Biblio
Export 7 results:
Filters: Автор is Adi Shamir [Clear All Filters]
"Weaknesses in the Key Scheduling Algorithm of RC4." Lecture Notes in Computer Science 2259 (2001).
"Zero-Knowledge Proofs of Identity." Journal of Cryptology 1 (1988).
How to Prove Yourself: Practical Solutions of Identification and Signature Problems In Advances in Cryptology – Proceedings of CRYPTO’86, Lecture Notes in Computer Science. Vol. 263., 1987.
How to Share a Secret." Communications of the ACM 22, no. 11 (1979): 612-613.
"A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.
""A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.
A Method of Obtaining Digital Signatures and Public-Key Cryptosystems." Communications of the ACM 21, no. 2 (1978): 120-126.
"