Moni Naor

Results: 60



#Item
1

Comparing Information Without Leaking It Ronald Fagin Moni Naor IBM Research Division Dept. of Applied Math Almaden Research Center

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2011-10-20 13:56:40
    2

    Broadcast Encryption  Moni Naor Amos Fiat Abstract

    Add to Reading List

    Source URL: pdfs.semanticscholar.org

    - Date: 2017-07-07 16:29:07
      3

      One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡ Moni Naor†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-07-20 05:44:28
        4

        Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-05-30 13:55:48
          5

          Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗ Moni Naor†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-03-07 02:09:32
            6

            An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-01-04 03:07:02
              7

              Secure Physical Computation using Disposable Circuits Ben A. Fisch1 , Daniel Freund2 , and Moni Naor?3 1

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-03-10 04:46:39
                8

                Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis† Moni Naor ‡

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2009-10-28 16:23:20
                  9

                  History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2008-08-18 02:50:19
                    10

                    NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-03-14 12:16:03
                      UPDATE