Alon Rosen

From MaRDI portal
(Redirected from Person:315549)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Sample efficient search to decision for \(k\)LIN2026-02-04Paper
CDS composition of multi-round protocols2024-12-13Paper
Nondeterministic interactive refutations for nearest Boolean vector2024-11-14Paper
PPP-completeness and extremal combinatorics2024-09-25Paper
Downward self-reducibility in TFNP2024-09-25Paper
Public-key encryption, local pseudorandom generators, and the low-degree method2024-08-01Paper
Public-key encryption from homogeneous CLWE
Theory of Cryptography
2023-08-14Paper
One-Way Functions and (Im)perfect Obfuscation
SIAM Journal on Computing
2023-04-04Paper
Acyclicity programming for sigma-protocols2023-03-31Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Non-interactive composition of sigma-protocols via Share-then-Hash2023-03-29Paper
Cryptography from Information Loss.2023-02-03Paper
Limits on the efficiency of (ring) LWE based non-interactive key exchange
Lecture Notes in Computer Science
2022-10-13Paper
PPP-Completeness and Extremal Combinatorics2022-09-11Paper
Time- and space-efficient arguments from groups of unknown order2022-05-18Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Public-coin zero-knowledge arguments with (almost) minimal time and space overheads2022-03-23Paper
Pseudorandom functions: three decades later
Tutorials on the Foundations of Cryptography
2022-01-12Paper
Limits on the efficiency of (ring) LWE-based non-interactive key exchange
Journal of Cryptology
2021-11-24Paper
An Algebraic Approach to Nonmalleability
SIAM Journal on Computing
2021-10-18Paper
Can PPAD hardness be based on standard cryptographic assumptions?
Journal of Cryptology
2021-04-07Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Securing Abe's mix-net against malicious verifiers via witness indistinguishability2018-10-17Paper
Proofs of Work from worst-case assumptions2018-09-12Paper
An efficiency-preserving transformation from honest-verifier statistical zero-knowledge to statistical zero-knowledge2018-07-17Paper
Functional encryption for bounded collusions, revisited2018-01-19Paper
Can PPAD hardness be based on standard cryptographic assumptions?
Theory of Cryptography
2018-01-19Paper
Average-case fine-grained hardness
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
2017-08-17Paper
Rational arguments: single round delegation with sublinear verification
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\)
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
On the existence of extractable one-way functions
SIAM Journal on Computing
2016-10-28Paper
A dichotomy for local small-bias generators
Journal of Cryptology
2016-09-21Paper
Rational sumchecks
Theory of Cryptography
2016-04-08Paper
Adaptive security with quasi-optimal rate
Theory of Cryptography
2016-03-23Paper
On the hardness of learning with rounding over small modulus
Theory of Cryptography
2016-03-23Paper
SPRING: Fast Pseudorandom Functions from Rounded Ring Products
Fast Software Encryption
2015-09-18Paper
FPGA implementations of SPRING and their countermeasures against side-channel attacks
Advanced Information Systems Engineering
2015-07-21Paper
Non-committing encryption from \(\Phi\)-hiding
Theory of Cryptography
2015-07-06Paper
The power of negations in cryptography
Theory of Cryptography
2015-07-06Paper
Public verification of private effort
Theory of Cryptography
2015-07-06Paper
On the existence of extractable one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds
Proceedings of the thirty-third annual ACM symposium on Theory of computing
2015-02-27Paper
Pseudo-random functions and factoring (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
The impossibility of obfuscation with auxiliary input or a universal simulator
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Lower Bounds in the Hardware Token Model
Theory of Cryptography
2014-02-18Paper
Limits on the power of cryptographic cheap talk
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Input locality and hardness amplification
Journal of Cryptology
2013-04-15Paper
More constructions of lossy and correlation-secure trapdoor functions
Journal of Cryptology
2013-04-15Paper
Public-coin parallel zero-knowledge for NP
Journal of Cryptology
2013-04-15Paper
Pseudorandom functions and lattices
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A dichotomy for local small-bias generators
Theory of Cryptography
2012-06-15Paper
Lossy functions do not amplify well
Theory of Cryptography
2012-06-15Paper
Input locality and hardness amplification
Theory of Cryptography
2011-05-19Paper
Chosen-ciphertext security via correlated products
SIAM Journal on Computing
2011-04-04Paper
Optimistic concurrent zero knowledge
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
New and improved constructions of non-malleable cryptographic protocols
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
2010-08-16Paper
More constructions of lossy and correlation-secure trapdoor functions
Public Key Cryptography – PKC 2010
2010-05-28Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
New and Improved Constructions of Nonmalleable Cryptographic Protocols
SIAM Journal on Computing
2009-04-30Paper
Fairness with an Honest Minority and a Rational Majority
Theory of Cryptography
2009-03-03Paper
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
Theory of Cryptography
2009-03-03Paper
Chosen-Ciphertext Security via Correlated Products
Theory of Cryptography
2009-03-03Paper
scientific article; zbMATH DE number 5485483 (Why is no real title available?)2009-01-05Paper
Concurrent Nonmalleable Commitments
SIAM Journal on Computing
2008-12-22Paper
SWIFFT: A Modest Proposal for FFT Hashing
Fast Software Encryption
2008-09-18Paper
On Robust Combiners for Oblivious Transfer and Other Primitives
Lecture Notes in Computer Science
2008-05-06Paper
Constant-round oblivious transfer in the bounded storage model
Journal of Cryptology
2007-05-03Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Completeness in two-party secure computation: A computational view
Journal of Cryptology
2007-01-24Paper
Concurrent zero-knowledge. With additional background by Oded Goldreich
Information Security and Cryptography
2006-10-27Paper
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds
SIAM Journal on Computing
2003-01-05Paper
Pseudorandom Functions and Factoring
SIAM Journal on Computing
2002-09-29Paper
scientific article; zbMATH DE number 1759795 (Why is no real title available?)2002-07-28Paper


Research outcomes over time


This page was built for person: Alon Rosen