrence, in science, of "multiple independent discovery".

New!!: Adi Shamir and List of multiple discoveries · See more »

List of people by Erdős number

Paul Erdős (1913–1996) was the most prolifically published mathematician of all time.

New!!: Adi Shamir and List of people by Erdős number · See more »

List of programmers

This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions.

New!!: Adi Shamir and List of programmers · See more »

List of Turing Award laureates by university affiliation

The following list comprehensively shows Turing Award laureates by university affiliations since 1966 (as of 2018, 67 winners in total), grouped by their current and past affiliation to academic institutions.

New!!: Adi Shamir and List of Turing Award laureates by university affiliation · See more »

LOKI

In cryptography, LOKI89 and LOKI91 are symmetric-key block ciphers designed as possible replacements for the Data Encryption Standard (DES).

New!!: Adi Shamir and LOKI · See more »

MAGENTA

In cryptography, MAGENTA is a symmetric key block cipher developed by Michael Jacobson Jr.

New!!: Adi Shamir and MAGENTA · See more »

Massachusetts Institute of Technology

The Massachusetts Institute of Technology (MIT) is a private research university located in Cambridge, Massachusetts, United States.

New!!: Adi Shamir and Massachusetts Institute of Technology · See more »

Member of the Academia Europaea

Membership of the Academia Europaea (MAE) is an award conferred by the Academia Europaea to individuals that have demonstrated “sustained academic excellence”.

New!!: Adi Shamir and Member of the Academia Europaea · See more »

Mental poker

Mental poker is the common name for a set of cryptographic problems that concerns playing a fair game over distance without the need for a trusted third party.

New!!: Adi Shamir and Mental poker · See more »

Michael Karin

Michael Karin is a Distinguished Professor of Pharmacology, Ben and Wanda Hildyard Chair for Mitochondrial and Metabolic Diseases, American Cancer Society Research Professor at the University of California San Diego.

New!!: Adi Shamir and Michael Karin · See more »

MISTY1

In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric.

New!!: Adi Shamir and MISTY1 · See more »

MIT Computer Science and Artificial Intelligence Laboratory

MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) is a research institute at the Massachusetts Institute of Technology formed by the 2003 merger of the Laboratory for Computer Science and the Artificial Intelligence Laboratory.

New!!: Adi Shamir and MIT Computer Science and Artificial Intelligence Laboratory · See more »

MIT150

The MIT150 is a list published by the Boston Globe, in honor of the 150th anniversary of the Massachusetts Institute of Technology (MIT) in 2011, listing 150 of the most significant innovators, inventions or ideas from MIT, its alumni, faculty, and related people and organizations in the 150 year history of the institute.

New!!: Adi Shamir and MIT150 · See more »

Mitsuru Matsui

is a Japanese cryptographer and senior researcher for Mitsubishi Electric Company.

New!!: Adi Shamir and Mitsuru Matsui · See more »

Moni Naor

Moni Naor (מוני נאור) is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science.

New!!: Adi Shamir and Moni Naor · See more »

MUGI

In cryptography, MUGI is a pseudorandom number generator (PRNG) designed for use as a stream cipher.

New!!: Adi Shamir and MUGI · See more »

N-Hash

In cryptography, N-Hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure.

New!!: Adi Shamir and N-Hash · See more »

National Cyber Security Hall of Fame

The National Cyber Security Hall of Fame was established in 2012 to recognize the contributions of key individuals in the field of cyber security, its mission statement is, Respect the Past - Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the Cyber Security Industry.

New!!: Adi Shamir and National Cyber Security Hall of Fame · See more »

Neural cryptography

Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network algorithms, for use in encryption and cryptanalysis.

New!!: Adi Shamir and Neural cryptography · See more »

Nicko van Someren

Dr.

New!!: Adi Shamir and Nicko van Someren · See more »

Non-interactive zero-knowledge proof

Non-interactive zero-knowledge proofs are a variant of zero-knowledge proofs in which no interaction is necessary between prover and verifier.

New!!: Adi Shamir and Non-interactive zero-knowledge proof · See more »

Nothing up my sleeve number

In cryptography, nothing-up-my-sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties.

New!!: Adi Shamir and Nothing up my sleeve number · See more »

Paris Kanellakis

Paris Christos Kanellakis (Πάρις Χρήστος Κανελλάκης; December 3, 1953 – December 20, 1995) was a Greek American computer scientist.

New!!: Adi Shamir and Paris Kanellakis · See more »

Paris Kanellakis Award

The Paris Kanellakis Theory and Practice Award is granted yearly by the Association for Computing Machinery (ACM) to honor "specific theoretical accomplishments that have had a significant and demonstrable effect on the practice of computing".

New!!: Adi Shamir and Paris Kanellakis Award · See more »

Pius XI Medal

The Pius XI Medal is an award presented every second year by the Pontifical Academy of Sciences to a promising scientist under the age of 45.

New!!: Adi Shamir and Pius XI Medal · See more »

Polynomial identity testing

In mathematics, polynomial identity testing (PIT) is the problem of efficiently determining whether two multivariate polynomials are identical.

New!!: Adi Shamir and Polynomial identity testing · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Adi Shamir and Public key infrastructure · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Adi Shamir and Public-key cryptography · See more »

Random oracle

In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every unique query with a (truly) random response chosen uniformly from its output domain.

New!!: Adi Shamir and Random oracle · See more »

RC4

In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.

New!!: Adi Shamir and RC4 · See more »

Ring signature

In cryptography, a ring signature is a type of digital signature that can be performed by any member of a group of users that each have keys.

New!!: Adi Shamir and Ring signature · See more »

Ron Rivest

Ronald Linn Rivest (born May 6, 1947) is a cryptographer and an Institute Professor at MIT.

New!!: Adi Shamir and Ron Rivest · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Adi Shamir and RSA (cryptosystem) · See more »

RSA Security

RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company.

New!!: Adi Shamir and RSA Security · See more »

Satoshi Nakamoto

Satoshi Nakamoto is the name used by the unknown person or people who developed bitcoin, authored the bitcoin white paper, created and deployed bitcoin's original reference implementation.

New!!: Adi Shamir and Satoshi Nakamoto · See more »

Scrambler

In telecommunications, a scrambler is a device that transposes or inverts signals or otherwise encodes a message at the sender's side to make the message unintelligible at a receiver not equipped with an appropriately set descrambling device.

New!!: Adi Shamir and Scrambler · See more »

Secret sharing

Secret sharing (also called secret splitting) refers to methods for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret.

New!!: Adi Shamir and Secret sharing · See more »

Shamir

Shamir may refer to: dill or fenel.

New!!: Adi Shamir and Shamir · See more »

Shamir's Secret Sharing

Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir.

New!!: Adi Shamir and Shamir's Secret Sharing · See more »

Shlomi Dolev

Shlomi Dolev (שלומי דולב, born December 5, 1958) is a Rita Altura Trust Chair Professor in Computer Science at Ben-Gurion University of the Negev (BGU) and the head of the Frankel Center for Computer Science.

New!!: Adi Shamir and Shlomi Dolev · See more »

Side-channel attack

In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).

New!!: Adi Shamir and Side-channel attack · See more »

Skipjack (cipher)

In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA).

New!!: Adi Shamir and Skipjack (cipher) · See more »

Snefru

Snefru is a cryptographic hash function invented by Ralph Merkle in 1990 while working at Xerox PARC.

New!!: Adi Shamir and Snefru · See more »

Spycatcher

Spycatcher: The Candid Autobiography of a Senior Intelligence Officer (1987) is a book written by Peter Wright, former MI5 officer and Assistant Director, and co-author Paul Greengrass.

New!!: Adi Shamir and Spycatcher · See more »

Stefan Brands

Dr.

New!!: Adi Shamir and Stefan Brands · See more »

Steganographic file system

Steganographic file systems are a kind of file system first proposed by Ross Anderson, Roger Needham, and Adi Shamir.

New!!: Adi Shamir and Steganographic file system · See more »

Stream cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

New!!: Adi Shamir and Stream cipher · See more »

T-function

In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as x_i'.

New!!: Adi Shamir and T-function · See more »

Tel Aviv University

Tel Aviv University (TAU) (אוּנִיבֶרְסִיטַת תֵּל-אָבִיב Universitat Tel Aviv) is a public research university in the neighborhood of Ramat Aviv in Tel Aviv, Israel.

New!!: Adi Shamir and Tel Aviv University · See more »

Three-pass protocol

In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys.

New!!: Adi Shamir and Three-pass protocol · See more »

Time/memory/data tradeoff attack

A time/memory/data tradeoff attack is a type of cryptographic attack where an attacker tries to achieve a situation similar to the space–time tradeoff but with one more parameter data: amount of data available to the attacker at real time.

New!!: Adi Shamir and Time/memory/data tradeoff attack · See more »

Timeline of algorithms

The following timeline outlines the development of algorithms (mainly "mathematical recipes") since their inception.

New!!: Adi Shamir and Timeline of algorithms · See more »

Timeline of cryptography

Below is a timeline of notable events related to cryptography.

New!!: Adi Shamir and Timeline of cryptography · See more »

Turing Award

The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions "of lasting and major technical importance to the computer field".

New!!: Adi Shamir and Turing Award · See more »

TWINKLE

TWINKLE (The Weizmann Institute Key Locating Engine) is a hypothetical integer factorization device described in 1999 by Adi Shamir and purported to be capable of factoring 512-bit integers.

New!!: Adi Shamir and TWINKLE · See more »

TWIRL

In cryptography and number theory, TWIRL (The Weizmann Institute Relation Locator) is a hypothetical hardware device designed to speed up the sieving step of the general number field sieve integer factorization algorithm.

New!!: Adi Shamir and TWIRL · See more »

Uriel Feige

Uriel Feige (אוריאל פייגה) is an Israeli computer scientist who was a doctoral student of Adi Shamir.

New!!: Adi Shamir and Uriel Feige · See more »

VideoCrypt

VideoCrypt is a cryptographic, smartcard-based conditional access television encryption system that scrambles analogue pay-TV signals.

New!!: Adi Shamir and VideoCrypt · See more »

Visual cryptography

Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes the job of the person to decrypt via sight reading.

New!!: Adi Shamir and Visual cryptography · See more »

Weizmann Institute of Science

The Weizmann Institute of Science (מכון ויצמן למדע Machon Weizmann LeMada) is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel.

New!!: Adi Shamir and Weizmann Institute of Science · See more »

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.

New!!: Adi Shamir and Wired Equivalent Privacy · See more »

XSL attack

In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers.

New!!: Adi Shamir and XSL attack · See more »

Yvo G. Desmedt

Dr.

New!!: Adi Shamir and Yvo G. Desmedt · See more »

1952

No description.

New!!: Adi Shamir and 1952 · See more »

1978 in science

The year 1978 in science and technology involved some significant events, listed below.

New!!: Adi Shamir and 1978 in science · See more »

2002 in science

The year 2002 in science and technology involved some significant events.

New!!: Adi Shamir and 2002 in science · See more »

Redirects here:

Sadi shamir.

References

[1] https://en.wikipedia.org/wiki/Adi_Shamir

OutgoingIncoming
Hey! We are on Facebook now! »