default search action
Gideon Samid
Person information
- affiliation: Case Western Reserve University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i34]Gideon Samid:
Transmitting Secrets by Transmitting only Plaintext. IACR Cryptol. ePrint Arch. 2025: 438 (2025) - [i33]Gideon Samid:
Polar Lattice Cryptography. IACR Cryptol. ePrint Arch. 2025: 452 (2025) - [i32]Gideon Samid:
Lifeboats on the Titanic Cryptography. IACR Cryptol. ePrint Arch. 2025: 587 (2025) - 2024
- [i31]Gideon Samid:
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. IACR Cryptol. ePrint Arch. 2024: 129 (2024) - 2023
- [i30]Gideon Samid:
The Prospect of a New Cryptography: Extensive use of non-algorithmic randomness competes with mathematical complexity. IACR Cryptol. ePrint Arch. 2023: 383 (2023) - [i29]Gideon Samid:
AI Resistant (AIR) Cryptography. IACR Cryptol. ePrint Arch. 2023: 524 (2023) - [i28]Gideon Samid:
"Tesla Cryptography:" Powering Up Security with Other Than Mathematical Complexity. IACR Cryptol. ePrint Arch. 2023: 803 (2023) - [i27]Gideon Samid:
Cryptographic Key Exchange: An Innovation Outlook. IACR Cryptol. ePrint Arch. 2023: 1372 (2023) - 2022
- [i26]Gideon Samid:
A LeVeL Paying Field: Cryptographic Solutions towards Social Accountability and Financial Inclusion. IACR Cryptol. ePrint Arch. 2022: 130 (2022) - 2021
- [i25]Gideon Samid:
FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm. IACR Cryptol. ePrint Arch. 2021: 458 (2021) - [i24]Gideon Samid:
Pattern Devoid Cryptography. IACR Cryptol. ePrint Arch. 2021: 1510 (2021) - 2020
- [i23]Gideon Samid:
A One-Time-Pad Alternative: Mathematical Secrecy with one round of Transposition. IACR Cryptol. ePrint Arch. 2020: 389 (2020) - [i22]Gideon Samid:
Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness. IACR Cryptol. ePrint Arch. 2020: 968 (2020)
2010 – 2019
- 2019
- [i21]Gideon Samid:
SpaceFlip : Unbound Geometry Cryptography. IACR Cryptol. ePrint Arch. 2019: 285 (2019) - [i20]Gideon Samid:
When Encryption is Not Enough - Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop). IACR Cryptol. ePrint Arch. 2019: 556 (2019) - 2018
- [i19]Gideon Samid:
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher. IACR Cryptol. ePrint Arch. 2018: 84 (2018) - [i18]Gideon Samid:
"Larger Keys, Less Complexity" A Strategic Proposition. IACR Cryptol. ePrint Arch. 2018: 406 (2018) - [i17]Gideon Samid:
Finger Printing Data. IACR Cryptol. ePrint Arch. 2018: 503 (2018) - 2017
- [i16]Gideon Samid, Serguei Popov:
BitFlip: A Randomness-Rich Cipher. IACR Cryptol. ePrint Arch. 2017: 366 (2017) - 2016
- [i15]Gideon Samid:
T-Proof: Secure Communication via Non-Algorithmic Randomization. IACR Cryptol. ePrint Arch. 2016: 474 (2016) - [i14]Gideon Samid:
Drone Targeted Cryptography. IACR Cryptol. ePrint Arch. 2016: 499 (2016) - [i13]Gideon Samid:
Cyber Passport: Preventing Massive Identity Theft. IACR Cryptol. ePrint Arch. 2016: 627 (2016) - 2015
- [i12]Gideon Samid:
Equivoe-T: Transposition Equivocation Cryptography. IACR Cryptol. ePrint Arch. 2015: 510 (2015) - [i11]Gideon Samid:
The Ultimate Transposition Cipher (UTC). IACR Cryptol. ePrint Arch. 2015: 1033 (2015) - 2014
- [i10]Gideon Samid:
bitcoin.BitMint: Reconciling Bitcoin with Central Banks. IACR Cryptol. ePrint Arch. 2014: 244 (2014) - 2012
- [i9]Gideon Samid:
Hush Functions Extended to Any Size Input versus Any Size Output. IACR Cryptol. ePrint Arch. 2012: 457 (2012) - 2011
- [i8]Gideon Samid:
Integer Arithmetic without Arithmetic Addition. IACR Cryptol. ePrint Arch. 2011: 127 (2011) - 2010
- [i7]Gideon Samid:
Shannon Revisited: Considering a More Tractable Expression to Measure and Manage Intractability, Uncertainty, Risk, Ignorance, and Entropy. CoRR abs/1006.1055 (2010) - [i6]Gideon Samid:
Binomial Sieve Series - a Prospective Cryptographic Tool. IACR Cryptol. ePrint Arch. 2010: 421 (2010)
2000 – 2009
- 2008
- [i5]Gideon Samid:
Encryption-On-Demand: Practical and Theoretical Considerations. IACR Cryptol. ePrint Arch. 2008: 222 (2008) - 2007
- [i4]Gideon Samid:
Proposing a Master One-Way Function. IACR Cryptol. ePrint Arch. 2007: 412 (2007) - 2004
- [i3]Gideon Samid:
s(n) An Arithmetic Function of Some Interest, and Related Arithmetic. IACR Cryptol. ePrint Arch. 2004: 34 (2004) - 2001
- [c2]Gideon Samid:
Encryption Sticks (Randomats). ICICS 2001: 150-154 - [c1]Gideon Samid:
Re-dividing Complexity between Algorithms and Keys. INDOCRYPT 2001: 330-338 - 2000
- [i2]Gideon Samid:
Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext. IACR Cryptol. ePrint Arch. 2000: 11 (2000) - [i1]Gideon Samid:
Essential Shannon Security with Keys Smaller Than the Encrypted Message. IACR Cryptol. ePrint Arch. 2000: 59 (2000)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-28 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint