What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Adi Shamir
Google Scholar
131
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting.
Nicholas Carlini
Jorge Chávez-Saab
Anna Hambitzer
Francisco Rodríguez-Henríquez
Adi Shamir
2024
journals/cic
Efficient Maliciously Secure Oblivious Exponentiations.
Carsten Baum
Jens Berlips
Walther Chen
Ivan Bjerre Damgård
Kevin M. Esvelt
Leonard Foner
Dana Gretton
Martin Kysel
Ronald L. Rivest
Lawrence Roy
Francesca Sage-Ling
Adi Shamir
Vinod Vaikuntanathan
Lynn Van Hauwe
Theia Vogel
Benjamin Weinstein-Raun
Daniel Wichs
Stephen Wooster
Andrew C. Yao
Yu Yu
2024
journals/joc
The Retracing Boomerang Attack, with Application to Reduced-Round AES.
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2024
conf/eurocrypt
Polynomial Time Cryptanalytic Extraction of Neural Network Models.
Isaac Andrés Canales Martinez
Jorge Chávez-Saab
Anna Hambitzer
Francisco Rodríguez-Henríquez
Nitin Satpute
Adi Shamir
2023
conf/eurocrypt
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Itai Dinur
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2022
conf/uss
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.
Ben Nassi
Yaron Pirutin
Raz Swisa
Adi Shamir
Yuval Elovici
Boris Zadov
2021
conf/ccs
POSTER: Recovering Songs from a Hanging Light Bulb.
Ben Nassi
Yaron Pirutin
Raz Swissa
Adi Shamir
Yuval Elovici
Boris Zadov
2021
conf/eurocrypt
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.
Ohad Amon
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2020
journals/joc
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
Achiya Bar-On
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2020
conf/eurocrypt
New Slide Attacks on Almost Self-similar Ciphers.
Orr Dunkelman
Nathan Keller
Noam Lasry
Adi Shamir
2020
conf/eurocrypt
The Retracing Boomerang Attack.
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2019
journals/tifs
Xerox Day Vulnerability.
Ben Nassi
Adi Shamir
Yuval Elovici
2019
journals/joc
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2019
conf/sp
Drones' Cryptanalysis - Smashing Cryptography with a Flicker.
Ben Nassi
Raz Ben-Netanel
Adi Shamir
Yuval Elovici
2019
conf/sp
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
Eyal Ronen
Robert Gillham
Daniel Genkin
Adi Shamir
David Wong
Yuval Yarom
2018
conf/ccs
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure.
Eyal Ronen
Kenneth G. Paterson
Adi Shamir
2018
conf/crypto
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.
Achiya Bar-On
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2017
journals/joc
Acoustic Cryptanalysis.
Daniel Genkin
Adi Shamir
Eran Tromer
2017
conf/sp
IoT Goes Nuclear: Creating a ZigBee Chain Reaction.
Eyal Ronen
Adi Shamir
Achi-Or Weingarten
Colin O'Flynn
2016
journals/joc
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2016
journals/joc
Bug Attacks.
Eli Biham
Yaniv Carmeli
Adi Shamir
2016
journals/joc
New Second-Preimage Attacks on Hash Functions.
Elena Andreeva
Charles Bouillaguet
Orr Dunkelman
Pierre-Alain Fouque
Jonathan J. Hoch
John Kelsey
Adi Shamir
Sébastien Zimmer
2016
conf/crypto
Memory-Efficient Algorithms for Finding Needles in Haystacks.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2016
conf/eurosp
Extended Functionality Attacks on IoT Devices: The Case of Smart Lights.
Eyal Ronen
Adi Shamir
2015
journals/joc
Slidex Attacks on the Even-Mansour Encryption Scheme.
Orr Dunkelman
Nathan Keller
Adi Shamir
2015
journals/joc
Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
Orr Dunkelman
Nathan Keller
Adi Shamir
2015
journals/joc
New Attacks on IDEA with at Least 6 Rounds.
Eli Biham
Orr Dunkelman
Nathan Keller
Adi Shamir
2015
conf/latincrypt
Improved Top-Down Techniques in Differential Cryptanalysis.
Itai Dinur
Orr Dunkelman
Masha Gutman
Adi Shamir
2015
conf/crypto
New Attacks on Feistel Structures with Improved Memory Complexities.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
journals/joc
Improved Practical Attacks on Round-Reduced Keccak.
Itai Dinur
Orr Dunkelman
Adi Shamir
2014
journals/joc
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
conf/fse
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
conf/crypto
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.
Yevgeniy Dodis
Adi Shamir
Noah Stephens-Davidowitz
Daniel Wichs
2014
conf/crypto
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
Daniel Genkin
Adi Shamir
Eran Tromer
2014
conf/fc
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?
Dorit Ron
Adi Shamir
2014
conf/asiacrypt
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2013
conf/fse
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Itai Dinur
Orr Dunkelman
Adi Shamir
2013
conf/fc
Quantitative Analysis of the Full Bitcoin Transaction Graph.
Dorit Ron
Adi Shamir
2013
conf/asiacrypt
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2012
conf/fse
Improved Attacks on Full GOST.
Itai Dinur
Orr Dunkelman
Adi Shamir
2012
conf/fse
New Attacks on Keccak-224 and Keccak-256.
Itai Dinur
Orr Dunkelman
Adi Shamir
2012
conf/crypto
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2012
conf/eurocrypt
Minimalism in Cryptography: The Even-Mansour Scheme Revisited.
Orr Dunkelman
Nathan Keller
Adi Shamir
2011
conf/fse
Breaking Grain-128 with Dynamic Cube Attacks.
Itai Dinur
Adi Shamir
2011
conf/fse
An Improved Algebraic Attack on Hamsi-256.
Itai Dinur
Adi Shamir
2011
conf/asiacrypt
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Itai Dinur
Tim Güneysu
Christof Paar
Adi Shamir
Ralf Zimmermann
2010
journals/joc
Structural Cryptanalysis of SASAS.
Alex Biryukov
Adi Shamir
2010
journals/joc
Efficient Cache Attacks on AES, and Countermeasures.
Eran Tromer
Dag Arne Osvik
Adi Shamir
2010
conf/crypto
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.
Orr Dunkelman
Nathan Keller
Adi Shamir
2010
conf/ches
<sub>2</sub>.
Charles Bouillaguet
Hsieh-Chung Chen
Chen-Mou Cheng
Tung Chou
Ruben Niederhagen
Adi Shamir
Bo-Yin Yang
2010
conf/fdtc
Generic Analysis of Small Cryptographic Leaks.
Itai Dinur
Adi Shamir
2010
conf/eurocrypt
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds.
Alex Biryukov
Orr Dunkelman
Nathan Keller
Dmitry Khovratovich
Adi Shamir
2010
conf/asiacrypt
Improved Single-Key Attacks on 8-Round AES-192 and AES-256.
Orr Dunkelman
Nathan Keller
Adi Shamir
2009
conf/fse
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.
Jean-Philippe Aumasson
Itai Dinur
Willi Meier
Adi Shamir
2009
conf/eurocrypt
Cube Attacks on Tweakable Black Box Polynomials.
Itai Dinur
Adi Shamir
2008
conf/fse
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.
Adi Shamir
2008
conf/crypto
Bug Attacks.
Eli Biham
Yaniv Carmeli
Adi Shamir
2008
conf/ches
Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs.
Naofumi Homma
Atsushi Miyamoto
Takafumi Aoki
Akashi Satoh
Adi Shamir
2008
conf/ches
RSA-Past, Present, Future.
Adi Shamir
2008
conf/eurocrypt
Second Preimage Attacks on Dithered Hash Functions.
Elena Andreeva
Charles Bouillaguet
Pierre-Alain Fouque
Jonathan J. Hoch
John Kelsey
Adi Shamir
Sébastien Zimmer
2007
conf/crypto
Practical Cryptanalysis of SFLASH.
Vivien Dubois
Pierre-Alain Fouque
Adi Shamir
Jacques Stern
2007
conf/pkc
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.
Dima Ruinskiy
Adi Shamir
Boaz Tsaban
2006
conf/fse
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
Jonathan J. Hoch
Adi Shamir
2006
conf/crypto
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.
Elad Barkan
Eli Biham
Adi Shamir
2006
conf/ctrsa
Cache Attacks and Countermeasures: The Case of AES.
Dag Arne Osvik
Adi Shamir
Eran Tromer
2005
journals/joc
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham
Alex Biryukov
Adi Shamir
2005
conf/fse
Analysis of the Non-linear Part of Mugi.
Alex Biryukov
Adi Shamir
2005
conf/fse
New Applications of T-Functions in Block Ciphers and Hash Functions.
Alexander Klimov
Adi Shamir
2005
conf/ches
Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization.
Willi Geiselmann
Adi Shamir
Rainer Steinwandt
Eran Tromer
2004
conf/fse
New Cryptographic Primitives Based on Multiword T-Functions.
Alexander Klimov
Adi Shamir
2004
conf/ches
Fault Analysis of Stream Ciphers.
Jonathan J. Hoch
Adi Shamir
2004
conf/asiacrypt
Stream Ciphers: Dead or Alive?
Adi Shamir
2003
conf/crypto
Factoring Large Number with the TWIRL Device.
Adi Shamir
Eran Tromer
2003
conf/ctrsa
RSA Shortcuts.
Adi Shamir
2003
conf/asiacrypt
Factoring Estimates for a 1024-Bit RSA Modulus.
Arjen K. Lenstra
Eran Tromer
Adi Shamir
Wil Kortsmit
Bruce Dodson
James P. Hughes
Paul C. Leyland
2003
conf/sacrypt
Cryptographic Applications of T-Functions.
Alexander Klimov
Adi Shamir
2002
conf/crypto
The LSD Broadcast Encryption Scheme.
Dani Halevy
Adi Shamir
2002
conf/ches
A New Class of Invertible Mappings.
Alexander Klimov
Adi Shamir
2002
conf/asiacrypt
Analysis of Neural Cryptography.
Alexander Klimov
Anton Mityagin
Adi Shamir
2002
conf/asiacrypt
Analysis of Bernstein's Factorization Circuit.
Arjen K. Lenstra
Adi Shamir
Jim Tomlinson
Eran Tromer
2001
conf/fse
A Practical Attack on Broadcast RC4.
Itsik Mantin
Adi Shamir
2001
conf/crypto
Improved Online/Offline Signature Schemes.
Adi Shamir
Yael Tauman
2001
conf/fc
SecureClick: A Web Payment System with Disposable Credit Card Numbers.
Adi Shamir
2001
conf/ches
New Directions in Croptography.
Adi Shamir
2001
conf/eurocrypt
Structural Cryptanalysis of SASAS.
Alex Biryukov
Adi Shamir
2001
conf/asiacrypt
How to Leak a Secret.
Ronald L. Rivest
Adi Shamir
Yael Tauman
2001
conf/sacrypt
Weaknesses in the Key Scheduling Algorithm of RC4.
Scott R. Fluhrer
Itsik Mantin
Adi Shamir
2000
conf/fse
Real Time Cryptanalysis of A5/1 on a PC.
Alex Biryukov
Adi Shamir
David A. Wagner
2000
conf/ches
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies.
Adi Shamir
2000
conf/eurocrypt
Analysis and Optimization of the TWINKLE Factoring Device.
Arjen K. Lenstra
Adi Shamir
2000
conf/eurocrypt
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations.
Nicolas T. Courtois
Alexander Klimov
Jacques Patarin
Adi Shamir
2000
conf/asiacrypt
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.
Alex Biryukov
Adi Shamir
1999
conf/fse
Miss in the Middle Attacks on IDEA and Khufu.
Eli Biham
Alex Biryukov
Adi Shamir
1999
conf/crypto
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.
Aviad Kipnis
Adi Shamir
1999
conf/fc
Playing "Hide and Seek" with Stored Keys.
Adi Shamir
Nicko van Someren
1999
conf/ches
Factoring Large Numbers with the Twinkle Device (Extended Abstract).
Adi Shamir
1999
conf/pkc
How to Copyright a Function?
David Naccache
Adi Shamir
Julien P. Stern
1999
conf/eurocrypt
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.
Eli Biham
Alex Biryukov
Adi Shamir
1998
conf/crypto
Cryptanalysis of the Oil & Vinegar Signature Scheme.
Aviad Kipnis
Adi Shamir
1998
conf/ih
The Steganographic File System.
Ross J. Anderson
Roger M. Needham
Adi Shamir
1998
conf/eurocrypt
Visual Cryptanalysis.
Adi Shamir
1998
conf/sacrypt
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Eli Biham
Alex Biryukov
Orr Dunkelman
Eran Richardson
Adi Shamir
1997
conf/crypto
Differential Fault Analysis of Secret Key Cryptosystems.
Eli Biham
Adi Shamir
1997
conf/eurocrypt
Lattice Attacks on NTRU.
Don Coppersmith
Adi Shamir
1994
conf/eurocrypt
Memory Efficient Variants of Public-Key Schemes for Smart Card Applications.
Adi Shamir
1994
conf/eurocrypt
Visual Cryptography.
Moni Naor
Adi Shamir
1993
journals/joc
Universal Tests for Nonuniform Distributions.
A. W. Schrift
Adi Shamir
1993
conf/crypto
Efficient Signature Schemes Based on Birational Permutations.
Adi Shamir
1992
conf/crypto
Differential Cryptanalysis of the Full 16-Round DES.
Eli Biham
Adi Shamir
1991
journals/joc
Differential Cryptanalysis of DES-like Cryptosystems.
Eli Biham
Adi Shamir
1991
conf/crypto
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.
Eli Biham
Adi Shamir
1991
conf/crypto
A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.
Dror Lapidot
Adi Shamir
1991
conf/eurocrypt
Differential Cryptanalysis of Feal and N-Hash.
Eli Biham
Adi Shamir
1990
conf/crypto
Differential Cryptanalysis of DES-like Cryptosystems.
Eli Biham
Adi Shamir
1990
conf/crypto
On the Universality of the Next Bit Test.
A. W. Schrift
Adi Shamir
1990
conf/crypto
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs.
Dror Lapidot
Adi Shamir
1989
conf/crypto
Zero Knowledge Proofs of Knowledge in Two Rounds.
Uriel Feige
Adi Shamir
1989
conf/crypto
An Efficient Identification Scheme Based on Permuted Kernels (Extended Abstract).
Adi Shamir
1988
journals/joc
Zero-Knowledge Proofs of Identity.
Uriel Feige
Amos Fiat
Adi Shamir
1988
conf/crypto
An Improvement of the Fiat-Shamir Identification and Signature Scheme.
Silvio Micali
Adi Shamir
1988
conf/crypto
The Noisy Oracle Problem.
Uriel Feige
Adi Shamir
Moshe Tennenholtz
1987
conf/crypto
A Video Scrambling Technique Based On Space Filling Curves.
Yossi Matias
Adi Shamir
1986
conf/crypto
How to Prove Yourself: Practical Solutions to Identification and Signature Problems.
Amos Fiat
Adi Shamir
1985
conf/crypto
On the Security of Ping-Pong Protocols when Implemented using the RSA.
Shimon Even
Oded Goldreich
Adi Shamir
1985
conf/crypto
On the Security of DES.
Adi Shamir
1985
conf/eurocrypt
Efficient Factoring Based on Partial Information.
Ronald L. Rivest
Adi Shamir
1984
conf/crypto
Efficient Signature Schemes Based on Polynomial Equations.
H. Ong
Claus-Peter Schnorr
Adi Shamir
1984
conf/crypto
Identity-Based Cryptosystems and Signature Schemes.
Adi Shamir
1982
conf/crypto
A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.
Adi Shamir
1981
conf/crypto
The Generation of Cryptographically Strong Pseudo-Random Sequences.
Adi Shamir
1980
conf/sp
The Cryptographic Security of Compact Knapsacks (Preliminary Report).
Adi Shamir
Coauthors
A. W. Schrift
(2)
Achi-Or Weingarten
(1)
Achiya Bar-On
(2)
Adi Shamir
(131)
Akashi Satoh
(1)
Alex Biryukov
(10)
Alexander Klimov
(6)
Amos Fiat
(2)
Andrew C. Yao
(1)
Anna Hambitzer
(2)
Anton Mityagin
(1)
Arjen K. Lenstra
(3)
Atsushi Miyamoto
(1)
Aviad Kipnis
(2)
Ben Nassi
(4)
Benjamin Weinstein-Raun
(1)
Bo-Yin Yang
(1)
Boaz Tsaban
(1)
Boris Zadov
(2)
Bruce Dodson
(1)
Carsten Baum
(1)
Charles Bouillaguet
(3)
Chen-Mou Cheng
(1)
Christof Paar
(1)
Claus-Peter Schnorr
(1)
Colin O'Flynn
(1)
Dag Arne Osvik
(2)
Dana Gretton
(1)
Dani Halevy
(1)
Daniel Genkin
(3)
Daniel Wichs
(2)
David A. Wagner
(1)
David Naccache
(1)
David Wong
(1)
Dima Ruinskiy
(1)
Dmitry Khovratovich
(1)
Don Coppersmith
(1)
Dorit Ron
(2)
Dror Lapidot
(2)
Elad Barkan
(1)
Elena Andreeva
(2)
Eli Biham
(14)
Eran Richardson
(1)
Eran Tromer
(8)
Eyal Ronen
(10)
Francesca Sage-Ling
(1)
Francisco Rodríguez-Henríquez
(2)
H. Ong
(1)
Hsieh-Chung Chen
(1)
Isaac Andrés Canales Martinez
(1)
Itai Dinur
(20)
Itsik Mantin
(2)
Ivan Bjerre Damgård
(1)
Jacques Patarin
(1)
Jacques Stern
(1)
James P. Hughes
(1)
Jean-Philippe Aumasson
(1)
Jens Berlips
(1)
Jim Tomlinson
(1)
John Kelsey
(2)
Jonathan J. Hoch
(4)
Jorge Chávez-Saab
(2)
Julien P. Stern
(1)
Kenneth G. Paterson
(1)
Kevin M. Esvelt
(1)
Lawrence Roy
(1)
Leonard Foner
(1)
Lynn Van Hauwe
(1)
Martin Kysel
(1)
Masha Gutman
(1)
Moni Naor
(1)
Moshe Tennenholtz
(1)
Naofumi Homma
(1)
Nathan Keller
(23)
Nicholas Carlini
(1)
Nicko van Someren
(1)
Nicolas T. Courtois
(1)
Nitin Satpute
(1)
Noah Stephens-Davidowitz
(1)
Noam Lasry
(1)
Oded Goldreich
(1)
Ohad Amon
(1)
Orr Dunkelman
(30)
Paul C. Leyland
(1)
Pierre-Alain Fouque
(3)
Rainer Steinwandt
(1)
Ralf Zimmermann
(1)
Raz Ben-Netanel
(1)
Raz Swisa
(1)
Raz Swissa
(1)
Robert Gillham
(1)
Roger M. Needham
(1)
Ronald L. Rivest
(3)
Ross J. Anderson
(1)
Ruben Niederhagen
(1)
Scott R. Fluhrer
(1)
Sébastien Zimmer
(2)
Shimon Even
(1)
Silvio Micali
(1)
Stephen Wooster
(1)
Takafumi Aoki
(1)
Theia Vogel
(1)
Tim Güneysu
(1)
Tung Chou
(1)
Uriel Feige
(3)
Vinod Vaikuntanathan
(1)
Vivien Dubois
(1)
Walther Chen
(1)
Wil Kortsmit
(1)
Willi Geiselmann
(1)
Willi Meier
(1)
Yael Tauman
(2)
Yaniv Carmeli
(2)
Yaron Pirutin
(2)
Yevgeniy Dodis
(1)
Yossi Matias
(1)
Yu Yu
(1)
Yuval Elovici
(4)
Yuval Yarom
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to