Moni Naor

Results: 60



#Item
1Comparing Information Without Leaking It Ronald Fagin Moni Naor IBM Research Division Dept. of Applied Math Almaden Research Center

Comparing Information Without Leaking It Ronald Fagin Moni Naor IBM Research Division Dept. of Applied Math Almaden Research Center

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2011-10-20 13:56:40
    2Broadcast Encryption  Moni Naor Amos Fiat  Abstract

    Broadcast Encryption  Moni Naor Amos Fiat Abstract

    Add to Reading List

    Source URL: pdfs.semanticscholar.org

    - Date: 2017-07-07 16:29:07
      3One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡  Moni Naor†

      One-Way Functions and (Im)perfect Obfuscation∗ Ilan Komargodski† Tal Moran‡ Moni Naor†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-07-20 05:44:28
        4Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev†  Abstract

        Public-Key Cryptosystems Resilient to Key Leakage Moni Naor∗ Gil Segev† Abstract

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2012-05-30 13:55:48
          5Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗  Moni Naor†

          Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗ Moni Naor†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-03-07 02:09:32
            6An Optimally Fair Coin Toss Tal Moran∗ Moni Naor†  Gil Segev‡

            An Optimally Fair Coin Toss Tal Moran∗ Moni Naor† Gil Segev‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-01-04 03:07:02
              7Secure Physical Computation using Disposable Circuits Ben A. Fisch1 , Daniel Freund2 , and Moni Naor?3 1

              Secure Physical Computation using Disposable Circuits Ben A. Fisch1 , Daniel Freund2 , and Moni Naor?3 1

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-03-10 04:46:39
                8Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis†  Moni Naor ‡

                Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis† Moni Naor ‡

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2009-10-28 16:23:20
                  9History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡  Udi Wieder§

                  History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2008-08-18 02:50:19
                    10NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

                    NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2016-03-14 12:16:03