Author: Adi Shamir
Publications
Co-authors
Productive Colleagues
Publications
Rivest, Ronald L., Shamir, Adi (1984): How to Expose an Eavesdropper. In Communications of the ACM, 27 (4) pp. 393-395.
Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1983): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). In Communications of the ACM, 26 (1) pp. 96-99.
Shamir, Adi (1979): How to Share a Secret. In Communications of the ACM, 22 (11) pp. 612-613.
Rivest, Ronald L., Shamir, Adi, Adleman, Leonard M. (1978): A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Communications of the ACM, 21 (2) pp. 120-126.
Manna, Zohar, Shamir, Adi (1977): The Optimal Approach to Recursive Programs. In Communications of the ACM, 20 (11) pp. 824-831.