Nir Bitansky
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [i41]Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:
Distributional Collision Resistance Beyond One-Way Functions. IACR Cryptology ePrint Archive 2019: 115 (2019) - 2018
- [j7]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. J. ACM 65(6): 39:1-39:37 (2018) - [j6]Nir Bitansky, Ran Canetti, Sanjam Garg, Justin Holmgren, Abhishek Jain, Huijia Lin, Rafael Pass, Sidharth Telang, Vinod Vaikuntanathan:
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings. SIAM J. Comput. 47(3): 1123-1210 (2018) - [c32]Nir Bitansky, Yael Tauman Kalai, Omer Paneth:
Multi-collision resistance: a paradigm for keyless hash functions. STOC 2018: 671-684 - [c31]Nir Bitansky, Huijia Lin:
One-Message Zero Knowledge and Non-malleable Commitments. TCC (1) 2018: 209-234 - [i40]Nir Bitansky, Huijia Lin:
One-Message Zero Knowledge and Non-Malleable Commitments. IACR Cryptology ePrint Archive 2018: 613 (2018) - [i39]Nir Bitansky, Omer Paneth:
Weak Zero-Knowledge Beyond the Black-Box Barrier. IACR Cryptology ePrint Archive 2018: 895 (2018) - 2017
- [j5]Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Virtual Grey Box Obfuscation for General Circuits. Algorithmica 79(4): 1014-1051 (2017) - [j4]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. J. Cryptology 30(4): 989-1066 (2017) - [c30]Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs. Hardness Through the Obfuscation Lens. CRYPTO (1) 2017: 696-723 - [c29]Nir Bitansky, Huijia Lin, Omer Paneth:
On Removing Graded Encodings from Functional Encryption. EUROCRYPT (2) 2017: 3-29 - [c28]Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. EUROCRYPT (2) 2017: 592-606 - [c27]Nir Bitansky:
Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs. TCC (2) 2017: 567-594 - [i38]Nir Bitansky:
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs. Electronic Colloquium on Computational Complexity (ECCC) 24: 5 (2017) - [i37]Nir Bitansky, Omer Paneth, Yael Tauman Kalai:
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions. Electronic Colloquium on Computational Complexity (ECCC) 24: 99 (2017) - [i36]Nir Bitansky:
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs. IACR Cryptology ePrint Archive 2017: 18 (2017) - [i35]Nir Bitansky, Yael Tauman Kalai, Omer Paneth:
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions. IACR Cryptology ePrint Archive 2017: 488 (2017) - 2016
- [j3]Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
On the Existence of Extractable One-Way Functions. SIAM J. Comput. 45(5): 1910-1952 (2016) - [c26]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. ITCS 2016: 345-356 - [c25]Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, Omer Paneth, Vinod Vaikuntanathan:
3-Message Zero Knowledge Against Human Ignorance. TCC (B1) 2016: 57-83 - [c24]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: From Approximate to Exact. TCC (A1) 2016: 67-95 - [c23]Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption. TCC (B2) 2016: 391-418 - [c22]Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation. TCC (A1) 2016: 474-502 - [i34]Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs Hardness through the Obfuscation Lens. Electronic Colloquium on Computational Complexity (ECCC) 23: 91 (2016) - [i33]Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, Omer Paneth, Vinod Vaikuntanathan:
3-Message Zero Knowledge Against Human Ignorance. IACR Cryptology ePrint Archive 2016: 213 (2016) - [i32]Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:
From Cryptomania to Obfustopia through Secret-Key Functional Encryption. IACR Cryptology ePrint Archive 2016: 558 (2016) - [i31]Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs Hardness through the Obfuscation Lens. IACR Cryptology ePrint Archive 2016: 574 (2016) - [i30]Nir Bitansky, Huijia Lin, Omer Paneth:
On Removing Graded Encodings from Functional Encryption. IACR Cryptology ePrint Archive 2016: 962 (2016) - 2015
- [j2]Nir Bitansky, Omer Paneth:
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. SIAM J. Comput. 44(5): 1325-1383 (2015) - [c21]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. FOCS 2015: 171-190 - [c20]Nir Bitansky, Omer Paneth, Alon Rosen:
On the Cryptographic Hardness of Finding a Nash Equilibrium. FOCS 2015: 1480-1498 - [c19]Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. STOC 2015: 439-448 - [c18]Nir Bitansky, Omer Paneth:
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation. TCC (2) 2015: 401-427 - [i29]Nir Bitansky, Omer Paneth, Alon Rosen:
On the Cryptographic Hardness of Finding a Nash Equilibrium. Electronic Colloquium on Computational Complexity (ECCC) 22: 1 (2015) - [i28]Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. Electronic Colloquium on Computational Complexity (ECCC) 22: 187 (2015) - [i27]Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos. IACR Cryptology ePrint Archive 2015: 126 (2015) - [i26]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. IACR Cryptology ePrint Archive 2015: 163 (2015) - [i25]Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. IACR Cryptology ePrint Archive 2015: 356 (2015) - [i24]Nir Bitansky, Omer Paneth:
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. IACR Cryptology ePrint Archive 2015: 369 (2015) - [i23]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. IACR Cryptology ePrint Archive 2015: 514 (2015) - [i22]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: from Approximate to Exact. IACR Cryptology ePrint Archive 2015: 704 (2015) - [i21]Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. IACR Cryptology ePrint Archive 2015: 1130 (2015) - 2014
- [j1]Nir Bitansky, Ran Canetti:
On Strong Simulation and Composable Point Obfuscation. J. Cryptology 27(2): 317-357 (2014) - [c17]Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth, Alon Rosen:
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator. CRYPTO (2) 2014: 71-89 - [c16]Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Virtual Grey Box Obfuscation for General Circuits. CRYPTO (2) 2014: 108-125 - [c15]Nir Bitansky, Dana Dachman-Soled, Huijia Lin:
Leakage-Tolerant Computation with Input-Independent Preprocessing. CRYPTO (2) 2014: 146-163 - [c14]Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
On the existence of extractable one-way functions. STOC 2014: 505-514 - [c13]Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Obfuscation for Evasive Functions. TCC 2014: 26-51 - [i20]Nir Bitansky, Omer Paneth:
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation. IACR Cryptology ePrint Archive 2014: 295 (2014) - [i19]Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
On the Existence of Extractable One-Way Functions. IACR Cryptology ePrint Archive 2014: 402 (2014) - [i18]Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth:
On Virtual Grey Box Obfuscation for General Circuits. IACR Cryptology ePrint Archive 2014: 554 (2014) - [i17]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. IACR Cryptology ePrint Archive 2014: 580 (2014) - [i16]Nir Bitansky, Sanjam Garg, Sidharth Telang:
Succinct Randomized Encodings and their Applications. IACR Cryptology ePrint Archive 2014: 771 (2014) - [i15]Nir Bitansky, Omer Paneth, Alon Rosen:
On the Cryptographic Hardness of Finding a Nash Equilibrium. IACR Cryptology ePrint Archive 2014: 1029 (2014) - 2013
- [c12]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
Recursive composition and bootstrapping for SNARKS and proof-carrying data. STOC 2013: 111-120 - [c11]Nir Bitansky, Omer Paneth:
On the impossibility of approximate obfuscation and applications to resettable cryptography. STOC 2013: 241-250 - [c10]Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth:
Succinct Non-interactive Arguments via Linear Interactive Proofs. TCC 2013: 315-333 - [c9]Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth:
Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs. TCC 2013 - [c8]Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs:
Why "Fiat-Shamir for Proofs" Lacks a Proof. TCC 2013: 182-201 - [i14]Nir Bitansky, Ran Canetti, Omer Paneth:
How To Construct Extractable One-Way Functions Against Uniform Adversaries. IACR Cryptology ePrint Archive 2013: 468 (2013) - [i13]Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall. IACR Cryptology ePrint Archive 2013: 641 (2013) - [i12]Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Obfuscation for Evasive Functions. IACR Cryptology ePrint Archive 2013: 668 (2013) - [i11]Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen:
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input. IACR Cryptology ePrint Archive 2013: 701 (2013) - 2012
- [c7]Nir Bitansky, Alessandro Chiesa:
Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits. CRYPTO 2012: 255-272 - [c6]Nir Bitansky, Omer Paneth:
From the Impossibility of Obfuscation to a New Non-Black-Box Simulation Technique. FOCS 2012: 223-232 - [c5]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. ITCS 2012: 326-349 - [c4]
- [c3]
- [i10]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data. IACR Cryptology ePrint Archive 2012: 95 (2012) - [i9]Nir Bitansky, Alessandro Chiesa:
Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits. IACR Cryptology ePrint Archive 2012: 461 (2012) - [i8]Nir Bitansky, Sanjam Garg, Daniel Wichs:
Why "Fiat-Shamir for Proofs" Lacks a Proof. IACR Cryptology ePrint Archive 2012: 705 (2012) - [i7]Nir Bitansky, Alessandro Chiesa, Yuval Ishai, Rafail Ostrovsky, Omer Paneth:
Succinct Non-Interactive Arguments via Linear Interactive Proofs. IACR Cryptology ePrint Archive 2012: 718 (2012) - [i6]Nir Bitansky, Omer Paneth:
On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography. IACR Cryptology ePrint Archive 2012: 729 (2012) - 2011
- [c2]Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum:
Program Obfuscation with Leaky Hardware. ASIACRYPT 2011: 722-739 - [i5]Nir Bitansky, Ran Canetti, Shai Halevi:
Leakage Tolerant Interactive Protocols. IACR Cryptology ePrint Archive 2011: 204 (2011) - [i4]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:
From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again. IACR Cryptology ePrint Archive 2011: 443 (2011) - [i3]Nir Bitansky, Omer Paneth:
From Point Obfuscation To 3-round Zero-Knowledge. IACR Cryptology ePrint Archive 2011: 493 (2011) - [i2]Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum:
Program Obfuscation with Leaky Hardware. IACR Cryptology ePrint Archive 2011: 660 (2011) - 2010
- [c1]Nir Bitansky, Ran Canetti:
On Strong Simulation and Composable Point Obfuscation. CRYPTO 2010: 520-537 - [i1]Nir Bitansky, Ran Canetti:
On Strong Simulation and Composable Point Obfuscation. IACR Cryptology ePrint Archive 2010: 414 (2010)
Coauthor Index
last updated on 2019-02-13 21:50 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint