Alon Rosen

From MaRDI portal
Person:315549

Available identifiers

zbMath Open rosen.alonWikidataQ102307908 ScholiaQ102307908MaRDI QIDQ315549

List of research outcomes





PublicationDate of PublicationType
CDS composition of multi-round protocols2024-12-13Paper
Nondeterministic interactive refutations for nearest Boolean vector2024-11-14Paper
PPP-completeness and extremal combinatorics2024-09-25Paper
Downward self-reducibility in TFNP2024-09-25Paper
Public-key encryption, local pseudorandom generators, and the low-degree method2024-08-01Paper
Public-key encryption from homogeneous CLWE2023-08-14Paper
One-Way Functions and (Im)perfect Obfuscation2023-04-04Paper
Acyclicity programming for sigma-protocols2023-03-31Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Non-interactive composition of sigma-protocols via Share-then-Hash2023-03-29Paper
Cryptography from Information Loss.2023-02-03Paper
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange2022-10-13Paper
PPP-Completeness and Extremal Combinatorics2022-09-11Paper
Time- and space-efficient arguments from groups of unknown order2022-05-18Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Public-coin zero-knowledge arguments with (almost) minimal time and space overheads2022-03-23Paper
Pseudorandom Functions: Three Decades Later2022-01-12Paper
Limits on the efficiency of (ring) LWE-based non-interactive key exchange2021-11-24Paper
An Algebraic Approach to Nonmalleability2021-10-18Paper
Can PPAD hardness be based on standard cryptographic assumptions?2021-04-07Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir2020-01-30Paper
Securing Abe's mix-net against malicious verifiers via witness indistinguishability2018-10-17Paper
Proofs of Work from worst-case assumptions2018-09-12Paper
An efficiency-preserving transformation from honest-verifier statistical zero-knowledge to statistical zero-knowledge2018-07-17Paper
Functional encryption for bounded collusions, revisited2018-01-19Paper
Can PPAD hardness be based on standard cryptographic assumptions?2018-01-19Paper
Average-case fine-grained hardness2017-08-17Paper
Rational arguments2017-05-19Paper
Candidate weak pseudorandom functions in AC 0 ○ MOD 22017-05-19Paper
On the existence of extractable one-way functions2016-10-28Paper
A dichotomy for local small-bias generators2016-09-21Paper
Rational Sumchecks2016-04-08Paper
Adaptive Security with Quasi-Optimal Rate2016-03-23Paper
On the Hardness of Learning with Rounding over Small Modulus2016-03-23Paper
SPRING: Fast Pseudorandom Functions from Rounded Ring Products2015-09-18Paper
FPGA Implementations of SPRING2015-07-21Paper
Non-committing Encryption from Φ-hiding2015-07-06Paper
The Power of Negations in Cryptography2015-07-06Paper
Public Verification of Private Effort2015-07-06Paper
On the existence of extractable one-way functions2015-06-26Paper
Black-box concurrent zero-knowledge requires \tilde {Ω} (log n ) rounds2015-02-27Paper
Pseudo-random functions and factoring (extended abstract)2014-09-26Paper
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator2014-08-07Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
Limits on the Power of Cryptographic Cheap Talk2013-09-02Paper
Input locality and hardness amplification2013-04-15Paper
More constructions of lossy and correlation-secure trapdoor functions2013-04-15Paper
Public-coin parallel zero-knowledge for NP2013-04-15Paper
Pseudorandom Functions and Lattices2012-06-29Paper
A Dichotomy for Local Small-Bias Generators2012-06-15Paper
Lossy Functions Do Not Amplify Well2012-06-15Paper
Input Locality and Hardness Amplification2011-05-19Paper
Chosen-Ciphertext Security via Correlated Products2011-04-04Paper
Optimistic Concurrent Zero Knowledge2010-12-07Paper
New and improved constructions of non-malleable cryptographic protocols2010-08-16Paper
More Constructions of Lossy and Correlation-Secure Trapdoor Functions2010-05-28Paper
Theory of Cryptography2009-05-14Paper
Theory of Cryptography2009-05-14Paper
New and Improved Constructions of Nonmalleable Cryptographic Protocols2009-04-30Paper
Fairness with an Honest Minority and a Rational Majority2009-03-03Paper
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols2009-03-03Paper
Chosen-Ciphertext Security via Correlated Products2009-03-03Paper
https://portal.mardi4nfdi.de/entity/Q35496472009-01-05Paper
Concurrent Nonmalleable Commitments2008-12-22Paper
SWIFFT: A Modest Proposal for FFT Hashing2008-09-18Paper
On Robust Combiners for Oblivious Transfer and Other Primitives2008-05-06Paper
Constant-round oblivious transfer in the bounded storage model2007-05-03Paper
Theory of Cryptography2007-02-12Paper
Completeness in two-party secure computation: A computational view2007-01-24Paper
Concurrent zero-knowledge. With additional background by Oded Goldreich2006-10-27Paper
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds2003-01-05Paper
Pseudorandom Functions and Factoring2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45368182002-07-28Paper

Research outcomes over time

This page was built for person: Alon Rosen