| 2009 |
| 143 | EE | Itai Dinur,
Adi Shamir:
Cube Attacks on Tweakable Black Box Polynomials.
EUROCRYPT 2009: 278-299 |
| 142 | EE | Shlomi Dolev,
Marina Kopeetsky,
Adi Shamir:
RFID Authentication, Efficient Proactive Information Security within Computational Security
CoRR abs/0903.5177: (2009) |
| 2008 |
| 141 | EE | Naofumi Homma,
Atsushi Miyamoto,
Takafumi Aoki,
Akashi Satoh,
Adi Shamir:
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs.
CHES 2008: 15-29 |
| 140 | EE | Adi Shamir:
RSA-Past, Present, Future.
CHES 2008: 443 |
| 139 | EE | Eli Biham,
Yaniv Carmeli,
Adi Shamir:
Bug Attacks.
CRYPTO 2008: 221-240 |
| 138 | EE | Elena Andreeva,
Charles Bouillaguet,
Pierre-Alain Fouque,
Jonathan J. Hoch,
John Kelsey,
Adi Shamir,
Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions.
EUROCRYPT 2008: 270-288 |
| 137 | EE | Adi Shamir:
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.
FSE 2008: 144-157 |
| 136 | EE | Jonathan J. Hoch,
Adi Shamir:
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak.
ICALP (2) 2008: 616-630 |
| 135 | EE | Raphael Chung-Wei Phan,
Adi Shamir:
Improved Related-key Attacks on Desx and Desx+.
Cryptologia 32(1): 13-22 (2008) |
| 2007 |
| 134 | EE | Vivien Dubois,
Pierre-Alain Fouque,
Adi Shamir,
Jacques Stern:
Practical Cryptanalysis of SFLASH.
CRYPTO 2007: 1-12 |
| 133 | EE | Vivien Dubois,
Pierre-Alain Fouque,
Adi Shamir,
Jacques Stern:
Cryptanalysis of the SFLASH Signature Scheme.
Inscrypt 2007: 1-4 |
| 132 | EE | Dima Ruinskiy,
Adi Shamir,
Boaz Tsaban:
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.
Public Key Cryptography 2007: 61-75 |
| 131 | EE | Dima Ruinskiy,
Adi Shamir,
Boaz Tsaban:
Cryptanalysis of group-based key agreement protocols using subgroup distance functions
CoRR abs/0705.2862: (2007) |
| 130 | EE | Yossef Oren,
Adi Shamir:
Remote Password Extraction from RFID Tags.
IEEE Trans. Computers 56(9): 1292-1296 (2007) |
| 2006 |
| 129 | EE | Elad Barkan,
Eli Biham,
Adi Shamir:
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
CRYPTO 2006: 1-21 |
| 128 | EE | Dag Arne Osvik,
Adi Shamir,
Eran Tromer:
Cache Attacks and Countermeasures: The Case of AES.
CT-RSA 2006: 1-20 |
| 127 | EE | Ronald L. Rivest,
Adi Shamir,
Yael Tauman:
How to Leak a Secret: Theory and Applications of Ring Signatures.
Essays in Memory of Shimon Even 2006: 164-186 |
| 126 | EE | Jonathan J. Hoch,
Adi Shamir:
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
FSE 2006: 179-194 |
| 125 | EE | Dima Ruinskiy,
Adi Shamir,
Boaz Tsaban:
Length-based cryptanalysis: The case of Thompson's Group
CoRR abs/cs/0607079: (2006) |
| 2005 |
| 124 | EE | Willi Geiselmann,
Adi Shamir,
Rainer Steinwandt,
Eran Tromer:
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
CHES 2005: 131-146 |
| 123 | EE | Alexander Klimov,
Adi Shamir:
New Applications of T-Functions in Block Ciphers and Hash Functions.
FSE 2005: 18-31 |
| 122 | EE | Alex Biryukov,
Adi Shamir:
Analysis of the Non-linear Part of Mugi.
FSE 2005: 320-329 |
| 121 | EE | Adi Shamir,
Eran Tromer:
TWIRL.
Encyclopedia of Cryptography and Security 2005 |
| 120 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
J. Cryptology 18(4): 291-311 (2005) |
| 2004 |
| 119 | EE | Adi Shamir:
Stream Ciphers: Dead or Alive?
ASIACRYPT 2004: 78 |
| 118 | EE | Jonathan J. Hoch,
Adi Shamir:
Fault Analysis of Stream Ciphers.
CHES 2004: 240-253 |
| 117 | EE | Alexander Klimov,
Adi Shamir:
New Cryptographic Primitives Based on Multiword T-Functions.
FSE 2004: 1-15 |
| 2003 |
| 116 | EE | Arjen K. Lenstra,
Eran Tromer,
Adi Shamir,
Wil Kortsmit,
Bruce Dodson,
James Hughes,
Paul C. Leyland:
Factoring Estimates for a 1024-Bit RSA Modulus.
ASIACRYPT 2003: 55-74 |
| 115 | EE | Adi Shamir,
Eran Tromer:
Factoring Large Number with the TWIRL Device.
CRYPTO 2003: 1-26 |
| 114 | EE | Adi Shamir:
RSA Shortcuts.
CT-RSA 2003: 327 |
| 113 | EE | Alexander Klimov,
Adi Shamir:
Cryptographic Applications of T-Functions.
Selected Areas in Cryptography 2003: 248-261 |
| 2002 |
| 112 | EE | Arjen K. Lenstra,
Adi Shamir,
Jim Tomlinson,
Eran Tromer:
Analysis of Bernstein's Factorization Circuit.
ASIACRYPT 2002: 1-26 |
| 111 | EE | Alexander Klimov,
Anton Mityagin,
Adi Shamir:
Analysis of Neural Cryptography.
ASIACRYPT 2002: 288-298 |
| 110 | EE | Alexander Klimov,
Adi Shamir:
A New Class of Invertible Mappings.
CHES 2002: 470-483 |
| 109 | EE | Dani Halevy,
Adi Shamir:
The LSD Broadcast Encryption Scheme.
CRYPTO 2002: 47-60 |
| 2001 |
| 108 | EE | Ronald L. Rivest,
Adi Shamir,
Yael Tauman:
How to Leak a Secret.
ASIACRYPT 2001: 552-565 |
| 107 | EE | Adi Shamir:
New Directions in Croptography.
CHES 2001: 159 |
| 106 | EE | Adi Shamir,
Yael Tauman:
Improved Online/Offline Signature Schemes.
CRYPTO 2001: 355-367 |
| 105 | EE | Alex Biryukov,
Adi Shamir:
Structural Cryptanalysis of SASAS.
EUROCRYPT 2001: 394-405 |
| 104 | EE | Itsik Mantin,
Adi Shamir:
A Practical Attack on Broadcast RC4.
FSE 2001: 152-164 |
| 103 | EE | Adi Shamir:
SecureClick: A Web Payment System with Disposable Credit Card Numbers.
Financial Cryptography 2001: 223-233 |
| 102 | EE | Scott R. Fluhrer,
Itsik Mantin,
Adi Shamir:
Weaknesses in the Key Scheduling Algorithm of RC4.
Selected Areas in Cryptography 2001: 1-24 |
| 101 | EE | Adi Shamir,
Boaz Tsaban:
Guaranteeing the diversity of number generators
CoRR cs.CR/0112014: (2001) |
| 100 | EE | Adi Shamir,
Boaz Tsaban:
Guaranteeing the Diversity of Number Generators.
Inf. Comput. 171(2): 350-363 (2001) |
| 2000 |
| 99 | EE | Alex Biryukov,
Adi Shamir:
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
ASIACRYPT 2000: 1-13 |
| 98 | EE | Adi Shamir:
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies.
CHES 2000: 71-77 |
| 97 | EE | Arjen K. Lenstra,
Adi Shamir:
Analysis and Optimization of the TWINKLE Factoring Device.
EUROCRYPT 2000: 35-52 |
| 96 | EE | Nicolas Courtois,
Alexander Klimov,
Jacques Patarin,
Adi Shamir:
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
EUROCRYPT 2000: 392-407 |
| 95 | EE | Alex Biryukov,
Adi Shamir,
David Wagner:
Real Time Cryptanalysis of A5/1 on a PC.
FSE 2000: 1-18 |
| 1999 |
| 94 | EE | Adi Shamir:
Factoring Large Numbers with the Twinkle Device (Extended Abstract).
CHES 1999: 2-12 |
| 93 | EE | Aviad Kipnis,
Adi Shamir:
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.
CRYPTO 1999: 19-30 |
| 92 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
EUROCRYPT 1999: 12-23 |
| 91 | EE | Eli Biham,
Alex Biryukov,
Adi Shamir:
Miss in the Middle Attacks on IDEA and Khufu.
FSE 1999: 124-138 |
| 90 | EE | Adi Shamir,
Nicko van Someren:
Playing "Hide and Seek" with Stored Keys.
Financial Cryptography 1999: 118-124 |
| 89 | EE | David Naccache,
Adi Shamir,
Julien P. Stern:
How to Copyright a Function?
Public Key Cryptography 1999: 188-196 |
| 88 | | Uriel Feige,
Dror Lapidot,
Adi Shamir:
Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions.
SIAM J. Comput. 29(1): 1-28 (1999) |
| 1998 |
| 87 | EE | Aviad Kipnis,
Adi Shamir:
Cryptanalysis of the Oil & Vinegar Signature Scheme.
CRYPTO 1998: 257-266 |
| 86 | EE | Adi Shamir:
Visual Cryptanalysis.
EUROCRYPT 1998: 201-210 |
| 85 | EE | Ross J. Anderson,
Roger M. Needham,
Adi Shamir:
The Steganographic File System.
Information Hiding 1998: 73-82 |
| 84 | EE | Eli Biham,
Alex Biryukov,
Orr Dunkelman,
Eran Richardson,
Adi Shamir:
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Selected Areas in Cryptography 1998: 362-376 |
| 1997 |
| 83 | EE | Eli Biham,
Adi Shamir:
Differential Fault Analysis of Secret Key Cryptosystems.
CRYPTO 1997: 513-525 |
| 82 | EE | Don Coppersmith,
Adi Shamir:
Lattice Attacks on NTRU.
EUROCRYPT 1997: 52-61 |
| 81 | | Dror Lapidot,
Adi Shamir:
Fully Parallelized Multi-Prover Protocols for NEXP-Time.
J. Comput. Syst. Sci. 54(2): 215-220 (1997) |
| 1996 |
| 80 | | Moni Naor,
Adi Shamir:
Visual Cryptography II: Improving the Contrast Via the Cover Base.
Security Protocols Workshop 1996: 197-202 |
| 79 | | Ronald L. Rivest,
Adi Shamir:
PayWord and MicroMint: Two Simple Micropayment Schemes.
Security Protocols Workshop 1996: 69-87 |
| 1995 |
| 78 | | Dror Lapidot,
Adi Shamir:
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.
Combinatorica 15(2): 204-214 (1995) |
| 1994 |
| 77 | EE | Moni Naor,
Adi Shamir:
Visual Cryptography.
EUROCRYPT 1994: 1-12 |
| 76 | EE | Adi Shamir:
Memory Efficient Variants of Public-Key Schemes for Smart Card Applications.
EUROCRYPT 1994: 445-449 |
| 1993 |
| 75 | EE | Adi Shamir:
Efficient Signature Schemes Based on Birational Permutations.
CRYPTO 1993: 1-12 |
| 74 | | Adi Shamir:
Practical Cryptography - Recent Trends and Results.
ISTCS 1993: 127 |
| 73 | EE | Adi Shamir:
On the generation of multivariate polynomials which are hard to factor.
STOC 1993: 796-804 |
| 72 | | David Feldman,
Russell Impagliazzo,
Moni Naor,
Noam Nisan,
Steven Rudich,
Adi Shamir:
On Dice and Coins: Models of Computation for Random Generation
Inf. Comput. 104(2): 159-174 (1993) |
| 71 | | Johan Håstad,
A. W. Schrift,
Adi Shamir:
The Discrete Logarithm Modulo a Composite Hides O(n) Bits.
J. Comput. Syst. Sci. 47(3): 376-404 (1993) |
| 70 | | A. W. Schrift,
Adi Shamir:
Universal Tests for Nonuniform Distributions.
J. Cryptology 6(3): 119-133 (1993) |
| 1992 |
| 69 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of the Full 16-Round DES.
CRYPTO 1992: 487-496 |
| 68 | EE | Adi Shamir:
IP = PSPACE.
J. ACM 39(4): 869-877 (1992) |
| 67 | | Uriel Feige,
Adi Shamir:
Multi-Oracle Interactive Protocols with Constant Space Verifiers.
J. Comput. Syst. Sci. 44(2): 259-271 (1992) |
| 1991 |
| 66 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
CRYPTO 1991: 156-171 |
| 65 | EE | Dror Lapidot,
Adi Shamir:
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.
CRYPTO 1991: 213-224 |
| 64 | EE | Eli Biham,
Adi Shamir:
Differential Cryptoanalysis of Feal and N-Hash.
EUROCRYPT 1991: 1-16 |
| 63 | | Dror Lapidot,
Adi Shamir:
Fully Parallelized Multi Prover Protocols for NEXP-Time (Extended Abstract)
FOCS 1991: 13-18 |
| 62 | | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
J. Cryptology 4(1): 3-72 (1991) |
| 1990 |
| 61 | EE | Eli Biham,
Adi Shamir:
Differential Cryptanalysis of DES-like Cryptosystems.
CRYPTO 1990: 2-21 |
| 60 | EE | Dror Lapidot,
Adi Shamir:
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs.
CRYPTO 1990: 353-365 |
| 59 | | Adi Shamir:
IP=PSPACE
FOCS 1990: 11-15 |
| 58 | | Uriel Feige,
Dror Lapidot,
Adi Shamir:
Multiple Non-Interactive Zero Knowledge Proofs Based on a Single Random String (Extended Abstract)
FOCS 1990: 308-317 |
| 57 | | A. W. Schrift,
Adi Shamir:
The Discrete Log is Very Discreet
STOC 1990: 405-415 |
| 56 | | Uriel Feige,
Adi Shamir:
Witness Indistinguishable and Witness Hiding Protocols
STOC 1990: 416-426 |
| 1989 |
| 55 | EE | Uriel Feige,
Adi Shamir:
Zero Knowledge Proofs of Knowledge in Two Rounds.
CRYPTO 1989: 526-544 |
| 54 | EE | Adi Shamir:
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract).
CRYPTO 1989: 606-609 |
| 53 | | Amos Fiat,
Shahar Moses,
Adi Shamir,
Ilan Shimshoni,
Gábor Tardos:
Planning and Learning in Permutation Groups
FOCS 1989: 274-279 |
| 52 | | David Feldman,
Russell Impagliazzo,
Moni Naor,
Noam Nisan,
Steven Rudich,
Adi Shamir:
On Dice and Coins: Models of Computation for Random Generation.
ICALP 1989: 319-340 |
| 51 | | Uriel Feige,
Adi Shamir:
Multi-Oracle Interactive Protocols with Space Bounded Verifiers.
Structure in Complexity Theory Conference 1989: 158-164 |
| 1988 |
| 50 | EE | Silvio Micali,
Adi Shamir:
An Improvement of the Fiat-Shamir Identification and Signature Scheme.
CRYPTO 1988: 244-247 |
| 49 | EE | Uriel Feige,
Adi Shamir,
Moshe Tennenholtz:
The Noisy Oracle Problem.
CRYPTO 1988: 284-296 |
| 48 | | Uriel Feige,
Amos Fiat,
Adi Shamir:
Zero-Knowledge Proofs of Identity.
J. Cryptology 1(2): 77-94 (1988) |
| 47 | | Alan M. Frieze,
Johan Håstad,
Ravi Kannan,
J. C. Lagarias,
Adi Shamir:
Reconstructing Truncated Integer Variables Satisfying Linear Congruences.
SIAM J. Comput. 17(2): 262-280 (1988) |
| 1987 |
| 46 | EE | Yossi Matias,
Adi Shamir:
A Video Scrambling Technique Based On Space Filling Curves.
CRYPTO 1987: 398-417 |
| 45 | | Uriel Feige,
Amos Fiat,
Adi Shamir:
Zero Knowledge Proofs of Identity
STOC 1987: 210-217 |
| 1986 |
| 44 | EE | Amos Fiat,
Adi Shamir:
How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
CRYPTO 1986: 186-194 |
| 43 | | Sandeep Sen,
Isaac D. Scherson,
Adi Shamir:
Shear Sort: A True Two-Dimensional Sorting Techniques for VLSI Networks.
ICPP 1986: 903-908 |
| 42 | | Claus-Peter Schnorr,
Adi Shamir:
An Optimal Sorting Algorithm for Mesh Connected Computers
STOC 1986: 255-263 |
| 41 | | Amos Fiat,
Adi Shamir:
Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers.
J. Comput. Syst. Sci. 33(1): 47-65 (1986) |
| 1985 |
| 40 | EE | Adi Shamir:
On the Security of DES.
CRYPTO 1985: 280-281 |
| 39 | EE | Shimon Even,
Oded Goldreich,
Adi Shamir:
On the Security of Ping-Pong Protocols when Implemented using the RSA.
CRYPTO 1985: 58-72 |
| 38 | EE | Ronald L. Rivest,
Adi Shamir:
Efficient Factoring Based on Partial Information.
EUROCRYPT 1985: 31-34 |
| 37 | | Amos Fiat,
Adi Shamir,
Ehud Y. Shapiro:
Polymorphic Arrays: An Architecture for a Programmable Systolic Machine.
ICPP 1985: 112-117 |
| 36 | | Johan Håstad,
Adi Shamir:
The Cryptographic Security of Truncated Linearly Related Variables
STOC 1985: 356-362 |
| 35 | | Jeffrey Shallit,
Adi Shamir:
Number-Theoretic Functions Which Are Equivalent to Number of Divisors.
Inf. Process. Lett. 20(3): 151-153 (1985) |
| 1984 |
| 34 | EE | H. Ong,
Claus-Peter Schnorr,
Adi Shamir:
Efficient Signature Schemes Based on Polynomial Equations.
CRYPTO 1984: 37-46 |
| 33 | EE | Adi Shamir:
Identity-Based Cryptosystems and Signature Schemes.
CRYPTO 1984: 47-53 |
| 32 | | Amos Fiat,
Adi Shamir:
Polymorphic Arrays: A Novel VLSI Layout for Systolic Computers
FOCS 1984: 37-45 |
| 31 | | H. Ong,
Claus-Peter Schnorr,
Adi Shamir:
An Efficient Signature Scheme Based on Quadratic Equations
STOC 1984: 208-216 |
| 30 | | Ronald L. Rivest,
Adi Shamir:
How to Expose an Eavesdropper.
Commun. ACM 27(4): 393-395 (1984) |
| 29 | | Amos Fiat,
Adi Shamir:
Generalized 'write-once' memories.
IEEE Transactions on Information Theory 30(3): 470-479 (1984) |
| 28 | | Adi Shamir:
A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem.
IEEE Transactions on Information Theory 30(5): 699-704 (1984) |
| 27 | | Adi Shamir,
Claus-Peter Schnorr:
Cryptanalysis of Certain Variants of Rabin's Signature Scheme.
Inf. Process. Lett. 19(3): 113-115 (1984) |
| 1983 |
| 26 | | Michael Ben-Or,
Benny Chor,
Adi Shamir:
On the Cryptographic Security of Single RSA Bits
STOC 1983: 421-430 |
| 25 | EE | Adi Shamir:
On the Generation of Cryptographically Strong Pseudorandom Sequences
ACM Trans. Comput. Syst. 1(1): 38-44 (1983) |
| 24 | | Ronald L. Rivest,
Adi Shamir,
Leonard M. Adleman:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint).
Commun. ACM 26(1): 96-99 (1983) |
| 23 | | Adi Shamir:
Embedding Cryptographic Trapdoors in Arbitrary Knapsack Systems.
Inf. Process. Lett. 17(2): 77-79 (1983) |
| 1982 |
| 22 | | Adi Shamir:
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.
CRYPTO 1982: 279-288 |
| 21 | | Adi Shamir:
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem
FOCS 1982: 145-152 |
| 20 | | Ronald L. Rivest,
Adi Shamir:
How to Reuse a ``Write-Once'' Memory (Preliminary Version)
STOC 1982: 105-113 |
| 19 | | Ronald L. Rivest,
Adi Shamir:
How to Reuse a ``Write-Once'' Memory
Information and Control 55(1-3): 1-19 (1982) |
| 1981 |
| 18 | | Adi Shamir:
The Generation of Cryptographically Strong Pseudo-Random Sequences.
CRYPTO 1981: 1 |
| 17 | | Adi Shamir:
On the Generation of Cryptographically Strong Pseudo-Random Sequences.
ICALP 1981: 544-550 |
| 16 | | Richard Schroeppel,
Adi Shamir:
A T=O(2^(n/2)), S=O(2^(n/4)) Algorithm for Certain NP-Complete Problems.
SIAM J. Comput. 10(3): 456-464 (1981) |
| 1980 |
| 15 | | Adi Shamir:
On the Power of Commutativity in Cryptography.
ICALP 1980: 582-595 |
| 14 | | Adi Shamir:
The Cryptographic Security of Compact Knapsacks (Preliminary Report).
IEEE Symposium on Security and Privacy 1980: 94-99 |
| 1979 |
| 13 | | Richard Schroeppel,
Adi Shamir:
A T S^2 = O(2^n) Time/Space Tradeoff for Certain NP-Complete Problems
FOCS 1979: 328-336 |
| 12 | | Adi Shamir:
On the Cryptocomplexity of Knapsack Systems
STOC 1979: 118-129 |
| 11 | | Adi Shamir:
How to Share a Secret.
Commun. ACM 22(11): 612-613 (1979) |
| 10 | | Adi Shamir:
Factoring Numbers in O(log n) Arithmetic Steps.
Inf. Process. Lett. 8(1): 28-31 (1979) |
| 9 | | Adi Shamir:
A Linear Time Algorithm for Finding Minimum Cutsets in Reducible Graphs.
SIAM J. Comput. 8(4): 645-655 (1979) |
| 1978 |
| 8 | | Ronald L. Rivest,
Adi Shamir,
Leonard M. Adleman:
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
Commun. ACM 21(2): 120-126 (1978) |
| 7 | | Zohar Manna,
Adi Shamir:
The Convergence of Functions to Fixedpoints of Recursive Definitions.
Theor. Comput. Sci. 6: 109-141 (1978) |
| 1977 |
| 6 | | Adi Shamir,
William W. Wadge:
Data Types as Objects.
ICALP 1977: 465-479 |
| 5 | | Zohar Manna,
Adi Shamir:
The Optimal Approach to Recursive Programs.
Commun. ACM 20(11): 824-831 (1977) |
| 1976 |
| 4 | | Zohar Manna,
Adi Shamir:
The Theoretical Aspects of the Optimal Fixed Point.
SIAM J. Comput. 5(3): 414-426 (1976) |
| 3 | | Shimon Even,
Alon Itai,
Adi Shamir:
On the Complexity of Timetable and Multicommodity Flow Problems.
SIAM J. Comput. 5(4): 691-703 (1976) |
| 1975 |
| 2 | | Shimon Even,
Alon Itai,
Adi Shamir:
On the Complexity of Timetable and Multi-Commodity Flow Problems
FOCS 1975: 184-193 |
| 1 | | Zohar Manna,
Adi Shamir:
The Optimal Fixedpoint of Recursive Programs
STOC 1975: 194-206 |