Moni Naor
Weizmann Institute of Science
H-index: 97
Asia-Israel
Top articles of Moni Naor
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Private everlasting prediction | Advances in Neural Information Processing Systems | Moni Naor Kobbi Nissim Uri Stemmer Chao Yan | 2024/2/13 |
Adjacency Sketches in Adversarial Environments | Moni Naor Eugene Pekel | 2024 | |
That’s not my signature! Fail-stop signatures for a post-quantum world | Cryptology ePrint Archive | Cecilia Boschini Hila Dahari Moni Naor Eyal Ronen | 2023 |
Does Prior Knowledge Help Detect Collisions? | Omri Ben-Eliezer Tomer Grossman Moni Naor | 2023/12/15 | |
Mirror games against an open book player | Theoretical Computer Science | Roey Magen Moni Naor | 2023/10/17 |
New Algorithms and Applications for Risk-Limiting Audits | arXiv preprint arXiv:2305.04050 | Bar Karov Moni Naor | 2023/5/6 |
MPC for tech giants (GMPC): enabling Gulliver and the Lilliputians to cooperate amicably | arXiv preprint arXiv:2207.05047 | Bar Alon Moni Naor Eran Omri Uri Stemmer | 2022/7/11 |
One-Way Functions and (Im) perfect Obfuscation | SIAM Journal on Computing | Ilan Komargodski Tal Moran Moni Naor Rafael Pass Alon Rosen | 2022/12/31 |
ONE-WAY FUNCTIONS AND (IM) PERFECT OBFUSCATION\ast | SIAM JOURNAL ON COMPUTING | Ilan Komargodski Tal Moran Moni Naor Rafael Pass Alon Rosen | 2022/1/1 |
Bet-or-pass: Adversarially robust bloom filters | Moni Naor Noa Oved | 2022/11/7 | |
Low communication complexity protocols, collision resistant hash functions and secret key-agreement protocols | Shahar P Cohen Moni Naor | 2022/8/15 | |
CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs | Cas Cremers Moni Naor Shahar Paz Eyal Ronen | 2022/8/15 | |
Keep that card in mind: Card guessing with limited memory | arXiv preprint arXiv:2107.03885 | Boaz Menuhin Moni Naor | 2021/7/8 |
Adversarial laws of large numbers and optimal regret in online classification | Noga Alon Omri Ben-Eliezer Yuval Dagan Shay Moran Moni Naor | 2021/6/15 | |
Searchable symmetric encryption: Optimal locality in linear space via two-dimensional balanced allocations | Gilad Asharov Moni Naor Gil Segev Ido Shahaf | 2016/6/19 | |
The power of distributed verifiers in interactive proofs | Moni Naor Merav Parter Eylon Yogev | 2020 | |
Privately learning thresholds: Closing the exponential gap | Haim Kaplan Katrina Ligett Yishay Mansour Moni Naor Uri Stemmer | 2020/7/15 | |
The security of lazy users in out-of-band authentication | ACM Transactions on Privacy and Security (TOPS) | Moni Naor Lior Rotem Gil Segev | 2020/4/13 |
Can two walk together: Privacy enhancing methods and preventing tracking of users | arXiv preprint arXiv:2004.03002 | Moni Naor Neil Vexler | 2020/4/6 |
CRISP: Compromise Resilient Identity-based Symmetric PAKE. | IACR Cryptol. ePrint Arch. | Moni Naor Shahar Paz Eyal Ronen | 2020 |