Search

Your search keyword '"Naor, Moni"' showing total 331,553 results

Search Constraints

Start Over You searched for: Author "Naor, Moni" Remove constraint Author: "Naor, Moni"
331,553 results on '"Naor, Moni"'

Search Results

1. On the instance optimality of detecting collisions and subgraphs

2. Adjacency Sketches in Adversarial Environments

3. Private Everlasting Prediction

4. New Algorithms and Applications for Risk-Limiting Audits

6. That’s Not My Signature! Fail-Stop Signatures for a Post-quantum World

8. MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably

9. Mirror Games Against an Open Book Player

10. Keep That Card in Mind: Card Guessing with Limited Memory

11. Hardness-Preserving Reductions via Cuckoo Hashing

12. Adversarial Laws of Large Numbers and Optimal Regret in Online Classification

13. Can Two Walk Together: Privacy Enhancing Methods and Preventing Tracking of Users

14. Privately Learning Thresholds: Closing the Exponential Gap

16. The Power of Distributed Verifiers in Interactive Proofs

17. Bet-or-Pass: Adversarially Robust Bloom Filters

23. When Can Limited Randomness Be Used in Repeated Games?

24. Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions

25. The Security of Lazy Users in Out-of-Band Authentication

26. Bloom Filters in Adversarial Environments

27. Incrementally Verifiable Computation via Incremental PCPs

28. The Family Holiday Gathering Problem or Fair and Periodic Scheduling of Independent Sets

29. Secret-Sharing for NP

30. Sliding Bloom Filters

31. Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation

32. How to Share a Secret, Infinitely

33. Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems

34. Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption

35. De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results

37. Pure Differential Privacy for Rectangle Queries via Private Partitions

38. Bloom Filters in Adversarial Environments

39. Primary-Secondary-Resolver Membership Proof Systems

40. Secure Physical Computation Using Disposable Circuits

42. Optimal Aggregation Algorithms for Middleware

43. Communication Complexity and Secure Function Evaluation

44. Physical Zero-Knowledge Proofs of Physical Properties

46. Hardness Preserving Reductions via Cuckoo Hashing

47. Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes

48. Public-Key Encryption in the Bounded-Retrieval Model

49. Hedged Public-Key Encryption: How to Protect against Bad Randomness

50. Public-Key Cryptosystems Resilient to Key Leakage

Catalog

Books, media, physical & digital resources