Enav Weinreb

From MaRDI portal
(Redirected from Person:541667)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the complexity of communication complexity
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Private approximation of search problems
Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing
2014-11-25Paper
Choosing, agreeing, and eliminating in communication complexity
Computational Complexity
2014-09-25Paper
The Communication Complexity of Set-Disjointness with Small Sets and 0-1 Intersection
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
Partition arguments in multiparty communication complexity
Theoretical Computer Science
2011-06-07Paper
On \(d\)-multiplicative secret sharing
Journal of Cryptology
2010-11-12Paper
On locally decodable codes, self-correctable codes, and \(t\)-private PIR
Algorithmica
2010-11-08Paper
Choosing, agreeing, and eliminating in communication complexity
Automata, Languages and Programming
2010-09-07Paper
How should we solve search problems privately?
Journal of Cryptology
2010-03-01Paper
Monotone circuits for monotone weighted threshold functions
Information Processing Letters
2009-12-18Paper
Private Approximation of Search Problems
SIAM Journal on Computing
2009-11-06Paper
Partition Arguments in Multiparty Communication Complexity
Automata, Languages and Programming
2009-07-14Paper
Characterizing Ideal Weighted Threshold Secret Sharing
SIAM Journal on Discrete Mathematics
2009-03-16Paper
How Should We Solve Search Problems Privately?
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
On Locally Decodable Codes, Self-correctable Codes, and t-Private PIR
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2009-02-17Paper
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
Lecture Notes in Computer Science
2009-02-10Paper
scientific article; zbMATH DE number 5485580 (Why is no real title available?)2009-01-05Paper
Secure Linear Algebra Using Linearly Recurrent Sequences
Theory of Cryptography
2007-08-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Separating the Power of Monotone Span Programs over Different Fields
SIAM Journal on Computing
2005-09-16Paper


Research outcomes over time


This page was built for person: Enav Weinreb