Iftach Haitner

From MaRDI portal
(Redirected from Person:290380)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Computationally differentially private inner-product protocols imply oblivious transfer2026-02-04Paper
Fair coin flipping: tighter analysis and the many-party case
Journal of Cryptology
2025-12-16Paper
Exponent-VRFs and their applications2025-12-02Paper
A tight lower bound on adaptively secure full-information coin flip2025-08-12Paper
Tighter bounds on multi-party coin flipping via augmented weak martingales and differentially private sampling2025-08-12Paper
Computational two-party correlation: a dichotomy for key-agreement protocols2025-08-12Paper
Incompressiblity and next-block pseudoentropy2024-09-25Paper
On the complexity of two-party differential privacy
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
Lower bound on SNARGs in the random oracle model
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
On the round complexity of randomized Byzantine agreement2023-02-03Paper
A tight parallel repetition theorem for partially simulatable interactive arguments via smooth KL-divergence
(available as arXiv preprint)
2022-12-07Paper
Highly efficient OT-based multiplication protocols2022-08-30Paper
Tighter bounds on multiparty coin flipping via augmented weak martingales and differentially private sampling
SIAM Journal on Computing
2022-08-12Paper
On the Communication Complexity of Key-Agreement Protocols.
(available as arXiv preprint)
2022-07-18Paper
On the complexity of fair coin flipping
Theoretical Computer Science
2022-04-19Paper
On the round complexity of randomized Byzantine agreement
Journal of Cryptology
2022-04-04Paper
On the round complexity of randomized Byzantine agreement
Journal of Cryptology
2022-04-04Paper
On the round complexity of the shuffle model
(available as arXiv preprint)
2022-03-23Paper
Lower bounds on the time/memory tradeoff of function inversion
(available as arXiv preprint)
2022-03-23Paper
The many entropies in one-way functions
Tutorials on the Foundations of Cryptography
2022-01-12Paper
From fairness to full security in multiparty computation
Journal of Cryptology
2022-01-06Paper
scientific article; zbMATH DE number 7286918 (Why is no real title available?)
Theory of Computing
2020-12-17Paper
Computational two-party correlation: a dichotomy for key-agreement protocols
SIAM Journal on Computing
2020-12-04Paper
Channels of small log-ratio leakage and characterization of two-party differentially private computation
(available as arXiv preprint)
2020-04-30Paper
Distributional collision resistance beyond one-way functions
(available as arXiv preprint)
2020-02-04Paper
Hardness-preserving reductions via cuckoo hashing
Journal of Cryptology
2019-06-20Paper
On the complexity of fair coin flipping
Theory of Cryptography
2018-12-11Paper
Coin flipping of \textit{any} constant bias implies one-way functions
Journal of the ACM
2018-12-06Paper
From fairness to full security in multiparty computation
Lecture Notes in Computer Science
2018-10-17Paper
Fair coin flipping: tighter analysis and the many-party case
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms
2018-07-16Paper
Characterization of secure multiparty computation without broadcast
Journal of Cryptology
2018-05-28Paper
An almost-optimally fair three-party coin-flipping protocol
SIAM Journal on Computing
2017-03-10Paper
Limits on the usefulness of random oracles
Journal of Cryptology
2016-06-01Paper
Characterization of secure multiparty computation without broadcast
Theory of Cryptography
2016-03-23Paper
Parallel Hashing via List Recoverability
Lecture Notes in Computer Science
2015-12-10Paper
Coin flipping of <i>any</i> constant bias implies one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
An almost-optimally fair three-party coin-flipping protocol
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
From non-adaptive to adaptive pseudorandom functions
Journal of Cryptology
2015-05-12Paper
Inaccessible entropy
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
Coin Flipping with Constant Bias Implies One-Way Functions
SIAM Journal on Computing
2014-07-30Paper
Coin flipping with constant bias implies one-way functions
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
A Parallel Repetition Theorem for Any Interactive Argument
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
A parallel repetition theorem for any interactive argument
SIAM Journal on Computing
2014-04-11Paper
A new interactive hashing theorem
Journal of Cryptology
2014-04-01Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions
SIAM Journal on Computing
2013-09-25Paper
Limits on the Usefulness of Random Oracles
Theory of Cryptography
2013-03-18Paper
Hardness preserving reductions via cuckoo hashing
Theory of Cryptography
2013-03-18Paper
From non-adaptive to adaptive pseudorandom functions
Theory of Cryptography
2012-06-15Paper
On the instantiability of hash-and-sign RSA signatures
Theory of Cryptography
2012-06-15Paper
On the Power of the Randomized Iterate
SIAM Journal on Computing
2012-03-15Paper
Black-box constructions of protocols for secure computation
SIAM Journal on Computing
2011-07-29Paper
Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
SIAM Journal on Computing
2010-07-07Paper
Bounded key-dependent message security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Universal one-way hash functions via inaccessible entropy
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Reducing complexity assumptions for statistically-hiding commitment
Journal of Cryptology
2009-06-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
On the (Im)Possibility of Key Dependent Encryption
Theory of Cryptography
2009-03-03Paper
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
Theory of Cryptography
2009-03-03Paper
Statistically-hiding commitment from any one-way function2009-01-05Paper
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Lecture Notes in Computer Science
2008-05-06Paper
Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
Theory of Cryptography
2008-03-05Paper
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Theory of Cryptography
2008-03-05Paper
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions
Automata, Languages and Programming
2007-09-11Paper
On the Power of the Randomized Iterate
Lecture Notes in Computer Science
2007-09-04Paper


Research outcomes over time


This page was built for person: Iftach Haitner