1![Comparing Information Without Leaking It Ronald Fagin Moni Naor IBM Research Division Dept. of Applied Math Almaden Research Center Comparing Information Without Leaking It Ronald Fagin Moni Naor IBM Research Division Dept. of Applied Math Almaden Research Center](https://www.pdfsearch.io/img/7e8e0e1744eae329e8494d5649e50be7.jpg) | Add to Reading ListSource URL: www.stat.berkeley.eduLanguage: English - Date: 2011-10-20 13:56:40
|
---|
2![Broadcast Encryption Moni Naor Amos Fiat Abstract Broadcast Encryption Moni Naor Amos Fiat Abstract](https://www.pdfsearch.io/img/cff72b97dd21bdf02161b217a08fd29a.jpg) | Add to Reading ListSource URL: pdfs.semanticscholar.org- Date: 2017-07-07 16:29:07
|
---|
3![One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡ Moni Naor† One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡ Moni Naor†](https://www.pdfsearch.io/img/8a601ced4467a25de39509a0469db8a1.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-07-20 05:44:28
|
---|
4![Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract](https://www.pdfsearch.io/img/1e76260041e273c9295692dca379c9c6.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2012-05-30 13:55:48
|
---|
5![Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗ Moni Naor† Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗ Moni Naor†](https://www.pdfsearch.io/img/81e5e2db1a07d948703ff796a1e0aa57.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-03-07 02:09:32
|
---|
6![An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡ An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡](https://www.pdfsearch.io/img/172cf4e0905307e9502bc9732ad26e1a.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2015-01-04 03:07:02
|
---|
7![Secure Physical Computation using Disposable Circuits Ben A. Fisch1 , Daniel Freund2 , and Moni Naor?3 1 Secure Physical Computation using Disposable Circuits Ben A. Fisch1 , Daniel Freund2 , and Moni Naor?3 1](https://www.pdfsearch.io/img/ddc24fa4321dc980b73594494da6beb9.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2015-03-10 04:46:39
|
---|
8![Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis† Moni Naor ‡ Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis† Moni Naor ‡](https://www.pdfsearch.io/img/c235dfc3c9fd62a3ab50f59c15c3d63f.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2009-10-28 16:23:20
|
---|
9![History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§ History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§](https://www.pdfsearch.io/img/92c83282a9159f3b95f702dcd160b58a.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2008-08-18 02:50:19
|
---|
10![NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University](https://www.pdfsearch.io/img/5cebb748f46a7e06b98ebc5a58ac108c.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2016-03-14 12:16:03
|
---|