Aloni Cohen

Orcid: 0000-0002-3492-2447

According to our database1, Aloni Cohen authored at least 28 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Blameless Users in a Clean Room: Defining Copyright Protection for Generative Models.
CoRR, June, 2025

A Machine Learning Theory Perspective on Strategic Litigation.
CoRR, June, 2025

HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security.
IACR Commun. Cryptol., 2025

Watermarking Language Models for Many Adaptive Users.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Enhancing Watermarked Language Models to Identify Users.
IACR Cryptol. ePrint Arch., 2024

Understanding and Mitigating the Impacts of Differentially Private Census Data on State Level Redistricting.
CoRR, 2024

Properties of Effective Information Anonymity Regulations.
CoRR, 2024

From Isolation to Identification.
Proceedings of the Privacy in Statistical Databases - International Conference, 2024

Private PAC Learning May be Harder than Online Learning.
Proceedings of the International Conference on Algorithmic Learning Theory, 2024

2023
Natural differential privacy - a perspective on protection guarantees.
PeerJ Comput. Sci., 2023

Control, Confidentiality, and the Right to be Forgotten.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Attacks on Deidentification's Defenses.
Proceedings of the 31st USENIX Security Symposium, 2022

Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

Can the Government Compel Decryption?: Don't Trust - Verify.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

2021
Census TopDown: The Impacts of Differential Privacy on Redistricting.
Proceedings of the 2nd Symposium on Foundations of Responsible Computing, 2021

2020
Towards formalizing the GDPR's notion of singling out.
Proc. Natl. Acad. Sci. USA, 2020

Linear Program Reconstruction in Practice.
J. Priv. Confidentiality, 2020

2019
New guarantees for cryptographic circuits and data anonymization.
PhD thesis, 2019

What About Bob? The Inadequacy of CPA Security for Proxy Reencryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

From Soft Classifiers to Hard Decisions: How fair can we be?
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019

2017
Cryptography with Updates.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
The GGM PRF is a Weakly One-Way Family of Functions.
IACR Cryptol. ePrint Arch., 2016

The GGM Function Family Is a Weakly One-Way Family of Functions.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Watermarking cryptographic capabilities.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

2015
Publicly Verifiable Software Watermarking.
IACR Cryptol. ePrint Arch., 2015

Aggregatable Pseudorandom Functions and Connections to Learning.
IACR Cryptol. ePrint Arch., 2015

Aggregate Pseudorandom Functions and Connections to Learning.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Multilinear Pseudorandom Functions.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015


  Loading...