Tal Moran

From MaRDI portal
(Redirected from Person:315539)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Locally verifiable distributed SNARGs2024-08-01Paper
Correction to: ``Topology-hiding communication from minimal assumptions
Journal of Cryptology
2023-10-25Paper
One-Way Functions and (Im)perfect Obfuscation
SIAM Journal on Computing
2023-04-04Paper
MPC with synchronous security and asynchronous responsiveness2023-03-29Paper
Incompressible encodings2022-11-09Paper
Topology-hiding communication from minimal assumptions2022-03-23Paper
Topology-hiding computation for networks with unknown delays2021-12-01Paper
Simple proofs of space-time and rational proofs of storage2020-05-20Paper
Is information-theoretic topology-hiding computation possible?2020-04-30Paper
Topology-hiding computation on all graphs
Journal of Cryptology
2020-03-03Paper
Topology-hiding computation beyond semi-honest adversaries2018-12-06Paper
Exploring the boundaries of topology-hiding computation2018-07-17Paper
Topology-hiding computation on all graphs
Advances in Cryptology – CRYPTO 2017
2017-11-03Paper
Topology-hiding computation beyond logarithmic diameter
Lecture Notes in Computer Science
2017-06-23Paper
Publicly verifiable proofs of sequential work
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
An optimally fair coin toss
Journal of Cryptology
2016-09-21Paper
Topology-hiding computation
Theory of Cryptography
2015-07-06Paper
Public verification of private effort
Theory of Cryptography
2015-07-06Paper
A mix-net from any CCA2 secure cryptosystem
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Counterexamples to hardness amplification beyond negligible
Theory of Cryptography
2012-06-15Paper
Time-lock puzzles in the random oracle model
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Deterministic history-independent strategies for storing information on write-once memories
Theory of Computing
2011-05-24Paper
Basing cryptographic protocols on tamper-evident seals
Theoretical Computer Science
2010-03-10Paper
On complete primitives for fairness
Theory of Cryptography
2010-02-24Paper
Non-interactive timestamping in the bounded-storage model
Journal of Cryptology
2009-05-08Paper
An Optimally Fair Coin Toss
Theory of Cryptography
2009-03-03Paper
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Automata, Languages and Programming
2007-11-28Paper
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
Lecture Notes in Computer Science
2007-09-04Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Tal Moran