Moni Naor

From MaRDI portal
Revision as of 19:42, 9 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Moni Naor to Moni Naor: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:247171

Available identifiers

zbMath Open naor.moniDBLPn/MoniNaorWikidataQ6899861 ScholiaQ6899861MaRDI QIDQ247171

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61263532024-04-09Paper
Adversarial laws of large numbers and optimal regret in online classification2023-11-14Paper
https://portal.mardi4nfdi.de/entity/Q60593682023-11-02Paper
Mirror games against an open book player2023-10-17Paper
Bet-or-pass: adversarially robust Bloom filters2023-08-14Paper
Low communication complexity protocols, collision resistant hash functions and secret key-agreement protocols2023-06-30Paper
CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs2023-06-28Paper
One-Way Functions and (Im)perfect Obfuscation2023-04-04Paper
https://portal.mardi4nfdi.de/entity/Q58757592023-02-03Paper
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations2021-10-18Paper
The Power of Distributed Verifiers in Interactive Proofs2021-02-02Paper
Incrementally verifiable computation via incremental PCPs2020-04-30Paper
White-Box vs. Black-Box Complexity of Search Problems2020-02-11Paper
Bloom Filters in Adversarial Environments2019-11-25Paper
Hardness-preserving reductions via cuckoo hashing2019-06-20Paper
Fast Algorithms for Interactive Coding2019-05-15Paper
The security of lazy users in out-of-band authentication2018-12-06Paper
How to Share a Secret, Infinitely2018-09-14Paper
Collision resistant hashing for paranoids: dealing with multiple collisions2018-07-09Paper
The Journey from NP to TFNP Hardness2018-05-03Paper
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations2017-09-29Paper
Secret-sharing for NP2017-05-22Paper
When can limited randomness be used in repeated games?2017-02-01Paper
How to Share a Secret, Infinitely2016-12-22Paper
Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems2016-11-09Paper
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption2016-10-27Paper
Oblivious transfer and polynomial evaluation2016-09-29Paper
An optimally fair coin toss2016-09-21Paper
A minimal model for secure computation (extended abstract)2016-09-01Paper
Visual cryptography for grey level images2016-06-16Paper
Is There an Oblivious RAM Lower Bound?2016-04-15Paper
Pure Differential Privacy for Rectangle Queries via Private Partitions2016-03-23Paper
Tight bounds for sliding Bloom filters2016-02-19Paper
Bloom Filters in Adversarial Environments2015-12-10Paper
Magic Functions2015-11-12Paper
The complexity of online memory checking2015-11-11Paper
When can limited randomness be used in repeated games?2015-11-04Paper
Scalable and dynamic quorum systems2015-09-04Paper
Fast Interactive Coding against Adversarial Noise2015-08-14Paper
Secure Physical Computation Using Disposable Circuits2015-07-06Paper
Primary-Secondary-Resolver Membership Proof Systems2015-07-06Paper
What can be computed locally?2015-05-07Paper
Anti-persistence2015-02-27Paper
Communication preserving protocols for secure function evaluation2015-02-27Paper
On the complexity of differentially private data release2015-02-04Paper
Secret-Sharing for NP2015-01-06Paper
Pseudo-random functions and factoring (extended abstract)2014-09-26Paper
Differential privacy under continual observation2014-08-13Paper
Physical Zero-Knowledge Proofs of Physical Properties2014-08-07Paper
Viceroy2014-07-25Paper
Sliding Bloom Filters2014-01-14Paper
Scalable and dynamic quorum systems2013-06-07Paper
Hardness Preserving Reductions via Cuckoo Hashing2013-03-18Paper
Public-Key Cryptosystems Resilient to Key Leakage2012-11-29Paper
Number-theoretic constructions of efficient pseudo-random functions2012-10-30Paper
Sketching in Adversarial Environments2012-03-15Paper
https://portal.mardi4nfdi.de/entity/Q30028002011-05-24Paper
On the Compressibility of $\mathcal{NP}$ Instances and Cryptographic Applications2010-11-04Paper
https://portal.mardi4nfdi.de/entity/Q35813982010-08-16Paper
Know thy neighbor's neighbor2010-08-15Paper
Completeness in two-party secure computation2010-08-15Paper
Novel architectures for P2P applications2010-08-14Paper
Public-Key Encryption in the Bounded-Retrieval Model2010-06-01Paper
Basing cryptographic protocols on tamper-evident seals2010-03-10Paper
Hedged Public-Key Encryption: How to Protect against Bad Randomness2009-12-15Paper
Public-Key Cryptosystems Resilient to Key Leakage2009-10-20Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science2009-08-06Paper
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles2009-08-06Paper
Derandomized constructions of \(k\)-wise (almost) independent permutations2009-07-24Paper
De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results2009-07-14Paper
An Optimally Fair Coin Toss2009-03-03Paper
How Efficient Can Memory Checking Be?2009-03-03Paper
Implementing Huge Sparse Random Graphs2009-02-17Paper
https://portal.mardi4nfdi.de/entity/Q53020902009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35497272009-01-05Paper
History-Independent Cuckoo Hashing2008-08-19Paper
On Robust Combiners for Oblivious Transfer and Other Primitives2008-05-06Paper
Pebbling and Proofs of Work2008-03-17Paper
Cryptography and Game Theory: Designing Protocols for Exchanging Information2008-03-05Paper
Concurrent zero-knowledge2008-01-14Paper
Zaps and Their Applications2008-01-03Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories2007-11-28Paper
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles2007-11-15Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol2007-09-24Paper
Our Data, Ourselves: Privacy Via Distributed Noise Generation2007-09-24Paper
On Everlasting Security in the Hybrid Bounded Storage Model2007-09-11Paper
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy2007-09-04Paper
Completeness in two-party secure computation: A computational view2007-01-24Paper
Distributed Computing2006-11-01Paper
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques2006-07-07Paper
Oblivious Polynomial Evaluation2006-06-01Paper
Automata, Languages and Programming2006-01-10Paper
Theory of Cryptography2005-12-07Paper
Fault-Tolerant Storage in a Dynamic Environment2005-08-17Paper
Computationally secure oblivious transfer2005-05-13Paper
On fairness in the carpool problem2005-05-04Paper
https://portal.mardi4nfdi.de/entity/Q42523822004-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45425592004-01-27Paper
Nonmalleable Cryptography2004-01-20Paper
Optimal aggregation algorithms for middleware.2003-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44091382003-06-30Paper
On the decisional complexity of problems over the reals2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47837192002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45362842002-11-28Paper
Pseudorandom Functions and Factoring2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q27683322002-09-01Paper
Tracing traitors2002-08-15Paper
https://portal.mardi4nfdi.de/entity/Q45368052002-08-06Paper
https://portal.mardi4nfdi.de/entity/Q27683332002-07-22Paper
Constructing pseudo-random permutations with a prescribed structure2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q42284442002-01-20Paper
https://portal.mardi4nfdi.de/entity/Q42303662002-01-20Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
https://portal.mardi4nfdi.de/entity/Q27074162001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45269822001-02-28Paper
Nonmalleable Cryptography2000-10-18Paper
On the construction of pseudorandom permutations: Luby-Rackoff revisited2000-05-22Paper
https://portal.mardi4nfdi.de/entity/Q42496422000-05-18Paper
https://portal.mardi4nfdi.de/entity/Q42319232000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q49418802000-03-19Paper
Rigorous Time/Space Trade-offs for Inverting Functions2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493362000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49406992000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49407012000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42496671999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42319221999-08-31Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186951999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186901999-08-29Paper
https://portal.mardi4nfdi.de/entity/Q42285041999-08-16Paper
https://portal.mardi4nfdi.de/entity/Q42493541999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42507711999-06-17Paper
Synthesizers and their application to the parallel construction of pseudo-random functions1999-05-11Paper
https://portal.mardi4nfdi.de/entity/Q42284561999-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42285211999-03-01Paper
Fairness in Scheduling1999-01-17Paper
An efficient existentially unforgeable signature scheme and its applications1998-12-21Paper
The Load, Capacity, and Availability of Quorum Systems1998-05-10Paper
https://portal.mardi4nfdi.de/entity/Q43657221997-11-18Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43645611997-11-17Paper
Codes for Interactive Authentication1997-09-17Paper
https://portal.mardi4nfdi.de/entity/Q43417731997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q31289321997-04-23Paper
Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions1997-03-03Paper
Efficient cryptographic schemes provably as secure as subset sum1997-01-26Paper
What Can be Computed Locally?1996-09-15Paper
https://portal.mardi4nfdi.de/entity/Q48860811996-07-28Paper
Amortized Communication Complexity1996-01-28Paper
Optimal File Sharing in Distributed Networks1996-01-02Paper
The probabilistic method yields deterministic parallel algorithms1995-10-24Paper
Search Problems in the Decision Tree Model1995-08-06Paper
Three results on interactive communication1994-10-03Paper
Nonoblivious hashing1994-08-21Paper
Small-Bias Probability Spaces: Efficient Constructions and Applications1993-10-10Paper
On dice and coins: Models of computation for random generation1993-08-30Paper
https://portal.mardi4nfdi.de/entity/Q40366091993-05-18Paper
Coin-Flipping Games Immune against Linear-Sized Coalitions1993-05-17Paper
Implicit $O(1)$ Probe Search1993-05-16Paper
Implicat Representation of Graphs1993-04-01Paper
On the time and space complexity of computation using write-once memory or is pen really much worse than pencil?1992-09-26Paper
An implicit data structure for searching a multikey table in logarithmic time1992-06-28Paper
Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs1992-06-28Paper
A Lower Bound on Probabilistic Algorithms for Distributive Ring Coloring1992-06-25Paper
Bit commitment using pseudorandomness1991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q57519271990-01-01Paper
Succinct representation of general unlabeled graphs1990-01-01Paper
The hardness of decoding linear codes with preprocessing1990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q47321261989-01-01Paper
Fast Parallel Algorithms for Chordal Graphs1989-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Moni Naor