1
Ronald L Rivest, Adi Shamir, Leonard M Adleman: Cryptographic communications system and method. Massachusetts Institute of Technology, Arthur A Smith Jr, Robert J Horn Jr, September 20, 1983: US04405829 (1090 worldwide citation)

A cryptographic communications system and method. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be-transferred is enciphered to ciphertext at the encoding terminal by first e ...


2
Adi Shamir, Amos Fiat: Method, apparatus and article for identification and signature. Yeda Research and Development Company, Fleit Jacobson Cohn & Price, May 31, 1988: US04748668 (275 worldwide citation)

A method and apparatus for simple identification and signature which enable any user to prove his identity and the authenticity of his messages to any other user. The method and apparatus are provably secure against any known or chosen message attack if factoring is difficult, and require only 1% to ...


3
Adi Shamir: Method and apparatus for protecting visual information with printed cryptographic watermarks. Yeda Research and Development, Keck Mahin & Cate, January 30, 1996: US05488664 (109 worldwide citation)

A method and device for protecting visual information against unauthorized access and modification using a printed cryptographic watermark includes printing a first array of shapes on a first sheet of material to be protected and printing a second array of shapes on a second sheet of material, which ...


4
Adi Shamir: Method and apparatus for protecting public key schemes from timing and fault attacks. Yeda Research and Development at the Weizmann Institute of Science, Evenson McKeown Edwards & Lenahan PLLC, November 23, 1999: US05991415 (65 worldwide citation)

Improved methods and apparatus are provided for protecting public key schemes based on modular exponentiation (including RSA and Diffie-Hellman) from indirect cryptanalytic techniques such as timing and fault attacks. Known methods for making the implementation of number-theoretic schemes resistant ...


5
Adi Shamir: Fast signature scheme based on sequentially linearized equations. Yeda Research & Development, Keck Mahin & Cate, November 16, 1993: US05263085 (37 worldwide citation)

A new type of digital signature scheme whose security is based on the difficulty of solving systems of k polynomial equations in m unknowns modulo a composite n is proposed. The scheme uses a simple technique (called sequential linearization) for embedding trapdoors into such systems of equations.


6
Adi Shamir: Method and apparatus for user identification based on permuted kernels. Yeda Research and Development Company, Fleit Jacobson Cohn Price Holman & Stern, June 5, 1990: US04932056 (34 worldwide citation)

A method and apparatus for identification of a prover to a verifier in which the prover demonstrates his knowledge of a secret permutation .pi. such that V.sub..pi. .epsilon. K(A) for publicly known A and V where all the arithmetic operations are carried out modulo p. The actual proof does not revea ...


7
Adi Shamir: Efficient signature scheme based on birational permutations. Yeda Research & Development, Keck Mahin & Cate, December 20, 1994: US05375170 (33 worldwide citation)

A birational permutation is a function f which is a one-to-one and onto mapping over k-tuples of numbers, where both f and its inverse are low degree rational functions. This patent describes a novel digital signature scheme which is based on a new class of birational permutations which have small k ...


8
Ronald L Rivest, Adi Shamir: Method and apparatus for reusing non-erasable memory media. Massachusetts Institute of Technology, Kenway & Jenney, September 1, 1987: US04691299 (31 worldwide citation)

Storage media such as digital optical disks, PROMS, and paper tape consist of a number of bit positions which initially contain a "zero" and which can later be irreversibly overwritten with a "one". An apparatus and method provide for rewriting in such "non-erasable memories" for expanding their cap ...


9
Adi Shamir: Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications. Yeda Research and Development at the Weizmann Institute of Science, Keck Mahin & Cate, April 2, 1996: US05504817 (29 worldwide citation)

Memory efficient variants of public key encryption and identification schemes for smart card applications with severely limited RAM without using dedicated coprocessors. The variants replace the memory-intensive modular multiplication operation z=x*y (mod n) by a new randomized multiplication operat ...


10
Adi Shamir: Variants of the fiat-shamir identification and signature scheme. Yeda Research and Development Company, Fleit Jacobson Cohn Price Holman & Stern, June 12, 1990: US04933970 (28 worldwide citation)

A method and apparatus are disclosed and claimed which enable an entity to generate proofs of identity and signatures of messages that everyone can verify but no one can forge. Compared to other schemes of this type (such as the RSA), the Fiat-Shamir scheme is faster by one to two orders of magnitud ...