List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Achievable \textsf{CCA2} relaxation for homomorphic encryption Journal of Cryptology | 2024-12-27 | Paper |
| Achievable \textsf{CCA2} relaxation for homomorphic encryption Theory of Cryptography | 2023-08-14 | Paper |
| Topology-hiding computation on all graphs Journal of Cryptology | 2020-03-03 | Paper |
| Topology-hiding computation on all graphs Advances in Cryptology – CRYPTO 2017 | 2017-11-03 | Paper |
| Topology-hiding computation beyond logarithmic diameter Lecture Notes in Computer Science | 2017-06-23 | Paper |
| Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\) Proceedings of the 5th conference on Innovations in theoretical computer science | 2017-05-19 | Paper |
| Deterministic Sparse Fourier Approximation Via Approximating Arithmetic Progressions IEEE Transactions on Information Theory | 2017-05-16 | Paper |
| Distributed public key schemes secure against continual leakage Proceedings of the 2012 ACM symposium on Principles of distributed computing | 2014-12-05 | Paper |
| On basing one-way functions on NP-hardness Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing | 2014-11-25 | Paper |
| Erratum for: ``On basing one-way functions on NP-hardness Proceedings of the forty-second ACM symposium on Theory of computing | 2014-08-13 | Paper |
| Explicit small sets with \(\varepsilon\)-discrepancy on Bohr sets Information Processing Letters | 2014-06-23 | Paper |
| Solving Hidden Number Problem with One Bit Oracle and Advice Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
| Simultaneous Hardcore Bits and Cryptography against Memory Attacks Theory of Cryptography | 2009-03-03 | Paper |
Research outcomes over time
This page was built for person: Adi Akavia