Naor

Results: 103



#Item
11

History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2008-08-18 02:50:19
    12

    NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2016-03-14 12:16:03
      13

      Metric embeddings and geometric inequalities Lectures by Professor Assaf Naor Scribes: Holden Lee and Kiran Vodrahalli April 27, 2016 MAT529

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

        14

        NSEC5 from Elliptic Curves Provably Preventing DNSSEC Zone Enumeration with Shorter Responses Sharon Goldberg∗ Moni Naor† ∗ Boston University

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-03-14 12:16:03
          15

          NSEC5: Provably Preventing DNSSEC Zone Enumeration Sharon Goldberg∗ , Moni Naor† , Dimitrios Papadopoulos∗ , Leonid Reyzin∗ , Sachin Vasant∗ and Asaf Ziv† ∗ Boston University, Department of Computer Scienc

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-12-05 19:15:38
            16

            Deterministic History-Independent Strategies for Storing Information on Write-Once Memories Tal Moran∗ Moni Naor∗†

            Add to Reading List

            Source URL: www.wisdom.weizmann.ac.il

            - Date: 2009-05-01 08:47:26
              17

              On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy Cynthia Dwork∗ Moni Naor†

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              - Date: 2008-08-31 14:24:39
                18

                History-Independent Cuckoo Hashing Moni Naor∗‡ Gil Segev†‡ Udi Wieder§

                Add to Reading List

                Source URL: www.wisdom.weizmann.ac.il

                - Date: 2008-04-22 13:39:01
                  19Information science / Information retrieval / Search algorithms / Hashing / Cuckoo hashing / Hash table / Perfect hash function / Hash function / Linear probing / Randomized algorithm / Big O notation / Double hashing

                  Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

                  Add to Reading List

                  Source URL: www.wisdom.weizmann.ac.il

                  Language: English - Date: 2010-04-08 04:06:04
                  20Randomness / Random number generation / Information theory / Statistical randomness / Theoretical computer science / Randomness extractor / Pseudorandomness / Entropy / Random sequence / Extractor / Min entropy / Hardware random number generator

                  Games for Extracting Randomness∗ Ran Halprin and Moni Naor† Department of Computer Science and Applied Mathematics Weizmann Institute of Science {ran.halprin, moni.naor}@weizmann.ac.il

                  Add to Reading List

                  Source URL: cups.cs.cmu.edu

                  Language: English - Date: 2009-06-18 19:46:36
                  UPDATE