Adi Shamir
The Paul and Marlene Borman Professor of Applied Mathematics
My main area of research is cryptography making and breaking codes. It is motivated by the explosive growth of computer networks and wireless communication. Without cryptographic protection, confidential information can be exposed to eavesdroppers, modified by hackers, or forged by criminals. In the last few years, I have developed (along with my students and colleagues) new practical cryptographic paradigms such as broadcast encryption, ring signatures and T-functions; new cryptanalytic attacks against block ciphers, stream ciphers, and number theoretic schemes; and new protective techniques against side channel attacks such as power analysis.
Recent Publications
- [with R. Rivest and Y. Tauman] How to Leak a Secret. Proceedings of Asiacrypt '01, December 2001.
- [with A. Klimov and A. Mityagin] Analysis of Neural Cryptography. Proceedings of Asiacrypt '02, December 2002.
- [with E. Tromer] Factoring Large Numbers with the TWIRL Device. Proceedings of Crypto '03, August 2003.