Tal Moran

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Locally verifiable distributed SNARGs2024-08-01Paper
Correction to: ``Topology-hiding communication from minimal assumptions
Journal of Cryptology
2023-10-25Paper
One-Way Functions and (Im)perfect Obfuscation
SIAM Journal on Computing
2023-04-04Paper
MPC with synchronous security and asynchronous responsiveness2023-03-29Paper
Incompressible encodings2022-11-09Paper
Topology-hiding communication from minimal assumptions2022-03-23Paper
Topology-hiding computation for networks with unknown delays2021-12-01Paper
Simple proofs of space-time and rational proofs of storage2020-05-20Paper
Is information-theoretic topology-hiding computation possible?2020-04-30Paper
Topology-hiding computation on all graphs
Journal of Cryptology
2020-03-03Paper
Topology-hiding computation beyond semi-honest adversaries2018-12-06Paper
Exploring the boundaries of topology-hiding computation2018-07-17Paper
Topology-hiding computation on all graphs
Advances in Cryptology – CRYPTO 2017
2017-11-03Paper
Topology-hiding computation beyond logarithmic diameter
Lecture Notes in Computer Science
2017-06-23Paper
Publicly verifiable proofs of sequential work
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
An optimally fair coin toss
Journal of Cryptology
2016-09-21Paper
Topology-hiding computation
Theory of Cryptography
2015-07-06Paper
Public verification of private effort
Theory of Cryptography
2015-07-06Paper
A mix-net from any CCA2 secure cryptosystem
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Counterexamples to hardness amplification beyond negligible
Theory of Cryptography
2012-06-15Paper
Time-lock puzzles in the random oracle model
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Deterministic history-independent strategies for storing information on write-once memories
Theory of Computing
2011-05-24Paper
Basing cryptographic protocols on tamper-evident seals
Theoretical Computer Science
2010-03-10Paper
On complete primitives for fairness
Theory of Cryptography
2010-02-24Paper
Non-interactive timestamping in the bounded-storage model
Journal of Cryptology
2009-05-08Paper
An Optimally Fair Coin Toss
Theory of Cryptography
2009-03-03Paper
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Automata, Languages and Programming
2007-11-28Paper
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy
Lecture Notes in Computer Science
2007-09-04Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Tal Moran