Moni Naor

Results: 60



#Item
11

NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-03-14 12:16:03
    12

    NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon Goldberg∗ , Moni Naor† , Dimitrios Papadopoulos∗ , Leonid Reyzin∗ , Sachin Vasant∗ and Asaf Ziv† ∗ Boston University, Department of Computer Scienc

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-12-05 19:15:38
      13

      Deterministic History-Independent Strategies for Storing Information on Write-Once Memories Tal Moran∗ Moni Naor∗†

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      - Date: 2009-05-01 08:47:26
        14

        On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy Cynthia Dwork∗ Moni Naor†

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        - Date: 2008-08-31 14:24:39
          15

          History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

          Add to Reading List

          Source URL: www.wisdom.weizmann.ac.il

          - Date: 2008-04-22 13:39:01
            16Information science / Information retrieval / Search algorithms / Hashing / Cuckoo hashing / Hash table / Perfect hash function / Hash function / Linear probing / Randomized algorithm / Big O notation / Double hashing

            Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

            Add to Reading List

            Source URL: www.wisdom.weizmann.ac.il

            Language: English - Date: 2010-04-08 04:06:04
            17Randomness / Random number generation / Information theory / Statistical randomness / Theoretical computer science / Randomness extractor / Pseudorandomness / Entropy / Random sequence / Extractor / Min entropy / Hardware random number generator

            Games for Extracting Randomness∗ Ran Halprin and Moni Naor† Department of Computer Science and Applied Mathematics Weizmann Institute of Science {ran.halprin, moni.naor}@weizmann.ac.il

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2009-06-18 19:46:36
            18Digital typography / Cryptography / Visual cryptography / RSA / PostScript / Python / Command-line interface / Moni Naor / C / Adi Shamir

            VCK: the Visual Cryptography Kit Frank Stajano Olivetti Oracle Research Laboratory & University of Cambridge Computer Laboratory The idea of visual cryptography is a fascinating invention by Moni Naor and Adi Shamir (199

            Add to Reading List

            Source URL: legacy.python.org

            Language: English - Date: 2006-05-04 17:09:08
            19

            Number-Theoreti Constru tions of EÆ ient Pseudo-Random Fun tions Moni Naor y Omer Reingold z

            Add to Reading List

            Source URL: omereingold.files.wordpress.com

            Language: English - Date: 2014-10-21 18:04:21
              20

              Derandomized Constructions of k-Wise (Almost) Independent Permutations∗ Eyal Kaplan† Moni Naor‡

              Add to Reading List

              Source URL: omereingold.files.wordpress.com

              Language: English - Date: 2014-10-22 02:41:38
                UPDATE