Naor

Results: 103



#Item
61

Secret-Sharing for NP Ilan Komargodski∗ Moni Naor∗ Eylon Yogev∗

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2015-05-31 10:47:31
    62

    Public-Key Cryptosystems Resilient to Key Leakage Moni Naor Gil Segev

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2009-09-22 18:25:06
      63

      Randomized Algorithms 2015A – Problem Set 3 Robert Krauthgamer and Moni Naor Due: January 18, 2015 ∑ 1. Show that the hash function hr : {0, 1}n → {0, 1} mapping x 7→ ni=1 xi ri (mod 2), where ⃗r ∈ {0, 1}n is

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2014-12-31 19:10:51
        64

        Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models∗ Moni Naor† Gil Segev‡

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        Language: English - Date: 2007-10-15 13:43:40
          65

          Algorithmic Game Theory – Handout 13 Uriel Feige, Robert Krauthgamer, Moni Naor February 4, 2009 Announcements. • Today is the last class.

          Add to Reading List

          Source URL: www.wisdom.weizmann.ac.il

          Language: English - Date: 2009-02-18 16:03:57
            66

            Pan-Private Streaming Algorithms Cynthia Dwork∗ Moni Naor† Toniann Pitassi‡

            Add to Reading List

            Source URL: www.wisdom.weizmann.ac.il

            Language: English - Date: 2010-05-25 09:43:30
              67Data privacy / Applied probability / Exponential mechanism / Time complexity / Differential privacy / Constructible universe / Polynomial / Negligible function / PP / Theoretical computer science / Mathematics / Computational complexity theory

              When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2010-11-01 14:13:39
              68Algorithmic game theory / Mathematics / Theoretical computer science / Routing / John Glen Wardrop / Inefficiency / Flow network / Game theory / Price of anarchy / Applied mathematics

              Algorithmic Game Theory – Handout 7 Uriel Feige, Robert Krauthgamer, Moni Naor December 17, 2008 We study inefficiency of equilibria, namely comparison between an optimal outcome of the game and an equilibrium outcome

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2008-12-17 13:22:18
              69Network performance / Wireless sensor network / Information / Telecommunications engineering / Mathematics / Coding theory / Information theory / Network coding

              Randomized Algorithms 2013A – Problem Set 5 Robert Krauthgamer and Moni Naor Date Due: February 13 Read Haeupler’s paper [Hae11] and use it to answer the following questions in a self-contained manner. You are suppos

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2013-01-28 13:36:00
              70Voting / Election fraud / Election technology / Electronic voting / Punchscan / Electoral fraud / Voting machine / Spoilt vote / Vote counting system / Politics / Elections / Electoral systems

              Split-Ballot Voting: Everlasting Privacy With Distributed Trust TAL MORAN Weizmann Institute of Science, Israel and MONI NAOR

              Add to Reading List

              Source URL: www.wisdom.weizmann.ac.il

              Language: English - Date: 2008-09-15 04:38:38
              UPDATE