Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Moni Naor
@inproceedings{DBLP:conf/soda/NaorP24, author = {Moni Naor and Eugene Pekel}, editor = {David P. Woodruff}, title = {Adjacency Sketches in Adversarial Environments}, booktitle = {Proceedings of the 2024 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2024, Alexandria, VA, USA, January 7-10, 2024}, pages = {1067--1098}, publisher = {{SIAM}}, year = {2024}, url = {https://doi.org/10.1137/1.9781611977912.41}, doi = {10.1137/1.9781611977912.41}, timestamp = {Thu, 04 Apr 2024 19:38:10 +0200}, biburl = {https://dblp.org/rec/conf/soda/NaorP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MagenN23, author = {Roey Magen and Moni Naor}, title = {Mirror games against an open book player}, journal = {Theor. Comput. Sci.}, volume = {976}, pages = {114159}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.114159}, doi = {10.1016/J.TCS.2023.114159}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/MagenN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forc/KarovN23, author = {Bar Karov and Moni Naor}, editor = {Kunal Talwar}, title = {New Algorithms and Applications for Risk-Limiting Audits}, booktitle = {4th Symposium on Foundations of Responsible Computing, {FORC} 2023, June 7-9, 2023, Stanford University, California, {USA}}, series = {LIPIcs}, volume = {256}, pages = {2:1--2:27}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.FORC.2023.2}, doi = {10.4230/LIPICS.FORC.2023.2}, timestamp = {Mon, 05 Jun 2023 16:20:06 +0200}, biburl = {https://dblp.org/rec/conf/forc/KarovN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forc/DovDNT23, author = {Yoav Ben Dov and Liron David and Moni Naor and Elad Tzalik}, editor = {Kunal Talwar}, title = {Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes}, booktitle = {4th Symposium on Foundations of Responsible Computing, {FORC} 2023, June 7-9, 2023, Stanford University, California, {USA}}, series = {LIPIcs}, volume = {256}, pages = {11:1--11:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.FORC.2023.11}, doi = {10.4230/LIPICS.FORC.2023.11}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forc/DovDNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/NaorNSY23, author = {Moni Naor and Kobbi Nissim and Uri Stemmer and Chao Yan}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Private Everlasting Prediction}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/abe31a12e83111fdf2cfd54deed5a2ce-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/NaorNSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-04050, author = {Bar Karov and Moni Naor}, title = {New Algorithms and Applications for Risk-Limiting Audits}, journal = {CoRR}, volume = {abs/2305.04050}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.04050}, doi = {10.48550/ARXIV.2305.04050}, eprinttype = {arXiv}, eprint = {2305.04050}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-04050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-09579, author = {Moni Naor and Kobbi Nissim and Uri Stemmer and Chao Yan}, title = {Private Everlasting Prediction}, journal = {CoRR}, volume = {abs/2305.09579}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.09579}, doi = {10.48550/ARXIV.2305.09579}, eprinttype = {arXiv}, eprint = {2305.09579}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-09579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-03728, author = {Moni Naor and Eugene Pekel}, title = {Adjacency Sketches in Adversarial Environments}, journal = {CoRR}, volume = {abs/2309.03728}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.03728}, doi = {10.48550/ARXIV.2309.03728}, eprinttype = {arXiv}, eprint = {2309.03728}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-03728.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-10196, author = {Omri Ben{-}Eliezer and Tomer Grossman and Moni Naor}, title = {Does Prior Knowledge Help Detect Collisions?}, journal = {CoRR}, volume = {abs/2312.10196}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.10196}, doi = {10.48550/ARXIV.2312.10196}, eprinttype = {arXiv}, eprint = {2312.10196}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-10196.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Ben-EliezerGN23, author = {Omri Ben{-}Eliezer and Tomer Grossman and Moni Naor}, title = {Does Prior Knowledge Help Detect Collisions?}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-207}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/207}, eprinttype = {ECCC}, eprint = {TR23-207}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/Ben-EliezerGN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoschiniDNR23, author = {Cecilia Boschini and Hila Dahari and Moni Naor and Eyal Ronen}, title = {That's not my signature! Fail-stop signatures for a post-quantum world}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1754}, year = {2023}, url = {https://eprint.iacr.org/2023/1754}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoschiniDNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/KomargodskiMNPR22, author = {Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev}, title = {One-Way Functions and (Im)perfect Obfuscation}, journal = {{SIAM} J. Comput.}, volume = {51}, number = {6}, pages = {1769--1795}, year = {2022}, url = {https://doi.org/10.1137/15m1048549}, doi = {10.1137/15M1048549}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/KomargodskiMNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CohenN22, author = {Shahar P. Cohen and Moni Naor}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {252--281}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_9}, doi = {10.1007/978-3-031-15982-4\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CohenN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CremersNPR22, author = {Cas Cremers and Moni Naor and Shahar Paz and Eyal Ronen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {{CHIP} and {CRISP:} Protecting All Parties Against Compromise Through Identity-Binding PAKEs}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {668--698}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_23}, doi = {10.1007/978-3-031-15979-4\_23}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CremersNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/MagenN22, author = {Roey Magen and Moni Naor}, editor = {Pierre Fraigniaud and Yushi Uno}, title = {Mirror Games Against an Open Book Player}, booktitle = {11th International Conference on Fun with Algorithms, {FUN} 2022, May 30 to June 3, 2022, Island of Favignana, Sicily, Italy}, series = {LIPIcs}, volume = {226}, pages = {20:1--20:12}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.FUN.2022.20}, doi = {10.4230/LIPICS.FUN.2022.20}, timestamp = {Mon, 23 May 2022 11:54:04 +0200}, biburl = {https://dblp.org/rec/conf/fun/MagenN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/MenuhinN22, author = {Boaz Menuhin and Moni Naor}, editor = {Mark Braverman}, title = {Keep That Card in Mind: Card Guessing with Limited Memory}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {107:1--107:28}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.107}, doi = {10.4230/LIPICS.ITCS.2022.107}, timestamp = {Wed, 26 Jan 2022 14:33:51 +0100}, biburl = {https://dblp.org/rec/conf/innovations/MenuhinN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NaorO22, author = {Moni Naor and Noa Oved}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Bet-or-Pass: Adversarially Robust Bloom Filters}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {777--808}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_27}, doi = {10.1007/978-3-031-22365-5\_27}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/NaorO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-12129, author = {Roey Magen and Moni Naor}, title = {Mirror Games Against an Open Book Player}, journal = {CoRR}, volume = {abs/2204.12129}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.12129}, doi = {10.48550/ARXIV.2204.12129}, eprinttype = {arXiv}, eprint = {2204.12129}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-12129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-05047, author = {Bar Alon and Moni Naor and Eran Omri and Uri Stemmer}, title = {{MPC} for Tech Giants {(GMPC):} Enabling Gulliver and the Lilliputians to Cooperate Amicably}, journal = {CoRR}, volume = {abs/2207.05047}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.05047}, doi = {10.48550/ARXIV.2207.05047}, eprinttype = {arXiv}, eprint = {2207.05047}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-05047.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenN22, author = {Shahar P. Cohen and Moni Naor}, title = {Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2022}, url = {https://eprint.iacr.org/2022/312}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CohenN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlonNOS22, author = {Bar Alon and Moni Naor and Eran Omri and Uri Stemmer}, title = {{MPC} for Tech Giants {(GMPC):} Enabling Gulliver and the Lilliputians to Cooperate Amicably}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2022}, url = {https://eprint.iacr.org/2022/902}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlonNOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorO22, author = {Moni Naor and Noa Oved}, title = {Bet-or-Pass: Adversarially Robust Bloom Filters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1292}, year = {2022}, url = {https://eprint.iacr.org/2022/1292}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/AsharovN0S21, author = {Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf}, title = {Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations}, journal = {{SIAM} J. Comput.}, volume = {50}, number = {5}, pages = {1501--1536}, year = {2021}, url = {https://doi.org/10.1137/19M1303186}, doi = {10.1137/19M1303186}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/AsharovN0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AlonBDMNY21, author = {Noga Alon and Omri Ben{-}Eliezer and Yuval Dagan and Shay Moran and Moni Naor and Eylon Yogev}, editor = {Samir Khuller and Virginia Vassilevska Williams}, title = {Adversarial laws of large numbers and optimal regret in online classification}, booktitle = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021}, pages = {447--455}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3406325.3451041}, doi = {10.1145/3406325.3451041}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AlonBDMNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-09054, author = {Noga Alon and Omri Ben{-}Eliezer and Yuval Dagan and Shay Moran and Moni Naor and Eylon Yogev}, title = {Adversarial Laws of Large Numbers and Optimal Regret in Online Classification}, journal = {CoRR}, volume = {abs/2101.09054}, year = {2021}, url = {https://arxiv.org/abs/2101.09054}, eprinttype = {arXiv}, eprint = {2101.09054}, timestamp = {Sat, 30 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-09054.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-01409, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness-Preserving Reductions via Cuckoo Hashing}, journal = {CoRR}, volume = {abs/2105.01409}, year = {2021}, url = {https://arxiv.org/abs/2105.01409}, eprinttype = {arXiv}, eprint = {2105.01409}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-01409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-03885, author = {Boaz Menuhin and Moni Naor}, title = {Keep That Card in Mind: Card Guessing with Limited Memory}, journal = {CoRR}, volume = {abs/2107.03885}, year = {2021}, url = {https://arxiv.org/abs/2107.03885}, eprinttype = {arXiv}, eprint = {2107.03885}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-03885.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MenuhinN21, author = {Boaz Menuhin and Moni Naor}, title = {Keep That Card in Mind: Card Guessing with Limited Memory}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR21-096}}, year = {2021}, url = {https://eccc.weizmann.ac.il/report/2021/096}, eprinttype = {ECCC}, eprint = {TR21-096}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MenuhinN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NaorRS20, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {The Security of Lazy Users in Out-of-Band Authentication}, journal = {{ACM} Trans. Priv. Secur.}, volume = {23}, number = {2}, pages = {9:1--9:32}, year = {2020}, url = {https://doi.org/10.1145/3377849}, doi = {10.1145/3377849}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/NaorRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/KaplanLMNS20, author = {Haim Kaplan and Katrina Ligett and Yishay Mansour and Moni Naor and Uri Stemmer}, editor = {Jacob D. Abernethy and Shivani Agarwal}, title = {Privately Learning Thresholds: Closing the Exponential Gap}, booktitle = {Conference on Learning Theory, {COLT} 2020, 9-12 July 2020, Virtual Event [Graz, Austria]}, series = {Proceedings of Machine Learning Research}, volume = {125}, pages = {2263--2285}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v125/kaplan20a.html}, timestamp = {Fri, 27 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colt/KaplanLMNS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forc/NaorV20, author = {Moni Naor and Neil Vexler}, editor = {Aaron Roth}, title = {Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users}, booktitle = {1st Symposium on Foundations of Responsible Computing, {FORC} 2020, June 1-3, 2020, Harvard University, Cambridge, MA, {USA} (virtual conference)}, series = {LIPIcs}, volume = {156}, pages = {4:1--4:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.FORC.2020.4}, doi = {10.4230/LIPICS.FORC.2020.4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/forc/NaorV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NaorR020, author = {Moni Naor and Lior Rotem and Gil Segev}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {9:1--9:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.9}, doi = {10.4230/LIPICS.ITC.2020.9}, timestamp = {Thu, 04 Jun 2020 17:19:53 +0200}, biburl = {https://dblp.org/rec/conf/icits/NaorR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GrossmanKN20, author = {Tomer Grossman and Ilan Komargodski and Moni Naor}, editor = {Thomas Vidick}, title = {Instance Complexity and Unlabeled Certificates in the Decision Tree Model}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {56:1--56:38}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.56}, doi = {10.4230/LIPICS.ITCS.2020.56}, timestamp = {Mon, 06 Jan 2020 16:50:09 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GrossmanKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/NaorPY20, author = {Moni Naor and Merav Parter and Eylon Yogev}, editor = {Shuchi Chawla}, title = {The Power of Distributed Verifiers in Interactive Proofs}, booktitle = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020}, pages = {1096--115}, publisher = {{SIAM}}, year = {2020}, url = {https://doi.org/10.1137/1.9781611975994.67}, doi = {10.1137/1.9781611975994.67}, timestamp = {Thu, 15 Jul 2021 13:48:53 +0200}, biburl = {https://dblp.org/rec/conf/soda/NaorPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-03002, author = {Moni Naor and Neil Vexler}, title = {Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users}, journal = {CoRR}, volume = {abs/2004.03002}, year = {2020}, url = {https://arxiv.org/abs/2004.03002}, eprinttype = {arXiv}, eprint = {2004.03002}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-03002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR20, author = {Moni Naor and Shahar Paz and Eyal Ronen}, title = {{CRISP:} Compromise Resilient Identity-based Symmetric {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2020}, url = {https://eprint.iacr.org/2020/529}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/KomargodskiNY19, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing}, journal = {J. {ACM}}, volume = {66}, number = {5}, pages = {34:1--34:28}, year = {2019}, url = {https://doi.org/10.1145/3341106}, doi = {10.1145/3341106}, timestamp = {Thu, 10 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/KomargodskiNY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BermanHKN19, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness-Preserving Reductions via Cuckoo Hashing}, journal = {J. Cryptol.}, volume = {32}, number = {2}, pages = {361--392}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9293-0}, doi = {10.1007/S00145-018-9293-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BermanHKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/NaorY19, author = {Moni Naor and Eylon Yogev}, title = {Bloom Filters in Adversarial Environments}, journal = {{ACM} Trans. Algorithms}, volume = {15}, number = {3}, pages = {35:1--35:30}, year = {2019}, url = {https://doi.org/10.1145/3306193}, doi = {10.1145/3306193}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/NaorY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaorPR19, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1369--1386}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363204}, doi = {10.1145/3319535.3363204}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaorPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NaorPR19, author = {Moni Naor and Omer Paneth and Guy N. Rothblum}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Incrementally Verifiable Computation via Incremental PCPs}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {552--576}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_21}, doi = {10.1007/978-3-030-36033-7\_21}, timestamp = {Mon, 25 Nov 2019 13:59:31 +0100}, biburl = {https://dblp.org/rec/conf/tcc/NaorPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-10137, author = {Haim Kaplan and Katrina Ligett and Yishay Mansour and Moni Naor and Uri Stemmer}, title = {Privately Learning Thresholds: Closing the Exponential Gap}, journal = {CoRR}, volume = {abs/1911.10137}, year = {2019}, url = {http://arxiv.org/abs/1911.10137}, eprinttype = {arXiv}, eprint = {1911.10137}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-10137.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GrossmanKN19, author = {Tomer Grossman and Ilan Komargodski and Moni Naor}, title = {Instance Complexity and Unlabeled Certificates in the Decision Tree Model}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR19-113}}, year = {2019}, url = {https://eccc.weizmann.ac.il/report/2019/113}, eprinttype = {ECCC}, eprint = {TR19-113}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GrossmanKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR19, author = {Moni Naor and Omer Paneth and Guy N. Rothblum}, title = {Incrementally Verifiable Computation via Incremental PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1407}, year = {2019}, url = {https://eprint.iacr.org/2019/1407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorR019, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1458}, year = {2019}, url = {https://eprint.iacr.org/2019/1458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorR019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KomargodskiNY18, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {How to Share a Secret, Infinitely}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {6}, pages = {4179--4190}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2779121}, doi = {10.1109/TIT.2017.2779121}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KomargodskiNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KomargodskiNY18, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {162--194}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_6}, doi = {10.1007/978-3-319-78375-8\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KomargodskiNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NaorRS18, author = {Moni Naor and Lior Rotem and Gil Segev}, editor = {Amos Beimel and Stefan Dziembowski}, title = {The Security of Lazy Users in Out-of-Band Authentication}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {575--599}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_21}, doi = {10.1007/978-3-030-03810-6\_21}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/NaorRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-10917, author = {Moni Naor and Merav Parter and Eylon Yogev}, title = {The Power of Distributed Verifiers in Interactive Proofs}, journal = {CoRR}, volume = {abs/1812.10917}, year = {2018}, url = {http://arxiv.org/abs/1812.10917}, eprinttype = {arXiv}, eprint = {1812.10917}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-10917.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/NaorPY18, author = {Moni Naor and Merav Parter and Eylon Yogev}, title = {The Power of Distributed Verifiers in Interactive Proofs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-213}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/213}, eprinttype = {ECCC}, eprint = {TR18-213}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/NaorPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR18, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, title = {How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2018}, url = {http://eprint.iacr.org/2018/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorRS18, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {The Security of Lazy Users in Out-of-Band Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2018}, url = {https://eprint.iacr.org/2018/823}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KomargodskiNY17, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Secret-Sharing for {NP}}, journal = {J. Cryptol.}, volume = {30}, number = {2}, pages = {444--469}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9226-0}, doi = {10.1007/S00145-015-9226-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KomargodskiNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KomargodskiNY17, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, editor = {Chris Umans}, title = {White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing}, booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2017, Berkeley, CA, USA, October 15-17, 2017}, pages = {622--632}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FOCS.2017.63}, doi = {10.1109/FOCS.2017.63}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KomargodskiNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/HubacekNY17, author = {Pavel Hub{\'{a}}cek and Moni Naor and Eylon Yogev}, editor = {Christos H. Papadimitriou}, title = {The Journey from {NP} to {TFNP} Hardness}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {60:1--60:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.60}, doi = {10.4230/LIPICS.ITCS.2017.60}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/HubacekNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KomargodskiNY17, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-015}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/015}, eprinttype = {ECCC}, eprint = {TR17-015}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KomargodskiNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapadopoulosWHN17, author = {Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan Vcel{\'{a}}k and Leonid Reyzin and Sharon Goldberg}, title = {Can {NSEC5} be practical for {DNSSEC} deployments?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2017}, url = {http://eprint.iacr.org/2017/099}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PapadopoulosWHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiNY17, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2017}, url = {http://eprint.iacr.org/2017/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MoranNS16, author = {Tal Moran and Moni Naor and Gil Segev}, title = {An Optimally Fair Coin Toss}, journal = {J. Cryptol.}, volume = {29}, number = {3}, pages = {491--513}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9199-z}, doi = {10.1007/S00145-015-9199-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MoranNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/HubacekNU16, author = {Pavel Hub{\'{a}}cek and Moni Naor and Jonathan R. Ullman}, title = {When Can Limited Randomness Be Used in Repeated Games?}, journal = {Theory Comput. Syst.}, volume = {59}, number = {4}, pages = {722--746}, year = {2016}, url = {https://doi.org/10.1007/s00224-016-9690-4}, doi = {10.1007/S00224-016-9690-4}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/HubacekNU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkNR16, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {123--145}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_5}, doi = {10.1007/978-3-662-53015-3\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJNSY16, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {491--520}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_17}, doi = {10.1007/978-3-662-53008-5\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJNSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BoyleN16, author = {Elette Boyle and Moni Naor}, editor = {Madhu Sudan}, title = {Is There an Oblivious {RAM} Lower Bound?}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {357--368}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840761}, doi = {10.1145/2840728.2840761}, timestamp = {Tue, 14 Jun 2022 13:12:41 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BoyleN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/AmirKKNP16, author = {Amihood Amir and Oren Kapah and Tsvi Kopelowitz and Moni Naor and Ely Porat}, editor = {Christian Scheideler and Seth Gilbert}, title = {The Family Holiday Gathering Problem or Fair and Periodic Scheduling of Independent Sets}, booktitle = {Proceedings of the 28th {ACM} Symposium on Parallelism in Algorithms and Architectures, {SPAA} 2016, Asilomar State Beach/Pacific Grove, CA, USA, July 11-13, 2016}, pages = {367--375}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2935764.2935788}, doi = {10.1145/2935764.2935788}, timestamp = {Tue, 06 Nov 2018 16:59:33 +0100}, biburl = {https://dblp.org/rec/conf/spaa/AmirKKNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AsharovNSS16, author = {Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf}, editor = {Daniel Wichs and Yishay Mansour}, title = {Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations}, booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016}, pages = {1101--1114}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897518.2897562}, doi = {10.1145/2897518.2897562}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/AsharovNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KomargodskiNY16, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, editor = {Martin Hirt and Adam D. Smith}, title = {How to Share a Secret, Infinitely}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {485--514}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_19}, doi = {10.1007/978-3-662-53644-5\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KomargodskiNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/DworkNR16, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum}, title = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR16-049}}, year = {2016}, url = {https://eccc.weizmann.ac.il/report/2016/049}, eprinttype = {ECCC}, eprint = {TR16-049}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/DworkNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HubacekNY16, author = {Pavel Hub{\'{a}}cek and Moni Naor and Eylon Yogev}, title = {The Journey from {NP} to {TFNP} Hardness}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR16-199}}, year = {2016}, url = {https://eccc.weizmann.ac.il/report/2016/199}, eprinttype = {ECCC}, eprint = {TR16-199}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HubacekNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KomargodskiNY16, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {How to Share a Secret, Infinitely}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR16-023}}, year = {2016}, url = {https://eccc.weizmann.ac.il/report/2016/023}, eprinttype = {ECCC}, eprint = {TR16-023}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KomargodskiNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldbergNPR16, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin}, title = {{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration with Shorter Responses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2016}, url = {http://eprint.iacr.org/2016/083}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoldbergNPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiNY16, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {How to Share a Secret, Infinitely}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2016}, url = {http://eprint.iacr.org/2016/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovNSS16, author = {Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf}, title = {Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2016}, url = {http://eprint.iacr.org/2016/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJNSY16, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, title = {Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2016}, url = {http://eprint.iacr.org/2016/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJNSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DworkNR16, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum}, title = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2016}, url = {http://eprint.iacr.org/2016/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DworkNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/NaorY15, author = {Moni Naor and Eylon Yogev}, title = {Tight Bounds for Sliding Bloom Filters}, journal = {Algorithmica}, volume = {73}, number = {4}, pages = {652--672}, year = {2015}, url = {https://doi.org/10.1007/s00453-015-0007-9}, doi = {10.1007/S00453-015-0007-9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/NaorY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DworkNRR15, author = {Cynthia Dwork and Moni Naor and Omer Reingold and Guy N. Rothblum}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Pure Differential Privacy for Rectangle Queries via Private Partitions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {735--751}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_30}, doi = {10.1007/978-3-662-48800-3\_30}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DworkNRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorY15, author = {Moni Naor and Eylon Yogev}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Bloom Filters in Adversarial Environments}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {565--584}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_28}, doi = {10.1007/978-3-662-48000-7\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GoldbergNPRVZ15, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv}, title = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/nsec5-provably-preventing-dnssec-zone-enumeration}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GoldbergNPRVZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sagt/HubacekNU15, author = {Pavel Hub{\'{a}}cek and Moni Naor and Jonathan R. Ullman}, editor = {Martin Hoefer}, title = {When Can Limited Randomness Be Used in Repeated Games?}, booktitle = {Algorithmic Game Theory - 8th International Symposium, {SAGT} 2015, Saarbr{\"{u}}cken, Germany, September 28-30, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9347}, pages = {259--271}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48433-3\_20}, doi = {10.1007/978-3-662-48433-3\_20}, timestamp = {Fri, 26 Mar 2021 08:28:34 +0100}, biburl = {https://dblp.org/rec/conf/sagt/HubacekNU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FischFN15, author = {Ben A. Fisch and Daniel Freund and Moni Naor}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Secure Physical Computation Using Disposable Circuits}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {182--198}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_9}, doi = {10.1007/978-3-662-46494-6\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FischFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NaorZ15, author = {Moni Naor and Asaf Ziv}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Primary-Secondary-Resolver Membership Proof Systems}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {199--228}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_8}, doi = {10.1007/978-3-662-46497-7\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/NaorZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HubacekNU15, author = {Pavel Hub{\'{a}}cek and Moni Naor and Jonathan R. Ullman}, title = {When Can Limited Randomness Be Used in Repeated Games?}, journal = {CoRR}, volume = {abs/1507.01191}, year = {2015}, url = {http://arxiv.org/abs/1507.01191}, eprinttype = {arXiv}, eprint = {1507.01191}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/HubacekNU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BoyleN15, author = {Elette Boyle and Moni Naor}, title = {Is There an Oblivious {RAM} Lower Bound?}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-146}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/146}, eprinttype = {ECCC}, eprint = {TR15-146}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BoyleN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischFN15, author = {Ben Fisch and Daniel Freund and Moni Naor}, title = {Secure Physical Computation using Disposable Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2015}, url = {http://eprint.iacr.org/2015/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorY15, author = {Moni Naor and Eylon Yogev}, title = {Bloom Filters in Adversarial Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2015}, url = {http://eprint.iacr.org/2015/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleN15, author = {Elette Boyle and Moni Naor}, title = {Is There an Oblivious {RAM} Lower Bound?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2015}, url = {http://eprint.iacr.org/2015/863}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BrakerskiKN14, author = {Zvika Brakerski and Yael Tauman Kalai and Moni Naor}, title = {Fast Interactive Coding against Adversarial Noise}, journal = {J. {ACM}}, volume = {61}, number = {6}, pages = {35:1--35:30}, year = {2014}, url = {https://doi.org/10.1145/2661628}, doi = {10.1145/2661628}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BrakerskiKN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KomargodskiNY14, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Secret-Sharing for {NP}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {254--273}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_14}, doi = {10.1007/978-3-662-45608-8\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KomargodskiNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischFN14, author = {Ben Fisch and Daniel Freund and Moni Naor}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Physical Zero-Knowledge Proofs of Physical Properties}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {313--336}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_18}, doi = {10.1007/978-3-662-44381-1\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischFN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KomargodskiMNPRY14, author = {Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev}, title = {One-Way Functions and (Im)Perfect Obfuscation}, booktitle = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2014, Philadelphia, PA, USA, October 18-21, 2014}, pages = {374--383}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FOCS.2014.47}, doi = {10.1109/FOCS.2014.47}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/KomargodskiMNPRY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/innovations/2014, editor = {Moni Naor}, title = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2554797}, isbn = {978-1-4503-2698-8}, timestamp = {Fri, 14 Feb 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KomargodskiNY14, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Secret-Sharing for {NP} from Indistinguishability Obfuscation}, journal = {CoRR}, volume = {abs/1403.5698}, year = {2014}, url = {http://arxiv.org/abs/1403.5698}, eprinttype = {arXiv}, eprint = {1403.5698}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KomargodskiNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AmirKKNP14, author = {Amihood Amir and Oren Kapah and Tsvi Kopelowitz and Moni Naor and Ely Porat}, title = {The Family Holiday Gathering Problem or Fair and Periodic Scheduling of Independent Sets}, journal = {CoRR}, volume = {abs/1408.2279}, year = {2014}, url = {http://arxiv.org/abs/1408.2279}, eprinttype = {arXiv}, eprint = {1408.2279}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AmirKKNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NaorY14, author = {Moni Naor and Eylon Yogev}, title = {Bloom Filters in Adversarial Environments}, journal = {CoRR}, volume = {abs/1412.8356}, year = {2014}, url = {http://arxiv.org/abs/1412.8356}, eprinttype = {arXiv}, eprint = {1412.8356}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NaorY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiNY14, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Secret-Sharing for {NP} from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2014}, url = {http://eprint.iacr.org/2014/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiMNPRY14, author = {Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev}, title = {One-Way Functions and (Im)perfect Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2014}, url = {http://eprint.iacr.org/2014/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiMNPRY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldbergNPRVZ14, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv}, title = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2014}, url = {http://eprint.iacr.org/2014/582}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoldbergNPRVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorZ14, author = {Moni Naor and Asaf Ziv}, title = {Primary-Secondary-Resolver Membership Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {905}, year = {2014}, url = {http://eprint.iacr.org/2014/905}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/NaorY13, author = {Moni Naor and Eylon Yogev}, editor = {Leizhen Cai and Siu{-}Wing Cheng and Tak Wah Lam}, title = {Sliding Bloom Filters}, booktitle = {Algorithms and Computation - 24th International Symposium, {ISAAC} 2013, Hong Kong, China, December 16-18, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8283}, pages = {513--523}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45030-3\_48}, doi = {10.1007/978-3-642-45030-3\_48}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/NaorY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BrakerskiN13, author = {Zvika Brakerski and Moni Naor}, editor = {Sanjeev Khanna}, title = {Fast Algorithms for Interactive Coding}, booktitle = {Proceedings of the Twenty-Fourth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2013, New Orleans, Louisiana, USA, January 6-8, 2013}, pages = {443--456}, publisher = {{SIAM}}, year = {2013}, url = {https://doi.org/10.1137/1.9781611973105.32}, doi = {10.1137/1.9781611973105.32}, timestamp = {Tue, 02 Feb 2021 17:07:29 +0100}, biburl = {https://dblp.org/rec/conf/soda/BrakerskiN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BermanHKN13, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, editor = {Amit Sahai}, title = {Hardness Preserving Reductions via Cuckoo Hashing}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {40--59}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_3}, doi = {10.1007/978-3-642-36594-2\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BermanHKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-5872, author = {Moni Naor and Eylon Yogev}, title = {Sliding Bloom Filters}, journal = {CoRR}, volume = {abs/1304.5872}, year = {2013}, url = {http://arxiv.org/abs/1304.5872}, eprinttype = {arXiv}, eprint = {1304.5872}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-5872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BrakerskiN13, author = {Zvika Brakerski and Moni Naor}, title = {Fast Algorithms for Interactive Coding}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-014}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/014}, eprinttype = {ECCC}, eprint = {TR13-014}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BrakerskiN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorS12, author = {Moni Naor and Gil Segev}, title = {Public-Key Cryptosystems Resilient to Key Leakage}, journal = {{SIAM} J. Comput.}, volume = {41}, number = {4}, pages = {772--814}, year = {2012}, url = {https://doi.org/10.1137/100813464}, doi = {10.1137/100813464}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DworkNV12, author = {Cynthia Dwork and Moni Naor and Salil P. Vadhan}, title = {The Privacy of the Analyst and the Power of the State}, booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2012, New Brunswick, NJ, USA, October 20-23, 2012}, pages = {400--409}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FOCS.2012.87}, doi = {10.1109/FOCS.2012.87}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DworkNV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BermanHKN12, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness Preserving Reductions via Cuckoo Hashing}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-182}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/182}, eprinttype = {ECCC}, eprint = {TR12-182}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BermanHKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBNRSSY12, author = {Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek}, title = {Hedged Public-key Encryption: How to Protect against Bad Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2012}, url = {http://eprint.iacr.org/2012/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBNRSSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BermanHKN12, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness Preserving Reductions via Cuckoo Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2012}, url = {http://eprint.iacr.org/2012/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BermanHKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/MironovNS11, author = {Ilya Mironov and Moni Naor and Gil Segev}, title = {Sketching in Adversarial Environments}, journal = {{SIAM} J. Comput.}, volume = {40}, number = {6}, pages = {1845--1870}, year = {2011}, url = {https://doi.org/10.1137/080733772}, doi = {10.1137/080733772}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/MironovNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/HalprinN10, author = {Ran Halprin and Moni Naor}, title = {Games for extracting randomness}, journal = {{XRDS}}, volume = {17}, number = {2}, pages = {44--48}, year = {2010}, url = {https://doi.org/10.1145/1869086.1869101}, doi = {10.1145/1869086.1869101}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/HalprinN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NaorP10, author = {Moni Naor and Benny Pinkas}, title = {Efficient trace and revoke schemes}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {6}, pages = {411--424}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0121-2}, doi = {10.1007/S10207-010-0121-2}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NaorP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkN10, author = {Cynthia Dwork and Moni Naor}, title = {On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.585}, doi = {10.29012/JPC.V2I1.585}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/HarnikN10, author = {Danny Harnik and Moni Naor}, title = {On the Compressibility of \emph{NP} Instances and Cryptographic Applications}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {5}, pages = {1667--1713}, year = {2010}, url = {https://doi.org/10.1137/060668092}, doi = {10.1137/060668092}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/HarnikN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MoranN10, author = {Tal Moran and Moni Naor}, title = {Basing cryptographic protocols on tamper-evident seals}, journal = {Theor. Comput. Sci.}, volume = {411}, number = {10}, pages = {1283--1310}, year = {2010}, url = {https://doi.org/10.1016/j.tcs.2009.10.023}, doi = {10.1016/J.TCS.2009.10.023}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/MoranN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MoranN10, author = {Tal Moran and Moni Naor}, title = {Split-ballot voting: Everlasting privacy with distributed trust}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {16:1--16:43}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698756}, doi = {10.1145/1698750.1698756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MoranN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/Naor10, author = {Moni Naor}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {The privacy of tracing traitors}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {1--2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866871}, doi = {10.1145/1866870.1866871}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/Naor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenDNSWW10, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs}, editor = {Henri Gilbert}, title = {Public-Key Encryption in the Bounded-Retrieval Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {113--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_6}, doi = {10.1007/978-3-642-13190-5\_6}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenDNSWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ArbitmanNS10, author = {Yuriy Arbitman and Moni Naor and Gil Segev}, title = {Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {787--796}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.80}, doi = {10.1109/FOCS.2010.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ArbitmanNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DworkNPRY10, author = {Cynthia Dwork and Moni Naor and Toniann Pitassi and Guy N. Rothblum and Sergey Yekhanin}, editor = {Andrew Chi{-}Chih Yao}, title = {Pan-Private Streaming Algorithms}, booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings}, pages = {66--80}, publisher = {Tsinghua University Press}, year = {2010}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/6.html}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/DworkNPRY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DworkNPR10, author = {Cynthia Dwork and Moni Naor and Toniann Pitassi and Guy N. Rothblum}, editor = {Leonard J. Schulman}, title = {Differential privacy under continual observation}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {715--724}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806787}, doi = {10.1145/1806689.1806787}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DworkNPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/KaplanNR09, author = {Eyal Kaplan and Moni Naor and Omer Reingold}, title = {Derandomized Constructions of \emph{k}-Wise (Almost) Independent Permutations}, journal = {Algorithmica}, volume = {55}, number = {1}, pages = {113--133}, year = {2009}, url = {https://doi.org/10.1007/s00453-008-9267-y}, doi = {10.1007/S00453-008-9267-Y}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/KaplanNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/NaorR09, author = {Moni Naor and Guy N. Rothblum}, title = {The complexity of online memory checking}, journal = {J. {ACM}}, volume = {56}, number = {1}, pages = {2:1--2:46}, year = {2009}, url = {https://doi.org/10.1145/1462153.1462155}, doi = {10.1145/1462153.1462155}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/NaorR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/GradwohlNPR09, author = {Ronen Gradwohl and Moni Naor and Benny Pinkas and Guy N. Rothblum}, title = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles}, journal = {Theory Comput. Syst.}, volume = {44}, number = {2}, pages = {245--268}, year = {2009}, url = {https://doi.org/10.1007/s00224-008-9119-9}, doi = {10.1007/S00224-008-9119-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mst/GradwohlNPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toc/MoranNS09, author = {Tal Moran and Moni Naor and Gil Segev}, title = {Deterministic History-Independent Strategies for Storing Information on Write-Once Memories}, journal = {Theory Comput.}, volume = {5}, number = {1}, pages = {43--67}, year = {2009}, url = {https://doi.org/10.4086/toc.2009.v005a002}, doi = {10.4086/TOC.2009.V005A002}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toc/MoranNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellareBNRSSY09, author = {Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek}, editor = {Mitsuru Matsui}, title = {Hedged Public-Key Encryption: How to Protect against Bad Randomness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {232--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_14}, doi = {10.1007/978-3-642-10366-7\_14}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellareBNRSSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorS09, author = {Moni Naor and Gil Segev}, editor = {Shai Halevi}, title = {Public-Key Cryptosystems Resilient to Key Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {18--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_2}, doi = {10.1007/978-3-642-03356-8\_2}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ArbitmanNS09, author = {Yuriy Arbitman and Moni Naor and Gil Segev}, editor = {Susanne Albers and Alberto Marchetti{-}Spaccamela and Yossi Matias and Sotiris E. Nikoletseas and Wolfgang Thomas}, title = {De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results}, booktitle = {Automata, Languages and Programming, 36th International Colloquium, {ICALP} 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5555}, pages = {107--118}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02927-1\_11}, doi = {10.1007/978-3-642-02927-1\_11}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/ArbitmanNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HalprinN09, author = {Ran Halprin and Moni Naor}, editor = {Lorrie Faith Cranor}, title = {Games for extracting randomness}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572548}, doi = {10.1145/1572532.1572548}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HalprinN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DworkNRRV09, author = {Cynthia Dwork and Moni Naor and Omer Reingold and Guy N. Rothblum and Salil P. Vadhan}, editor = {Michael Mitzenmacher}, title = {On the complexity of differentially private data release: efficient algorithms and hardness results}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {381--390}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536467}, doi = {10.1145/1536414.1536467}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DworkNRRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MoranNS09, author = {Tal Moran and Moni Naor and Gil Segev}, editor = {Omer Reingold}, title = {An Optimally Fair Coin Toss}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_1}, doi = {10.1007/978-3-642-00457-5\_1}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MoranNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DworkNRV09, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum and Vinod Vaikuntanathan}, editor = {Omer Reingold}, title = {How Efficient Can Memory Checking Be?}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {503--520}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_30}, doi = {10.1007/978-3-642-00457-5\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DworkNRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-0391, author = {Yuriy Arbitman and Moni Naor and Gil Segev}, title = {De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results}, journal = {CoRR}, volume = {abs/0903.0391}, year = {2009}, url = {http://arxiv.org/abs/0903.0391}, eprinttype = {arXiv}, eprint = {0903.0391}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-0391.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-5424, author = {Yuriy Arbitman and Moni Naor and Gil Segev}, title = {Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation}, journal = {CoRR}, volume = {abs/0912.5424}, year = {2009}, url = {http://arxiv.org/abs/0912.5424}, eprinttype = {arXiv}, eprint = {0912.5424}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-5424.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorS09, author = {Moni Naor and Gil Segev}, title = {Public-Key Cryptosystems Resilient to Key Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2009}, url = {http://eprint.iacr.org/2009/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoranNS09, author = {Tal Moran and Moni Naor and Gil Segev}, title = {An Optimally Fair Coin Toss}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2009}, url = {http://eprint.iacr.org/2009/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoranNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenDNSWW09, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs}, title = {Public-Key Encryption in the Bounded-Retrieval Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2009}, url = {http://eprint.iacr.org/2009/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenDNSWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/NaorSS08, author = {Moni Naor and Gil Segev and Adam D. Smith}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2408--2425}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921691}, doi = {10.1109/TIT.2008.921691}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/NaorSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BonehN08, author = {Dan Boneh and Moni Naor}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Traitor tracing with constant size ciphertext}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {501--510}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455834}, doi = {10.1145/1455770.1455834}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BonehN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/NaorSW08, author = {Moni Naor and Gil Segev and Udi Wieder}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {History-Independent Cuckoo Hashing}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {631--642}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_51}, doi = {10.1007/978-3-540-70583-3\_51}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/NaorSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/BabaioffBNS08, author = {Moshe Babaioff and Liad Blumrosen and Moni Naor and Michael Schapira}, editor = {Lance Fortnow and John Riedl and Tuomas Sandholm}, title = {Informational overhead of incentive compatibility}, booktitle = {Proceedings 9th {ACM} Conference on Electronic Commerce (EC-2008), Chicago, IL, USA, June 8-12, 2008}, pages = {88--97}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1386790.1386807}, doi = {10.1145/1386790.1386807}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/BabaioffBNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KolN08, author = {Gillat Kol and Moni Naor}, editor = {Cynthia Dwork}, title = {Games for exchanging information}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {423--432}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374437}, doi = {10.1145/1374376.1374437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KolN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/MironovNS08, author = {Ilya Mironov and Moni Naor and Gil Segev}, editor = {Cynthia Dwork}, title = {Sketching in adversarial environments}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {651--660}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374471}, doi = {10.1145/1374376.1374471}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/MironovNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KolN08, author = {Gillat Kol and Moni Naor}, editor = {Ran Canetti}, title = {Cryptography and Game Theory: Designing Protocols for Exchanging Information}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {320--339}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_18}, doi = {10.1007/978-3-540-78524-8\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KolN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorSW08, author = {Moni Naor and Gil Segev and Udi Wieder}, title = {History-Independent Cuckoo Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2008}, url = {http://eprint.iacr.org/2008/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DworkN07, author = {Cynthia Dwork and Moni Naor}, title = {Zaps and Their Applications}, journal = {{SIAM} J. Comput.}, volume = {36}, number = {6}, pages = {1513--1543}, year = {2007}, url = {https://doi.org/10.1137/S0097539703426817}, doi = {10.1137/S0097539703426817}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DworkN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/NaorW07, author = {Moni Naor and Udi Wieder}, title = {Novel architectures for {P2P} applications: The continuous-discrete approach}, journal = {{ACM} Trans. Algorithms}, volume = {3}, number = {3}, pages = {34}, year = {2007}, url = {https://doi.org/10.1145/1273340.1273350}, doi = {10.1145/1273340.1273350}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/NaorW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/NaorN07, author = {Moni Naor and Asaf Nussboim}, editor = {Moses Charikar and Klaus Jansen and Omer Reingold and Jos{\'{e}} D. P. Rolim}, title = {Implementing Huge Sparse Random Graphs}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 10th International Workshop, {APPROX} 2007, and 11th International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August 20-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4627}, pages = {596--608}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74208-1\_43}, doi = {10.1007/978-3-540-74208-1\_43}, timestamp = {Sat, 30 Sep 2023 09:34:32 +0200}, biburl = {https://dblp.org/rec/conf/approx/NaorN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoranN07, author = {Tal Moran and Moni Naor}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Split-ballot voting: everlasting privacy with distributed trust}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {246--255}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315277}, doi = {10.1145/1315245.1315277}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoranN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/GradwohlNPR07, author = {Ronen Gradwohl and Moni Naor and Benny Pinkas and Guy N. Rothblum}, editor = {Pierluigi Crescenzi and Giuseppe Prencipe and Geppino Pucci}, title = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles}, booktitle = {Fun with Algorithms, 4th International Conference, {FUN} 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4475}, pages = {166--182}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72914-3\_16}, doi = {10.1007/978-3-540-72914-3\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/fun/GradwohlNPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/MoranNS07, author = {Tal Moran and Moni Naor and Gil Segev}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Deterministic History-Independent Strategies for Storing Information on Write-Once Memories}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {303--315}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_28}, doi = {10.1007/978-3-540-73420-8\_28}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/MoranNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2007, editor = {Moni Naor}, title = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4}, doi = {10.1007/978-3-540-72540-4}, isbn = {978-3-540-72539-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoranNS07, author = {Tal Moran and Moni Naor and Gil Segev}, title = {Deterministic History-Independent Strategies for Storing Information on Write-Once Memories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2007}, url = {http://eprint.iacr.org/2007/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoranNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HarnikNRR06, author = {Danny Harnik and Moni Naor and Omer Reingold and Alon Rosen}, title = {Completeness in Two-Party Secure Computation: {A} Computational View}, journal = {J. Cryptol.}, volume = {19}, number = {4}, pages = {521--552}, year = {2006}, url = {https://doi.org/10.1007/s00145-006-0346-4}, doi = {10.1007/S00145-006-0346-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HarnikNRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorP06, author = {Moni Naor and Benny Pinkas}, title = {Oblivious Polynomial Evaluation}, journal = {{SIAM} J. Comput.}, volume = {35}, number = {5}, pages = {1254--1281}, year = {2006}, url = {https://doi.org/10.1137/S0097539704383633}, doi = {10.1137/S0097539704383633}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorSS06, author = {Moni Naor and Gil Segev and Adam D. Smith}, editor = {Cynthia Dwork}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {214--231}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_13}, doi = {10.1007/11818175\_13}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MoranN06, author = {Tal Moran and Moni Naor}, editor = {Cynthia Dwork}, title = {Receipt-Free Universally-Verifiable Voting with Everlasting Privacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {373--392}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_22}, doi = {10.1007/11818175\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MoranN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MoranN06, author = {Tal Moran and Moni Naor}, editor = {Serge Vaudenay}, title = {Polling with Physical Envelopes: {A} Rigorous Analysis of a Human-Centric Protocol}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {88--108}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_7}, doi = {10.1007/11761679\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MoranN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DworkKMMN06, author = {Cynthia Dwork and Krishnaram Kenthapadi and Frank McSherry and Ilya Mironov and Moni Naor}, editor = {Serge Vaudenay}, title = {Our Data, Ourselves: Privacy Via Distributed Noise Generation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {486--503}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_29}, doi = {10.1007/11761679\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DworkKMMN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/HarnikN06, author = {Danny Harnik and Moni Naor}, title = {On the Compressibility of {NP} Instances and Cryptographic Applications}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {719--728}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.54}, doi = {10.1109/FOCS.2006.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/HarnikN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HarnikN06, author = {Danny Harnik and Moni Naor}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {On Everlasting Security in the \emph{Hybrid} Bounded Storage Model}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {192--203}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_17}, doi = {10.1007/11787006\_17}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HarnikN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/NaorR06, author = {Moni Naor and Guy N. Rothblum}, editor = {William W. Cohen and Andrew W. Moore}, title = {Learning to impersonate}, booktitle = {Machine Learning, Proceedings of the Twenty-Third International Conference {(ICML} 2006), Pittsburgh, Pennsylvania, USA, June 25-29, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {148}, pages = {649--656}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143844.1143926}, doi = {10.1145/1143844.1143926}, timestamp = {Tue, 19 Nov 2019 09:25:06 +0100}, biburl = {https://dblp.org/rec/conf/icml/NaorR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR06-002, author = {Eyal Kaplan and Moni Naor and Omer Reingold}, title = {Derandomized Constructions of k-Wise (Almost) Independent Permutations}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR06-002}}, year = {2006}, url = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-002/index.html}, eprinttype = {ECCC}, eprint = {TR06-002}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR06-002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HarnikN06, author = {Danny Harnik and Moni Naor}, title = {On the Compressibility of {NP} Instances and Cryptographic Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR06-022}}, year = {2006}, url = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-022/index.html}, eprinttype = {ECCC}, eprint = {TR06-022}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HarnikN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/NaorR06, author = {Moni Naor and Guy N. Rothblum}, title = {The Complexity of Online Memory Checking}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR06-034}}, year = {2006}, url = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-034/index.html}, eprinttype = {ECCC}, eprint = {TR06-034}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/NaorR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorR06, author = {Moni Naor and Guy N. Rothblum}, title = {The Complexity of Online Memory Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2006}, url = {http://eprint.iacr.org/2006/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorSS06, author = {Moni Naor and Gil Segev and Adam D. Smith}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2006}, url = {http://eprint.iacr.org/2006/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/NaorW05, author = {Moni Naor and Udi Wieder}, title = {Scalable and dynamic quorum systems}, journal = {Distributed Comput.}, volume = {17}, number = {4}, pages = {311--322}, year = {2005}, url = {https://doi.org/10.1007/s00446-004-0114-3}, doi = {10.1007/S00446-004-0114-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/NaorW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/Naor05, author = {Moni Naor}, title = {On fairness in the carpool problem}, journal = {J. Algorithms}, volume = {55}, number = {1}, pages = {93--98}, year = {2005}, url = {https://doi.org/10.1016/j.jalgor.2004.05.001}, doi = {10.1016/J.JALGOR.2004.05.001}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/Naor05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorP05, author = {Moni Naor and Benny Pinkas}, title = {Computationally Secure Oblivious Transfer}, journal = {J. Cryptol.}, volume = {18}, number = {1}, pages = {1--35}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0102-6}, doi = {10.1007/S00145-004-0102-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/KaplanNR05, author = {Eyal Kaplan and Moni Naor and Omer Reingold}, editor = {Chandra Chekuri and Klaus Jansen and Jos{\'{e}} D. P. Rolim and Luca Trevisan}, title = {Derandomized Constructions of k-Wise (Almost) Independent Permutations}, booktitle = {Approximation, Randomization and Combinatorial Optimization, Algorithms and Techniques, 8th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2005 and 9th InternationalWorkshop on Randomization and Computation, {RANDOM} 2005, Berkeley, CA, USA, August 22-24, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3624}, pages = {354--365}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11538462\_30}, doi = {10.1007/11538462\_30}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/KaplanNR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkNW05, author = {Cynthia Dwork and Moni Naor and Hoeteck Wee}, editor = {Victor Shoup}, title = {Pebbling and Proofs of Work}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {37--54}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_3}, doi = {10.1007/11535218\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkNW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarnikKNRR05, author = {Danny Harnik and Joe Kilian and Moni Naor and Omer Reingold and Alon Rosen}, editor = {Ronald Cramer}, title = {On Robust Combiners for Oblivious Transfer and Other Primitives}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {96--113}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_6}, doi = {10.1007/11426639\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarnikKNRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorR05, author = {Moni Naor and Guy N. Rothblum}, title = {The Complexity of Online Memory Checking}, booktitle = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings}, pages = {573--584}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SFCS.2005.71}, doi = {10.1109/SFCS.2005.71}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/MoranN05, author = {Tal Moran and Moni Naor}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Basing Cryptographic Protocols on Tamper-Evident Seals}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {285--297}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_24}, doi = {10.1007/11523468\_24}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/MoranN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/NaorNT05, author = {Moni Naor and Asaf Nussboim and Eran Tromer}, editor = {Joe Kilian}, title = {Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {66--85}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_5}, doi = {10.1007/978-3-540-30576-7\_5}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/NaorNT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/NadavN05, author = {Uri Nadav and Moni Naor}, editor = {Pierre Fraigniaud}, title = {The Dynamic And-Or Quorum System}, booktitle = {Distributed Computing, 19th International Conference, {DISC} 2005, Cracow, Poland, September 26-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3724}, pages = {472--486}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11561927\_34}, doi = {10.1007/11561927\_34}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/NadavN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/NaorR04, author = {Moni Naor and Omer Reingold}, title = {Number-theoretic constructions of efficient pseudo-random functions}, journal = {J. {ACM}}, volume = {51}, number = {2}, pages = {231--262}, year = {2004}, url = {https://doi.org/10.1145/972639.972643}, doi = {10.1145/972639.972643}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/NaorR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DworkNS04, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, title = {Concurrent zero-knowledge}, journal = {J. {ACM}}, volume = {51}, number = {6}, pages = {851--898}, year = {2004}, url = {https://doi.org/10.1145/1039488.1039489}, doi = {10.1145/1039488.1039489}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/DworkNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DworkNR04, author = {Cynthia Dwork and Moni Naor and Omer Reingold}, editor = {Christian Cachin and Jan Camenisch}, title = {Immunizing Encryption Schemes from Decryption Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {342--360}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_21}, doi = {10.1007/978-3-540-24676-3\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DworkNR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/NaorW04, author = {Moni Naor and Udi Wieder}, editor = {Geoffrey M. Voelker and Scott Shenker}, title = {Know Thy Neighbor's Neighbor: Better Routing for Skip-Graphs and Small Worlds}, booktitle = {Peer-to-Peer Systems III, Third International Workshop, {IPTPS} 2004, La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3279}, pages = {269--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30183-7\_26}, doi = {10.1007/978-3-540-30183-7\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/NaorW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/MankuNW04, author = {Gurmeet Singh Manku and Moni Naor and Udi Wieder}, editor = {L{\'{a}}szl{\'{o}} Babai}, title = {Know thy neighbor's neighbor: the power of lookahead in randomized {P2P} networks}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004}, pages = {54--63}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007352.1007368}, doi = {10.1145/1007352.1007368}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/MankuNW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/HarnikNRR04, author = {Danny Harnik and Moni Naor and Omer Reingold and Alon Rosen}, editor = {L{\'{a}}szl{\'{o}} Babai}, title = {Completeness in two-party secure computation: a computational view}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004}, pages = {252--261}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007352.1007395}, doi = {10.1145/1007352.1007395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/HarnikNRR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/NadavN04, author = {Uri Nadav and Moni Naor}, editor = {Rachid Guerraoui}, title = {Fault-Tolerant Storage in a Dynamic Environment}, booktitle = {Distributed Computing, 18th International Conference, {DISC} 2004, Amsterdam, The Netherlands, October 4-7, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3274}, pages = {390--404}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30186-8\_28}, doi = {10.1007/978-3-540-30186-8\_28}, timestamp = {Wed, 07 Dec 2022 23:11:11 +0100}, biburl = {https://dblp.org/rec/conf/wdag/NadavN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2004, editor = {Moni Naor}, title = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95566}, doi = {10.1007/B95566}, isbn = {3-540-21000-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/NaorN03, author = {Dalit Naor and Moni Naor}, title = {Protecting Cryptographic Keys: The Trace-and-Revoke Approach}, journal = {Computer}, volume = {36}, number = {7}, pages = {47--53}, year = {2003}, url = {https://doi.org/10.1109/MC.2003.1212690}, doi = {10.1109/MC.2003.1212690}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/NaorN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DworkNRS03, author = {Cynthia Dwork and Moni Naor and Omer Reingold and Larry J. Stockmeyer}, title = {Magic Functions}, journal = {J. {ACM}}, volume = {50}, number = {6}, pages = {852--921}, year = {2003}, url = {https://doi.org/10.1145/950620.950623}, doi = {10.1145/950620.950623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/DworkNRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/FaginLN03, author = {Ronald Fagin and Amnon Lotem and Moni Naor}, title = {Optimal aggregation algorithms for middleware}, journal = {J. Comput. Syst. Sci.}, volume = {66}, number = {4}, pages = {614--656}, year = {2003}, url = {https://doi.org/10.1016/S0022-0000(03)00026-6}, doi = {10.1016/S0022-0000(03)00026-6}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/FaginLN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamrev/DolevDN03, author = {Danny Dolev and Cynthia Dwork and Moni Naor}, title = {Nonmalleable Cryptography}, journal = {{SIAM} Rev.}, volume = {45}, number = {4}, pages = {727--784}, year = {2003}, url = {https://doi.org/10.1137/S0036144503429856}, doi = {10.1137/S0036144503429856}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamrev/DolevDN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Naor03, author = {Moni Naor}, editor = {Dan Boneh}, title = {On Cryptographic Assumptions and Challenges}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {96--109}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_6}, doi = {10.1007/978-3-540-45146-4\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Naor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkGN03, author = {Cynthia Dwork and Andrew V. Goldberg and Moni Naor}, editor = {Dan Boneh}, title = {On Memory-Bound Functions for Fighting Spam}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {426--444}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_25}, doi = {10.1007/978-3-540-45146-4\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkGN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/Naor03, author = {Moni Naor}, editor = {Paritosh K. Pandya and Jaikumar Radhakrishnan}, title = {Moderately Hard Functions: From Complexity to Spam Fighting}, booktitle = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2914}, pages = {434--442}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24597-1\_37}, doi = {10.1007/978-3-540-24597-1\_37}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/Naor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iptps/NaorW03, author = {Moni Naor and Udi Wieder}, editor = {M. Frans Kaashoek and Ion Stoica}, title = {A Simple Fault Tolerant Distributed Hash Table}, booktitle = {Peer-to-Peer Systems II, Second International Workshop, {IPTPS} 2003, Berkeley, CA, USA, February 21-22,2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2735}, pages = {88--97}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45172-3\_8}, doi = {10.1007/978-3-540-45172-3\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/iptps/NaorW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/NaorW03, author = {Moni Naor and Udi Wieder}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Scalable and dynamic quorum systems}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {114--122}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872052}, doi = {10.1145/872035.872052}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/NaorW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/NaorW03, author = {Moni Naor and Udi Wieder}, editor = {Arnold L. Rosenberg and Friedhelm Meyer auf der Heide}, title = {Novel architectures for {P2P} applications: the continuous-discrete approach}, booktitle = {{SPAA} 2003: Proceedings of the Fifteenth Annual {ACM} Symposium on Parallelism in Algorithms and Architectures, June 7-9, 2003, San Diego, California, {USA} (part of {FCRC} 2003)}, pages = {50--59}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/777412.777421}, doi = {10.1145/777412.777421}, timestamp = {Wed, 21 Nov 2018 11:11:22 +0100}, biburl = {https://dblp.org/rec/conf/spaa/NaorW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR03-060, author = {Danny Harnik and Moni Naor and Omer Reingold and Alon Rosen}, title = {Completeness in Two-Party Secure Computation - {A} Computational View}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR03-060}}, year = {2003}, url = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-060/index.html}, eprinttype = {ECCC}, eprint = {TR03-060}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR03-060.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorR02, author = {Moni Naor and Omer Reingold}, title = {Constructing Pseudo-Random Permutations with a Prescribed Structure}, journal = {J. Cryptol.}, volume = {15}, number = {2}, pages = {97--102}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0008-5}, doi = {10.1007/S00145-001-0008-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorRR02, author = {Moni Naor and Omer Reingold and Alon Rosen}, title = {Pseudorandom Functions and Factoring}, journal = {{SIAM} J. Comput.}, volume = {31}, number = {5}, pages = {1383--1404}, year = {2002}, url = {https://doi.org/10.1137/S0097539701389257}, doi = {10.1137/S0097539701389257}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorRR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Naor02, author = {Moni Naor}, editor = {Moti Yung}, title = {Deniable Ring Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {481--498}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_31}, doi = {10.1007/3-540-45708-9\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Naor02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/MalkhiNR02, author = {Dahlia Malkhi and Moni Naor and David Ratajczak}, editor = {Aleta Ricciardi}, title = {Viceroy: a scalable and dynamic emulation of the butterfly}, booktitle = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2002, Monterey, California, USA, July 21-24, 2002}, pages = {183--192}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/571825.571857}, doi = {10.1145/571825.571857}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/MalkhiNR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-DB-0204046, author = {Ronald Fagin and Amnon Lotem and Moni Naor}, title = {Optimal Aggregation Algorithms for Middleware}, journal = {CoRR}, volume = {cs.DB/0204046}, year = {2002}, url = {https://arxiv.org/abs/cs/0204046}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-DB-0204046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR02-001, author = {Cynthia Dwork and Moni Naor}, title = {Zaps and Their Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR02-001}}, year = {2002}, url = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-001/index.html}, eprinttype = {ECCC}, eprint = {TR02-001}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR02-001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR02-043, author = {Dalit Naor and Moni Naor and Jeffery Lotspiech}, title = {Revocation and Tracing Schemes for Stateless Receivers}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR02-043}}, year = {2002}, url = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-043/index.html}, eprinttype = {ECCC}, eprint = {TR02-043}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR02-043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichLN02, author = {Oded Goldreich and Yoad Lustig and Moni Naor}, title = {On Chosen Ciphertext Security of Multiple Encryptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2002}, url = {http://eprint.iacr.org/2002/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichLN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/NaorR01, author = {Moni Naor and Sitvanit Ruah}, title = {On the Decisional Complexity of Problems Over the Reals}, journal = {Inf. Comput.}, volume = {167}, number = {1}, pages = {27--45}, year = {2001}, url = {https://doi.org/10.1006/inco.2000.3012}, doi = {10.1006/INCO.2000.3012}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/NaorR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorNL01, author = {Dalit Naor and Moni Naor and Jeffery Lotspiech}, editor = {Joe Kilian}, title = {Revocation and Tracing Schemes for Stateless Receivers}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {41--62}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_3}, doi = {10.1007/3-540-44647-8\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorNL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/FaginLN01, author = {Ronald Fagin and Amnon Lotem and Moni Naor}, editor = {Peter Buneman}, title = {Optimal Aggregation Algorithms for Middleware}, booktitle = {Proceedings of the Twentieth {ACM} {SIGACT-SIGMOD-SIGART} Symposium on Principles of Database Systems, May 21-23, 2001, Santa Barbara, California, {USA}}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/375551.375567}, doi = {10.1145/375551.375567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/FaginLN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/NaorP01, author = {Moni Naor and Benny Pinkas}, editor = {S. Rao Kosaraju}, title = {Efficient oblivious transfer protocols}, booktitle = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, January 7-9, 2001, Washington, DC, {USA}}, pages = {448--457}, publisher = {{ACM/SIAM}}, year = {2001}, url = {http://dl.acm.org/citation.cfm?id=365411.365502}, timestamp = {Fri, 07 Dec 2012 17:02:08 +0100}, biburl = {https://dblp.org/rec/conf/soda/NaorP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/NaorR01a, author = {Moni Naor and Omer Reingold}, editor = {S. Rao Kosaraju}, title = {Constructing pseudo-random permutations with a prescribed structure}, booktitle = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, January 7-9, 2001, Washington, DC, {USA}}, pages = {458--459}, publisher = {{ACM/SIAM}}, year = {2001}, url = {http://dl.acm.org/citation.cfm?id=365411.365505}, timestamp = {Fri, 07 Dec 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soda/NaorR01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorT01, author = {Moni Naor and Vanessa Teague}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {Anti-presistence: history independent data structures}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {492--501}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380844}, doi = {10.1145/380752.380844}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorN01, author = {Moni Naor and Kobbi Nissim}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {Communication preserving protocols for secure function evaluation}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {590--599}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380855}, doi = {10.1145/380752.380855}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/DworkKNS01, author = {Cynthia Dwork and Ravi Kumar and Moni Naor and D. Sivakumar}, editor = {Vincent Y. Shen and Nobuo Saito and Michael R. Lyu and Mary Ellen Zurko}, title = {Rank aggregation methods for the Web}, booktitle = {Proceedings of the Tenth International World Wide Web Conference, {WWW} 10, Hong Kong, China, May 1-5, 2001}, pages = {613--622}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/371920.372165}, doi = {10.1145/371920.372165}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/DworkKNS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0109011, author = {Moni Naor and Kobbi Nissim}, title = {Communication Complexity and Secure Function Evaluation}, journal = {CoRR}, volume = {cs.CR/0109011}, year = {2001}, url = {https://arxiv.org/abs/cs/0109011}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0109011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR01-062, author = {Moni Naor and Kobbi Nissim}, title = {Communication Complexity and Secure Function Evaluation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR01-062}}, year = {2001}, url = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-062/index.html}, eprinttype = {ECCC}, eprint = {TR01-062}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR01-062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR01-064, author = {Moni Naor and Omer Reingold and Alon Rosen}, title = {Pseudo-Random Functions and Factoring}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR01-064}}, year = {2001}, url = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-064/index.html}, eprinttype = {ECCC}, eprint = {TR01-064}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR01-064.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorT01, author = {Moni Naor and Vanessa Teague}, title = {Anti-persistence: History Independent Data Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2001}, url = {http://eprint.iacr.org/2001/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorNB01, author = {Dalit Naor and Moni Naor and Jeffrey B. Lotspiech}, title = {Revocation and Tracing Schemes for Stateless Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2001}, url = {http://eprint.iacr.org/2001/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorNB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorRR01, author = {Moni Naor and Omer Reingold and Alon Rosen}, title = {Pseudo-Random Functions and Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2001}, url = {http://eprint.iacr.org/2001/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorN01, author = {Moni Naor and Kobbi Nissim}, title = {Communication Complexity and Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2001}, url = {http://eprint.iacr.org/2001/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSN00, author = {Carlo Blundo and Alfredo De Santis and Moni Naor}, title = {Visual cryptography for grey level images}, journal = {Inf. Process. Lett.}, volume = {75}, number = {6}, pages = {255--259}, year = {2000}, url = {https://doi.org/10.1016/S0020-0190(00)00108-3}, doi = {10.1016/S0020-0190(00)00108-3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/NaorN00, author = {Moni Naor and Kobbi Nissim}, title = {Certificate revocation and certificate update}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {18}, number = {4}, pages = {561--570}, year = {2000}, url = {https://doi.org/10.1109/49.839932}, doi = {10.1109/49.839932}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/NaorN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DolevDN00, author = {Danny Dolev and Cynthia Dwork and Moni Naor}, title = {Nonmalleable Cryptography}, journal = {{SIAM} J. Comput.}, volume = {30}, number = {2}, pages = {391--437}, year = {2000}, url = {https://doi.org/10.1137/S0097539795291562}, doi = {10.1137/S0097539795291562}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/DolevDN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ChorFNP00, author = {Benny Chor and Amos Fiat and Moni Naor and Benny Pinkas}, title = {Tracing traitors}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {893--910}, year = {2000}, url = {https://doi.org/10.1109/18.841169}, doi = {10.1109/18.841169}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ChorFNP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaorP00, author = {Moni Naor and Benny Pinkas}, editor = {Tatsuaki Okamoto}, title = {Distributed Oblivious Transfer}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {205--219}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_16}, doi = {10.1007/3-540-44448-3\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaorP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehN00, author = {Dan Boneh and Moni Naor}, editor = {Mihir Bellare}, title = {Timed Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {236--254}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_15}, doi = {10.1007/3-540-44598-6\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NaorP00, author = {Moni Naor and Benny Pinkas}, editor = {Yair Frankel}, title = {Efficient Trace and Revoke Schemes}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {1--20}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_1}, doi = {10.1007/3-540-45472-1\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/NaorP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DworkN00, author = {Cynthia Dwork and Moni Naor}, title = {Zaps and Their Applications}, booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000, 12-14 November 2000, Redondo Beach, California, {USA}}, pages = {283--293}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SFCS.2000.892117}, doi = {10.1109/SFCS.2000.892117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DworkN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorRR00, author = {Moni Naor and Omer Reingold and Alon Rosen}, editor = {F. Frances Yao and Eugene M. Luks}, title = {Pseudo-random functions and factoring (extended abstract)}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {11--20}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335307}, doi = {10.1145/335305.335307}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorRR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorR00, author = {Moni Naor and Omer Reingold}, title = {Constructing Pseudo-Random Permutations with a Prescribed Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2000}, url = {http://eprint.iacr.org/2000/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/NaorR99, author = {Moni Naor and Omer Reingold}, title = {Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions}, journal = {J. Comput. Syst. Sci.}, volume = {58}, number = {2}, pages = {336--375}, year = {1999}, url = {https://doi.org/10.1006/jcss.1998.1618}, doi = {10.1006/JCSS.1998.1618}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/NaorR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorR99, author = {Moni Naor and Omer Reingold}, title = {On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited}, journal = {J. Cryptol.}, volume = {12}, number = {1}, pages = {29--66}, year = {1999}, url = {https://doi.org/10.1007/PL00003817}, doi = {10.1007/PL00003817}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FiatN99, author = {Amos Fiat and Moni Naor}, title = {Rigorous Time/Space Trade-offs for Inverting Functions}, journal = {{SIAM} J. Comput.}, volume = {29}, number = {3}, pages = {790--803}, year = {1999}, url = {https://doi.org/10.1137/S0097539795280512}, doi = {10.1137/S0097539795280512}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FiatN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP99, author = {Moni Naor and Benny Pinkas}, editor = {Michael J. Wiener}, title = {Oblivious Transfer with Adaptive Queries}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {573--590}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_36}, doi = {10.1007/3-540-48405-1\_36}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaorPR99, author = {Moni Naor and Benny Pinkas and Omer Reingold}, editor = {Jacques Stern}, title = {Distributed Pseudo-random Functions and KDCs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {327--346}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_23}, doi = {10.1007/3-540-48910-X\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaorPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DworkNRS99, author = {Cynthia Dwork and Moni Naor and Omer Reingold and Larry J. Stockmeyer}, title = {Magic Functions}, booktitle = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99, 17-18 October, 1999, New York, NY, {USA}}, pages = {523--534}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SFFCS.1999.814626}, doi = {10.1109/SFFCS.1999.814626}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DworkNRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CanettiGIMNP99, author = {Ran Canetti and Juan A. Garay and Gene Itkis and Daniele Micciancio and Moni Naor and Benny Pinkas}, title = {Multicast Security: {A} Taxonomy and Some Efficient Constructions}, booktitle = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications, Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999}, pages = {708--716}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/INFCOM.1999.751457}, doi = {10.1109/INFCOM.1999.751457}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/CanettiGIMNP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/NaorPS99, author = {Moni Naor and Benny Pinkas and Reuban Sumner}, editor = {Stuart I. Feldman and Michael P. Wellman}, title = {Privacy preserving auctions and mechanism design}, booktitle = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999}, pages = {129--139}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/336992.337028}, doi = {10.1145/336992.337028}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/NaorPS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BlazeFN99, author = {Matt Blaze and Joan Feigenbaum and Moni Naor}, editor = {Robert Endre Tarjan and Tandy J. Warnow}, title = {A Formal Treatment of Remotely Keyed Encryption}, booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 17-19 January 1999, Baltimore, Maryland, {USA}}, pages = {868--869}, publisher = {{ACM/SIAM}}, year = {1999}, url = {http://dl.acm.org/citation.cfm?id=314500.315056}, timestamp = {Thu, 05 Jul 2018 07:29:57 +0200}, biburl = {https://dblp.org/rec/conf/soda/BlazeFN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorP99, author = {Moni Naor and Benny Pinkas}, editor = {Jeffrey Scott Vitter and Lawrence L. Larmore and Frank Thomson Leighton}, title = {Oblivious Transfer and Polynomial Evaluation}, booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, {USA}}, pages = {245--254}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301250.301312}, doi = {10.1145/301250.301312}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DworkNS99, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, title = {Concurrent Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {1999}, url = {http://eprint.iacr.org/1999/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DworkNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NaorP98, author = {Moni Naor and Benny Pinkas}, title = {Secure Accounting and Auditing on the Web}, journal = {Comput. Networks}, volume = {30}, number = {1-7}, pages = {541--550}, year = {1998}, url = {https://doi.org/10.1016/S0169-7552(98)00116-0}, doi = {10.1016/S0169-7552(98)00116-0}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NaorP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/AjtaiANRSW98, author = {Mikl{\'{o}}s Ajtai and James Aspnes and Moni Naor and Yuval Rabani and Leonard J. Schulman and Orli Waarts}, title = {Fairness in Scheduling}, journal = {J. Algorithms}, volume = {29}, number = {2}, pages = {306--357}, year = {1998}, url = {https://doi.org/10.1006/jagm.1998.0953}, doi = {10.1006/JAGM.1998.0953}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jal/AjtaiANRSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NaorOVY98, author = {Moni Naor and Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, title = {Perfect Zero-Knowledge Arguments for \emph{NP} Using Any One-Way Permutation}, journal = {J. Cryptol.}, volume = {11}, number = {2}, pages = {87--108}, year = {1998}, url = {https://doi.org/10.1007/s001459900037}, doi = {10.1007/S001459900037}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NaorOVY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DworkN98, author = {Cynthia Dwork and Moni Naor}, title = {An Efficient Existentially Unforgeable Signature Scheme and Its Applications}, journal = {J. Cryptol.}, volume = {11}, number = {3}, pages = {187--208}, year = {1998}, url = {https://doi.org/10.1007/s001459900043}, doi = {10.1007/S001459900043}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DworkN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorW98, author = {Moni Naor and Avishai Wool}, title = {The Load, Capacity, and Availability of Quorum Systems}, journal = {{SIAM} J. Comput.}, volume = {27}, number = {2}, pages = {423--447}, year = {1998}, url = {https://doi.org/10.1137/S0097539795281232}, doi = {10.1137/S0097539795281232}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/NaorW98, author = {Moni Naor and Avishai Wool}, title = {Access Control and Signatures via Quorum Secret Sharing}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {9}, number = {9}, pages = {909--922}, year = {1998}, url = {https://doi.org/10.1109/71.722223}, doi = {10.1109/71.722223}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/NaorW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorR98, author = {Moni Naor and Omer Reingold}, editor = {Hugo Krawczyk}, title = {From Unpredictability to Indistinguishability: {A} Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {267--282}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055734}, doi = {10.1007/BFB0055734}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP98, author = {Moni Naor and Benny Pinkas}, editor = {Hugo Krawczyk}, title = {Threshold Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {502--517}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055750}, doi = {10.1007/BFB0055750}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlazeFN98, author = {Matt Blaze and Joan Feigenbaum and Moni Naor}, editor = {Kaisa Nyberg}, title = {A Formal Treatment of Remotely Keyed Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {251--265}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054131}, doi = {10.1007/BFB0054131}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlazeFN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaorP98, author = {Moni Naor and Benny Pinkas}, editor = {Kaisa Nyberg}, title = {Secure and Efficient Metering}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {576--590}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054155}, doi = {10.1007/BFB0054155}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaorP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DworkNS98, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, editor = {Jeffrey Scott Vitter}, title = {Concurrent Zero-Knowledge}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {409--418}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276853}, doi = {10.1145/276698.276853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DworkNS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NissimN98, author = {Kobbi Nissim and Moni Naor}, editor = {Aviel D. Rubin}, title = {Certificate Revocation and Certificate Update}, booktitle = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX, USA, January 26-29, 1998}, publisher = {{USENIX} Association}, year = {1998}, url = {https://www.usenix.org/conference/7th-usenix-security-symposium/certificate-revocation-and-certificate-update}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/NissimN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChorGN98, author = {Benny Chor and Niv Gilboa and Moni Naor}, title = {Private Information Retrieval by Keywords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {1998}, url = {http://eprint.iacr.org/1998/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChorGN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiDNO97, author = {Ran Canetti and Cynthia Dwork and Moni Naor and Rafail Ostrovsky}, editor = {Burton S. Kaliski Jr.}, title = {Deniable Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {90--104}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052229}, doi = {10.1007/BFB0052229}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiDNO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorP97, author = {Moni Naor and Benny Pinkas}, editor = {Burton S. Kaliski Jr.}, title = {Visual Authentication and Identification}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {322--336}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052245}, doi = {10.1007/BFB0052245}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BellareIN97, author = {Mihir Bellare and Russell Impagliazzo and Moni Naor}, title = {Does Parallel Repetition Lower the Error in Computationally Sound Protocols?}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {374--383}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646126}, doi = {10.1109/SFCS.1997.646126}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BellareIN97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorR97, author = {Moni Naor and Omer Reingold}, title = {Number-theoretic Constructions of Efficient Pseudo-random Functions}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {458--467}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646134}, doi = {10.1109/SFCS.1997.646134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorR97, author = {Moni Naor and Omer Reingold}, editor = {Frank Thomson Leighton and Peter W. Shor}, title = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract)}, booktitle = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997}, pages = {189--199}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/258533.258581}, doi = {10.1145/258533.258581}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR97-005, author = {Moni Naor and Omer Reingold}, title = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR97-005}}, year = {1997}, url = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-005/index.html}, eprinttype = {ECCC}, eprint = {TR97-005}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR97-005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorP97, author = {Moni Naor and Benny Pinkas}, title = {Visual Authentication and Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1997}, url = {http://eprint.iacr.org/1997/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/AlonN96, author = {Noga Alon and Moni Naor}, title = {Derandomization, Witnesses for Boolean Matrix Multiplication and Construction of Perfect Hash Functions}, journal = {Algorithmica}, volume = {16}, number = {4/5}, pages = {434--449}, year = {1996}, url = {https://doi.org/10.1007/BF01940874}, doi = {10.1007/BF01940874}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/AlonN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/FaginNW96, author = {Ronald Fagin and Moni Naor and Peter Winkler}, title = {Comparing Information Without Leaking It}, journal = {Commun. {ACM}}, volume = {39}, number = {5}, pages = {77--85}, year = {1996}, url = {https://doi.org/10.1145/229459.229469}, doi = {10.1145/229459.229469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/FaginNW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ImpagliazzoN96, author = {Russell Impagliazzo and Moni Naor}, title = {Efficient Cryptographic Schemes Provably as Secure as Subset Sum}, journal = {J. Cryptol.}, volume = {9}, number = {4}, pages = {199--216}, year = {1996}, url = {https://doi.org/10.1007/BF00189260}, doi = {10.1007/BF00189260}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ImpagliazzoN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaorW96, author = {Moni Naor and Avishai Wool}, editor = {Li Gong and Jacques Stearn}, title = {Access Control and Signatures via Quorum Secret Sharing}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {157--168}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238209}, doi = {10.1145/238168.238209}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaorW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/NaorR96, author = {Moni Naor and Sitvanit Ruah}, title = {On the Decisional Complexity of Problems Over the Reals}, booktitle = {Fourth Israel Symposium on Theory of Computing and Systems, {ISTCS} 1996, Jerusalem, Israel, June 10-12, 1996, Proceedings}, pages = {176--187}, publisher = {{IEEE} Computer Society}, year = {1996}, timestamp = {Tue, 31 May 2016 15:27:26 +0200}, biburl = {https://dblp.org/rec/conf/istcs/NaorR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NaorS96, author = {Moni Naor and Adi Shamir}, editor = {T. Mark A. Lomas}, title = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {197--202}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_18}, doi = {10.1007/3-540-62494-5\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/NaorS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Naor96, author = {Moni Naor}, editor = {Gary L. Miller}, title = {Evaluation May Be Easier Than Generation (Extended Abstract)}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {74--83}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.237833}, doi = {10.1145/237814.237833}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Naor96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DworkLN96, author = {Cynthia Dwork and Jeffrey B. Lotspiech and Moni Naor}, editor = {Gary L. Miller}, title = {Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version)}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {489--498}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.237997}, doi = {10.1145/237814.237997}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DworkLN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiFGN96, author = {Ran Canetti and Uriel Feige and Oded Goldreich and Moni Naor}, editor = {Gary L. Miller}, title = {Adaptively Secure Multi-Party Computation}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {639--648}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.238015}, doi = {10.1145/237814.238015}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CanettiFGN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiDNO96, author = {Ran Canetti and Cynthia Dwork and Moni Naor and Rafail Ostrovsky}, title = {Deniable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {1996}, url = {http://eprint.iacr.org/1996/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiDNO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorS96, author = {Moni Naor and Adi Shamir}, title = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {1996}, url = {http://eprint.iacr.org/1996/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorW96, author = {Moni Naor and Avishai Wool}, title = {Access Control and Signatures via Quorum Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {1996}, url = {http://eprint.iacr.org/1996/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorR96, author = {Moni Naor and Omer Reingold}, title = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {1996}, url = {http://eprint.iacr.org/1996/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorR95, author = {Moni Naor and Ron M. Roth}, title = {Optimal File Sharing in Distributed Networks}, journal = {{SIAM} J. Comput.}, volume = {24}, number = {1}, pages = {158--183}, year = {1995}, url = {https://doi.org/10.1137/S0097539792237462}, doi = {10.1137/S0097539792237462}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FederKNN95, author = {Tom{\'{a}}s Feder and Eyal Kushilevitz and Moni Naor and Noam Nisan}, title = {Amortized Communication Complexity}, journal = {{SIAM} J. Comput.}, volume = {24}, number = {4}, pages = {736--750}, year = {1995}, url = {https://doi.org/10.1137/S0097539792235864}, doi = {10.1137/S0097539792235864}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FederKNN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorS95, author = {Moni Naor and Larry J. Stockmeyer}, title = {What Can be Computed Locally?}, journal = {{SIAM} J. Comput.}, volume = {24}, number = {6}, pages = {1259--1277}, year = {1995}, url = {https://doi.org/10.1137/S0097539793254571}, doi = {10.1137/S0097539793254571}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/LovaszNNW95, author = {L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and Moni Naor and Ilan Newman and Avi Wigderson}, title = {Search Problems in the Decision Tree Model}, journal = {{SIAM} J. Discret. Math.}, volume = {8}, number = {1}, pages = {119--132}, year = {1995}, url = {https://doi.org/10.1137/S0895480192233867}, doi = {10.1137/S0895480192233867}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/LovaszNNW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorR95, author = {Moni Naor and Omer Reingold}, title = {Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions}, booktitle = {36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, USA, 23-25 October 1995}, pages = {170--181}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/SFCS.1995.492474}, doi = {10.1109/SFCS.1995.492474}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorSS95, author = {Moni Naor and Leonard J. Schulman and Aravind Srinivasan}, title = {Splitters and Near-Optimal Derandomization}, booktitle = {36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, USA, 23-25 October 1995}, pages = {182--191}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/SFCS.1995.492475}, doi = {10.1109/SFCS.1995.492475}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorSS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/KilianN95, author = {Joe Kilian and Moni Naor}, title = {On the Complexity of Statistical Reasoning (extended abtract)}, booktitle = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS} 1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings}, pages = {209--217}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ISTCS.1995.377030}, doi = {10.1109/ISTCS.1995.377030}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/KilianN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/MayerNS95, author = {Alain J. Mayer and Moni Naor and Larry J. Stockmeyer}, title = {Local Computations on Static and Dynamic Graphs (Preliminary Version)}, booktitle = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS} 1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings}, pages = {268--278}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ISTCS.1995.377023}, doi = {10.1109/ISTCS.1995.377023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/MayerNS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/AjtaiANRSW95, author = {Mikl{\'{o}}s Ajtai and James Aspnes and Moni Naor and Yuval Rabani and Leonard J. Schulman and Orli Waarts}, editor = {Kenneth L. Clarkson}, title = {Fairness in Scheduling}, booktitle = {Proceedings of the Sixth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 22-24 January 1995. San Francisco, California, {USA}}, pages = {477--485}, publisher = {{ACM/SIAM}}, year = {1995}, url = {http://dl.acm.org/citation.cfm?id=313651.313796}, timestamp = {Thu, 05 Jul 2018 07:29:25 +0200}, biburl = {https://dblp.org/rec/conf/soda/AjtaiANRSW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR95-045, author = {Moni Naor and Omer Reingold}, title = {Synthesizers and Their Application to the Parallel Construction of Pseudo-random Functions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR95-045}}, year = {1995}, url = {https://eccc.weizmann.ac.il/eccc-reports/1995/TR95-045/index.html}, eprinttype = {ECCC}, eprint = {TR95-045}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR95-045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/BlumEGKN94, author = {Manuel Blum and William S. Evans and Peter Gemmell and Sampath Kannan and Moni Naor}, title = {Checking the Correctness of Memories}, journal = {Algorithmica}, volume = {12}, number = {2/3}, pages = {225--244}, year = {1994}, url = {https://doi.org/10.1007/BF01185212}, doi = {10.1007/BF01185212}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/BlumEGKN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/MotwaniNN94, author = {Rajeev Motwani and Joseph Naor and Moni Naor}, title = {The Probabilistic Method Yields Deterministic Parallel Algorithms}, journal = {J. Comput. Syst. Sci.}, volume = {49}, number = {3}, pages = {478--516}, year = {1994}, url = {https://doi.org/10.1016/S0022-0000(05)80069-8}, doi = {10.1016/S0022-0000(05)80069-8}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/MotwaniNN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkN94, author = {Cynthia Dwork and Moni Naor}, editor = {Yvo Desmedt}, title = {An Efficient Existentially Unforgeable Signature Scheme and its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {234--246}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_23}, doi = {10.1007/3-540-48658-5\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChorFN94, author = {Benny Chor and Amos Fiat and Moni Naor}, editor = {Yvo Desmedt}, title = {Tracing Traitors}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {257--270}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_25}, doi = {10.1007/3-540-48658-5\_25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChorFN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NaorS94, author = {Moni Naor and Adi Shamir}, editor = {Alfredo De Santis}, title = {Visual Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {1--12}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053419}, doi = {10.1007/BFB0053419}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NaorS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorW94, author = {Moni Naor and Avishai Wool}, title = {The Load, Capacity and Availability of Quorum Systems}, booktitle = {35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994}, pages = {214--225}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/SFCS.1994.365692}, doi = {10.1109/SFCS.1994.365692}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/AlonBFKNO94, author = {Noga Alon and Manuel Blum and Amos Fiat and Sampath Kannan and Moni Naor and Rafail Ostrovsky}, editor = {Daniel Dominic Sleator}, title = {Matching Nuts and Bolts}, booktitle = {Proceedings of the Fifth Annual {ACM-SIAM} Symposium on Discrete Algorithms. 23-25 January 1994, Arlington, Virginia, {USA}}, pages = {690--696}, publisher = {{ACM/SIAM}}, year = {1994}, url = {http://dl.acm.org/citation.cfm?id=314464.314673}, timestamp = {Thu, 05 Jul 2018 07:29:19 +0200}, biburl = {https://dblp.org/rec/conf/soda/AlonBFKNO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FeigeKN94, author = {Uriel Feige and Joe Kilian and Moni Naor}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {A minimal model for secure computation (extended abstract)}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {554--563}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195408}, doi = {10.1145/195058.195408}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FeigeKN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/FeldmanINNRS93, author = {David Feldman and Russell Impagliazzo and Moni Naor and Noam Nisan and Steven Rudich and Adi Shamir}, title = {On Dice and Coins: Models of Computation for Random Generation}, journal = {Inf. Comput.}, volume = {104}, number = {2}, pages = {159--174}, year = {1993}, url = {https://doi.org/10.1006/inco.1993.1028}, doi = {10.1006/INCO.1993.1028}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/FeldmanINNRS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FiatN93, author = {Amos Fiat and Moni Naor}, title = {Implicit {O(1)} Probe Search}, journal = {{SIAM} J. Comput.}, volume = {22}, number = {1}, pages = {1--10}, year = {1993}, url = {https://doi.org/10.1137/0222001}, doi = {10.1137/0222001}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FiatN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/AlonN93, author = {Noga Alon and Moni Naor}, title = {Coin-Flipping Games Immune Against Linear-Sized Coalitions}, journal = {{SIAM} J. Comput.}, volume = {22}, number = {2}, pages = {403--417}, year = {1993}, url = {https://doi.org/10.1137/0222030}, doi = {10.1137/0222030}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/AlonN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorN93, author = {Joseph Naor and Moni Naor}, title = {Small-Bias Probability Spaces: Efficient Constructions and Applications}, journal = {{SIAM} J. Comput.}, volume = {22}, number = {4}, pages = {838--856}, year = {1993}, url = {https://doi.org/10.1137/0222053}, doi = {10.1137/0222053}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/NaorOS93, author = {Moni Naor and Alon Orlitsky and Peter W. Shor}, title = {Three results on interactive communication}, journal = {{IEEE} Trans. Inf. Theory}, volume = {39}, number = {5}, pages = {1608--1615}, year = {1993}, url = {https://doi.org/10.1109/18.259644}, doi = {10.1109/18.259644}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/NaorOS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GemmellN93, author = {Peter Gemmell and Moni Naor}, editor = {Douglas R. Stinson}, title = {Codes for Interactive Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {355--367}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_30}, doi = {10.1007/3-540-48329-2\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GemmellN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FiatN93, author = {Amos Fiat and Moni Naor}, editor = {Douglas R. Stinson}, title = {Broadcast Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {480--491}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_40}, doi = {10.1007/3-540-48329-2\_40}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FiatN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/MegiddoNA93, author = {Nimrod Megiddo and Moni Naor and David P. Anderson}, title = {The Minimum Reservation Rate Problem in Digital Audio/Video Systems}, booktitle = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993, Natanya, Israel, June 7-9, 1993, Proceedings}, pages = {43--48}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/ISTCS.1993.253485}, doi = {10.1109/ISTCS.1993.253485}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/MegiddoNA93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorS93, author = {Moni Naor and Larry J. Stockmeyer}, editor = {S. Rao Kosaraju and David S. Johnson and Alok Aggarwal}, title = {What can be computed locally?}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of Computing, May 16-18, 1993, San Diego, CA, {USA}}, pages = {184--193}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/167088.167149}, doi = {10.1145/167088.167149}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/FiatNSS92, author = {Amos Fiat and Moni Naor and Jeanette P. Schmidt and Alan Siegel}, title = {Nonoblivious Hashing}, journal = {J. {ACM}}, volume = {39}, number = {4}, pages = {764--782}, year = {1992}, url = {https://doi.org/10.1145/146585.146591}, doi = {10.1145/146585.146591}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/FiatNSS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mst/IraniNR92, author = {Sandy Irani and Moni Naor and Ronitt Rubinfeld}, title = {On the Time and Space Complexity of Computation Using Write-Once Memory Or Is Pen Really Much Worse Than Pencil?}, journal = {Math. Syst. Theory}, volume = {25}, number = {2}, pages = {141--159}, year = {1992}, url = {https://doi.org/10.1007/BF02835833}, doi = {10.1007/BF02835833}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mst/IraniNR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/KannanNR92, author = {Sampath Kannan and Moni Naor and Steven Rudich}, title = {Implicit Representation of Graphs}, journal = {{SIAM} J. Discret. Math.}, volume = {5}, number = {4}, pages = {596--603}, year = {1992}, url = {https://doi.org/10.1137/0405049}, doi = {10.1137/0405049}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/KannanNR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/AlonBNNR92, author = {Noga Alon and Jehoshua Bruck and Joseph Naor and Moni Naor and Ron M. Roth}, title = {Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs}, journal = {{IEEE} Trans. Inf. Theory}, volume = {38}, number = {2}, pages = {509--516}, year = {1992}, url = {https://doi.org/10.1109/18.119713}, doi = {10.1109/18.119713}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/AlonBNNR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkN92, author = {Cynthia Dwork and Moni Naor}, editor = {Ernest F. Brickell}, title = {Pricing via Processing or Combatting Junk Mail}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {139--147}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_10}, doi = {10.1007/3-540-48071-4\_10}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkN92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorOVY92, author = {Moni Naor and Rafail Ostrovsky and Ramarathnam Venkatesan and Moti Yung}, editor = {Ernest F. Brickell}, title = {Perfect Zero-Knowledge Arguments for {NP} Can Be Based on General Complexity Assumptions (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {196--214}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_14}, doi = {10.1007/3-540-48071-4\_14}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorOVY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkFKNS92, author = {Cynthia Dwork and Uriel Feige and Joe Kilian and Moni Naor and Shmuel Safra}, editor = {Ernest F. Brickell}, title = {Low Communication 2-Prover Zero-Knowledge Proofs for {NP}}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {215--227}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_15}, doi = {10.1007/3-540-48071-4\_15}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkFKNS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/AlonGMN92, author = {Noga Alon and Zvi Galil and Oded Margalit and Moni Naor}, title = {Witnesses for Boolean Matrix Multiplication and for Shortest Paths}, booktitle = {33rd Annual Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, USA, 24-27 October 1992}, pages = {417--426}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/SFCS.1992.267748}, doi = {10.1109/SFCS.1992.267748}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/AlonGMN92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/AjtaiABCHNS92, author = {Mikl{\'{o}}s Ajtai and Noga Alon and Jehoshua Bruck and Robert Cypher and Ching{-}Tien Ho and Moni Naor and Endre Szemer{\'{e}}di}, title = {Fault Tolerant Graphs, Perfect Hash Functions and Disjoint Paths}, booktitle = {33rd Annual Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, USA, 24-27 October 1992}, pages = {693--702}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/SFCS.1992.267781}, doi = {10.1109/SFCS.1992.267781}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/AjtaiABCHNS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/FiatMNSSS91, author = {Amos Fiat and J. Ian Munro and Moni Naor and Alejandro A. Sch{\"{a}}ffer and Jeanette P. Schmidt and Alan Siegel}, title = {An Implicit Data Structure for Searching a Multikey Table in Logarithmic Time}, journal = {J. Comput. Syst. Sci.}, volume = {43}, number = {3}, pages = {406--424}, year = {1991}, url = {https://doi.org/10.1016/0022-0000(91)90022-W}, doi = {10.1016/0022-0000(91)90022-W}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/FiatMNSSS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Naor91, author = {Moni Naor}, title = {Bit Commitment Using Pseudorandomness}, journal = {J. Cryptol.}, volume = {4}, number = {2}, pages = {151--158}, year = {1991}, url = {https://doi.org/10.1007/BF00196774}, doi = {10.1007/BF00196774}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Naor91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/Naor91, author = {Moni Naor}, title = {A Lower Bound on Probabilistic Algorithms for Distributive Ring Coloring}, journal = {{SIAM} J. Discret. Math.}, volume = {4}, number = {3}, pages = {409--412}, year = {1991}, url = {https://doi.org/10.1137/0404036}, doi = {10.1137/0404036}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/Naor91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BlumEGKN91, author = {Manuel Blum and William S. Evans and Peter Gemmell and Sampath Kannan and Moni Naor}, title = {Checking the Correctness of Memories}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {90--99}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185352}, doi = {10.1109/SFCS.1991.185352}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BlumEGKN91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/FederKN91, author = {Tom{\'{a}}s Feder and Eyal Kushilevitz and Moni Naor}, title = {Amortized Communication Complexity (Preliminary Version)}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {239--248}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185374}, doi = {10.1109/SFCS.1991.185374}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/FederKN91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorR91, author = {Moni Naor and Ron M. Roth}, title = {Optimal File Sharing in Distributed Networks (Preliminary Version)}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {515--525}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185414}, doi = {10.1109/SFCS.1991.185414}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/LovaszNNW91, author = {L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and Moni Naor and Ilan Newman and Avi Wigderson}, title = {Search Problems in the Decision Tree Model (Preliminary Version)}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {576--585}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185422}, doi = {10.1109/SFCS.1991.185422}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/LovaszNNW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Naor91, author = {Moni Naor}, editor = {Javier Leach Albert and Burkhard Monien and Mario Rodr{\'{\i}}guez{-}Artalejo}, title = {String Matching with Preprocessing of Text and Pattern}, booktitle = {Automata, Languages and Programming, 18th International Colloquium, ICALP91, Madrid, Spain, July 8-12, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {510}, pages = {739--750}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54233-7\_179}, doi = {10.1007/3-540-54233-7\_179}, timestamp = {Fri, 17 Jul 2020 16:12:48 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Naor91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FiatN91, author = {Amos Fiat and Moni Naor}, editor = {Cris Koutsougeras and Jeffrey Scott Vitter}, title = {Rigorous Time/Space Tradeoffs for Inverting Functions}, booktitle = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, {USA}}, pages = {534--541}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/103418.103473}, doi = {10.1145/103418.103473}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FiatN91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DolevDN91, author = {Danny Dolev and Cynthia Dwork and Moni Naor}, editor = {Cris Koutsougeras and Jeffrey Scott Vitter}, title = {Non-Malleable Cryptography (Extended Abstract)}, booktitle = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, {USA}}, pages = {542--552}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/103418.103474}, doi = {10.1145/103418.103474}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DolevDN91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/Naor90, author = {Moni Naor}, title = {Succinct representation of general unlabeled graphs}, journal = {Discret. Appl. Math.}, volume = {28}, number = {3}, pages = {303--307}, year = {1990}, url = {https://doi.org/10.1016/0166-218X(90)90011-Z}, doi = {10.1016/0166-218X(90)90011-Z}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/Naor90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/Bar-NoyNN90, author = {Amotz Bar{-}Noy and Joseph Naor and Moni Naor}, title = {One-Bit Algorithms}, journal = {Distributed Comput.}, volume = {4}, pages = {3--8}, year = {1990}, url = {https://doi.org/10.1007/BF01783661}, doi = {10.1007/BF01783661}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/Bar-NoyNN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BruckN90, author = {Jehoshua Bruck and Moni Naor}, title = {The hardness of decoding linear codes with preprocessing}, journal = {{IEEE} Trans. Inf. Theory}, volume = {36}, number = {2}, pages = {381--385}, year = {1990}, url = {https://doi.org/10.1109/18.52484}, doi = {10.1109/18.52484}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BruckN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/AlonN90, author = {Noga Alon and Moni Naor}, title = {Coin-Flipping Games Immune against Linear-Sized Coalitions (Extended Abstract)}, booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume {I}}, pages = {46--54}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/FSCS.1990.89523}, doi = {10.1109/FSCS.1990.89523}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/AlonN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorN90, author = {Joseph Naor and Moni Naor}, editor = {Harriet Ortiz}, title = {Small-bias Probability Spaces: Efficient Constructions and Applications}, booktitle = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, {USA}}, pages = {213--223}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/100216.100244}, doi = {10.1145/100216.100244}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorY90, author = {Moni Naor and Moti Yung}, editor = {Harriet Ortiz}, title = {Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks}, booktitle = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, {USA}}, pages = {427--437}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/100216.100273}, doi = {10.1145/100216.100273}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorNS89, author = {Joseph Naor and Moni Naor and Alejandro A. Sch{\"{a}}ffer}, title = {Fast Parallel Algorithms for Chordal Graphs}, journal = {{SIAM} J. Comput.}, volume = {18}, number = {2}, pages = {327--349}, year = {1989}, url = {https://doi.org/10.1137/0218023}, doi = {10.1137/0218023}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorNS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Naor89, author = {Moni Naor}, editor = {Gilles Brassard}, title = {Bit Commitment Using Pseudo-Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {128--136}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_13}, doi = {10.1007/0-387-34805-0\_13}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Naor89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MotwaniNN89, author = {Rajeev Motwani and Joseph Naor and Moni Naor}, title = {The Probabilistic Method Yields Deterministic Parallel Algorithms}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {8--13}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63448}, doi = {10.1109/SFCS.1989.63448}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/MotwaniNN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ImpagliazzoN89, author = {Russell Impagliazzo and Moni Naor}, title = {Efficient Cryptographic Schemes Provably as Secure as Subset Sum}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {236--241}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63484}, doi = {10.1109/SFCS.1989.63484}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ImpagliazzoN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FeldmanINNRS89, author = {David Feldman and Russell Impagliazzo and Moni Naor and Noam Nisan and Steven Rudich and Adi Shamir}, editor = {Giorgio Ausiello and Mariangiola Dezani{-}Ciancaglini and Simona Ronchi Della Rocca}, title = {On Dice and Coins: Models of Computation for Random Generation}, booktitle = {Automata, Languages and Programming, 16th International Colloquium, ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {372}, pages = {319--340}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/BFb0035769}, doi = {10.1007/BFB0035769}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FeldmanINNRS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorY89, author = {Moni Naor and Moti Yung}, editor = {David S. Johnson}, title = {Universal One-Way Hash Functions and their Cryptographic Applications}, booktitle = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing, May 14-17, 1989, Seattle, Washington, {USA}}, pages = {33--43}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/73007.73011}, doi = {10.1145/73007.73011}, timestamp = {Wed, 24 Nov 2021 12:15:31 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FiatN89, author = {Amos Fiat and Moni Naor}, editor = {David S. Johnson}, title = {Implicit {O(1)} Probe Search}, booktitle = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing, May 14-17, 1989, Seattle, Washington, {USA}}, pages = {336--344}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/73007.73039}, doi = {10.1145/73007.73039}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FiatN89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/ImpagliazzoN88, author = {Russell Impagliazzo and Moni Naor}, title = {Decision trees and downward closures}, booktitle = {Proceedings: Third Annual Structure in Complexity Theory Conference, Georgetown University, Washington, D. C., USA, June 14-17, 1988}, pages = {29--38}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/SCT.1988.5260}, doi = {10.1109/SCT.1988.5260}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coco/ImpagliazzoN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaumFN88, author = {David Chaum and Amos Fiat and Moni Naor}, editor = {Shafi Goldwasser}, title = {Untraceable Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {319--327}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_25}, doi = {10.1007/0-387-34799-2\_25}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChaumFN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Bar-NoyNN88, author = {Amotz Bar{-}Noy and Joseph Naor and Moni Naor}, editor = {Danny Dolev}, title = {One Bit Algorithms}, booktitle = {Proceedings of the Seventh Annual {ACM} Symposium on Principles of Distributed Computing, Toronto, Ontario, Canada, August 15-17, 1988}, pages = {66--76}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62546.62558}, doi = {10.1145/62546.62558}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Bar-NoyNN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KannanNR88, author = {Sampath Kannan and Moni Naor and Steven Rudich}, editor = {Janos Simon}, title = {Implicit Representation of Graphs}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {334--343}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62244}, doi = {10.1145/62212.62244}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KannanNR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FiatNSSS88, author = {Amos Fiat and Moni Naor and Alejandro A. Sch{\"{a}}ffer and Jeanette P. Schmidt and Alan Siegel}, editor = {Janos Simon}, title = {Storing and Searching a Multikey Table (Extended Abstract)}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {344--353}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62245}, doi = {10.1145/62212.62245}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FiatNSSS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FiatNSS88, author = {Amos Fiat and Moni Naor and Jeanette P. Schmidt and Alan Siegel}, editor = {Janos Simon}, title = {Non-Oblivious Hashing (Extended Abstract)}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {367--376}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62248}, doi = {10.1145/62212.62248}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FiatNSS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NaorNS87, author = {Joseph Naor and Moni Naor and Alejandro A. Sch{\"{a}}ffer}, editor = {Alfred V. Aho}, title = {Fast Parallel Algorithms for Chordal Graphs (Extended Abstract)}, booktitle = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing, 1987, New York, New York, {USA}}, pages = {355--364}, publisher = {{ACM}}, year = {1987}, url = {https://doi.org/10.1145/28395.28433}, doi = {10.1145/28395.28433}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NaorNS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.