Name
Papers
Collaborators
SHIMON EVEN
61
43
Citations 
PageRank 
Referers 
2873
981.78
4378
Referees 
References 
281
274
Search Limit
1001000
Title
Citations
PageRank
Year
Layout of an Arbitrary Permutation in a Minimal Right Triangle Area.00.342007
Layout Of An Arbitrary Permutation In A Minimal Right Triangle Area00.342005
Layout Area of the Hypercube40.552003
A Compact Layout of the Butterfly40.722003
Layout area of the hypercube: (extended abstract)00.342002
Laying Out the Interconnection Network of the Transpose Bijection00.342002
Area efficient layouts of the Batcher sorting networks40.782001
Embedding Interconnection Networks in Grids via the Layered Cross Product10.372000
Some compact layouts of the butterfly80.591999
On mixed connectivity certificates70.751998
Layout of the batcher bitonic sorter (extended abstract)50.511998
A Tight Layout of the Butterfly Network170.961998
A Note on Limited Preemption00.341998
Monochromatic Paths and Triangulated Graphs00.341998
Computing with snakes in directed networks of automata191.781997
The Use of a Synchronizer Yields the Maximum Computation Rate in Distributed Networks.182.691997
On-line/off-line digital signatures19453.001996
Unison, Canon, and Sluggish Clocks in Networks Controlled by a Synchronizer91.061995
On Mixed Connectivity Certificates (Extended Abstract)00.341995
On the capabilities of systolic systems91.001994
A unified scheme for routing in expander based networks00.341994
Grid Layouts of Block Diagrams - Bounding the Number of Bends in Each Connection90.991994
Layered cross product—a technique to construct interconnection networks151.191992
A construction of a cipher from a single pseudorandom permutation15411.671991
On the capabilities of systolic systems (extended abstract)20.661991
The Use of a Synchronizer Yields Maximum Computation Rate in Distributed Networks (Extended Abstract)00.341990
Computing with Snakes in Directed Networks of Automata (Extended Abstract)00.341990
Systolic Modular Multiplication137.641990
On-Line/Off-Line Digital Schemes311.661989
On the security of ping-pong protocols when implemented using the RSA167.351985
Hard-core theorems for complexity classes174.121985
On the power of cascade ciphers325.651985
The complexity of promise problems with applications to public-key cryptography13213.301984
Efficient and Reliable Broadcast is Achievable in an Eventually Connected Network3038.881984
Electronic Wallet72.951983
On the security of multi-party ping-pong protocols6810.371983
A Note on Deterministic and Nondeterministic Time Complexity30.911982
A randomized protocol for signing contracts519155.131982
On the Security of Ping-Pong Protocols4810.091982
Protocol for Signing Contracts89.171981
An On-Line Edge-Deletion Problem12419.081981
Automata, Languages and Programming, 8th Colloquium, Acre (Akko), Israel, July 13-17, 1981, Proceedings44107.391981
A linear-time approximation algorithm for the weighted vertex cover problem18238.271981
The minimum-length generator sequence problem is NP-hard3722.091981
Linear Algorithm for Data Compression via String Matching10637.911981
On Protocols for Cake Cutting.00.341981
Cost Tradeoffs in Graph Embeddings, with Applications (Preliminary Version)21.731981
Cryptocomplexity and NP-Completeness2114.601980
An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography00.341980
The Max Flow of Dinic and Karzanov: An Exposition00.341978
  • 1
  • 2