BibTeX records: Moni Naor

download as .bib file

@inproceedings{DBLP:conf/soda/NaorP24,
  author       = {Moni Naor and
                  Eugene Pekel},
  editor       = {David P. Woodruff},
  title        = {Adjacency Sketches in Adversarial Environments},
  booktitle    = {Proceedings of the 2024 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2024, Alexandria, VA, USA, January 7-10, 2024},
  pages        = {1067--1098},
  publisher    = {{SIAM}},
  year         = {2024},
  url          = {https://doi.org/10.1137/1.9781611977912.41},
  doi          = {10.1137/1.9781611977912.41},
  timestamp    = {Thu, 04 Apr 2024 19:38:10 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/NaorP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MagenN23,
  author       = {Roey Magen and
                  Moni Naor},
  title        = {Mirror games against an open book player},
  journal      = {Theor. Comput. Sci.},
  volume       = {976},
  pages        = {114159},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2023.114159},
  doi          = {10.1016/J.TCS.2023.114159},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/MagenN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forc/KarovN23,
  author       = {Bar Karov and
                  Moni Naor},
  editor       = {Kunal Talwar},
  title        = {New Algorithms and Applications for Risk-Limiting Audits},
  booktitle    = {4th Symposium on Foundations of Responsible Computing, {FORC} 2023,
                  June 7-9, 2023, Stanford University, California, {USA}},
  series       = {LIPIcs},
  volume       = {256},
  pages        = {2:1--2:27},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.FORC.2023.2},
  doi          = {10.4230/LIPICS.FORC.2023.2},
  timestamp    = {Mon, 05 Jun 2023 16:20:06 +0200},
  biburl       = {https://dblp.org/rec/conf/forc/KarovN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forc/DovDNT23,
  author       = {Yoav Ben Dov and
                  Liron David and
                  Moni Naor and
                  Elad Tzalik},
  editor       = {Kunal Talwar},
  title        = {Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes},
  booktitle    = {4th Symposium on Foundations of Responsible Computing, {FORC} 2023,
                  June 7-9, 2023, Stanford University, California, {USA}},
  series       = {LIPIcs},
  volume       = {256},
  pages        = {11:1--11:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.FORC.2023.11},
  doi          = {10.4230/LIPICS.FORC.2023.11},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/forc/DovDNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/NaorNSY23,
  author       = {Moni Naor and
                  Kobbi Nissim and
                  Uri Stemmer and
                  Chao Yan},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Private Everlasting Prediction},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/abe31a12e83111fdf2cfd54deed5a2ce-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/NaorNSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-04050,
  author       = {Bar Karov and
                  Moni Naor},
  title        = {New Algorithms and Applications for Risk-Limiting Audits},
  journal      = {CoRR},
  volume       = {abs/2305.04050},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.04050},
  doi          = {10.48550/ARXIV.2305.04050},
  eprinttype    = {arXiv},
  eprint       = {2305.04050},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-04050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-09579,
  author       = {Moni Naor and
                  Kobbi Nissim and
                  Uri Stemmer and
                  Chao Yan},
  title        = {Private Everlasting Prediction},
  journal      = {CoRR},
  volume       = {abs/2305.09579},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.09579},
  doi          = {10.48550/ARXIV.2305.09579},
  eprinttype    = {arXiv},
  eprint       = {2305.09579},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-09579.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-03728,
  author       = {Moni Naor and
                  Eugene Pekel},
  title        = {Adjacency Sketches in Adversarial Environments},
  journal      = {CoRR},
  volume       = {abs/2309.03728},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.03728},
  doi          = {10.48550/ARXIV.2309.03728},
  eprinttype    = {arXiv},
  eprint       = {2309.03728},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-03728.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-10196,
  author       = {Omri Ben{-}Eliezer and
                  Tomer Grossman and
                  Moni Naor},
  title        = {Does Prior Knowledge Help Detect Collisions?},
  journal      = {CoRR},
  volume       = {abs/2312.10196},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.10196},
  doi          = {10.48550/ARXIV.2312.10196},
  eprinttype    = {arXiv},
  eprint       = {2312.10196},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-10196.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/Ben-EliezerGN23,
  author       = {Omri Ben{-}Eliezer and
                  Tomer Grossman and
                  Moni Naor},
  title        = {Does Prior Knowledge Help Detect Collisions?},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-207}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/207},
  eprinttype    = {ECCC},
  eprint       = {TR23-207},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/Ben-EliezerGN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniDNR23,
  author       = {Cecilia Boschini and
                  Hila Dahari and
                  Moni Naor and
                  Eyal Ronen},
  title        = {That's not my signature! Fail-stop signatures for a post-quantum world},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1754},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1754},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoschiniDNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/KomargodskiMNPR22,
  author       = {Ilan Komargodski and
                  Tal Moran and
                  Moni Naor and
                  Rafael Pass and
                  Alon Rosen and
                  Eylon Yogev},
  title        = {One-Way Functions and (Im)perfect Obfuscation},
  journal      = {{SIAM} J. Comput.},
  volume       = {51},
  number       = {6},
  pages        = {1769--1795},
  year         = {2022},
  url          = {https://doi.org/10.1137/15m1048549},
  doi          = {10.1137/15M1048549},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/KomargodskiMNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CohenN22,
  author       = {Shahar P. Cohen and
                  Moni Naor},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Low Communication Complexity Protocols, Collision Resistant Hash Functions
                  and Secret Key-Agreement Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {252--281},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_9},
  doi          = {10.1007/978-3-031-15982-4\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CohenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CremersNPR22,
  author       = {Cas Cremers and
                  Moni Naor and
                  Shahar Paz and
                  Eyal Ronen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {{CHIP} and {CRISP:} Protecting All Parties Against Compromise Through
                  Identity-Binding PAKEs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {668--698},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_23},
  doi          = {10.1007/978-3-031-15979-4\_23},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CremersNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fun/MagenN22,
  author       = {Roey Magen and
                  Moni Naor},
  editor       = {Pierre Fraigniaud and
                  Yushi Uno},
  title        = {Mirror Games Against an Open Book Player},
  booktitle    = {11th International Conference on Fun with Algorithms, {FUN} 2022,
                  May 30 to June 3, 2022, Island of Favignana, Sicily, Italy},
  series       = {LIPIcs},
  volume       = {226},
  pages        = {20:1--20:12},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.FUN.2022.20},
  doi          = {10.4230/LIPICS.FUN.2022.20},
  timestamp    = {Mon, 23 May 2022 11:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/fun/MagenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/MenuhinN22,
  author       = {Boaz Menuhin and
                  Moni Naor},
  editor       = {Mark Braverman},
  title        = {Keep That Card in Mind: Card Guessing with Limited Memory},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {107:1--107:28},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.107},
  doi          = {10.4230/LIPICS.ITCS.2022.107},
  timestamp    = {Wed, 26 Jan 2022 14:33:51 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/MenuhinN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NaorO22,
  author       = {Moni Naor and
                  Noa Oved},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Bet-or-Pass: Adversarially Robust Bloom Filters},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {777--808},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_27},
  doi          = {10.1007/978-3-031-22365-5\_27},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/NaorO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-12129,
  author       = {Roey Magen and
                  Moni Naor},
  title        = {Mirror Games Against an Open Book Player},
  journal      = {CoRR},
  volume       = {abs/2204.12129},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.12129},
  doi          = {10.48550/ARXIV.2204.12129},
  eprinttype    = {arXiv},
  eprint       = {2204.12129},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-12129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-05047,
  author       = {Bar Alon and
                  Moni Naor and
                  Eran Omri and
                  Uri Stemmer},
  title        = {{MPC} for Tech Giants {(GMPC):} Enabling Gulliver and the Lilliputians
                  to Cooperate Amicably},
  journal      = {CoRR},
  volume       = {abs/2207.05047},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.05047},
  doi          = {10.48550/ARXIV.2207.05047},
  eprinttype    = {arXiv},
  eprint       = {2207.05047},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-05047.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenN22,
  author       = {Shahar P. Cohen and
                  Moni Naor},
  title        = {Low Communication Complexity Protocols, Collision Resistant Hash Functions
                  and Secret Key-Agreement Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/312},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlonNOS22,
  author       = {Bar Alon and
                  Moni Naor and
                  Eran Omri and
                  Uri Stemmer},
  title        = {{MPC} for Tech Giants {(GMPC):} Enabling Gulliver and the Lilliputians
                  to Cooperate Amicably},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/902},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlonNOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorO22,
  author       = {Moni Naor and
                  Noa Oved},
  title        = {Bet-or-Pass: Adversarially Robust Bloom Filters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1292},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1292},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/AsharovN0S21,
  author       = {Gilad Asharov and
                  Moni Naor and
                  Gil Segev and
                  Ido Shahaf},
  title        = {Searchable Symmetric Encryption: Optimal Locality in Linear Space
                  via Two-Dimensional Balanced Allocations},
  journal      = {{SIAM} J. Comput.},
  volume       = {50},
  number       = {5},
  pages        = {1501--1536},
  year         = {2021},
  url          = {https://doi.org/10.1137/19M1303186},
  doi          = {10.1137/19M1303186},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/AsharovN0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AlonBDMNY21,
  author       = {Noga Alon and
                  Omri Ben{-}Eliezer and
                  Yuval Dagan and
                  Shay Moran and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Samir Khuller and
                  Virginia Vassilevska Williams},
  title        = {Adversarial laws of large numbers and optimal regret in online classification},
  booktitle    = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Virtual Event, Italy, June 21-25, 2021},
  pages        = {447--455},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3406325.3451041},
  doi          = {10.1145/3406325.3451041},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AlonBDMNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-09054,
  author       = {Noga Alon and
                  Omri Ben{-}Eliezer and
                  Yuval Dagan and
                  Shay Moran and
                  Moni Naor and
                  Eylon Yogev},
  title        = {Adversarial Laws of Large Numbers and Optimal Regret in Online Classification},
  journal      = {CoRR},
  volume       = {abs/2101.09054},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.09054},
  eprinttype    = {arXiv},
  eprint       = {2101.09054},
  timestamp    = {Sat, 30 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-09054.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-01409,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Hardness-Preserving Reductions via Cuckoo Hashing},
  journal      = {CoRR},
  volume       = {abs/2105.01409},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.01409},
  eprinttype    = {arXiv},
  eprint       = {2105.01409},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-01409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-03885,
  author       = {Boaz Menuhin and
                  Moni Naor},
  title        = {Keep That Card in Mind: Card Guessing with Limited Memory},
  journal      = {CoRR},
  volume       = {abs/2107.03885},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.03885},
  eprinttype    = {arXiv},
  eprint       = {2107.03885},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-03885.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MenuhinN21,
  author       = {Boaz Menuhin and
                  Moni Naor},
  title        = {Keep That Card in Mind: Card Guessing with Limited Memory},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR21-096}},
  year         = {2021},
  url          = {https://eccc.weizmann.ac.il/report/2021/096},
  eprinttype    = {ECCC},
  eprint       = {TR21-096},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MenuhinN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NaorRS20,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  title        = {The Security of Lazy Users in Out-of-Band Authentication},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {9:1--9:32},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377849},
  doi          = {10.1145/3377849},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/NaorRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/KaplanLMNS20,
  author       = {Haim Kaplan and
                  Katrina Ligett and
                  Yishay Mansour and
                  Moni Naor and
                  Uri Stemmer},
  editor       = {Jacob D. Abernethy and
                  Shivani Agarwal},
  title        = {Privately Learning Thresholds: Closing the Exponential Gap},
  booktitle    = {Conference on Learning Theory, {COLT} 2020, 9-12 July 2020, Virtual
                  Event [Graz, Austria]},
  series       = {Proceedings of Machine Learning Research},
  volume       = {125},
  pages        = {2263--2285},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v125/kaplan20a.html},
  timestamp    = {Fri, 27 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colt/KaplanLMNS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forc/NaorV20,
  author       = {Moni Naor and
                  Neil Vexler},
  editor       = {Aaron Roth},
  title        = {Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking
                  of Users},
  booktitle    = {1st Symposium on Foundations of Responsible Computing, {FORC} 2020,
                  June 1-3, 2020, Harvard University, Cambridge, MA, {USA} (virtual
                  conference)},
  series       = {LIPIcs},
  volume       = {156},
  pages        = {4:1--4:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.FORC.2020.4},
  doi          = {10.4230/LIPICS.FORC.2020.4},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/forc/NaorV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NaorR020,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication
                  to Immediate Key Delivery},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {9:1--9:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.9},
  doi          = {10.4230/LIPICS.ITC.2020.9},
  timestamp    = {Thu, 04 Jun 2020 17:19:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NaorR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GrossmanKN20,
  author       = {Tomer Grossman and
                  Ilan Komargodski and
                  Moni Naor},
  editor       = {Thomas Vidick},
  title        = {Instance Complexity and Unlabeled Certificates in the Decision Tree
                  Model},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {56:1--56:38},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.56},
  doi          = {10.4230/LIPICS.ITCS.2020.56},
  timestamp    = {Mon, 06 Jan 2020 16:50:09 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GrossmanKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/NaorPY20,
  author       = {Moni Naor and
                  Merav Parter and
                  Eylon Yogev},
  editor       = {Shuchi Chawla},
  title        = {The Power of Distributed Verifiers in Interactive Proofs},
  booktitle    = {Proceedings of the 2020 {ACM-SIAM} Symposium on Discrete Algorithms,
                  {SODA} 2020, Salt Lake City, UT, USA, January 5-8, 2020},
  pages        = {1096--115},
  publisher    = {{SIAM}},
  year         = {2020},
  url          = {https://doi.org/10.1137/1.9781611975994.67},
  doi          = {10.1137/1.9781611975994.67},
  timestamp    = {Thu, 15 Jul 2021 13:48:53 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/NaorPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-03002,
  author       = {Moni Naor and
                  Neil Vexler},
  title        = {Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking
                  of Users},
  journal      = {CoRR},
  volume       = {abs/2004.03002},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.03002},
  eprinttype    = {arXiv},
  eprint       = {2004.03002},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-03002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR20,
  author       = {Moni Naor and
                  Shahar Paz and
                  Eyal Ronen},
  title        = {{CRISP:} Compromise Resilient Identity-based Symmetric {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/529},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/KomargodskiNY19,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {White-Box vs. Black-Box Complexity of Search Problems: Ramsey and
                  Graph Property Testing},
  journal      = {J. {ACM}},
  volume       = {66},
  number       = {5},
  pages        = {34:1--34:28},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341106},
  doi          = {10.1145/3341106},
  timestamp    = {Thu, 10 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/KomargodskiNY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BermanHKN19,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Hardness-Preserving Reductions via Cuckoo Hashing},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {361--392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9293-0},
  doi          = {10.1007/S00145-018-9293-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BermanHKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/NaorY19,
  author       = {Moni Naor and
                  Eylon Yogev},
  title        = {Bloom Filters in Adversarial Environments},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {15},
  number       = {3},
  pages        = {35:1--35:30},
  year         = {2019},
  url          = {https://doi.org/10.1145/3306193},
  doi          = {10.1145/3306193},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/NaorY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorPR19,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Eyal Ronen},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {How to (not) Share a Password: Privacy Preserving Protocols for Finding
                  Heavy Hitters with Adversarial Behavior},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1369--1386},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363204},
  doi          = {10.1145/3319535.3363204},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaorPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NaorPR19,
  author       = {Moni Naor and
                  Omer Paneth and
                  Guy N. Rothblum},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Incrementally Verifiable Computation via Incremental PCPs},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {552--576},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_21},
  doi          = {10.1007/978-3-030-36033-7\_21},
  timestamp    = {Mon, 25 Nov 2019 13:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/NaorPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-10137,
  author       = {Haim Kaplan and
                  Katrina Ligett and
                  Yishay Mansour and
                  Moni Naor and
                  Uri Stemmer},
  title        = {Privately Learning Thresholds: Closing the Exponential Gap},
  journal      = {CoRR},
  volume       = {abs/1911.10137},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.10137},
  eprinttype    = {arXiv},
  eprint       = {1911.10137},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-10137.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GrossmanKN19,
  author       = {Tomer Grossman and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Instance Complexity and Unlabeled Certificates in the Decision Tree
                  Model},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR19-113}},
  year         = {2019},
  url          = {https://eccc.weizmann.ac.il/report/2019/113},
  eprinttype    = {ECCC},
  eprint       = {TR19-113},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GrossmanKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR19,
  author       = {Moni Naor and
                  Omer Paneth and
                  Guy N. Rothblum},
  title        = {Incrementally Verifiable Computation via Incremental PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1407},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR019,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  title        = {Out-of-Band Authenticated Group Key Exchange: From Strong Authentication
                  to Immediate Key Delivery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1458},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorR019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KomargodskiNY18,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {How to Share a Secret, Infinitely},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {6},
  pages        = {4179--4190},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2779121},
  doi          = {10.1109/TIT.2017.2779121},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KomargodskiNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KomargodskiNY18,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {162--194},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_6},
  doi          = {10.1007/978-3-319-78375-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KomargodskiNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NaorRS18,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {The Security of Lazy Users in Out-of-Band Authentication},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {575--599},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_21},
  doi          = {10.1007/978-3-030-03810-6\_21},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/NaorRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-10917,
  author       = {Moni Naor and
                  Merav Parter and
                  Eylon Yogev},
  title        = {The Power of Distributed Verifiers in Interactive Proofs},
  journal      = {CoRR},
  volume       = {abs/1812.10917},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.10917},
  eprinttype    = {arXiv},
  eprint       = {1812.10917},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-10917.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/NaorPY18,
  author       = {Moni Naor and
                  Merav Parter and
                  Eylon Yogev},
  title        = {The Power of Distributed Verifiers in Interactive Proofs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-213}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/213},
  eprinttype    = {ECCC},
  eprint       = {TR18-213},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/NaorPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR18,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Eyal Ronen},
  title        = {How to (not) share a password: Privacy preserving protocols for finding
                  heavy hitters with adversarial behavior},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorRS18,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  title        = {The Security of Lazy Users in Out-of-Band Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/823},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KomargodskiNY17,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {Secret-Sharing for {NP}},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {2},
  pages        = {444--469},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-015-9226-0},
  doi          = {10.1007/S00145-015-9226-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KomargodskiNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KomargodskiNY17,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Chris Umans},
  title        = {White-Box vs. Black-Box Complexity of Search Problems: Ramsey and
                  Graph Property Testing},
  booktitle    = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2017, Berkeley, CA, USA, October 15-17, 2017},
  pages        = {622--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FOCS.2017.63},
  doi          = {10.1109/FOCS.2017.63},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KomargodskiNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/HubacekNY17,
  author       = {Pavel Hub{\'{a}}cek and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Christos H. Papadimitriou},
  title        = {The Journey from {NP} to {TFNP} Hardness},
  booktitle    = {8th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2017, January 9-11, 2017, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {67},
  pages        = {60:1--60:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2017.60},
  doi          = {10.4230/LIPICS.ITCS.2017.60},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/HubacekNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KomargodskiNY17,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {White-Box vs. Black-Box Complexity of Search Problems: Ramsey and
                  Graph Property Testing},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-015}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/015},
  eprinttype    = {ECCC},
  eprint       = {TR17-015},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KomargodskiNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapadopoulosWHN17,
  author       = {Dimitrios Papadopoulos and
                  Duane Wessels and
                  Shumon Huque and
                  Moni Naor and
                  Jan Vcel{\'{a}}k and
                  Leonid Reyzin and
                  Sharon Goldberg},
  title        = {Can {NSEC5} be practical for {DNSSEC} deployments?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/099},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PapadopoulosWHN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiNY17,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MoranNS16,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  title        = {An Optimally Fair Coin Toss},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {3},
  pages        = {491--513},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9199-z},
  doi          = {10.1007/S00145-015-9199-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MoranNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/HubacekNU16,
  author       = {Pavel Hub{\'{a}}cek and
                  Moni Naor and
                  Jonathan R. Ullman},
  title        = {When Can Limited Randomness Be Used in Repeated Games?},
  journal      = {Theory Comput. Syst.},
  volume       = {59},
  number       = {4},
  pages        = {722--746},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00224-016-9690-4},
  doi          = {10.1007/S00224-016-9690-4},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/HubacekNU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkNR16,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message
                  Argument Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {123--145},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_5},
  doi          = {10.1007/978-3-662-53015-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AnanthJNSY16,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Moni Naor and
                  Amit Sahai and
                  Eylon Yogev},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Universal Constructions and Robust Combiners for Indistinguishability
                  Obfuscation and Witness Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {491--520},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_17},
  doi          = {10.1007/978-3-662-53008-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AnanthJNSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BoyleN16,
  author       = {Elette Boyle and
                  Moni Naor},
  editor       = {Madhu Sudan},
  title        = {Is There an Oblivious {RAM} Lower Bound?},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {357--368},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840761},
  doi          = {10.1145/2840728.2840761},
  timestamp    = {Tue, 14 Jun 2022 13:12:41 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/BoyleN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/AmirKKNP16,
  author       = {Amihood Amir and
                  Oren Kapah and
                  Tsvi Kopelowitz and
                  Moni Naor and
                  Ely Porat},
  editor       = {Christian Scheideler and
                  Seth Gilbert},
  title        = {The Family Holiday Gathering Problem or Fair and Periodic Scheduling
                  of Independent Sets},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Parallelism in Algorithms
                  and Architectures, {SPAA} 2016, Asilomar State Beach/Pacific Grove,
                  CA, USA, July 11-13, 2016},
  pages        = {367--375},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2935764.2935788},
  doi          = {10.1145/2935764.2935788},
  timestamp    = {Tue, 06 Nov 2018 16:59:33 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/AmirKKNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AsharovNSS16,
  author       = {Gilad Asharov and
                  Moni Naor and
                  Gil Segev and
                  Ido Shahaf},
  editor       = {Daniel Wichs and
                  Yishay Mansour},
  title        = {Searchable symmetric encryption: optimal locality in linear space
                  via two-dimensional balanced allocations},
  booktitle    = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages        = {1101--1114},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897518.2897562},
  doi          = {10.1145/2897518.2897562},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/AsharovNSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KomargodskiNY16,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {How to Share a Secret, Infinitely},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {485--514},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_19},
  doi          = {10.1007/978-3-662-53644-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KomargodskiNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/DworkNR16,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum},
  title        = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message
                  Argument Systems},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR16-049}},
  year         = {2016},
  url          = {https://eccc.weizmann.ac.il/report/2016/049},
  eprinttype    = {ECCC},
  eprint       = {TR16-049},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/DworkNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HubacekNY16,
  author       = {Pavel Hub{\'{a}}cek and
                  Moni Naor and
                  Eylon Yogev},
  title        = {The Journey from {NP} to {TFNP} Hardness},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR16-199}},
  year         = {2016},
  url          = {https://eccc.weizmann.ac.il/report/2016/199},
  eprinttype    = {ECCC},
  eprint       = {TR16-199},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HubacekNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KomargodskiNY16,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {How to Share a Secret, Infinitely},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR16-023}},
  year         = {2016},
  url          = {https://eccc.weizmann.ac.il/report/2016/023},
  eprinttype    = {ECCC},
  eprint       = {TR16-023},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KomargodskiNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldbergNPR16,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin},
  title        = {{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration
                  with Shorter Responses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/083},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldbergNPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiNY16,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {How to Share a Secret, Infinitely},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovNSS16,
  author       = {Gilad Asharov and
                  Moni Naor and
                  Gil Segev and
                  Ido Shahaf},
  title        = {Searchable Symmetric Encryption: Optimal Locality in Linear Space
                  via Two-Dimensional Balanced Allocations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovNSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJNSY16,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Moni Naor and
                  Amit Sahai and
                  Eylon Yogev},
  title        = {Universal Obfuscation and Witness Encryption: Boosting Correctness
                  and Combining Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJNSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DworkNR16,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum},
  title        = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message
                  Argument Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DworkNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/NaorY15,
  author       = {Moni Naor and
                  Eylon Yogev},
  title        = {Tight Bounds for Sliding Bloom Filters},
  journal      = {Algorithmica},
  volume       = {73},
  number       = {4},
  pages        = {652--672},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00453-015-0007-9},
  doi          = {10.1007/S00453-015-0007-9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/NaorY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DworkNRR15,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Omer Reingold and
                  Guy N. Rothblum},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Pure Differential Privacy for Rectangle Queries via Private Partitions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {735--751},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_30},
  doi          = {10.1007/978-3-662-48800-3\_30},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DworkNRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorY15,
  author       = {Moni Naor and
                  Eylon Yogev},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Bloom Filters in Adversarial Environments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {565--584},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_28},
  doi          = {10.1007/978-3-662-48000-7\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GoldbergNPRVZ15,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin and
                  Sachin Vasant and
                  Asaf Ziv},
  title        = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/nsec5-provably-preventing-dnssec-zone-enumeration},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GoldbergNPRVZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sagt/HubacekNU15,
  author       = {Pavel Hub{\'{a}}cek and
                  Moni Naor and
                  Jonathan R. Ullman},
  editor       = {Martin Hoefer},
  title        = {When Can Limited Randomness Be Used in Repeated Games?},
  booktitle    = {Algorithmic Game Theory - 8th International Symposium, {SAGT} 2015,
                  Saarbr{\"{u}}cken, Germany, September 28-30, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9347},
  pages        = {259--271},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48433-3\_20},
  doi          = {10.1007/978-3-662-48433-3\_20},
  timestamp    = {Fri, 26 Mar 2021 08:28:34 +0100},
  biburl       = {https://dblp.org/rec/conf/sagt/HubacekNU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FischFN15,
  author       = {Ben A. Fisch and
                  Daniel Freund and
                  Moni Naor},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Secure Physical Computation Using Disposable Circuits},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_9},
  doi          = {10.1007/978-3-662-46494-6\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/FischFN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NaorZ15,
  author       = {Moni Naor and
                  Asaf Ziv},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Primary-Secondary-Resolver Membership Proof Systems},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {199--228},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_8},
  doi          = {10.1007/978-3-662-46497-7\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/NaorZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HubacekNU15,
  author       = {Pavel Hub{\'{a}}cek and
                  Moni Naor and
                  Jonathan R. Ullman},
  title        = {When Can Limited Randomness Be Used in Repeated Games?},
  journal      = {CoRR},
  volume       = {abs/1507.01191},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01191},
  eprinttype    = {arXiv},
  eprint       = {1507.01191},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/HubacekNU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BoyleN15,
  author       = {Elette Boyle and
                  Moni Naor},
  title        = {Is There an Oblivious {RAM} Lower Bound?},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-146}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/146},
  eprinttype    = {ECCC},
  eprint       = {TR15-146},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BoyleN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischFN15,
  author       = {Ben Fisch and
                  Daniel Freund and
                  Moni Naor},
  title        = {Secure Physical Computation using Disposable Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischFN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorY15,
  author       = {Moni Naor and
                  Eylon Yogev},
  title        = {Bloom Filters in Adversarial Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleN15,
  author       = {Elette Boyle and
                  Moni Naor},
  title        = {Is There an Oblivious {RAM} Lower Bound?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/863},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BrakerskiKN14,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai and
                  Moni Naor},
  title        = {Fast Interactive Coding against Adversarial Noise},
  journal      = {J. {ACM}},
  volume       = {61},
  number       = {6},
  pages        = {35:1--35:30},
  year         = {2014},
  url          = {https://doi.org/10.1145/2661628},
  doi          = {10.1145/2661628},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/BrakerskiKN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KomargodskiNY14,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Secret-Sharing for {NP}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {254--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_14},
  doi          = {10.1007/978-3-662-45608-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KomargodskiNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischFN14,
  author       = {Ben Fisch and
                  Daniel Freund and
                  Moni Naor},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Physical Zero-Knowledge Proofs of Physical Properties},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {313--336},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_18},
  doi          = {10.1007/978-3-662-44381-1\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischFN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KomargodskiMNPRY14,
  author       = {Ilan Komargodski and
                  Tal Moran and
                  Moni Naor and
                  Rafael Pass and
                  Alon Rosen and
                  Eylon Yogev},
  title        = {One-Way Functions and (Im)Perfect Obfuscation},
  booktitle    = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2014, Philadelphia, PA, USA, October 18-21, 2014},
  pages        = {374--383},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FOCS.2014.47},
  doi          = {10.1109/FOCS.2014.47},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/KomargodskiMNPRY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2014,
  editor       = {Moni Naor},
  title        = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
                  USA, January 12-14, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2554797},
  isbn         = {978-1-4503-2698-8},
  timestamp    = {Fri, 14 Feb 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KomargodskiNY14,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {Secret-Sharing for {NP} from Indistinguishability Obfuscation},
  journal      = {CoRR},
  volume       = {abs/1403.5698},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.5698},
  eprinttype    = {arXiv},
  eprint       = {1403.5698},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KomargodskiNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AmirKKNP14,
  author       = {Amihood Amir and
                  Oren Kapah and
                  Tsvi Kopelowitz and
                  Moni Naor and
                  Ely Porat},
  title        = {The Family Holiday Gathering Problem or Fair and Periodic Scheduling
                  of Independent Sets},
  journal      = {CoRR},
  volume       = {abs/1408.2279},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.2279},
  eprinttype    = {arXiv},
  eprint       = {1408.2279},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AmirKKNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NaorY14,
  author       = {Moni Naor and
                  Eylon Yogev},
  title        = {Bloom Filters in Adversarial Environments},
  journal      = {CoRR},
  volume       = {abs/1412.8356},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.8356},
  eprinttype    = {arXiv},
  eprint       = {1412.8356},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NaorY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiNY14,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {Secret-Sharing for {NP} from Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiMNPRY14,
  author       = {Ilan Komargodski and
                  Tal Moran and
                  Moni Naor and
                  Rafael Pass and
                  Alon Rosen and
                  Eylon Yogev},
  title        = {One-Way Functions and (Im)perfect Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiMNPRY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldbergNPRVZ14,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin and
                  Sachin Vasant and
                  Asaf Ziv},
  title        = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/582},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldbergNPRVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorZ14,
  author       = {Moni Naor and
                  Asaf Ziv},
  title        = {Primary-Secondary-Resolver Membership Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {905},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/905},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/NaorY13,
  author       = {Moni Naor and
                  Eylon Yogev},
  editor       = {Leizhen Cai and
                  Siu{-}Wing Cheng and
                  Tak Wah Lam},
  title        = {Sliding Bloom Filters},
  booktitle    = {Algorithms and Computation - 24th International Symposium, {ISAAC}
                  2013, Hong Kong, China, December 16-18, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8283},
  pages        = {513--523},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45030-3\_48},
  doi          = {10.1007/978-3-642-45030-3\_48},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/NaorY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BrakerskiN13,
  author       = {Zvika Brakerski and
                  Moni Naor},
  editor       = {Sanjeev Khanna},
  title        = {Fast Algorithms for Interactive Coding},
  booktitle    = {Proceedings of the Twenty-Fourth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2013, New Orleans, Louisiana, USA, January 6-8,
                  2013},
  pages        = {443--456},
  publisher    = {{SIAM}},
  year         = {2013},
  url          = {https://doi.org/10.1137/1.9781611973105.32},
  doi          = {10.1137/1.9781611973105.32},
  timestamp    = {Tue, 02 Feb 2021 17:07:29 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/BrakerskiN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BermanHKN13,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  editor       = {Amit Sahai},
  title        = {Hardness Preserving Reductions via Cuckoo Hashing},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_3},
  doi          = {10.1007/978-3-642-36594-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BermanHKN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-5872,
  author       = {Moni Naor and
                  Eylon Yogev},
  title        = {Sliding Bloom Filters},
  journal      = {CoRR},
  volume       = {abs/1304.5872},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.5872},
  eprinttype    = {arXiv},
  eprint       = {1304.5872},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-5872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BrakerskiN13,
  author       = {Zvika Brakerski and
                  Moni Naor},
  title        = {Fast Algorithms for Interactive Coding},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-014}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/014},
  eprinttype    = {ECCC},
  eprint       = {TR13-014},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BrakerskiN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorS12,
  author       = {Moni Naor and
                  Gil Segev},
  title        = {Public-Key Cryptosystems Resilient to Key Leakage},
  journal      = {{SIAM} J. Comput.},
  volume       = {41},
  number       = {4},
  pages        = {772--814},
  year         = {2012},
  url          = {https://doi.org/10.1137/100813464},
  doi          = {10.1137/100813464},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkNV12,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Salil P. Vadhan},
  title        = {The Privacy of the Analyst and the Power of the State},
  booktitle    = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages        = {400--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FOCS.2012.87},
  doi          = {10.1109/FOCS.2012.87},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DworkNV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BermanHKN12,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Hardness Preserving Reductions via Cuckoo Hashing},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-182}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/182},
  eprinttype    = {ECCC},
  eprint       = {TR12-182},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BermanHKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBNRSSY12,
  author       = {Mihir Bellare and
                  Zvika Brakerski and
                  Moni Naor and
                  Thomas Ristenpart and
                  Gil Segev and
                  Hovav Shacham and
                  Scott Yilek},
  title        = {Hedged Public-key Encryption: How to Protect against Bad Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBNRSSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BermanHKN12,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Hardness Preserving Reductions via Cuckoo Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BermanHKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/MironovNS11,
  author       = {Ilya Mironov and
                  Moni Naor and
                  Gil Segev},
  title        = {Sketching in Adversarial Environments},
  journal      = {{SIAM} J. Comput.},
  volume       = {40},
  number       = {6},
  pages        = {1845--1870},
  year         = {2011},
  url          = {https://doi.org/10.1137/080733772},
  doi          = {10.1137/080733772},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/MironovNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/HalprinN10,
  author       = {Ran Halprin and
                  Moni Naor},
  title        = {Games for extracting randomness},
  journal      = {{XRDS}},
  volume       = {17},
  number       = {2},
  pages        = {44--48},
  year         = {2010},
  url          = {https://doi.org/10.1145/1869086.1869101},
  doi          = {10.1145/1869086.1869101},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/HalprinN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NaorP10,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Efficient trace and revoke schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {6},
  pages        = {411--424},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0121-2},
  doi          = {10.1007/S10207-010-0121-2},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/NaorP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkN10,
  author       = {Cynthia Dwork and
                  Moni Naor},
  title        = {On the Difficulties of Disclosure Prevention in Statistical Databases
                  or The Case for Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {2},
  number       = {1},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v2i1.585},
  doi          = {10.29012/JPC.V2I1.585},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/HarnikN10,
  author       = {Danny Harnik and
                  Moni Naor},
  title        = {On the Compressibility of \emph{NP} Instances and Cryptographic Applications},
  journal      = {{SIAM} J. Comput.},
  volume       = {39},
  number       = {5},
  pages        = {1667--1713},
  year         = {2010},
  url          = {https://doi.org/10.1137/060668092},
  doi          = {10.1137/060668092},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/HarnikN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MoranN10,
  author       = {Tal Moran and
                  Moni Naor},
  title        = {Basing cryptographic protocols on tamper-evident seals},
  journal      = {Theor. Comput. Sci.},
  volume       = {411},
  number       = {10},
  pages        = {1283--1310},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.tcs.2009.10.023},
  doi          = {10.1016/J.TCS.2009.10.023},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/MoranN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MoranN10,
  author       = {Tal Moran and
                  Moni Naor},
  title        = {Split-ballot voting: Everlasting privacy with distributed trust},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {16:1--16:43},
  year         = {2010},
  url          = {https://doi.org/10.1145/1698750.1698756},
  doi          = {10.1145/1698750.1698756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MoranN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/Naor10,
  author       = {Moni Naor},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {The privacy of tracing traitors},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866871},
  doi          = {10.1145/1866870.1866871},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/Naor10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenDNSWW10,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Moni Naor and
                  Gil Segev and
                  Shabsi Walfish and
                  Daniel Wichs},
  editor       = {Henri Gilbert},
  title        = {Public-Key Encryption in the Bounded-Retrieval Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {113--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_6},
  doi          = {10.1007/978-3-642-13190-5\_6},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenDNSWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ArbitmanNS10,
  author       = {Yuriy Arbitman and
                  Moni Naor and
                  Gil Segev},
  title        = {Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct
                  Representation},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {787--796},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.80},
  doi          = {10.1109/FOCS.2010.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ArbitmanNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DworkNPRY10,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Toniann Pitassi and
                  Guy N. Rothblum and
                  Sergey Yekhanin},
  editor       = {Andrew Chi{-}Chih Yao},
  title        = {Pan-Private Streaming Algorithms},
  booktitle    = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
                  Beijing, China, January 5-7, 2010. Proceedings},
  pages        = {66--80},
  publisher    = {Tsinghua University Press},
  year         = {2010},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/6.html},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/DworkNPRY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkNPR10,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Toniann Pitassi and
                  Guy N. Rothblum},
  editor       = {Leonard J. Schulman},
  title        = {Differential privacy under continual observation},
  booktitle    = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
                  2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages        = {715--724},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1806689.1806787},
  doi          = {10.1145/1806689.1806787},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DworkNPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/KaplanNR09,
  author       = {Eyal Kaplan and
                  Moni Naor and
                  Omer Reingold},
  title        = {Derandomized Constructions of \emph{k}-Wise (Almost) Independent Permutations},
  journal      = {Algorithmica},
  volume       = {55},
  number       = {1},
  pages        = {113--133},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00453-008-9267-y},
  doi          = {10.1007/S00453-008-9267-Y},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/KaplanNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/NaorR09,
  author       = {Moni Naor and
                  Guy N. Rothblum},
  title        = {The complexity of online memory checking},
  journal      = {J. {ACM}},
  volume       = {56},
  number       = {1},
  pages        = {2:1--2:46},
  year         = {2009},
  url          = {https://doi.org/10.1145/1462153.1462155},
  doi          = {10.1145/1462153.1462155},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/NaorR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/GradwohlNPR09,
  author       = {Ronen Gradwohl and
                  Moni Naor and
                  Benny Pinkas and
                  Guy N. Rothblum},
  title        = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions
                  of Sudoku Puzzles},
  journal      = {Theory Comput. Syst.},
  volume       = {44},
  number       = {2},
  pages        = {245--268},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00224-008-9119-9},
  doi          = {10.1007/S00224-008-9119-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mst/GradwohlNPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toc/MoranNS09,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  title        = {Deterministic History-Independent Strategies for Storing Information
                  on Write-Once Memories},
  journal      = {Theory Comput.},
  volume       = {5},
  number       = {1},
  pages        = {43--67},
  year         = {2009},
  url          = {https://doi.org/10.4086/toc.2009.v005a002},
  doi          = {10.4086/TOC.2009.V005A002},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toc/MoranNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellareBNRSSY09,
  author       = {Mihir Bellare and
                  Zvika Brakerski and
                  Moni Naor and
                  Thomas Ristenpart and
                  Gil Segev and
                  Hovav Shacham and
                  Scott Yilek},
  editor       = {Mitsuru Matsui},
  title        = {Hedged Public-Key Encryption: How to Protect against Bad Randomness},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_14},
  doi          = {10.1007/978-3-642-10366-7\_14},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellareBNRSSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorS09,
  author       = {Moni Naor and
                  Gil Segev},
  editor       = {Shai Halevi},
  title        = {Public-Key Cryptosystems Resilient to Key Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {18--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_2},
  doi          = {10.1007/978-3-642-03356-8\_2},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ArbitmanNS09,
  author       = {Yuriy Arbitman and
                  Moni Naor and
                  Gil Segev},
  editor       = {Susanne Albers and
                  Alberto Marchetti{-}Spaccamela and
                  Yossi Matias and
                  Sotiris E. Nikoletseas and
                  Wolfgang Thomas},
  title        = {De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental
                  Results},
  booktitle    = {Automata, Languages and Programming, 36th International Colloquium,
                  {ICALP} 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5555},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02927-1\_11},
  doi          = {10.1007/978-3-642-02927-1\_11},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/ArbitmanNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HalprinN09,
  author       = {Ran Halprin and
                  Moni Naor},
  editor       = {Lorrie Faith Cranor},
  title        = {Games for extracting randomness},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572548},
  doi          = {10.1145/1572532.1572548},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/HalprinN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkNRRV09,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Omer Reingold and
                  Guy N. Rothblum and
                  Salil P. Vadhan},
  editor       = {Michael Mitzenmacher},
  title        = {On the complexity of differentially private data release: efficient
                  algorithms and hardness results},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {381--390},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536467},
  doi          = {10.1145/1536414.1536467},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DworkNRRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MoranNS09,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  editor       = {Omer Reingold},
  title        = {An Optimally Fair Coin Toss},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_1},
  doi          = {10.1007/978-3-642-00457-5\_1},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MoranNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DworkNRV09,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum and
                  Vinod Vaikuntanathan},
  editor       = {Omer Reingold},
  title        = {How Efficient Can Memory Checking Be?},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {503--520},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_30},
  doi          = {10.1007/978-3-642-00457-5\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DworkNRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-0391,
  author       = {Yuriy Arbitman and
                  Moni Naor and
                  Gil Segev},
  title        = {De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental
                  Results},
  journal      = {CoRR},
  volume       = {abs/0903.0391},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.0391},
  eprinttype    = {arXiv},
  eprint       = {0903.0391},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-0391.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0912-5424,
  author       = {Yuriy Arbitman and
                  Moni Naor and
                  Gil Segev},
  title        = {Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct
                  Representation},
  journal      = {CoRR},
  volume       = {abs/0912.5424},
  year         = {2009},
  url          = {http://arxiv.org/abs/0912.5424},
  eprinttype    = {arXiv},
  eprint       = {0912.5424},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0912-5424.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorS09,
  author       = {Moni Naor and
                  Gil Segev},
  title        = {Public-Key Cryptosystems Resilient to Key Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoranNS09,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  title        = {An Optimally Fair Coin Toss},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoranNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenDNSWW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Moni Naor and
                  Gil Segev and
                  Shabsi Walfish and
                  Daniel Wichs},
  title        = {Public-Key Encryption in the Bounded-Retrieval Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenDNSWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NaorSS08,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2408--2425},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921691},
  doi          = {10.1109/TIT.2008.921691},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/NaorSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehN08,
  author       = {Dan Boneh and
                  Moni Naor},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Traitor tracing with constant size ciphertext},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {501--510},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455834},
  doi          = {10.1145/1455770.1455834},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BonehN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/NaorSW08,
  author       = {Moni Naor and
                  Gil Segev and
                  Udi Wieder},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {History-Independent Cuckoo Hashing},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {631--642},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_51},
  doi          = {10.1007/978-3-540-70583-3\_51},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/NaorSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/BabaioffBNS08,
  author       = {Moshe Babaioff and
                  Liad Blumrosen and
                  Moni Naor and
                  Michael Schapira},
  editor       = {Lance Fortnow and
                  John Riedl and
                  Tuomas Sandholm},
  title        = {Informational overhead of incentive compatibility},
  booktitle    = {Proceedings 9th {ACM} Conference on Electronic Commerce (EC-2008),
                  Chicago, IL, USA, June 8-12, 2008},
  pages        = {88--97},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1386790.1386807},
  doi          = {10.1145/1386790.1386807},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/BabaioffBNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KolN08,
  author       = {Gillat Kol and
                  Moni Naor},
  editor       = {Cynthia Dwork},
  title        = {Games for exchanging information},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {423--432},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374437},
  doi          = {10.1145/1374376.1374437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KolN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MironovNS08,
  author       = {Ilya Mironov and
                  Moni Naor and
                  Gil Segev},
  editor       = {Cynthia Dwork},
  title        = {Sketching in adversarial environments},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {651--660},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374471},
  doi          = {10.1145/1374376.1374471},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/MironovNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KolN08,
  author       = {Gillat Kol and
                  Moni Naor},
  editor       = {Ran Canetti},
  title        = {Cryptography and Game Theory: Designing Protocols for Exchanging Information},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {320--339},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_18},
  doi          = {10.1007/978-3-540-78524-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KolN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorSW08,
  author       = {Moni Naor and
                  Gil Segev and
                  Udi Wieder},
  title        = {History-Independent Cuckoo Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DworkN07,
  author       = {Cynthia Dwork and
                  Moni Naor},
  title        = {Zaps and Their Applications},
  journal      = {{SIAM} J. Comput.},
  volume       = {36},
  number       = {6},
  pages        = {1513--1543},
  year         = {2007},
  url          = {https://doi.org/10.1137/S0097539703426817},
  doi          = {10.1137/S0097539703426817},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DworkN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/NaorW07,
  author       = {Moni Naor and
                  Udi Wieder},
  title        = {Novel architectures for {P2P} applications: The continuous-discrete
                  approach},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {3},
  number       = {3},
  pages        = {34},
  year         = {2007},
  url          = {https://doi.org/10.1145/1273340.1273350},
  doi          = {10.1145/1273340.1273350},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/NaorW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/NaorN07,
  author       = {Moni Naor and
                  Asaf Nussboim},
  editor       = {Moses Charikar and
                  Klaus Jansen and
                  Omer Reingold and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Implementing Huge Sparse Random Graphs},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques, 10th International Workshop, {APPROX} 2007, and 11th
                  International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August
                  20-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4627},
  pages        = {596--608},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74208-1\_43},
  doi          = {10.1007/978-3-540-74208-1\_43},
  timestamp    = {Sat, 30 Sep 2023 09:34:32 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/NaorN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoranN07,
  author       = {Tal Moran and
                  Moni Naor},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Split-ballot voting: everlasting privacy with distributed trust},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {246--255},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315277},
  doi          = {10.1145/1315245.1315277},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoranN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fun/GradwohlNPR07,
  author       = {Ronen Gradwohl and
                  Moni Naor and
                  Benny Pinkas and
                  Guy N. Rothblum},
  editor       = {Pierluigi Crescenzi and
                  Giuseppe Prencipe and
                  Geppino Pucci},
  title        = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions
                  of Sudoku Puzzles},
  booktitle    = {Fun with Algorithms, 4th International Conference, {FUN} 2007, Castiglioncello,
                  Italy, June 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4475},
  pages        = {166--182},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72914-3\_16},
  doi          = {10.1007/978-3-540-72914-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/fun/GradwohlNPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/MoranNS07,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  editor       = {Lars Arge and
                  Christian Cachin and
                  Tomasz Jurdzinski and
                  Andrzej Tarlecki},
  title        = {Deterministic History-Independent Strategies for Storing Information
                  on Write-Once Memories},
  booktitle    = {Automata, Languages and Programming, 34th International Colloquium,
                  {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4596},
  pages        = {303--315},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73420-8\_28},
  doi          = {10.1007/978-3-540-73420-8\_28},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/MoranNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2007,
  editor       = {Moni Naor},
  title        = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4},
  doi          = {10.1007/978-3-540-72540-4},
  isbn         = {978-3-540-72539-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoranNS07,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  title        = {Deterministic History-Independent Strategies for Storing Information
                  on Write-Once Memories},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoranNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HarnikNRR06,
  author       = {Danny Harnik and
                  Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  title        = {Completeness in Two-Party Secure Computation: {A} Computational View},
  journal      = {J. Cryptol.},
  volume       = {19},
  number       = {4},
  pages        = {521--552},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00145-006-0346-4},
  doi          = {10.1007/S00145-006-0346-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HarnikNRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorP06,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Oblivious Polynomial Evaluation},
  journal      = {{SIAM} J. Comput.},
  volume       = {35},
  number       = {5},
  pages        = {1254--1281},
  year         = {2006},
  url          = {https://doi.org/10.1137/S0097539704383633},
  doi          = {10.1137/S0097539704383633},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorSS06,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  editor       = {Cynthia Dwork},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_13},
  doi          = {10.1007/11818175\_13},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MoranN06,
  author       = {Tal Moran and
                  Moni Naor},
  editor       = {Cynthia Dwork},
  title        = {Receipt-Free Universally-Verifiable Voting with Everlasting Privacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_22},
  doi          = {10.1007/11818175\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MoranN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MoranN06,
  author       = {Tal Moran and
                  Moni Naor},
  editor       = {Serge Vaudenay},
  title        = {Polling with Physical Envelopes: {A} Rigorous Analysis of a Human-Centric
                  Protocol},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_7},
  doi          = {10.1007/11761679\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MoranN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DworkKMMN06,
  author       = {Cynthia Dwork and
                  Krishnaram Kenthapadi and
                  Frank McSherry and
                  Ilya Mironov and
                  Moni Naor},
  editor       = {Serge Vaudenay},
  title        = {Our Data, Ourselves: Privacy Via Distributed Noise Generation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {486--503},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_29},
  doi          = {10.1007/11761679\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DworkKMMN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/HarnikN06,
  author       = {Danny Harnik and
                  Moni Naor},
  title        = {On the Compressibility of {NP} Instances and Cryptographic Applications},
  booktitle    = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages        = {719--728},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FOCS.2006.54},
  doi          = {10.1109/FOCS.2006.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/HarnikN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HarnikN06,
  author       = {Danny Harnik and
                  Moni Naor},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {On Everlasting Security in the \emph{Hybrid} Bounded Storage Model},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_17},
  doi          = {10.1007/11787006\_17},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HarnikN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/NaorR06,
  author       = {Moni Naor and
                  Guy N. Rothblum},
  editor       = {William W. Cohen and
                  Andrew W. Moore},
  title        = {Learning to impersonate},
  booktitle    = {Machine Learning, Proceedings of the Twenty-Third International Conference
                  {(ICML} 2006), Pittsburgh, Pennsylvania, USA, June 25-29, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {148},
  pages        = {649--656},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143844.1143926},
  doi          = {10.1145/1143844.1143926},
  timestamp    = {Tue, 19 Nov 2019 09:25:06 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/NaorR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR06-002,
  author       = {Eyal Kaplan and
                  Moni Naor and
                  Omer Reingold},
  title        = {Derandomized Constructions of k-Wise (Almost) Independent Permutations},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR06-002}},
  year         = {2006},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-002/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR06-002},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR06-002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HarnikN06,
  author       = {Danny Harnik and
                  Moni Naor},
  title        = {On the Compressibility of {NP} Instances and Cryptographic Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR06-022}},
  year         = {2006},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-022/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR06-022},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HarnikN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/NaorR06,
  author       = {Moni Naor and
                  Guy N. Rothblum},
  title        = {The Complexity of Online Memory Checking},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR06-034}},
  year         = {2006},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-034/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR06-034},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/NaorR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR06,
  author       = {Moni Naor and
                  Guy N. Rothblum},
  title        = {The Complexity of Online Memory Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorSS06,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/NaorW05,
  author       = {Moni Naor and
                  Udi Wieder},
  title        = {Scalable and dynamic quorum systems},
  journal      = {Distributed Comput.},
  volume       = {17},
  number       = {4},
  pages        = {311--322},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00446-004-0114-3},
  doi          = {10.1007/S00446-004-0114-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/NaorW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/Naor05,
  author       = {Moni Naor},
  title        = {On fairness in the carpool problem},
  journal      = {J. Algorithms},
  volume       = {55},
  number       = {1},
  pages        = {93--98},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jalgor.2004.05.001},
  doi          = {10.1016/J.JALGOR.2004.05.001},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jal/Naor05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorP05,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Computationally Secure Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {1},
  pages        = {1--35},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-004-0102-6},
  doi          = {10.1007/S00145-004-0102-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/KaplanNR05,
  author       = {Eyal Kaplan and
                  Moni Naor and
                  Omer Reingold},
  editor       = {Chandra Chekuri and
                  Klaus Jansen and
                  Jos{\'{e}} D. P. Rolim and
                  Luca Trevisan},
  title        = {Derandomized Constructions of k-Wise (Almost) Independent Permutations},
  booktitle    = {Approximation, Randomization and Combinatorial Optimization, Algorithms
                  and Techniques, 8th International Workshop on Approximation Algorithms
                  for Combinatorial Optimization Problems, {APPROX} 2005 and 9th InternationalWorkshop
                  on Randomization and Computation, {RANDOM} 2005, Berkeley, CA, USA,
                  August 22-24, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3624},
  pages        = {354--365},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11538462\_30},
  doi          = {10.1007/11538462\_30},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/KaplanNR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkNW05,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Hoeteck Wee},
  editor       = {Victor Shoup},
  title        = {Pebbling and Proofs of Work},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_3},
  doi          = {10.1007/11535218\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkNW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HarnikKNRR05,
  author       = {Danny Harnik and
                  Joe Kilian and
                  Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  editor       = {Ronald Cramer},
  title        = {On Robust Combiners for Oblivious Transfer and Other Primitives},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {96--113},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_6},
  doi          = {10.1007/11426639\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HarnikKNRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorR05,
  author       = {Moni Naor and
                  Guy N. Rothblum},
  title        = {The Complexity of Online Memory Checking},
  booktitle    = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  pages        = {573--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SFCS.2005.71},
  doi          = {10.1109/SFCS.2005.71},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/MoranN05,
  author       = {Tal Moran and
                  Moni Naor},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Basing Cryptographic Protocols on Tamper-Evident Seals},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_24},
  doi          = {10.1007/11523468\_24},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/MoranN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/NaorNT05,
  author       = {Moni Naor and
                  Asaf Nussboim and
                  Eran Tromer},
  editor       = {Joe Kilian},
  title        = {Efficiently Constructible Huge Graphs That Preserve First Order Properties
                  of Random Graphs},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_5},
  doi          = {10.1007/978-3-540-30576-7\_5},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/NaorNT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/NadavN05,
  author       = {Uri Nadav and
                  Moni Naor},
  editor       = {Pierre Fraigniaud},
  title        = {The Dynamic And-Or Quorum System},
  booktitle    = {Distributed Computing, 19th International Conference, {DISC} 2005,
                  Cracow, Poland, September 26-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3724},
  pages        = {472--486},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11561927\_34},
  doi          = {10.1007/11561927\_34},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/NadavN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/NaorR04,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Number-theoretic constructions of efficient pseudo-random functions},
  journal      = {J. {ACM}},
  volume       = {51},
  number       = {2},
  pages        = {231--262},
  year         = {2004},
  url          = {https://doi.org/10.1145/972639.972643},
  doi          = {10.1145/972639.972643},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/NaorR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DworkNS04,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Amit Sahai},
  title        = {Concurrent zero-knowledge},
  journal      = {J. {ACM}},
  volume       = {51},
  number       = {6},
  pages        = {851--898},
  year         = {2004},
  url          = {https://doi.org/10.1145/1039488.1039489},
  doi          = {10.1145/1039488.1039489},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/DworkNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DworkNR04,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Omer Reingold},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Immunizing Encryption Schemes from Decryption Errors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {342--360},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_21},
  doi          = {10.1007/978-3-540-24676-3\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DworkNR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/NaorW04,
  author       = {Moni Naor and
                  Udi Wieder},
  editor       = {Geoffrey M. Voelker and
                  Scott Shenker},
  title        = {Know Thy Neighbor's Neighbor: Better Routing for Skip-Graphs and Small
                  Worlds},
  booktitle    = {Peer-to-Peer Systems III, Third International Workshop, {IPTPS} 2004,
                  La Jolla, CA, USA, February 26-27, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3279},
  pages        = {269--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30183-7\_26},
  doi          = {10.1007/978-3-540-30183-7\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/NaorW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/MankuNW04,
  author       = {Gurmeet Singh Manku and
                  Moni Naor and
                  Udi Wieder},
  editor       = {L{\'{a}}szl{\'{o}} Babai},
  title        = {Know thy neighbor's neighbor: the power of lookahead in randomized
                  {P2P} networks},
  booktitle    = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
                  Chicago, IL, USA, June 13-16, 2004},
  pages        = {54--63},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1007352.1007368},
  doi          = {10.1145/1007352.1007368},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/MankuNW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/HarnikNRR04,
  author       = {Danny Harnik and
                  Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  editor       = {L{\'{a}}szl{\'{o}} Babai},
  title        = {Completeness in two-party secure computation: a computational view},
  booktitle    = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing,
                  Chicago, IL, USA, June 13-16, 2004},
  pages        = {252--261},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1007352.1007395},
  doi          = {10.1145/1007352.1007395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/HarnikNRR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/NadavN04,
  author       = {Uri Nadav and
                  Moni Naor},
  editor       = {Rachid Guerraoui},
  title        = {Fault-Tolerant Storage in a Dynamic Environment},
  booktitle    = {Distributed Computing, 18th International Conference, {DISC} 2004,
                  Amsterdam, The Netherlands, October 4-7, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3274},
  pages        = {390--404},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30186-8\_28},
  doi          = {10.1007/978-3-540-30186-8\_28},
  timestamp    = {Wed, 07 Dec 2022 23:11:11 +0100},
  biburl       = {https://dblp.org/rec/conf/wdag/NadavN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2004,
  editor       = {Moni Naor},
  title        = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95566},
  doi          = {10.1007/B95566},
  isbn         = {3-540-21000-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/NaorN03,
  author       = {Dalit Naor and
                  Moni Naor},
  title        = {Protecting Cryptographic Keys: The Trace-and-Revoke Approach},
  journal      = {Computer},
  volume       = {36},
  number       = {7},
  pages        = {47--53},
  year         = {2003},
  url          = {https://doi.org/10.1109/MC.2003.1212690},
  doi          = {10.1109/MC.2003.1212690},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/NaorN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DworkNRS03,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Omer Reingold and
                  Larry J. Stockmeyer},
  title        = {Magic Functions},
  journal      = {J. {ACM}},
  volume       = {50},
  number       = {6},
  pages        = {852--921},
  year         = {2003},
  url          = {https://doi.org/10.1145/950620.950623},
  doi          = {10.1145/950620.950623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/DworkNRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FaginLN03,
  author       = {Ronald Fagin and
                  Amnon Lotem and
                  Moni Naor},
  title        = {Optimal aggregation algorithms for middleware},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {66},
  number       = {4},
  pages        = {614--656},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0022-0000(03)00026-6},
  doi          = {10.1016/S0022-0000(03)00026-6},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/FaginLN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamrev/DolevDN03,
  author       = {Danny Dolev and
                  Cynthia Dwork and
                  Moni Naor},
  title        = {Nonmalleable Cryptography},
  journal      = {{SIAM} Rev.},
  volume       = {45},
  number       = {4},
  pages        = {727--784},
  year         = {2003},
  url          = {https://doi.org/10.1137/S0036144503429856},
  doi          = {10.1137/S0036144503429856},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamrev/DolevDN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Naor03,
  author       = {Moni Naor},
  editor       = {Dan Boneh},
  title        = {On Cryptographic Assumptions and Challenges},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_6},
  doi          = {10.1007/978-3-540-45146-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Naor03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkGN03,
  author       = {Cynthia Dwork and
                  Andrew V. Goldberg and
                  Moni Naor},
  editor       = {Dan Boneh},
  title        = {On Memory-Bound Functions for Fighting Spam},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {426--444},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_25},
  doi          = {10.1007/978-3-540-45146-4\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkGN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Naor03,
  author       = {Moni Naor},
  editor       = {Paritosh K. Pandya and
                  Jaikumar Radhakrishnan},
  title        = {Moderately Hard Functions: From Complexity to Spam Fighting},
  booktitle    = {{FST} {TCS} 2003: Foundations of Software Technology and Theoretical
                  Computer Science, 23rd Conference, Mumbai, India, December 15-17,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2914},
  pages        = {434--442},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24597-1\_37},
  doi          = {10.1007/978-3-540-24597-1\_37},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/Naor03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iptps/NaorW03,
  author       = {Moni Naor and
                  Udi Wieder},
  editor       = {M. Frans Kaashoek and
                  Ion Stoica},
  title        = {A Simple Fault Tolerant Distributed Hash Table},
  booktitle    = {Peer-to-Peer Systems II, Second International Workshop, {IPTPS} 2003,
                  Berkeley, CA, USA, February 21-22,2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2735},
  pages        = {88--97},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45172-3\_8},
  doi          = {10.1007/978-3-540-45172-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iptps/NaorW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/NaorW03,
  author       = {Moni Naor and
                  Udi Wieder},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Scalable and dynamic quorum systems},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {114--122},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872052},
  doi          = {10.1145/872035.872052},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/NaorW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/NaorW03,
  author       = {Moni Naor and
                  Udi Wieder},
  editor       = {Arnold L. Rosenberg and
                  Friedhelm Meyer auf der Heide},
  title        = {Novel architectures for {P2P} applications: the continuous-discrete
                  approach},
  booktitle    = {{SPAA} 2003: Proceedings of the Fifteenth Annual {ACM} Symposium on
                  Parallelism in Algorithms and Architectures, June 7-9, 2003, San Diego,
                  California, {USA} (part of {FCRC} 2003)},
  pages        = {50--59},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/777412.777421},
  doi          = {10.1145/777412.777421},
  timestamp    = {Wed, 21 Nov 2018 11:11:22 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/NaorW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR03-060,
  author       = {Danny Harnik and
                  Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  title        = {Completeness in Two-Party Secure Computation - {A} Computational View},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR03-060}},
  year         = {2003},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-060/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR03-060},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR03-060.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorR02,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Constructing Pseudo-Random Permutations with a Prescribed Structure},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {2},
  pages        = {97--102},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0008-5},
  doi          = {10.1007/S00145-001-0008-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorRR02,
  author       = {Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  title        = {Pseudorandom Functions and Factoring},
  journal      = {{SIAM} J. Comput.},
  volume       = {31},
  number       = {5},
  pages        = {1383--1404},
  year         = {2002},
  url          = {https://doi.org/10.1137/S0097539701389257},
  doi          = {10.1137/S0097539701389257},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorRR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Naor02,
  author       = {Moni Naor},
  editor       = {Moti Yung},
  title        = {Deniable Ring Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {481--498},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_31},
  doi          = {10.1007/3-540-45708-9\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Naor02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiNR02,
  author       = {Dahlia Malkhi and
                  Moni Naor and
                  David Ratajczak},
  editor       = {Aleta Ricciardi},
  title        = {Viceroy: a scalable and dynamic emulation of the butterfly},
  booktitle    = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2002, Monterey, California, USA,
                  July 21-24, 2002},
  pages        = {183--192},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/571825.571857},
  doi          = {10.1145/571825.571857},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/MalkhiNR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DB-0204046,
  author       = {Ronald Fagin and
                  Amnon Lotem and
                  Moni Naor},
  title        = {Optimal Aggregation Algorithms for Middleware},
  journal      = {CoRR},
  volume       = {cs.DB/0204046},
  year         = {2002},
  url          = {https://arxiv.org/abs/cs/0204046},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-DB-0204046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR02-001,
  author       = {Cynthia Dwork and
                  Moni Naor},
  title        = {Zaps and Their Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR02-001}},
  year         = {2002},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-001/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR02-001},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR02-001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR02-043,
  author       = {Dalit Naor and
                  Moni Naor and
                  Jeffery Lotspiech},
  title        = {Revocation and Tracing Schemes for Stateless Receivers},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR02-043}},
  year         = {2002},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2002/TR02-043/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR02-043},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR02-043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichLN02,
  author       = {Oded Goldreich and
                  Yoad Lustig and
                  Moni Naor},
  title        = {On Chosen Ciphertext Security of Multiple Encryptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichLN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/NaorR01,
  author       = {Moni Naor and
                  Sitvanit Ruah},
  title        = {On the Decisional Complexity of Problems Over the Reals},
  journal      = {Inf. Comput.},
  volume       = {167},
  number       = {1},
  pages        = {27--45},
  year         = {2001},
  url          = {https://doi.org/10.1006/inco.2000.3012},
  doi          = {10.1006/INCO.2000.3012},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/NaorR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorNL01,
  author       = {Dalit Naor and
                  Moni Naor and
                  Jeffery Lotspiech},
  editor       = {Joe Kilian},
  title        = {Revocation and Tracing Schemes for Stateless Receivers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {41--62},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_3},
  doi          = {10.1007/3-540-44647-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorNL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/FaginLN01,
  author       = {Ronald Fagin and
                  Amnon Lotem and
                  Moni Naor},
  editor       = {Peter Buneman},
  title        = {Optimal Aggregation Algorithms for Middleware},
  booktitle    = {Proceedings of the Twentieth {ACM} {SIGACT-SIGMOD-SIGART} Symposium
                  on Principles of Database Systems, May 21-23, 2001, Santa Barbara,
                  California, {USA}},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/375551.375567},
  doi          = {10.1145/375551.375567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/FaginLN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/NaorP01,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {S. Rao Kosaraju},
  title        = {Efficient oblivious transfer protocols},
  booktitle    = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms,
                  January 7-9, 2001, Washington, DC, {USA}},
  pages        = {448--457},
  publisher    = {{ACM/SIAM}},
  year         = {2001},
  url          = {http://dl.acm.org/citation.cfm?id=365411.365502},
  timestamp    = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/NaorP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/NaorR01a,
  author       = {Moni Naor and
                  Omer Reingold},
  editor       = {S. Rao Kosaraju},
  title        = {Constructing pseudo-random permutations with a prescribed structure},
  booktitle    = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms,
                  January 7-9, 2001, Washington, DC, {USA}},
  pages        = {458--459},
  publisher    = {{ACM/SIAM}},
  year         = {2001},
  url          = {http://dl.acm.org/citation.cfm?id=365411.365505},
  timestamp    = {Fri, 07 Dec 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/NaorR01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorT01,
  author       = {Moni Naor and
                  Vanessa Teague},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {Anti-presistence: history independent data structures},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {492--501},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380844},
  doi          = {10.1145/380752.380844},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorN01,
  author       = {Moni Naor and
                  Kobbi Nissim},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {Communication preserving protocols for secure function evaluation},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {590--599},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380855},
  doi          = {10.1145/380752.380855},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/DworkKNS01,
  author       = {Cynthia Dwork and
                  Ravi Kumar and
                  Moni Naor and
                  D. Sivakumar},
  editor       = {Vincent Y. Shen and
                  Nobuo Saito and
                  Michael R. Lyu and
                  Mary Ellen Zurko},
  title        = {Rank aggregation methods for the Web},
  booktitle    = {Proceedings of the Tenth International World Wide Web Conference,
                  {WWW} 10, Hong Kong, China, May 1-5, 2001},
  pages        = {613--622},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/371920.372165},
  doi          = {10.1145/371920.372165},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/DworkKNS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0109011,
  author       = {Moni Naor and
                  Kobbi Nissim},
  title        = {Communication Complexity and Secure Function Evaluation},
  journal      = {CoRR},
  volume       = {cs.CR/0109011},
  year         = {2001},
  url          = {https://arxiv.org/abs/cs/0109011},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0109011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-062,
  author       = {Moni Naor and
                  Kobbi Nissim},
  title        = {Communication Complexity and Secure Function Evaluation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR01-062}},
  year         = {2001},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-062/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR01-062},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR01-062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-064,
  author       = {Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  title        = {Pseudo-Random Functions and Factoring},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR01-064}},
  year         = {2001},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-064/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR01-064},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR01-064.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorT01,
  author       = {Moni Naor and
                  Vanessa Teague},
  title        = {Anti-persistence: History Independent Data Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorNB01,
  author       = {Dalit Naor and
                  Moni Naor and
                  Jeffrey B. Lotspiech},
  title        = {Revocation and Tracing Schemes for Stateless Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorNB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorRR01,
  author       = {Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  title        = {Pseudo-Random Functions and Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorRR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorN01,
  author       = {Moni Naor and
                  Kobbi Nissim},
  title        = {Communication Complexity and Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/BlundoSN00,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Moni Naor},
  title        = {Visual cryptography for grey level images},
  journal      = {Inf. Process. Lett.},
  volume       = {75},
  number       = {6},
  pages        = {255--259},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0190(00)00108-3},
  doi          = {10.1016/S0020-0190(00)00108-3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/BlundoSN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/NaorN00,
  author       = {Moni Naor and
                  Kobbi Nissim},
  title        = {Certificate revocation and certificate update},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {4},
  pages        = {561--570},
  year         = {2000},
  url          = {https://doi.org/10.1109/49.839932},
  doi          = {10.1109/49.839932},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/NaorN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DolevDN00,
  author       = {Danny Dolev and
                  Cynthia Dwork and
                  Moni Naor},
  title        = {Nonmalleable Cryptography},
  journal      = {{SIAM} J. Comput.},
  volume       = {30},
  number       = {2},
  pages        = {391--437},
  year         = {2000},
  url          = {https://doi.org/10.1137/S0097539795291562},
  doi          = {10.1137/S0097539795291562},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DolevDN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ChorFNP00,
  author       = {Benny Chor and
                  Amos Fiat and
                  Moni Naor and
                  Benny Pinkas},
  title        = {Tracing traitors},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {893--910},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841169},
  doi          = {10.1109/18.841169},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ChorFNP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaorP00,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Tatsuaki Okamoto},
  title        = {Distributed Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_16},
  doi          = {10.1007/3-540-44448-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaorP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehN00,
  author       = {Dan Boneh and
                  Moni Naor},
  editor       = {Mihir Bellare},
  title        = {Timed Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_15},
  doi          = {10.1007/3-540-44598-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NaorP00,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Yair Frankel},
  title        = {Efficient Trace and Revoke Schemes},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_1},
  doi          = {10.1007/3-540-45472-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NaorP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkN00,
  author       = {Cynthia Dwork and
                  Moni Naor},
  title        = {Zaps and Their Applications},
  booktitle    = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000,
                  12-14 November 2000, Redondo Beach, California, {USA}},
  pages        = {283--293},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SFCS.2000.892117},
  doi          = {10.1109/SFCS.2000.892117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DworkN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorRR00,
  author       = {Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {Pseudo-random functions and factoring (extended abstract)},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335307},
  doi          = {10.1145/335305.335307},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorRR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR00,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Constructing Pseudo-Random Permutations with a Prescribed Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/NaorR99,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Synthesizers and Their Application to the Parallel Construction of
                  Pseudo-Random Functions},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {58},
  number       = {2},
  pages        = {336--375},
  year         = {1999},
  url          = {https://doi.org/10.1006/jcss.1998.1618},
  doi          = {10.1006/JCSS.1998.1618},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/NaorR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorR99,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {1},
  pages        = {29--66},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003817},
  doi          = {10.1007/PL00003817},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FiatN99,
  author       = {Amos Fiat and
                  Moni Naor},
  title        = {Rigorous Time/Space Trade-offs for Inverting Functions},
  journal      = {{SIAM} J. Comput.},
  volume       = {29},
  number       = {3},
  pages        = {790--803},
  year         = {1999},
  url          = {https://doi.org/10.1137/S0097539795280512},
  doi          = {10.1137/S0097539795280512},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FiatN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP99,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Michael J. Wiener},
  title        = {Oblivious Transfer with Adaptive Queries},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {573--590},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_36},
  doi          = {10.1007/3-540-48405-1\_36},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaorPR99,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Omer Reingold},
  editor       = {Jacques Stern},
  title        = {Distributed Pseudo-random Functions and KDCs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {327--346},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_23},
  doi          = {10.1007/3-540-48910-X\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaorPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkNRS99,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Omer Reingold and
                  Larry J. Stockmeyer},
  title        = {Magic Functions},
  booktitle    = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
                  17-18 October, 1999, New York, NY, {USA}},
  pages        = {523--534},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SFFCS.1999.814626},
  doi          = {10.1109/SFFCS.1999.814626},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DworkNRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CanettiGIMNP99,
  author       = {Ran Canetti and
                  Juan A. Garay and
                  Gene Itkis and
                  Daniele Micciancio and
                  Moni Naor and
                  Benny Pinkas},
  title        = {Multicast Security: {A} Taxonomy and Some Efficient Constructions},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '99, The Conference on Computer Communications,
                  Eighteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, The Future Is Now, New York, NY, USA, March 21-25, 1999},
  pages        = {708--716},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/INFCOM.1999.751457},
  doi          = {10.1109/INFCOM.1999.751457},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/CanettiGIMNP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/NaorPS99,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Reuban Sumner},
  editor       = {Stuart I. Feldman and
                  Michael P. Wellman},
  title        = {Privacy preserving auctions and mechanism design},
  booktitle    = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99),
                  Denver, CO, USA, November 3-5, 1999},
  pages        = {129--139},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/336992.337028},
  doi          = {10.1145/336992.337028},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/NaorPS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BlazeFN99,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Moni Naor},
  editor       = {Robert Endre Tarjan and
                  Tandy J. Warnow},
  title        = {A Formal Treatment of Remotely Keyed Encryption},
  booktitle    = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  17-19 January 1999, Baltimore, Maryland, {USA}},
  pages        = {868--869},
  publisher    = {{ACM/SIAM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=314500.315056},
  timestamp    = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/BlazeFN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorP99,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Jeffrey Scott Vitter and
                  Lawrence L. Larmore and
                  Frank Thomson Leighton},
  title        = {Oblivious Transfer and Polynomial Evaluation},
  booktitle    = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
                  Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301250.301312},
  doi          = {10.1145/301250.301312},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DworkNS99,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Amit Sahai},
  title        = {Concurrent Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DworkNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/NaorP98,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Secure Accounting and Auditing on the Web},
  journal      = {Comput. Networks},
  volume       = {30},
  number       = {1-7},
  pages        = {541--550},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0169-7552(98)00116-0},
  doi          = {10.1016/S0169-7552(98)00116-0},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/NaorP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jal/AjtaiANRSW98,
  author       = {Mikl{\'{o}}s Ajtai and
                  James Aspnes and
                  Moni Naor and
                  Yuval Rabani and
                  Leonard J. Schulman and
                  Orli Waarts},
  title        = {Fairness in Scheduling},
  journal      = {J. Algorithms},
  volume       = {29},
  number       = {2},
  pages        = {306--357},
  year         = {1998},
  url          = {https://doi.org/10.1006/jagm.1998.0953},
  doi          = {10.1006/JAGM.1998.0953},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jal/AjtaiANRSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NaorOVY98,
  author       = {Moni Naor and
                  Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  title        = {Perfect Zero-Knowledge Arguments for \emph{NP} Using Any One-Way Permutation},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {87--108},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900037},
  doi          = {10.1007/S001459900037},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NaorOVY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DworkN98,
  author       = {Cynthia Dwork and
                  Moni Naor},
  title        = {An Efficient Existentially Unforgeable Signature Scheme and Its Applications},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {3},
  pages        = {187--208},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900043},
  doi          = {10.1007/S001459900043},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DworkN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorW98,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {The Load, Capacity, and Availability of Quorum Systems},
  journal      = {{SIAM} J. Comput.},
  volume       = {27},
  number       = {2},
  pages        = {423--447},
  year         = {1998},
  url          = {https://doi.org/10.1137/S0097539795281232},
  doi          = {10.1137/S0097539795281232},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/NaorW98,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {9},
  number       = {9},
  pages        = {909--922},
  year         = {1998},
  url          = {https://doi.org/10.1109/71.722223},
  doi          = {10.1109/71.722223},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/NaorW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorR98,
  author       = {Moni Naor and
                  Omer Reingold},
  editor       = {Hugo Krawczyk},
  title        = {From Unpredictability to Indistinguishability: {A} Simple Construction
                  of Pseudo-Random Functions from MACs (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {267--282},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055734},
  doi          = {10.1007/BFB0055734},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP98,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Hugo Krawczyk},
  title        = {Threshold Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {502--517},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055750},
  doi          = {10.1007/BFB0055750},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlazeFN98,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Moni Naor},
  editor       = {Kaisa Nyberg},
  title        = {A Formal Treatment of Remotely Keyed Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {251--265},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054131},
  doi          = {10.1007/BFB0054131},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlazeFN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaorP98,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Kaisa Nyberg},
  title        = {Secure and Efficient Metering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {576--590},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054155},
  doi          = {10.1007/BFB0054155},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaorP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkNS98,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Amit Sahai},
  editor       = {Jeffrey Scott Vitter},
  title        = {Concurrent Zero-Knowledge},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {409--418},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276853},
  doi          = {10.1145/276698.276853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DworkNS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NissimN98,
  author       = {Kobbi Nissim and
                  Moni Naor},
  editor       = {Aviel D. Rubin},
  title        = {Certificate Revocation and Certificate Update},
  booktitle    = {Proceedings of the 7th {USENIX} Security Symposium, San Antonio, TX,
                  USA, January 26-29, 1998},
  publisher    = {{USENIX} Association},
  year         = {1998},
  url          = {https://www.usenix.org/conference/7th-usenix-security-symposium/certificate-revocation-and-certificate-update},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NissimN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChorGN98,
  author       = {Benny Chor and
                  Niv Gilboa and
                  Moni Naor},
  title        = {Private Information Retrieval by Keywords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChorGN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiDNO97,
  author       = {Ran Canetti and
                  Cynthia Dwork and
                  Moni Naor and
                  Rafail Ostrovsky},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Deniable Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {90--104},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052229},
  doi          = {10.1007/BFB0052229},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiDNO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorP97,
  author       = {Moni Naor and
                  Benny Pinkas},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Visual Authentication and Identification},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052245},
  doi          = {10.1007/BFB0052245},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BellareIN97,
  author       = {Mihir Bellare and
                  Russell Impagliazzo and
                  Moni Naor},
  title        = {Does Parallel Repetition Lower the Error in Computationally Sound
                  Protocols?},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {374--383},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646126},
  doi          = {10.1109/SFCS.1997.646126},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BellareIN97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorR97,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Number-theoretic Constructions of Efficient Pseudo-random Functions},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {458--467},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646134},
  doi          = {10.1109/SFCS.1997.646134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorR97,
  author       = {Moni Naor and
                  Omer Reingold},
  editor       = {Frank Thomson Leighton and
                  Peter W. Shor},
  title        = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited
                  (Extended Abstract)},
  booktitle    = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
                  of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages        = {189--199},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258533.258581},
  doi          = {10.1145/258533.258581},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR97-005,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR97-005}},
  year         = {1997},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-005/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR97-005},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR97-005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorP97,
  author       = {Moni Naor and
                  Benny Pinkas},
  title        = {Visual Authentication and Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/AlonN96,
  author       = {Noga Alon and
                  Moni Naor},
  title        = {Derandomization, Witnesses for Boolean Matrix Multiplication and Construction
                  of Perfect Hash Functions},
  journal      = {Algorithmica},
  volume       = {16},
  number       = {4/5},
  pages        = {434--449},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF01940874},
  doi          = {10.1007/BF01940874},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/AlonN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/FaginNW96,
  author       = {Ronald Fagin and
                  Moni Naor and
                  Peter Winkler},
  title        = {Comparing Information Without Leaking It},
  journal      = {Commun. {ACM}},
  volume       = {39},
  number       = {5},
  pages        = {77--85},
  year         = {1996},
  url          = {https://doi.org/10.1145/229459.229469},
  doi          = {10.1145/229459.229469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/FaginNW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ImpagliazzoN96,
  author       = {Russell Impagliazzo and
                  Moni Naor},
  title        = {Efficient Cryptographic Schemes Provably as Secure as Subset Sum},
  journal      = {J. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {199--216},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00189260},
  doi          = {10.1007/BF00189260},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ImpagliazzoN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorW96,
  author       = {Moni Naor and
                  Avishai Wool},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238209},
  doi          = {10.1145/238168.238209},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaorW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/NaorR96,
  author       = {Moni Naor and
                  Sitvanit Ruah},
  title        = {On the Decisional Complexity of Problems Over the Reals},
  booktitle    = {Fourth Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1996, Jerusalem, Israel, June 10-12, 1996, Proceedings},
  pages        = {176--187},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  timestamp    = {Tue, 31 May 2016 15:27:26 +0200},
  biburl       = {https://dblp.org/rec/conf/istcs/NaorR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NaorS96,
  author       = {Moni Naor and
                  Adi Shamir},
  editor       = {T. Mark A. Lomas},
  title        = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {197--202},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_18},
  doi          = {10.1007/3-540-62494-5\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NaorS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Naor96,
  author       = {Moni Naor},
  editor       = {Gary L. Miller},
  title        = {Evaluation May Be Easier Than Generation (Extended Abstract)},
  booktitle    = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory
                  of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996},
  pages        = {74--83},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/237814.237833},
  doi          = {10.1145/237814.237833},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Naor96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkLN96,
  author       = {Cynthia Dwork and
                  Jeffrey B. Lotspiech and
                  Moni Naor},
  editor       = {Gary L. Miller},
  title        = {Digital Signets: Self-Enforcing Protection of Digital Information
                  (Preliminary Version)},
  booktitle    = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory
                  of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996},
  pages        = {489--498},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/237814.237997},
  doi          = {10.1145/237814.237997},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DworkLN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanettiFGN96,
  author       = {Ran Canetti and
                  Uriel Feige and
                  Oded Goldreich and
                  Moni Naor},
  editor       = {Gary L. Miller},
  title        = {Adaptively Secure Multi-Party Computation},
  booktitle    = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory
                  of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996},
  pages        = {639--648},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/237814.238015},
  doi          = {10.1145/237814.238015},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CanettiFGN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDNO96,
  author       = {Ran Canetti and
                  Cynthia Dwork and
                  Moni Naor and
                  Rafail Ostrovsky},
  title        = {Deniable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDNO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorS96,
  author       = {Moni Naor and
                  Adi Shamir},
  title        = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorW96,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR96,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorR95,
  author       = {Moni Naor and
                  Ron M. Roth},
  title        = {Optimal File Sharing in Distributed Networks},
  journal      = {{SIAM} J. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {158--183},
  year         = {1995},
  url          = {https://doi.org/10.1137/S0097539792237462},
  doi          = {10.1137/S0097539792237462},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FederKNN95,
  author       = {Tom{\'{a}}s Feder and
                  Eyal Kushilevitz and
                  Moni Naor and
                  Noam Nisan},
  title        = {Amortized Communication Complexity},
  journal      = {{SIAM} J. Comput.},
  volume       = {24},
  number       = {4},
  pages        = {736--750},
  year         = {1995},
  url          = {https://doi.org/10.1137/S0097539792235864},
  doi          = {10.1137/S0097539792235864},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FederKNN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorS95,
  author       = {Moni Naor and
                  Larry J. Stockmeyer},
  title        = {What Can be Computed Locally?},
  journal      = {{SIAM} J. Comput.},
  volume       = {24},
  number       = {6},
  pages        = {1259--1277},
  year         = {1995},
  url          = {https://doi.org/10.1137/S0097539793254571},
  doi          = {10.1137/S0097539793254571},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/LovaszNNW95,
  author       = {L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and
                  Moni Naor and
                  Ilan Newman and
                  Avi Wigderson},
  title        = {Search Problems in the Decision Tree Model},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {8},
  number       = {1},
  pages        = {119--132},
  year         = {1995},
  url          = {https://doi.org/10.1137/S0895480192233867},
  doi          = {10.1137/S0895480192233867},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/LovaszNNW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorR95,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Synthesizers and Their Application to the Parallel Construction of
                  Psuedo-Random Functions},
  booktitle    = {36th Annual Symposium on Foundations of Computer Science, Milwaukee,
                  Wisconsin, USA, 23-25 October 1995},
  pages        = {170--181},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/SFCS.1995.492474},
  doi          = {10.1109/SFCS.1995.492474},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorSS95,
  author       = {Moni Naor and
                  Leonard J. Schulman and
                  Aravind Srinivasan},
  title        = {Splitters and Near-Optimal Derandomization},
  booktitle    = {36th Annual Symposium on Foundations of Computer Science, Milwaukee,
                  Wisconsin, USA, 23-25 October 1995},
  pages        = {182--191},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/SFCS.1995.492475},
  doi          = {10.1109/SFCS.1995.492475},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorSS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/KilianN95,
  author       = {Joe Kilian and
                  Moni Naor},
  title        = {On the Complexity of Statistical Reasoning (extended abtract)},
  booktitle    = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings},
  pages        = {209--217},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ISTCS.1995.377030},
  doi          = {10.1109/ISTCS.1995.377030},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/KilianN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/MayerNS95,
  author       = {Alain J. Mayer and
                  Moni Naor and
                  Larry J. Stockmeyer},
  title        = {Local Computations on Static and Dynamic Graphs (Preliminary Version)},
  booktitle    = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings},
  pages        = {268--278},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ISTCS.1995.377023},
  doi          = {10.1109/ISTCS.1995.377023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/MayerNS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/AjtaiANRSW95,
  author       = {Mikl{\'{o}}s Ajtai and
                  James Aspnes and
                  Moni Naor and
                  Yuval Rabani and
                  Leonard J. Schulman and
                  Orli Waarts},
  editor       = {Kenneth L. Clarkson},
  title        = {Fairness in Scheduling},
  booktitle    = {Proceedings of the Sixth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  22-24 January 1995. San Francisco, California, {USA}},
  pages        = {477--485},
  publisher    = {{ACM/SIAM}},
  year         = {1995},
  url          = {http://dl.acm.org/citation.cfm?id=313651.313796},
  timestamp    = {Thu, 05 Jul 2018 07:29:25 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/AjtaiANRSW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR95-045,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Synthesizers and Their Application to the Parallel Construction of
                  Pseudo-random Functions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR95-045}},
  year         = {1995},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1995/TR95-045/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR95-045},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR95-045.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/BlumEGKN94,
  author       = {Manuel Blum and
                  William S. Evans and
                  Peter Gemmell and
                  Sampath Kannan and
                  Moni Naor},
  title        = {Checking the Correctness of Memories},
  journal      = {Algorithmica},
  volume       = {12},
  number       = {2/3},
  pages        = {225--244},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF01185212},
  doi          = {10.1007/BF01185212},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/BlumEGKN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/MotwaniNN94,
  author       = {Rajeev Motwani and
                  Joseph Naor and
                  Moni Naor},
  title        = {The Probabilistic Method Yields Deterministic Parallel Algorithms},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {49},
  number       = {3},
  pages        = {478--516},
  year         = {1994},
  url          = {https://doi.org/10.1016/S0022-0000(05)80069-8},
  doi          = {10.1016/S0022-0000(05)80069-8},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/MotwaniNN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkN94,
  author       = {Cynthia Dwork and
                  Moni Naor},
  editor       = {Yvo Desmedt},
  title        = {An Efficient Existentially Unforgeable Signature Scheme and its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {234--246},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_23},
  doi          = {10.1007/3-540-48658-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChorFN94,
  author       = {Benny Chor and
                  Amos Fiat and
                  Moni Naor},
  editor       = {Yvo Desmedt},
  title        = {Tracing Traitors},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_25},
  doi          = {10.1007/3-540-48658-5\_25},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChorFN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NaorS94,
  author       = {Moni Naor and
                  Adi Shamir},
  editor       = {Alfredo De Santis},
  title        = {Visual Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053419},
  doi          = {10.1007/BFB0053419},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NaorS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorW94,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {The Load, Capacity and Availability of Quorum Systems},
  booktitle    = {35th Annual Symposium on Foundations of Computer Science, Santa Fe,
                  New Mexico, USA, 20-22 November 1994},
  pages        = {214--225},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/SFCS.1994.365692},
  doi          = {10.1109/SFCS.1994.365692},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/AlonBFKNO94,
  author       = {Noga Alon and
                  Manuel Blum and
                  Amos Fiat and
                  Sampath Kannan and
                  Moni Naor and
                  Rafail Ostrovsky},
  editor       = {Daniel Dominic Sleator},
  title        = {Matching Nuts and Bolts},
  booktitle    = {Proceedings of the Fifth Annual {ACM-SIAM} Symposium on Discrete Algorithms.
                  23-25 January 1994, Arlington, Virginia, {USA}},
  pages        = {690--696},
  publisher    = {{ACM/SIAM}},
  year         = {1994},
  url          = {http://dl.acm.org/citation.cfm?id=314464.314673},
  timestamp    = {Thu, 05 Jul 2018 07:29:19 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/AlonBFKNO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeKN94,
  author       = {Uriel Feige and
                  Joe Kilian and
                  Moni Naor},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {A minimal model for secure computation (extended abstract)},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {554--563},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195408},
  doi          = {10.1145/195058.195408},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FeigeKN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/FeldmanINNRS93,
  author       = {David Feldman and
                  Russell Impagliazzo and
                  Moni Naor and
                  Noam Nisan and
                  Steven Rudich and
                  Adi Shamir},
  title        = {On Dice and Coins: Models of Computation for Random Generation},
  journal      = {Inf. Comput.},
  volume       = {104},
  number       = {2},
  pages        = {159--174},
  year         = {1993},
  url          = {https://doi.org/10.1006/inco.1993.1028},
  doi          = {10.1006/INCO.1993.1028},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/FeldmanINNRS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FiatN93,
  author       = {Amos Fiat and
                  Moni Naor},
  title        = {Implicit {O(1)} Probe Search},
  journal      = {{SIAM} J. Comput.},
  volume       = {22},
  number       = {1},
  pages        = {1--10},
  year         = {1993},
  url          = {https://doi.org/10.1137/0222001},
  doi          = {10.1137/0222001},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FiatN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/AlonN93,
  author       = {Noga Alon and
                  Moni Naor},
  title        = {Coin-Flipping Games Immune Against Linear-Sized Coalitions},
  journal      = {{SIAM} J. Comput.},
  volume       = {22},
  number       = {2},
  pages        = {403--417},
  year         = {1993},
  url          = {https://doi.org/10.1137/0222030},
  doi          = {10.1137/0222030},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/AlonN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorN93,
  author       = {Joseph Naor and
                  Moni Naor},
  title        = {Small-Bias Probability Spaces: Efficient Constructions and Applications},
  journal      = {{SIAM} J. Comput.},
  volume       = {22},
  number       = {4},
  pages        = {838--856},
  year         = {1993},
  url          = {https://doi.org/10.1137/0222053},
  doi          = {10.1137/0222053},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NaorOS93,
  author       = {Moni Naor and
                  Alon Orlitsky and
                  Peter W. Shor},
  title        = {Three results on interactive communication},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {39},
  number       = {5},
  pages        = {1608--1615},
  year         = {1993},
  url          = {https://doi.org/10.1109/18.259644},
  doi          = {10.1109/18.259644},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/NaorOS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GemmellN93,
  author       = {Peter Gemmell and
                  Moni Naor},
  editor       = {Douglas R. Stinson},
  title        = {Codes for Interactive Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {355--367},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_30},
  doi          = {10.1007/3-540-48329-2\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GemmellN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FiatN93,
  author       = {Amos Fiat and
                  Moni Naor},
  editor       = {Douglas R. Stinson},
  title        = {Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {480--491},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_40},
  doi          = {10.1007/3-540-48329-2\_40},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FiatN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/MegiddoNA93,
  author       = {Nimrod Megiddo and
                  Moni Naor and
                  David P. Anderson},
  title        = {The Minimum Reservation Rate Problem in Digital Audio/Video Systems},
  booktitle    = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993,
                  Natanya, Israel, June 7-9, 1993, Proceedings},
  pages        = {43--48},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/ISTCS.1993.253485},
  doi          = {10.1109/ISTCS.1993.253485},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/MegiddoNA93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorS93,
  author       = {Moni Naor and
                  Larry J. Stockmeyer},
  editor       = {S. Rao Kosaraju and
                  David S. Johnson and
                  Alok Aggarwal},
  title        = {What can be computed locally?},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
                  Computing, May 16-18, 1993, San Diego, CA, {USA}},
  pages        = {184--193},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/167088.167149},
  doi          = {10.1145/167088.167149},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/FiatNSS92,
  author       = {Amos Fiat and
                  Moni Naor and
                  Jeanette P. Schmidt and
                  Alan Siegel},
  title        = {Nonoblivious Hashing},
  journal      = {J. {ACM}},
  volume       = {39},
  number       = {4},
  pages        = {764--782},
  year         = {1992},
  url          = {https://doi.org/10.1145/146585.146591},
  doi          = {10.1145/146585.146591},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/FiatNSS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/IraniNR92,
  author       = {Sandy Irani and
                  Moni Naor and
                  Ronitt Rubinfeld},
  title        = {On the Time and Space Complexity of Computation Using Write-Once Memory
                  Or Is Pen Really Much Worse Than Pencil?},
  journal      = {Math. Syst. Theory},
  volume       = {25},
  number       = {2},
  pages        = {141--159},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF02835833},
  doi          = {10.1007/BF02835833},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mst/IraniNR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/KannanNR92,
  author       = {Sampath Kannan and
                  Moni Naor and
                  Steven Rudich},
  title        = {Implicit Representation of Graphs},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {5},
  number       = {4},
  pages        = {596--603},
  year         = {1992},
  url          = {https://doi.org/10.1137/0405049},
  doi          = {10.1137/0405049},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/KannanNR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/AlonBNNR92,
  author       = {Noga Alon and
                  Jehoshua Bruck and
                  Joseph Naor and
                  Moni Naor and
                  Ron M. Roth},
  title        = {Construction of asymptotically good low-rate error-correcting codes
                  through pseudo-random graphs},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {38},
  number       = {2},
  pages        = {509--516},
  year         = {1992},
  url          = {https://doi.org/10.1109/18.119713},
  doi          = {10.1109/18.119713},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/AlonBNNR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkN92,
  author       = {Cynthia Dwork and
                  Moni Naor},
  editor       = {Ernest F. Brickell},
  title        = {Pricing via Processing or Combatting Junk Mail},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {139--147},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_10},
  doi          = {10.1007/3-540-48071-4\_10},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkN92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorOVY92,
  author       = {Moni Naor and
                  Rafail Ostrovsky and
                  Ramarathnam Venkatesan and
                  Moti Yung},
  editor       = {Ernest F. Brickell},
  title        = {Perfect Zero-Knowledge Arguments for {NP} Can Be Based on General
                  Complexity Assumptions (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_14},
  doi          = {10.1007/3-540-48071-4\_14},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorOVY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkFKNS92,
  author       = {Cynthia Dwork and
                  Uriel Feige and
                  Joe Kilian and
                  Moni Naor and
                  Shmuel Safra},
  editor       = {Ernest F. Brickell},
  title        = {Low Communication 2-Prover Zero-Knowledge Proofs for {NP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_15},
  doi          = {10.1007/3-540-48071-4\_15},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkFKNS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/AlonGMN92,
  author       = {Noga Alon and
                  Zvi Galil and
                  Oded Margalit and
                  Moni Naor},
  title        = {Witnesses for Boolean Matrix Multiplication and for Shortest Paths},
  booktitle    = {33rd Annual Symposium on Foundations of Computer Science, Pittsburgh,
                  Pennsylvania, USA, 24-27 October 1992},
  pages        = {417--426},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/SFCS.1992.267748},
  doi          = {10.1109/SFCS.1992.267748},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/AlonGMN92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/AjtaiABCHNS92,
  author       = {Mikl{\'{o}}s Ajtai and
                  Noga Alon and
                  Jehoshua Bruck and
                  Robert Cypher and
                  Ching{-}Tien Ho and
                  Moni Naor and
                  Endre Szemer{\'{e}}di},
  title        = {Fault Tolerant Graphs, Perfect Hash Functions and Disjoint Paths},
  booktitle    = {33rd Annual Symposium on Foundations of Computer Science, Pittsburgh,
                  Pennsylvania, USA, 24-27 October 1992},
  pages        = {693--702},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/SFCS.1992.267781},
  doi          = {10.1109/SFCS.1992.267781},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/AjtaiABCHNS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FiatMNSSS91,
  author       = {Amos Fiat and
                  J. Ian Munro and
                  Moni Naor and
                  Alejandro A. Sch{\"{a}}ffer and
                  Jeanette P. Schmidt and
                  Alan Siegel},
  title        = {An Implicit Data Structure for Searching a Multikey Table in Logarithmic
                  Time},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {43},
  number       = {3},
  pages        = {406--424},
  year         = {1991},
  url          = {https://doi.org/10.1016/0022-0000(91)90022-W},
  doi          = {10.1016/0022-0000(91)90022-W},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/FiatMNSSS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Naor91,
  author       = {Moni Naor},
  title        = {Bit Commitment Using Pseudorandomness},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {151--158},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00196774},
  doi          = {10.1007/BF00196774},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Naor91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/Naor91,
  author       = {Moni Naor},
  title        = {A Lower Bound on Probabilistic Algorithms for Distributive Ring Coloring},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {4},
  number       = {3},
  pages        = {409--412},
  year         = {1991},
  url          = {https://doi.org/10.1137/0404036},
  doi          = {10.1137/0404036},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/Naor91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BlumEGKN91,
  author       = {Manuel Blum and
                  William S. Evans and
                  Peter Gemmell and
                  Sampath Kannan and
                  Moni Naor},
  title        = {Checking the Correctness of Memories},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {90--99},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185352},
  doi          = {10.1109/SFCS.1991.185352},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BlumEGKN91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/FederKN91,
  author       = {Tom{\'{a}}s Feder and
                  Eyal Kushilevitz and
                  Moni Naor},
  title        = {Amortized Communication Complexity (Preliminary Version)},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {239--248},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185374},
  doi          = {10.1109/SFCS.1991.185374},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/FederKN91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorR91,
  author       = {Moni Naor and
                  Ron M. Roth},
  title        = {Optimal File Sharing in Distributed Networks (Preliminary Version)},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {515--525},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185414},
  doi          = {10.1109/SFCS.1991.185414},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/LovaszNNW91,
  author       = {L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and
                  Moni Naor and
                  Ilan Newman and
                  Avi Wigderson},
  title        = {Search Problems in the Decision Tree Model (Preliminary Version)},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {576--585},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185422},
  doi          = {10.1109/SFCS.1991.185422},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/LovaszNNW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Naor91,
  author       = {Moni Naor},
  editor       = {Javier Leach Albert and
                  Burkhard Monien and
                  Mario Rodr{\'{\i}}guez{-}Artalejo},
  title        = {String Matching with Preprocessing of Text and Pattern},
  booktitle    = {Automata, Languages and Programming, 18th International Colloquium,
                  ICALP91, Madrid, Spain, July 8-12, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {510},
  pages        = {739--750},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54233-7\_179},
  doi          = {10.1007/3-540-54233-7\_179},
  timestamp    = {Fri, 17 Jul 2020 16:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Naor91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FiatN91,
  author       = {Amos Fiat and
                  Moni Naor},
  editor       = {Cris Koutsougeras and
                  Jeffrey Scott Vitter},
  title        = {Rigorous Time/Space Tradeoffs for Inverting Functions},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing,
                  May 5-8, 1991, New Orleans, Louisiana, {USA}},
  pages        = {534--541},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/103418.103473},
  doi          = {10.1145/103418.103473},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FiatN91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DolevDN91,
  author       = {Danny Dolev and
                  Cynthia Dwork and
                  Moni Naor},
  editor       = {Cris Koutsougeras and
                  Jeffrey Scott Vitter},
  title        = {Non-Malleable Cryptography (Extended Abstract)},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing,
                  May 5-8, 1991, New Orleans, Louisiana, {USA}},
  pages        = {542--552},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/103418.103474},
  doi          = {10.1145/103418.103474},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DolevDN91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/Naor90,
  author       = {Moni Naor},
  title        = {Succinct representation of general unlabeled graphs},
  journal      = {Discret. Appl. Math.},
  volume       = {28},
  number       = {3},
  pages        = {303--307},
  year         = {1990},
  url          = {https://doi.org/10.1016/0166-218X(90)90011-Z},
  doi          = {10.1016/0166-218X(90)90011-Z},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/Naor90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/Bar-NoyNN90,
  author       = {Amotz Bar{-}Noy and
                  Joseph Naor and
                  Moni Naor},
  title        = {One-Bit Algorithms},
  journal      = {Distributed Comput.},
  volume       = {4},
  pages        = {3--8},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF01783661},
  doi          = {10.1007/BF01783661},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/Bar-NoyNN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BruckN90,
  author       = {Jehoshua Bruck and
                  Moni Naor},
  title        = {The hardness of decoding linear codes with preprocessing},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {36},
  number       = {2},
  pages        = {381--385},
  year         = {1990},
  url          = {https://doi.org/10.1109/18.52484},
  doi          = {10.1109/18.52484},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BruckN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/AlonN90,
  author       = {Noga Alon and
                  Moni Naor},
  title        = {Coin-Flipping Games Immune against Linear-Sized Coalitions (Extended
                  Abstract)},
  booktitle    = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
                  Missouri, USA, October 22-24, 1990, Volume {I}},
  pages        = {46--54},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/FSCS.1990.89523},
  doi          = {10.1109/FSCS.1990.89523},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/AlonN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorN90,
  author       = {Joseph Naor and
                  Moni Naor},
  editor       = {Harriet Ortiz},
  title        = {Small-bias Probability Spaces: Efficient Constructions and Applications},
  booktitle    = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
                  May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages        = {213--223},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/100216.100244},
  doi          = {10.1145/100216.100244},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorN90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorY90,
  author       = {Moni Naor and
                  Moti Yung},
  editor       = {Harriet Ortiz},
  title        = {Public-key Cryptosystems Provably Secure against Chosen Ciphertext
                  Attacks},
  booktitle    = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
                  May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages        = {427--437},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/100216.100273},
  doi          = {10.1145/100216.100273},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorY90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorNS89,
  author       = {Joseph Naor and
                  Moni Naor and
                  Alejandro A. Sch{\"{a}}ffer},
  title        = {Fast Parallel Algorithms for Chordal Graphs},
  journal      = {{SIAM} J. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {327--349},
  year         = {1989},
  url          = {https://doi.org/10.1137/0218023},
  doi          = {10.1137/0218023},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorNS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Naor89,
  author       = {Moni Naor},
  editor       = {Gilles Brassard},
  title        = {Bit Commitment Using Pseudo-Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {128--136},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_13},
  doi          = {10.1007/0-387-34805-0\_13},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Naor89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/MotwaniNN89,
  author       = {Rajeev Motwani and
                  Joseph Naor and
                  Moni Naor},
  title        = {The Probabilistic Method Yields Deterministic Parallel Algorithms},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {8--13},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63448},
  doi          = {10.1109/SFCS.1989.63448},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/MotwaniNN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ImpagliazzoN89,
  author       = {Russell Impagliazzo and
                  Moni Naor},
  title        = {Efficient Cryptographic Schemes Provably as Secure as Subset Sum},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {236--241},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63484},
  doi          = {10.1109/SFCS.1989.63484},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ImpagliazzoN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeldmanINNRS89,
  author       = {David Feldman and
                  Russell Impagliazzo and
                  Moni Naor and
                  Noam Nisan and
                  Steven Rudich and
                  Adi Shamir},
  editor       = {Giorgio Ausiello and
                  Mariangiola Dezani{-}Ciancaglini and
                  Simona Ronchi Della Rocca},
  title        = {On Dice and Coins: Models of Computation for Random Generation},
  booktitle    = {Automata, Languages and Programming, 16th International Colloquium,
                  ICALP89, Stresa, Italy, July 11-15, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {372},
  pages        = {319--340},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/BFb0035769},
  doi          = {10.1007/BFB0035769},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FeldmanINNRS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorY89,
  author       = {Moni Naor and
                  Moti Yung},
  editor       = {David S. Johnson},
  title        = {Universal One-Way Hash Functions and their Cryptographic Applications},
  booktitle    = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing,
                  May 14-17, 1989, Seattle, Washington, {USA}},
  pages        = {33--43},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/73007.73011},
  doi          = {10.1145/73007.73011},
  timestamp    = {Wed, 24 Nov 2021 12:15:31 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FiatN89,
  author       = {Amos Fiat and
                  Moni Naor},
  editor       = {David S. Johnson},
  title        = {Implicit {O(1)} Probe Search},
  booktitle    = {Proceedings of the 21st Annual {ACM} Symposium on Theory of Computing,
                  May 14-17, 1989, Seattle, Washington, {USA}},
  pages        = {336--344},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/73007.73039},
  doi          = {10.1145/73007.73039},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FiatN89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/ImpagliazzoN88,
  author       = {Russell Impagliazzo and
                  Moni Naor},
  title        = {Decision trees and downward closures},
  booktitle    = {Proceedings: Third Annual Structure in Complexity Theory Conference,
                  Georgetown University, Washington, D. C., USA, June 14-17, 1988},
  pages        = {29--38},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/SCT.1988.5260},
  doi          = {10.1109/SCT.1988.5260},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coco/ImpagliazzoN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaumFN88,
  author       = {David Chaum and
                  Amos Fiat and
                  Moni Naor},
  editor       = {Shafi Goldwasser},
  title        = {Untraceable Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {319--327},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_25},
  doi          = {10.1007/0-387-34799-2\_25},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaumFN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Bar-NoyNN88,
  author       = {Amotz Bar{-}Noy and
                  Joseph Naor and
                  Moni Naor},
  editor       = {Danny Dolev},
  title        = {One Bit Algorithms},
  booktitle    = {Proceedings of the Seventh Annual {ACM} Symposium on Principles of
                  Distributed Computing, Toronto, Ontario, Canada, August 15-17, 1988},
  pages        = {66--76},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62546.62558},
  doi          = {10.1145/62546.62558},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Bar-NoyNN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KannanNR88,
  author       = {Sampath Kannan and
                  Moni Naor and
                  Steven Rudich},
  editor       = {Janos Simon},
  title        = {Implicit Representation of Graphs},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {334--343},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62244},
  doi          = {10.1145/62212.62244},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KannanNR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FiatNSSS88,
  author       = {Amos Fiat and
                  Moni Naor and
                  Alejandro A. Sch{\"{a}}ffer and
                  Jeanette P. Schmidt and
                  Alan Siegel},
  editor       = {Janos Simon},
  title        = {Storing and Searching a Multikey Table (Extended Abstract)},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {344--353},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62245},
  doi          = {10.1145/62212.62245},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FiatNSSS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FiatNSS88,
  author       = {Amos Fiat and
                  Moni Naor and
                  Jeanette P. Schmidt and
                  Alan Siegel},
  editor       = {Janos Simon},
  title        = {Non-Oblivious Hashing (Extended Abstract)},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {367--376},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62248},
  doi          = {10.1145/62212.62248},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FiatNSS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NaorNS87,
  author       = {Joseph Naor and
                  Moni Naor and
                  Alejandro A. Sch{\"{a}}ffer},
  editor       = {Alfred V. Aho},
  title        = {Fast Parallel Algorithms for Chordal Graphs (Extended Abstract)},
  booktitle    = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
                  1987, New York, New York, {USA}},
  pages        = {355--364},
  publisher    = {{ACM}},
  year         = {1987},
  url          = {https://doi.org/10.1145/28395.28433},
  doi          = {10.1145/28395.28433},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NaorNS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics