DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Adi Shamir
Adi Shamir
Butler Lampson, Martin Abadi, Michael Burrows, Edward Wobber
Rivest, Shamir, and Adleman Receive 2002 Turing Award, Volume 50
Cryptography: DH And
Magnetic RSA
Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
The Best Nurturers in Computer Science Research
The RSA Algorithm
Cache Timing Side-Channel Vulnerability Checking With
Rsa and Rabin Functions: Certain Parts Are As Hard As the Whole*
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories
A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay
RON RIVEST Viterbi Professor of Computer Science, MIT's Department of Electrical Engineering and Computer Science
Arxiv:2106.11534V1 [Cs.DL] 22 Jun 2021 2 Nanjing University of Science and Technology, Nanjing, China 3 University of Southampton, Southampton, U.K
Dr. Adi Shamir
Alan Mathison Turing and the Turing Award Winners
Contents 1 a Brief Introduction to Cryptography
COMP 516 Research Methods in Computer Science Research Methods in Computer Science Lecture 3: Who Is Who in Computer Science Research
How to Leak a Secret
Top View
AM Turing Awards Winners Panel Discussions
Public Key Cryptography
Book Rev of Ideas That Created the Future
A Timing Attack on Openssl Constant Time RSA
Secret Sharing Scheme from Quadratic Residues for Grayscale Images
Goldwasser, Micali and Rivest Discuss How to Protect Citizens' Security In
Cryptography Cryptography Basics
Notes for Recitation 7 1
Optimal Multi-Way Number Partitioning
Social Network Forensics: Tapping the Data Pool of Social Networks
Download and Use Untrusted Code Without Fear
ID-Based Cryptography and Smart-Cards Survol Des Techniques Cryptographiques Basées Sur L’Identité Et Implémentation Sur Carte À Puce
Co-Authorship Proximity of A. M. Turing Award and John Von Neumann Medal Winners to the Disciplinary Boundaries of Computer Science
CECS 328 Lectures
Ron Rivest (MIT)
Goldwasser Transcript Final with Timestamps)
Contents U U U
Shamir: How to Share a Secret
Privacy and Authentication: an Introduction to Cryptography
Contact: Jim Ormond 212-626-0505
[email protected]
A Bibliography of the ACM Turing Awards (1966–Date)
IDENTITY-BASED CRYPTOSYSTEMS and SIGNATURE SCHEMES Adi
Time-Lock Puzzles and Timed-Release Crypto
Ed Catmull, Co-Founder of Pixar, Served As President of Pixar for 33 Years, and President of Disney Animation for 13 of Those 33 Years, Prior to Retiring
Visual Cryptography
Zohar Manna (1939–2018)
A Conceptual Discussion of Cryptographic Security In
Stopping Time Signatures for Some Algorithms in Cryptography
RSA Worksheet Public Key Cryptography Was Suggested By
Past and Present Recipients
Improved Space-Time Tradeoffs for Ksum
Profile of Group B Recipients Professor Ronald L. Rivest
FASTER FILE MATCHING USING GPGPU's by Deephan Venkatesh
How to Leak a Secret
Deja Vu All Over Again
Loosely-Self-Stabilizing Byzantine-Tolerant Binary Consensus for Signature-Free Message-Passing Systems
Protecting AES with Shamir's Secret Sharing Scheme⋆
RSA Public Key Cryptosystem Razia Amzad Pace University
Lecture Notes in Computer Science for Information About Vols
Visual Cryptography
Adi Shamir (PDF)