Author: Adi Shamir

Publications

Publication period start: 1979
Number of co-authors: 3

Co-authors

Number of publications with favourite co-authors
Zohar Manna
1
Leonard M. Adleman
2
Ronald L. Rivest
3

Productive Colleagues

Most productive colleagues in number of publications
Leonard M. Adleman
2
Zohar Manna
7
Ronald L. Rivest
9

Publications

Rivest, Ronald L., Shamir, Adi (1984): How to Expose an Eavesdropper. In Communications of the ACM, 27 (4) pp. 393-395.

Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1983): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). In Communications of the ACM, 26 (1) pp. 96-99.

Shamir, Adi (1979): How to Share a Secret. In Communications of the ACM, 22 (11) pp. 612-613.

Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1978): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, 21 (2) pp. 120-126.

Manna, Zohar, Shamir, Adi (1977): The Optimal Approach to Recursive Programs. In Communications of the ACM, 20 (11) pp. 824-831.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,560 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,560 designers enjoy our newsletter—sure you don’t want to receive it?