Iftach Haitner

From MaRDI portal
Person:290380

Available identifiers

zbMath Open haitner.iftachMaRDI QIDQ290380

List of research outcomes





PublicationDate of PublicationType
Incompressiblity and next-block pseudoentropy2024-09-25Paper
On the complexity of two-party differential privacy2023-12-08Paper
Lower bound on SNARGs in the random oracle model2023-06-30Paper
On the round complexity of randomized Byzantine agreement2023-02-03Paper
A tight parallel repetition theorem for partially simulatable interactive arguments via smooth KL-divergence2022-12-07Paper
Highly efficient OT-based multiplication protocols2022-08-30Paper
Tighter bounds on multiparty coin flipping via augmented weak martingales and differentially private sampling2022-08-12Paper
On the Communication Complexity of Key-Agreement Protocols.2022-07-18Paper
On the complexity of fair coin flipping2022-04-19Paper
On the round complexity of randomized Byzantine agreement2022-04-04Paper
On the round complexity of the shuffle model2022-03-23Paper
Lower bounds on the time/memory tradeoff of function inversion2022-03-23Paper
The many entropies in one-way functions2022-01-12Paper
https://portal.mardi4nfdi.de/entity/Q51408422020-12-17Paper
Computational two-party correlation: a dichotomy for key-agreement protocols2020-12-04Paper
Channels of small log-ratio leakage and characterization of two-party differentially private computation2020-04-30Paper
Distributional collision resistance beyond one-way functions2020-02-04Paper
Hardness-preserving reductions via cuckoo hashing2019-06-20Paper
On the complexity of fair coin flipping2018-12-11Paper
Coin flipping of \textit{any} constant bias implies one-way functions2018-12-06Paper
Fair coin flipping: tighter analysis and the many-party case2018-07-16Paper
Characterization of secure multiparty computation without broadcast2018-05-28Paper
An almost-optimally fair three-party coin-flipping protocol2017-03-10Paper
Limits on the usefulness of random oracles2016-06-01Paper
Characterization of secure multiparty computation without broadcast2016-03-23Paper
Parallel Hashing via List Recoverability2015-12-10Paper
Coin flipping of any constant bias implies one-way functions2015-06-26Paper
An almost-optimally fair three-party coin-flipping protocol2015-06-26Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments2015-06-02Paper
From non-adaptive to adaptive pseudorandom functions2015-05-12Paper
Inaccessible entropy2015-02-04Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions2014-08-13Paper
Coin Flipping with Constant Bias Implies One-Way Functions2014-07-30Paper
Coin flipping with constant bias implies one-way functions2014-07-30Paper
A Parallel Repetition Theorem for Any Interactive Argument2014-07-25Paper
A parallel repetition theorem for any interactive argument2014-04-11Paper
A new interactive hashing theorem2014-04-01Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions2013-09-25Paper
Limits on the Usefulness of Random Oracles2013-03-18Paper
Hardness preserving reductions via cuckoo hashing2013-03-18Paper
From non-adaptive to adaptive pseudorandom functions2012-06-15Paper
On the instantiability of hash-and-sign RSA signatures2012-06-15Paper
On the Power of the Randomized Iterate2012-03-15Paper
Black-box constructions of protocols for secure computation2011-07-29Paper
Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function2010-07-07Paper
Bounded key-dependent message security2010-06-01Paper
Universal one-way hash functions via inaccessible entropy2010-06-01Paper
Reducing complexity assumptions for statistically-hiding commitment2009-06-30Paper
Theory of Cryptography2009-05-14Paper
On the (Im)Possibility of Key Dependent Encryption2009-03-03Paper
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols2009-03-03Paper
Statistically-hiding commitment from any one-way function2009-01-05Paper
Reducing Complexity Assumptions for Statistically-Hiding Commitment2008-05-06Paper
Semi-honest to Malicious Oblivious Transfer—The Black-Box Way2008-03-05Paper
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval2008-03-05Paper
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions2007-09-11Paper
On the Power of the Randomized Iterate2007-09-04Paper

Research outcomes over time

This page was built for person: Iftach Haitner