Alon Rosen

From MaRDI portal
Person:315549

Available identifiers

zbMath Open rosen.alonWikidataQ102307908 ScholiaQ102307908MaRDI QIDQ315549

List of research outcomes





PublicationDate of PublicationType
CDS composition of multi-round protocols2024-12-13Paper
Nondeterministic interactive refutations for nearest Boolean vector2024-11-14Paper
PPP-completeness and extremal combinatorics2024-09-25Paper
Downward self-reducibility in TFNP2024-09-25Paper
Public-key encryption, local pseudorandom generators, and the low-degree method2024-08-01Paper
Public-key encryption from homogeneous CLWE2023-08-14Paper
One-Way Functions and (Im)perfect Obfuscation2023-04-04Paper
Acyclicity programming for sigma-protocols2023-03-31Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Non-interactive composition of sigma-protocols via Share-then-Hash2023-03-29Paper
Cryptography from Information Loss.2023-02-03Paper
Limits on the efficiency of (ring) LWE based non-interactive key exchange2022-10-13Paper
PPP-Completeness and Extremal Combinatorics2022-09-11Paper
Time- and space-efficient arguments from groups of unknown order2022-05-18Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Public-coin zero-knowledge arguments with (almost) minimal time and space overheads2022-03-23Paper
Pseudorandom functions: three decades later2022-01-12Paper
Limits on the efficiency of (ring) LWE-based non-interactive key exchange2021-11-24Paper
An Algebraic Approach to Nonmalleability2021-10-18Paper
Can PPAD hardness be based on standard cryptographic assumptions?2021-04-07Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir2020-01-30Paper
Securing Abe's mix-net against malicious verifiers via witness indistinguishability2018-10-17Paper
Proofs of Work from worst-case assumptions2018-09-12Paper
An efficiency-preserving transformation from honest-verifier statistical zero-knowledge to statistical zero-knowledge2018-07-17Paper
Functional encryption for bounded collusions, revisited2018-01-19Paper
Can PPAD hardness be based on standard cryptographic assumptions?2018-01-19Paper
Average-case fine-grained hardness2017-08-17Paper
Rational arguments: single round delegation with sublinear verification2017-05-19Paper
Candidate weak pseudorandom functions in \(\mathrm{AC}^0\circ\mathrm{MOD}_2\)2017-05-19Paper
On the existence of extractable one-way functions2016-10-28Paper
A dichotomy for local small-bias generators2016-09-21Paper
Rational sumchecks2016-04-08Paper
Adaptive security with quasi-optimal rate2016-03-23Paper
On the hardness of learning with rounding over small modulus2016-03-23Paper
SPRING: Fast Pseudorandom Functions from Rounded Ring Products2015-09-18Paper
FPGA implementations of SPRING and their countermeasures against side-channel attacks2015-07-21Paper
Non-committing encryption from \(\Phi\)-hiding2015-07-06Paper
The power of negations in cryptography2015-07-06Paper
Public verification of private effort2015-07-06Paper
On the existence of extractable one-way functions2015-06-26Paper
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds2015-02-27Paper
Pseudo-random functions and factoring (extended abstract)2014-09-26Paper
The impossibility of obfuscation with auxiliary input or a universal simulator2014-08-07Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
Limits on the power of cryptographic cheap talk2013-09-02Paper
Input locality and hardness amplification2013-04-15Paper
More constructions of lossy and correlation-secure trapdoor functions2013-04-15Paper
Public-coin parallel zero-knowledge for NP2013-04-15Paper
Pseudorandom functions and lattices2012-06-29Paper
A dichotomy for local small-bias generators2012-06-15Paper
Lossy functions do not amplify well2012-06-15Paper
Input locality and hardness amplification2011-05-19Paper
Chosen-ciphertext security via correlated products2011-04-04Paper
Optimistic concurrent zero knowledge2010-12-07Paper
New and improved constructions of non-malleable cryptographic protocols2010-08-16Paper
More constructions of lossy and correlation-secure trapdoor functions2010-05-28Paper
Theory of Cryptography2009-05-14Paper
Theory of Cryptography2009-05-14Paper
New and Improved Constructions of Nonmalleable Cryptographic Protocols2009-04-30Paper
Fairness with an Honest Minority and a Rational Majority2009-03-03Paper
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols2009-03-03Paper
Chosen-Ciphertext Security via Correlated Products2009-03-03Paper
https://portal.mardi4nfdi.de/entity/Q35496472009-01-05Paper
Concurrent Nonmalleable Commitments2008-12-22Paper
SWIFFT: A Modest Proposal for FFT Hashing2008-09-18Paper
On Robust Combiners for Oblivious Transfer and Other Primitives2008-05-06Paper
Constant-round oblivious transfer in the bounded storage model2007-05-03Paper
Theory of Cryptography2007-02-12Paper
Completeness in two-party secure computation: A computational view2007-01-24Paper
Concurrent zero-knowledge. With additional background by Oded Goldreich2006-10-27Paper
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds2003-01-05Paper
Pseudorandom Functions and Factoring2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45368182002-07-28Paper

Research outcomes over time

This page was built for person: Alon Rosen