2010 | ||
---|---|---|
194 | Danny Harnik, Moni Naor: On the Compressibility of NP Instances and Cryptographic Applications. SIAM J. Comput. 39(5): 1667-1713 (2010) | |
2009 | ||
193 | Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek: Hedged Public-Key Encryption: How to Protect against Bad Randomness. ASIACRYPT 2009: 232-249 | |
192 | Moni Naor, Gil Segev: Public-Key Cryptosystems Resilient to Key Leakage. CRYPTO 2009: 18-35 | |
191 | Yuriy Arbitman, Moni Naor, Gil Segev: De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results. ICALP (1) 2009: 107-118 | |
190 | Ran Halprin, Moni Naor: Games for extracting randomness. SOUPS 2009 | |
189 | Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum, Salil P. Vadhan: On the complexity of differentially private data release: efficient algorithms and hardness results. STOC 2009: 381-390 | |
188 | Tal Moran, Moni Naor, Gil Segev: An Optimally Fair Coin Toss. TCC 2009: 1-18 | |
187 | Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod Vaikuntanathan: How Efficient Can Memory Checking Be?. TCC 2009: 503-520 | |
186 | Eyal Kaplan, Moni Naor, Omer Reingold: Derandomized Constructions of k-Wise (Almost) Independent Permutations. Algorithmica 55(1): 113-133 (2009) | |
185 | Yuriy Arbitman, Moni Naor, Gil Segev: De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results CoRR abs/0903.0391: (2009) | |
184 | Yuriy Arbitman, Moni Naor, Gil Segev: Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation CoRR abs/0912.5424: (2009) | |
183 | Moni Naor, Guy N. Rothblum: The complexity of online memory checking. J. ACM 56(1): (2009) | |
182 | Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum: Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. Theory Comput. Syst. 44(2): 245-268 (2009) | |
2008 | ||
181 | Dan Boneh, Moni Naor: Traitor tracing with constant size ciphertext. ACM Conference on Computer and Communications Security 2008: 501-510 | |
180 | Moshe Babaioff, Liad Blumrosen, Moni Naor, Michael Schapira: Informational overhead of incentive compatibility. ACM Conference on Electronic Commerce 2008: 88-97 | |
179 | Moni Naor, Gil Segev, Udi Wieder: History-Independent Cuckoo Hashing. ICALP (2) 2008: 631-642 | |
178 | Gillat Kol, Moni Naor: Games for exchanging information. STOC 2008: 423-432 | |
177 | Ilya Mironov, Moni Naor, Gil Segev: Sketching in adversarial environments. STOC 2008: 651-660 | |
176 | Gillat Kol, Moni Naor: Cryptography and Game Theory: Designing Protocols for Exchanging Information. TCC 2008: 320-339 | |
175 | Moni Naor, Gil Segev, Adam Smith: Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. IEEE Transactions on Information Theory 54(6): 2408-2425 (2008) | |
2007 | ||
174 | Moni Naor: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings Springer 2007 | |
173 | Tal Moran, Moni Naor: Split-ballot voting: everlasting privacy with distributed trust. ACM Conference on Computer and Communications Security 2007: 246-255 | |
172 | Moni Naor, Asaf Nussboim: Implementing Huge Sparse Random Graphs. APPROX-RANDOM 2007: 596-608 | |
171 | Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum: Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles. FUN 2007: 166-182 | |
170 | Tal Moran, Moni Naor, Gil Segev: Deterministic History-Independent Strategies for Storing Information on Write-Once Memories. ICALP 2007: 303-315 | |
169 | Moni Naor, Udi Wieder: Novel architectures for P2P applications: The continuous-discrete approach. ACM Transactions on Algorithms 3(3): (2007) | |
168 | Cynthia Dwork, Moni Naor: Zaps and Their Applications. SIAM J. Comput. 36(6): 1513-1543 (2007) | |
2006 | ||
167 | Moni Naor, Gil Segev, Adam Smith: Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. CRYPTO 2006: 214-231 | |
166 | Tal Moran, Moni Naor: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. CRYPTO 2006: 373-392 | |
165 | Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor: Our Data, Ourselves: Privacy Via Distributed Noise Generation. EUROCRYPT 2006: 486-503 | |
164 | Tal Moran, Moni Naor: Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol. EUROCRYPT 2006: 88-108 | |
163 | Danny Harnik, Moni Naor: On the Compressibility of NP Instances and Cryptographic Applications. FOCS 2006: 719-728 | |
162 | Danny Harnik, Moni Naor: On Everlasting Security in the Hybrid Bounded Storage Model. ICALP (2) 2006: 192-203 | |
161 | Moni Naor, Guy N. Rothblum: Learning to impersonate. ICML 2006: 649-656 | |
160 | Eyal Kaplan, Moni Naor, Omer Reingold: Derandomized Constructions of k-Wise (Almost) Independent Permutations Electronic Colloquium on Computational Complexity (ECCC)(002): (2006) | |
159 | Danny Harnik, Moni Naor: On the Compressibility of NP Instances and Cryptographic Applications. Electronic Colloquium on Computational Complexity (ECCC) 13(022): (2006) | |
158 | Moni Naor, Guy N. Rothblum: The Complexity of Online Memory Checking. Electronic Colloquium on Computational Complexity (ECCC) 13(034): (2006) | |
157 | Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen: Completeness in Two-Party Secure Computation: A Computational View. J. Cryptology 19(4): 521-552 (2006) | |
156 | Moni Naor, Benny Pinkas: Oblivious Polynomial Evaluation. SIAM J. Comput. 35(5): 1254-1281 (2006) | |
2005 | ||
155 | Eyal Kaplan, Moni Naor, Omer Reingold: Derandomized Constructions of k-Wise (Almost) Independent Permutations. APPROX-RANDOM 2005: 354-365 | |
154 | Cynthia Dwork, Moni Naor, Hoeteck Wee: Pebbling and Proofs of Work. CRYPTO 2005: 37-54 | |
153 | Uri Nadav, Moni Naor: The Dynamic And-Or Quorum System. DISC 2005: 472-486 | |
152 | Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen: On Robust Combiners for Oblivious Transfer and Other Primitives. EUROCRYPT 2005: 96-113 | |
151 | Moni Naor, Guy N. Rothblum: The Complexity of Online Memory Checking. FOCS 2005: 573-584 | |
150 | Tal Moran, Moni Naor: Basing Cryptographic Protocols on Tamper-Evident Seals. ICALP 2005: 285-297 | |
149 | Moni Naor, Asaf Nussboim, Eran Tromer: Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs. TCC 2005: 66-85 | |
148 | Moni Naor, Udi Wieder: Scalable and dynamic quorum systems. Distributed Computing 17(4): 311-322 (2005) | |
147 | Moni Naor: On fairness in the carpool problem. J. Algorithms 55(1): 93-98 (2005) | |
146 | Moni Naor, Benny Pinkas: Computationally Secure Oblivious Transfer. J. Cryptology 18(1): 1-35 (2005) | |
2004 | ||
145 | Moni Naor: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings Springer 2004 | |
144 | Uri Nadav, Moni Naor: Fault-Tolerant Storage in a Dynamic Environment. DISC 2004: 390-404 | |
143 | Cynthia Dwork, Moni Naor, Omer Reingold: Immunizing Encryption Schemes from Decryption Errors. EUROCRYPT 2004: 342-360 | |
142 | Moni Naor, Udi Wieder: Know Thy Neighbor's Neighbor: Better Routing for Skip-Graphs and Small Worlds. IPTPS 2004: 269-277 | |
141 | Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen: Completeness in two-party secure computation: a computational view. STOC 2004: 252-261 | |
140 | Gurmeet Singh Manku, Moni Naor, Udi Wieder: Know thy neighbor's neighbor: the power of lookahead in randomized P2P networks. STOC 2004: 54-63 | |
139 | Moni Naor, Omer Reingold: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2): 231-262 (2004) | |
138 | Cynthia Dwork, Moni Naor, Amit Sahai: Concurrent zero-knowledge. J. ACM 51(6): 851-898 (2004) | |
2003 | ||
137 | Cynthia Dwork, Andrew Goldberg, Moni Naor: On Memory-Bound Functions for Fighting Spam. CRYPTO 2003: 426-444 | |
136 | Moni Naor: On Cryptographic Assumptions and Challenges. CRYPTO 2003: 96-109 | |
135 | Moni Naor: Moderately Hard Functions: From Complexity to Spam Fighting. FSTTCS 2003: 434-442 | |
134 | Moni Naor, Udi Wieder: A Simple Fault Tolerant Distributed Hash Table. IPTPS 2003: 88-97 | |
133 | Moni Naor, Udi Wieder: Scalable and dynamic quorum systems. PODC 2003: 114-122 | |
132 | Moni Naor, Udi Wieder: Novel architectures for P2P applications: the continuous-discrete approach. SPAA 2003: 50-59 | |
131 | Danny Harnik, Moni Naor, Omer Reingold, Alon Rosen: Completeness in Two-Party Secure Computation - A Computational View Electronic Colloquium on Computational Complexity (ECCC)(060): (2003) | |
130 | Dalit Naor, Moni Naor: Protecting Cryptographic Keys: The Trace-and-Revoke Approach. IEEE Computer 36(7): 47-53 (2003) | |
129 | Cynthia Dwork, Moni Naor, Omer Reingold, Larry J. Stockmeyer: Magic Functions. J. ACM 50(6): 852-921 (2003) | |
128 | Ronald Fagin, Amnon Lotem, Moni Naor: Optimal aggregation algorithms for middleware. J. Comput. Syst. Sci. 66(4): 614-656 (2003) | |
2002 | ||
127 | Moni Naor: Deniable Ring Authentication. CRYPTO 2002: 481-498 | |
126 | Dahlia Malkhi, Moni Naor, David Ratajczak: Viceroy: a scalable and dynamic emulation of the butterfly. PODC 2002: 183-192 | |
125 | Ronald Fagin, Amnon Lotem, Moni Naor: Optimal Aggregation Algorithms for Middleware CoRR cs.DB/0204046: (2002) | |
124 | Cynthia Dwork, Moni Naor: Zaps and Their Applications Electronic Colloquium on Computational Complexity (ECCC)(001): (2002) | |
123 | Dalit Naor, Moni Naor, Jeffery Lotspiech: Revocation and Tracing Schemes for Stateless Receivers Electronic Colloquium on Computational Complexity (ECCC)(043): (2002) | |
122 | Moni Naor, Omer Reingold: Constructing Pseudo-Random Permutations with a Prescribed Structure. J. Cryptology 15(2): 97-102 (2002) | |
121 | Moni Naor, Omer Reingold, Alon Rosen: Pseudorandom Functions and Factoring. SIAM J. Comput. 31(5): 1383-1404 (2002) | |
2001 | ||
120 | Dalit Naor, Moni Naor, Jeffery Lotspiech: Revocation and Tracing Schemes for Stateless Receivers. CRYPTO 2001: 41-62 | |
119 | Ronald Fagin, Amnon Lotem, Moni Naor: Optimal Aggregation Algorithms for Middleware. PODS 2001 | |
118 | Moni Naor, Benny Pinkas: Efficient oblivious transfer protocols. SODA 2001: 448-457 | |
117 | Moni Naor, Omer Reingold: Constructing pseudo-random permutations with a prescribed structure. SODA 2001: 458-459 | |
116 | Moni Naor, Vanessa Teague: Anti-presistence: history independent data structures. STOC 2001: 492-501 | |
115 | Moni Naor, Kobbi Nissim: Communication preserving protocols for secure function evaluation. STOC 2001: 590-599 | |
114 | Cynthia Dwork, Ravi Kumar, Moni Naor, D. Sivakumar: Rank aggregation methods for the Web. WWW 2001: 613-622 | |
113 | Moni Naor, Kobbi Nissim: Communication Complexity and Secure Function Evaluation CoRR cs.CR/0109011: (2001) | |
112 | Moni Naor, Kobbi Nissim: Communication Complexity and Secure Function Evaluation Electronic Colloquium on Computational Complexity (ECCC) 8(062): (2001) | |
111 | Moni Naor, Omer Reingold, Alon Rosen: Pseudo-Random Functions and Factoring Electronic Colloquium on Computational Complexity (ECCC) 8(064): (2001) | |
110 | Moni Naor, Sitvanit Ruah: On the Decisional Complexity of Problems Over the Reals. Inf. Comput. 167(1): 27-45 (2001) | |
2000 | ||
109 | Moni Naor, Benny Pinkas: Distributed Oblivious Transfer. ASIACRYPT 2000: 205-219 | |
108 | Dan Boneh, Moni Naor: Timed Commitments. CRYPTO 2000: 236-254 | |
107 | Cynthia Dwork, Moni Naor: Zaps and Their Applications. FOCS 2000: 283-293 | |
106 | Moni Naor, Benny Pinkas: Efficient Trace and Revoke Schemes. Financial Cryptography 2000: 1-20 | |
105 | Moni Naor, Omer Reingold, Alon Rosen: Pseudo-random functions and factoring (extended abstract). STOC 2000: 11-20 | |
104 | Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas: Tracing traitors. IEEE Transactions on Information Theory 46(3): 893-910 (2000) | |
103 | Carlo Blundo, Alfredo De Santis, Moni Naor: Visual cryptography for grey level images. Inf. Process. Lett. 75(6): 255-259 (2000) | |
102 | Danny Dolev, Cynthia Dwork, Moni Naor: Nonmalleable Cryptography. SIAM J. Comput. 30(2): 391-437 (2000) | |
1999 | ||
101 | Moni Naor, Benny Pinkas, Reuban Sumner: Privacy preserving auctions and mechanism design. ACM Conference on Electronic Commerce 1999: 129-139 | |
100 | Moni Naor, Benny Pinkas: Oblivious Transfer with Adaptive Queries. CRYPTO 1999: 573-590 | |
99 | Moni Naor, Benny Pinkas, Omer Reingold: Distributed Pseudo-random Functions and KDCs. EUROCRYPT 1999: 327-346 | |
98 | Cynthia Dwork, Moni Naor, Omer Reingold, Larry J. Stockmeyer: Magic Functions. FOCS 1999: 523-534 | |
97 | Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas: Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999: 708-716 | |
96 | Matt Blaze, Joan Feigenbaum, Moni Naor: A Formal Treatment of Remotely Keyed Encryption. SODA 1999: 868-869 | |
95 | Moni Naor, Benny Pinkas: Oblivious Transfer and Polynomial Evaluation. STOC 1999: 245-254 | |
94 | Moni Naor, Omer Reingold: Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions. J. Comput. Syst. Sci. 58(2): 336-375 (1999) | |
93 | Moni Naor, Omer Reingold: On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. J. Cryptology 12(1): 29-66 (1999) | |
92 | Amos Fiat, Moni Naor: Rigorous Time/Space Trade-offs for Inverting Functions. SIAM J. Comput. 29(3): 790-803 (1999) | |
1998 | ||
91 | Moni Naor, Omer Reingold: From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). CRYPTO 1998: 267-282 | |
90 | Moni Naor, Benny Pinkas: Threshold Traitor Tracing. CRYPTO 1998: 502-517 | |
89 | Matt Blaze, Joan Feigenbaum, Moni Naor: A Formal Treatment of Remotely Keyed Encryption. EUROCRYPT 1998: 251-265 | |
88 | Moni Naor, Benny Pinkas: Secure and Efficient Metering. EUROCRYPT 1998: 576-590 | |
87 | Cynthia Dwork, Moni Naor, Amit Sahai: Concurrent Zero-Knowledge. STOC 1998: 409-418 | |
86 | Moni Naor, Benny Pinkas: Secure Accounting and Auditing on the Web. Computer Networks 30(1-7): 541-550 (1998) | |
85 | Moni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distrib. Syst. 9(9): 909-922 (1998) | |
84 | Miklós Ajtai, James Aspnes, Moni Naor, Yuval Rabani, Leonard J. Schulman, Orli Waarts: Fairness in Scheduling J. Algorithms 29(2): 306-357 (1998) | |
83 | Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. J. Cryptology 11(2): 87-108 (1998) | |
82 | Cynthia Dwork, Moni Naor: An Efficient Existentially Unforgeable Signature Scheme and Its Applications. J. Cryptology 11(3): 187-208 (1998) | |
81 | Moni Naor, Avishai Wool: The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998) | |
1997 | ||
80 | Moni Naor, Benny Pinkas: Visual Authentication and Identification. CRYPTO 1997: 322-336 | |
79 | Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky: Deniable Encryption. CRYPTO 1997: 90-104 | |
78 | Mihir Bellare, Russell Impagliazzo, Moni Naor: Does Parallel Repetition Lower the Error in Computationally Sound Protocols? FOCS 1997: 374-383 | |
77 | Moni Naor, Omer Reingold: Number-theoretic Constructions of Efficient Pseudo-random Functions. FOCS 1997: 458-467 | |
76 | Moni Naor, Omer Reingold: On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract). STOC 1997: 189-199 | |
75 | Moni Naor, Omer Reingold: On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited Electronic Colloquium on Computational Complexity (ECCC) 4(5): (1997) | |
1996 | ||
74 | Moni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. ACM Conference on Computer and Communications Security 1996: 157-168 | |
73 | Moni Naor, Sitvanit Ruah: On the Decisional Complexity of Problems Over the Reals. ISTCS 1996: 176-187 | |
72 | Cynthia Dwork, Jeffrey B. Lotspiech, Moni Naor: Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version). STOC 1996: 489-498 | |
71 | Ran Canetti, Uriel Feige, Oded Goldreich, Moni Naor: Adaptively Secure Multi-Party Computation. STOC 1996: 639-648 | |
70 | Moni Naor: Evaluation May Be Easier Than Generation (Extended Abstract). STOC 1996: 74-83 | |
69 | Moni Naor, Adi Shamir: Visual Cryptography II: Improving the Contrast Via the Cover Base. Security Protocols Workshop 1996: 197-202 | |
68 | Noga Alon, Moni Naor: Derandomization, Witnesses for Boolean Matrix Multiplication and Construction of Perfect Hash Functions. Algorithmica 16(4/5): 434-449 (1996) | |
67 | Ronald Fagin, Moni Naor, Peter Winkler: Comparing Information Without Leaking It. Commun. ACM 39(5): 77-85 (1996) | |
66 | Russell Impagliazzo, Moni Naor: Efficient Cryptographic Schemes Provably as Secure as Subset Sum. J. Cryptology 9(4): 199-216 (1996) | |
1995 | ||
65 | Moni Naor, Omer Reingold: Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions. FOCS 1995: 170-181 | |
64 | Moni Naor, Leonard J. Schulman, Aravind Srinivasan: Splitters and Near-Optimal Derandomization. FOCS 1995: 182-191 | |
63 | Joe Kilian, Moni Naor: On the Complexity of Statistical Reasoning (extended abtract). ISTCS 1995: 209-217 | |
62 | Alain J. Mayer, Moni Naor, Larry J. Stockmeyer: Local Computations on Static and Dynamic Graphs (Preliminary Version). ISTCS 1995: 268-278 | |
61 | Miklós Ajtai, James Aspnes, Moni Naor, Yuval Rabani, Leonard J. Schulman, Orli Waarts: Fairness in Scheduling. SODA 1995: 477-485 | |
60 | Moni Naor, Omer Reingold: Synthesizers and Their Application to the Parallel Construction of Pseudo-random Functions Electronic Colloquium on Computational Complexity (ECCC) 2(45): (1995) | |
59 | Moni Naor, Ron M. Roth: Optimal File Sharing in Distributed Networks. SIAM J. Comput. 24(1): 158-183 (1995) | |
58 | Tomás Feder, Eyal Kushilevitz, Moni Naor, Noam Nisan: Amortized Communication Complexity. SIAM J. Comput. 24(4): 736-750 (1995) | |
57 | Moni Naor, Larry J. Stockmeyer: What Can be Computed Locally? SIAM J. Comput. 24(6): 1259-1277 (1995) | |
56 | László Lovász, Moni Naor, Ilan Newman, Avi Wigderson: Search Problems in the Decision Tree Model. SIAM J. Discrete Math. 8(1): 119-132 (1995) | |
1994 | ||
55 | Cynthia Dwork, Moni Naor: An Efficient Existentially Unforgeable Signature Scheme and its Applications. CRYPTO 1994: 234-246 | |
54 | Benny Chor, Amos Fiat, Moni Naor: Tracing Traitors. CRYPTO 1994: 257-270 | |
53 | Moni Naor, Adi Shamir: Visual Cryptography. EUROCRYPT 1994: 1-12 | |
52 | Moni Naor, Avishai Wool: The Load, Capacity and Availability of Quorum Systems FOCS 1994: 214-225 | |
51 | Noga Alon, Manuel Blum, Amos Fiat, Sampath Kannan, Moni Naor, Rafail Ostrovsky: Matching Nuts and Bolts. SODA 1994: 690-696 | |
50 | Uriel Feige, Joe Kilian, Moni Naor: A minimal model for secure computation (extended abstract). STOC 1994: 554-563 | |
49 | Manuel Blum, William S. Evans, Peter Gemmell, Sampath Kannan, Moni Naor: Checking the Correctness of Memories. Algorithmica 12(2/3): 225-244 (1994) | |
48 | Rajeev Motwani, Joseph Naor, Moni Naor: The Probabilistic Method Yields Deterministic Parallel Algorithms. J. Comput. Syst. Sci. 49(3): 478-516 (1994) | |
1993 | ||
47 | Peter Gemmell, Moni Naor: Codes for Interactive Authentication. CRYPTO 1993: 355-367 | |
46 | Amos Fiat, Moni Naor: Broadcast Encryption. CRYPTO 1993: 480-491 | |
45 | Nimrod Megiddo, Moni Naor, David P. Anderson: The Minimum Reservation Rate Problem in Digital Audio/Video Systems. ISTCS 1993: 43-48 | |
44 | Moni Naor, Larry J. Stockmeyer: What can be computed locally? STOC 1993: 184-193 | |
43 | Moni Naor, Alon Orlitsky, Peter W. Shor: Three results on interactive communication. IEEE Transactions on Information Theory 39(5): 1608-1615 (1993) | |
42 | David Feldman, Russell Impagliazzo, Moni Naor, Noam Nisan, Steven Rudich, Adi Shamir: On Dice and Coins: Models of Computation for Random Generation Inf. Comput. 104(2): 159-174 (1993) | |
41 | Amos Fiat, Moni Naor: Implicit O(1) Probe Search. SIAM J. Comput. 22(1): 1-10 (1993) | |
40 | Noga Alon, Moni Naor: Coin-Flipping Games Immune Against Linear-Sized Coalitions. SIAM J. Comput. 22(2): 403-417 (1993) | |
39 | Joseph Naor, Moni Naor: Small-Bias Probability Spaces: Efficient Constructions and Applications. SIAM J. Comput. 22(4): 838-856 (1993) | |
1992 | ||
38 | Cynthia Dwork, Moni Naor: Pricing via Processing or Combatting Junk Mail. CRYPTO 1992: 139-147 | |
37 | Moni Naor, Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yung: Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). CRYPTO 1992: 196-214 | |
36 | Cynthia Dwork, Uriel Feige, Joe Kilian, Moni Naor, Shmuel Safra: Low Communication 2-Prover Zero-Knowledge Proofs for NP. CRYPTO 1992: 215-227 | |
35 | Noga Alon, Zvi Galil, Oded Margalit, Moni Naor: Witnesses for Boolean Matrix Multiplication and for Shortest Paths FOCS 1992: 417-426 | |
34 | Miklós Ajtai, Noga Alon, Jehoshua Bruck, Robert Cypher, Ching-Tien Ho, Moni Naor, Endre Szemerédi: Fault Tolerant Graphs, Perfect Hash Functions and Disjoint Paths FOCS 1992: 693-702 | |
33 | Noga Alon, Jehoshua Bruck, Joseph Naor, Moni Naor, Ron M. Roth: Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Transactions on Information Theory 38(2): 509- (1992) | |
32 | Amos Fiat, Moni Naor, Jeanette P. Schmidt, Alan Siegel: Nonoblivious Hashing. J. ACM 39(4): 764-782 (1992) | |
31 | Sandy Irani, Moni Naor, Ronitt Rubinfeld: On the Time and Space Complexity of Computation Using Write-Once Memory Or Is Pen Really Much Worse Than Pencil? Mathematical Systems Theory 25(2): 141-159 (1992) | |
30 | Sampath Kannan, Moni Naor, Steven Rudich: Implicit Representation of Graphs. SIAM J. Discrete Math. 5(4): 596-603 (1992) | |
1991 | ||
29 | Tomás Feder, Eyal Kushilevitz, Moni Naor: Amortized Communication Complexity (Preliminary Version) FOCS 1991: 239-248 | |
28 | Moni Naor, Ron M. Roth: Optimal File Sharing in Distributed Networks (Preliminary Version) FOCS 1991: 515-525 | |
27 | László Lovász, Moni Naor, Ilan Newman, Avi Wigderson: Search Problems in the Decision Tree Model (Preliminary Version) FOCS 1991: 576-585 | |
26 | Manuel Blum, William S. Evans, Peter Gemmell, Sampath Kannan, Moni Naor: Checking the Correctness of Memories FOCS 1991: 90-99 | |
25 | Moni Naor: String Matching with Preprocessing of Text and Pattern. ICALP 1991: 739-750 | |
24 | Amos Fiat, Moni Naor: Rigorous Time/Space Tradeoffs for Inverting Functions STOC 1991: 534-541 | |
23 | Danny Dolev, Cynthia Dwork, Moni Naor: Non-Malleable Cryptography (Extended Abstract) STOC 1991: 542-552 | |
22 | Amos Fiat, J. Ian Munro, Moni Naor, Alejandro A. Schäffer, Jeanette P. Schmidt, Alan Siegel: An Implicit Data Structure for Searching a Multikey Table in Logarithmic Time. J. Comput. Syst. Sci. 43(3): 406-424 (1991) | |
21 | Moni Naor: Bit Commitment Using Pseudorandomness. J. Cryptology 4(2): 151-158 (1991) | |
20 | Moni Naor: A Lower Bound on Probabilistic Algorithms for Distributive Ring Coloring. SIAM J. Discrete Math. 4(3): 409-412 (1991) | |
1990 | ||
19 | Noga Alon, Moni Naor: Coin-Flipping Games Immune against Linear-Sized Coalitions (Extended Abstract) FOCS 1990: 46-54 | |
18 | Joseph Naor, Moni Naor: Small-bias Probability Spaces: Efficient Constructions and Applications STOC 1990: 213-223 | |
17 | Moni Naor, Moti Yung: Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks STOC 1990: 427-437 | |
16 | Moni Naor: Succinct representation of general unlabeled graphs. Discrete Applied Mathematics 28(3): 303-307 (1990) | |
15 | Amotz Bar-Noy, Joseph Naor, Moni Naor: One-Bit Algorithms. Distributed Computing 4: 3-8 (1990) | |
14 | Jehoshua Bruck, Moni Naor: The hardness of decoding linear codes with preprocessing. IEEE Transactions on Information Theory 36(2): 381-385 (1990) | |
1989 | ||
13 | Moni Naor: Bit Commitment Using Pseudo-Randomness. CRYPTO 1989: 128-136 | |
12 | Russell Impagliazzo, Moni Naor: Efficient Cryptographic Schemes Provably as Secure as Subset Sum FOCS 1989: 236-241 | |
11 | Rajeev Motwani, Joseph Naor, Moni Naor: The Probabilistic Method Yields Deterministic Parallel Algorithms FOCS 1989: 8-13 | |
10 | David Feldman, Russell Impagliazzo, Moni Naor, Noam Nisan, Steven Rudich, Adi Shamir: On Dice and Coins: Models of Computation for Random Generation. ICALP 1989: 319-340 | |
9 | Moni Naor, Moti Yung: Universal One-Way Hash Functions and their Cryptographic Applications STOC 1989: 33-43 | |
8 | Amos Fiat, Moni Naor: Implicit O(1) Probe Search STOC 1989: 336-344 | |
7 | Joseph Naor, Moni Naor, Alejandro A. Schäffer: Fast Parallel Algorithms for Chordal Graphs. SIAM J. Comput. 18(2): 327-349 (1989) | |
1988 | ||
6 | David Chaum, Amos Fiat, Moni Naor: Untraceable Electronic Cash. CRYPTO 1988: 319-327 | |
5 | Amotz Bar-Noy, Joseph Naor, Moni Naor: One Bit Algorithms. PODC 1988: 66-76 | |
4 | Sampath Kannan, Moni Naor, Steven Rudich: Implicit Representation of Graphs STOC 1988: 334-343 | |
3 | Amos Fiat, Moni Naor, Alejandro A. Schäffer, Jeanette P. Schmidt, Alan Siegel: Storing and Searching a Multikey Table (Extended Abstract) STOC 1988: 344-353 | |
2 | Amos Fiat, Moni Naor, Jeanette P. Schmidt, Alan Siegel: Non-Oblivious Hashing (Extended Abstract) STOC 1988: 367-376 | |
1987 | ||
1 | Joseph Naor, Moni Naor, Alejandro A. Schäffer: Fast Parallel Algorithms for Chordal Graphs (Extended Abstract) STOC 1987: 355-364 |