Adi Shamir

Results: 35



#Item
11Bitcoin / Cryptocurrencies / Dark web / Illegal drug trade / Underground culture / Silk Road / Satoshi Nakamoto / Operation Onymous / BTCS / Ross Ulbricht / Blockchain / Draft:Basics with Bitcoin

How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir}@weizm

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:19:53
12

Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir}@weizmann.ac.il

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-03-27 20:41:00
    13

    New  Attacks  on  SHA-­‐3 Adi  Shamir   The  Weizmann  Institute   Israel     Joint  work  with  Itai  Dinur  and  Orr  Dunkelman  

    Add to Reading List

    Source URL: cis.sjtu.edu.cn

    Language: English - Date: 2012-12-05 11:26:12
      14Trivium / Linear cryptanalysis / Differential cryptanalysis / Stream ciphers / Grain / Cube attack

      Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2011-03-20 11:59:02
      15RC4 / Related-key attack / Random variable / Fluhrer /  Mantin and Shamir attack / Cryptography / Stream ciphers / Pseudorandom number generators

      A Practical Attack on Broadcast RC4 Itsik Mantin and Adi Shamir Computer Science Department, The Weizmann Institute, Rehovot 76100, Israel. {itsik,shamir}@wisdom.weizmann.ac.il Abstract. RC4 is the most widely deployed

      Add to Reading List

      Source URL: saluc.engr.uconn.edu

      Language: English - Date: 2006-02-21 13:57:34
      16Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4

      Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2

      Add to Reading List

      Source URL: saluc.engr.uconn.edu

      Language: English - Date: 2006-02-21 14:40:46
      17Computing / Payment systems / Silk Road / Business / Financial cryptography / Nakamoto / Electronic money / Bitcoin / Peer-to-peer computing / Electronic commerce

      How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth? Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir}@weizm

      Add to Reading List

      Source URL: i.cdn.turner.com

      Language: English - Date: 2013-11-25 09:53:45
      18Ciphertext / Cryptanalysis / ICE / Lucifer / Key schedule / Chosen-plaintext attack / Differential cryptanalysis / Linear cryptanalysis / Cryptography / Data Encryption Standard / FEAL

      Di erential Cryptanalysis of DES-like Cryptosystems Eli Biham Adi Shamir

      Add to Reading List

      Source URL: zoo.cs.yale.edu

      Language: English - Date: 2012-10-14 17:28:33
      19MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

      PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

      Add to Reading List

      Source URL: hashcash.org

      Language: English - Date: 2005-01-15 19:23:54
      20MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

      PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

      Add to Reading List

      Source URL: www.hashcash.org

      Language: English - Date: 2005-01-15 19:23:54
      UPDATE