Iftach Haitner

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Incompressiblity and next-block pseudoentropy
 
2024-09-25Paper
On the complexity of two-party differential privacy
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
Lower bound on SNARGs in the random oracle model
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
On the round complexity of randomized Byzantine agreement
 
2023-02-03Paper
A tight parallel repetition theorem for partially simulatable interactive arguments via smooth KL-divergence
 
2022-12-07Paper
Highly efficient OT-based multiplication protocols
 
2022-08-30Paper
Tighter bounds on multiparty coin flipping via augmented weak martingales and differentially private sampling
SIAM Journal on Computing
2022-08-12Paper
On the Communication Complexity of Key-Agreement Protocols.
 
2022-07-18Paper
On the complexity of fair coin flipping
Theoretical Computer Science
2022-04-19Paper
On the round complexity of randomized Byzantine agreement
Journal of Cryptology
2022-04-04Paper
On the round complexity of the shuffle model
 
2022-03-23Paper
Lower bounds on the time/memory tradeoff of function inversion
 
2022-03-23Paper
The many entropies in one-way functions
Tutorials on the Foundations of Cryptography
2022-01-12Paper
From fairness to full security in multiparty computation
Journal of Cryptology
2022-01-06Paper
scientific article; zbMATH DE number 7286918 (Why is no real title available?)
Theory of Computing
2020-12-17Paper
Computational two-party correlation: a dichotomy for key-agreement protocols
SIAM Journal on Computing
2020-12-04Paper
Channels of small log-ratio leakage and characterization of two-party differentially private computation
 
2020-04-30Paper
Distributional collision resistance beyond one-way functions
 
2020-02-04Paper
Hardness-preserving reductions via cuckoo hashing
Journal of Cryptology
2019-06-20Paper
On the complexity of fair coin flipping
Theory of Cryptography
2018-12-11Paper
Coin flipping of \textit{any} constant bias implies one-way functions
Journal of the ACM
2018-12-06Paper
From fairness to full security in multiparty computation
Lecture Notes in Computer Science
2018-10-17Paper
Fair coin flipping: tighter analysis and the many-party case
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms
2018-07-16Paper
Characterization of secure multiparty computation without broadcast
Journal of Cryptology
2018-05-28Paper
An almost-optimally fair three-party coin-flipping protocol
SIAM Journal on Computing
2017-03-10Paper
Limits on the usefulness of random oracles
Journal of Cryptology
2016-06-01Paper
Characterization of secure multiparty computation without broadcast
Theory of Cryptography
2016-03-23Paper
Parallel Hashing via List Recoverability
Lecture Notes in Computer Science
2015-12-10Paper
Coin flipping of any constant bias implies one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
An almost-optimally fair three-party coin-flipping protocol
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
From non-adaptive to adaptive pseudorandom functions
Journal of Cryptology
2015-05-12Paper
Inaccessible entropy
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
Coin Flipping with Constant Bias Implies One-Way Functions
SIAM Journal on Computing
2014-07-30Paper
Coin flipping with constant bias implies one-way functions
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
A Parallel Repetition Theorem for Any Interactive Argument
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
A parallel repetition theorem for any interactive argument
SIAM Journal on Computing
2014-04-11Paper
A new interactive hashing theorem
Journal of Cryptology
2014-04-01Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions
SIAM Journal on Computing
2013-09-25Paper
Limits on the Usefulness of Random Oracles
Theory of Cryptography
2013-03-18Paper
Hardness preserving reductions via cuckoo hashing
Theory of Cryptography
2013-03-18Paper
From non-adaptive to adaptive pseudorandom functions
Theory of Cryptography
2012-06-15Paper
On the instantiability of hash-and-sign RSA signatures
Theory of Cryptography
2012-06-15Paper
On the Power of the Randomized Iterate
SIAM Journal on Computing
2012-03-15Paper
Black-box constructions of protocols for secure computation
SIAM Journal on Computing
2011-07-29Paper
Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
SIAM Journal on Computing
2010-07-07Paper
Bounded key-dependent message security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Universal one-way hash functions via inaccessible entropy
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Reducing complexity assumptions for statistically-hiding commitment
Journal of Cryptology
2009-06-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
On the (Im)Possibility of Key Dependent Encryption
Theory of Cryptography
2009-03-03Paper
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
Theory of Cryptography
2009-03-03Paper
Statistically-hiding commitment from any one-way function
 
2009-01-05Paper
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Lecture Notes in Computer Science
2008-05-06Paper
Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
Theory of Cryptography
2008-03-05Paper
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Theory of Cryptography
2008-03-05Paper
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions
Automata, Languages and Programming
2007-09-11Paper
On the Power of the Randomized Iterate
Lecture Notes in Computer Science
2007-09-04Paper


Research outcomes over time


This page was built for person: Iftach Haitner