Person:247171: Difference between revisions

From MaRDI portal
Person:247171
Created automatically from import231006081045
 
m AuthorDisambiguator moved page Moni Naor to Moni Naor: Duplicate
 
(No difference)

Latest revision as of 19:42, 9 December 2023

Available identifiers

zbMath Open naor.moniDBLPn/MoniNaorWikidataQ6899861 ScholiaQ6899861MaRDI QIDQ247171

List of research outcomes





PublicationDate of PublicationType
MPC for tech giants (GMPC): enabling Gulliver and the Lilliputians to cooperate amicably2024-12-13Paper
That's not my signature! Fail-stop signatures for a post-quantum world2024-12-04Paper
Adjacency sketches in adversarial environments2024-11-28Paper
Mirror games against an open book player2024-05-16Paper
https://portal.mardi4nfdi.de/entity/Q61263532024-04-09Paper
Adversarial laws of large numbers and optimal regret in online classification2023-11-14Paper
https://portal.mardi4nfdi.de/entity/Q60593682023-11-02Paper
Mirror games against an open book player2023-10-17Paper
Bet-or-pass: adversarially robust Bloom filters2023-08-14Paper
Low communication complexity protocols, collision resistant hash functions and secret key-agreement protocols2023-06-30Paper
CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs2023-06-28Paper
One-Way Functions and (Im)perfect Obfuscation2023-04-04Paper
https://portal.mardi4nfdi.de/entity/Q58757592023-02-03Paper
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations2021-10-18Paper
The Power of Distributed Verifiers in Interactive Proofs2021-02-02Paper
Incrementally verifiable computation via incremental PCPs2020-04-30Paper
White-Box vs. Black-Box Complexity of Search Problems2020-02-11Paper
Bloom Filters in Adversarial Environments2019-11-25Paper
Hardness-preserving reductions via cuckoo hashing2019-06-20Paper
Fast Algorithms for Interactive Coding2019-05-15Paper
The security of lazy users in out-of-band authentication2018-12-06Paper
How to Share a Secret, Infinitely2018-09-14Paper
Collision resistant hashing for paranoids: dealing with multiple collisions2018-07-09Paper
The Journey from NP to TFNP Hardness2018-05-03Paper
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations2017-09-29Paper
Secret-sharing for NP2017-05-22Paper
When can limited randomness be used in repeated games?2017-02-01Paper
How to Share a Secret, Infinitely2016-12-22Paper
Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems2016-11-09Paper
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption2016-10-27Paper
Oblivious transfer and polynomial evaluation2016-09-29Paper
An optimally fair coin toss2016-09-21Paper
A minimal model for secure computation (extended abstract)2016-09-01Paper
Visual cryptography for grey level images2016-06-16Paper
Is There an Oblivious RAM Lower Bound?2016-04-15Paper
Pure Differential Privacy for Rectangle Queries via Private Partitions2016-03-23Paper
Tight bounds for sliding Bloom filters2016-02-19Paper
Bloom Filters in Adversarial Environments2015-12-10Paper
Magic Functions2015-11-12Paper
The complexity of online memory checking2015-11-11Paper
When can limited randomness be used in repeated games?2015-11-04Paper
Scalable and dynamic quorum systems2015-09-04Paper
Fast Interactive Coding against Adversarial Noise2015-08-14Paper
Secure Physical Computation Using Disposable Circuits2015-07-06Paper
Primary-Secondary-Resolver Membership Proof Systems2015-07-06Paper
What can be computed locally?2015-05-07Paper
Anti-persistence2015-02-27Paper
Communication preserving protocols for secure function evaluation2015-02-27Paper
On the complexity of differentially private data release2015-02-04Paper
Secret-Sharing for NP2015-01-06Paper
Pseudo-random functions and factoring (extended abstract)2014-09-26Paper
Differential privacy under continual observation2014-08-13Paper
Physical Zero-Knowledge Proofs of Physical Properties2014-08-07Paper
Viceroy2014-07-25Paper
Sliding Bloom Filters2014-01-14Paper
Scalable and dynamic quorum systems2013-06-07Paper
Hardness Preserving Reductions via Cuckoo Hashing2013-03-18Paper
Public-Key Cryptosystems Resilient to Key Leakage2012-11-29Paper
Number-theoretic constructions of efficient pseudo-random functions2012-10-30Paper
Sketching in Adversarial Environments2012-03-15Paper
https://portal.mardi4nfdi.de/entity/Q30028002011-05-24Paper
On the Compressibility of $\mathcal{NP}$ Instances and Cryptographic Applications2010-11-04Paper
https://portal.mardi4nfdi.de/entity/Q35813982010-08-16Paper
Know thy neighbor's neighbor2010-08-15Paper
Completeness in two-party secure computation2010-08-15Paper
Novel architectures for P2P applications2010-08-14Paper
Public-Key Encryption in the Bounded-Retrieval Model2010-06-01Paper
Basing cryptographic protocols on tamper-evident seals2010-03-10Paper
Hedged Public-Key Encryption: How to Protect against Bad Randomness2009-12-15Paper
Public-Key Cryptosystems Resilient to Key Leakage2009-10-20Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science2009-08-06Paper
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles2009-08-06Paper
Derandomized constructions of \(k\)-wise (almost) independent permutations2009-07-24Paper
De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results2009-07-14Paper
An Optimally Fair Coin Toss2009-03-03Paper
How Efficient Can Memory Checking Be?2009-03-03Paper
Implementing Huge Sparse Random Graphs2009-02-17Paper
https://portal.mardi4nfdi.de/entity/Q53020902009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35497272009-01-05Paper
History-Independent Cuckoo Hashing2008-08-19Paper
On Robust Combiners for Oblivious Transfer and Other Primitives2008-05-06Paper
Pebbling and Proofs of Work2008-03-17Paper
Cryptography and Game Theory: Designing Protocols for Exchanging Information2008-03-05Paper
Concurrent zero-knowledge2008-01-14Paper
Zaps and Their Applications2008-01-03Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories2007-11-28Paper
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol2007-09-24Paper
Our Data, Ourselves: Privacy Via Distributed Noise Generation2007-09-24Paper
On Everlasting Security in the Hybrid Bounded Storage Model2007-09-11Paper
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy2007-09-04Paper
Completeness in two-party secure computation: A computational view2007-01-24Paper
Distributed Computing2006-11-01Paper
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques2006-07-07Paper
Oblivious Polynomial Evaluation2006-06-01Paper
Automata, Languages and Programming2006-01-10Paper
Theory of Cryptography2005-12-07Paper
Fault-Tolerant Storage in a Dynamic Environment2005-08-17Paper
Computationally secure oblivious transfer2005-05-13Paper
On fairness in the carpool problem2005-05-04Paper
https://portal.mardi4nfdi.de/entity/Q42523822004-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45425592004-01-27Paper
Nonmalleable Cryptography2004-01-20Paper
Optimal aggregation algorithms for middleware.2003-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44091382003-06-30Paper
On the decisional complexity of problems over the reals2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47837192002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45362842002-11-28Paper
Pseudorandom Functions and Factoring2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q27683322002-09-01Paper
Tracing traitors2002-08-15Paper
https://portal.mardi4nfdi.de/entity/Q45368052002-08-06Paper
https://portal.mardi4nfdi.de/entity/Q27683332002-07-22Paper
Constructing pseudo-random permutations with a prescribed structure2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q42284442002-01-20Paper
https://portal.mardi4nfdi.de/entity/Q42303662002-01-20Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
https://portal.mardi4nfdi.de/entity/Q27074162001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45269822001-02-28Paper
Nonmalleable Cryptography2000-10-18Paper
On the construction of pseudorandom permutations: Luby-Rackoff revisited2000-05-22Paper
https://portal.mardi4nfdi.de/entity/Q42496422000-05-18Paper
https://portal.mardi4nfdi.de/entity/Q42319232000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q49418802000-03-19Paper
Rigorous Time/Space Trade-offs for Inverting Functions2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493362000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49406992000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49407012000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42496671999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42319221999-08-31Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186951999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186901999-08-29Paper
https://portal.mardi4nfdi.de/entity/Q42285041999-08-16Paper
https://portal.mardi4nfdi.de/entity/Q42493541999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42507711999-06-17Paper
Synthesizers and their application to the parallel construction of pseudo-random functions1999-05-11Paper
https://portal.mardi4nfdi.de/entity/Q42284561999-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42285211999-03-01Paper
Fairness in Scheduling1999-01-17Paper
An efficient existentially unforgeable signature scheme and its applications1998-12-21Paper
The Load, Capacity, and Availability of Quorum Systems1998-05-10Paper
https://portal.mardi4nfdi.de/entity/Q43657221997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43645611997-11-17Paper
Codes for Interactive Authentication1997-09-17Paper
https://portal.mardi4nfdi.de/entity/Q43417731997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q31289321997-04-23Paper
Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions1997-03-03Paper
Efficient cryptographic schemes provably as secure as subset sum1997-01-26Paper
What Can be Computed Locally?1996-09-15Paper
https://portal.mardi4nfdi.de/entity/Q48860811996-07-28Paper
Amortized Communication Complexity1996-01-28Paper
Optimal File Sharing in Distributed Networks1996-01-02Paper
The probabilistic method yields deterministic parallel algorithms1995-10-24Paper
Search Problems in the Decision Tree Model1995-08-06Paper
Three results on interactive communication1994-10-03Paper
Nonoblivious hashing1994-08-21Paper
Small-Bias Probability Spaces: Efficient Constructions and Applications1993-10-10Paper
On dice and coins: Models of computation for random generation1993-08-30Paper
https://portal.mardi4nfdi.de/entity/Q40366091993-05-18Paper
Coin-Flipping Games Immune against Linear-Sized Coalitions1993-05-17Paper
Implicit $O(1)$ Probe Search1993-05-16Paper
Implicat Representation of Graphs1993-04-01Paper
On the time and space complexity of computation using write-once memory or is pen really much worse than pencil?1992-09-26Paper
An implicit data structure for searching a multikey table in logarithmic time1992-06-28Paper
Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs1992-06-28Paper
A Lower Bound on Probabilistic Algorithms for Distributive Ring Coloring1992-06-25Paper
Bit commitment using pseudorandomness1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q57519271990-01-01Paper
Succinct representation of general unlabeled graphs1990-01-01Paper
The hardness of decoding linear codes with preprocessing1990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q47321261989-01-01Paper
Fast Parallel Algorithms for Chordal Graphs1989-01-01Paper

Research outcomes over time

This page was built for person: Moni Naor