Eylon Yogev

Orcid: 0000-0001-8599-2472

Affiliations:
  • Bar-Ilan University, Ramat-Gan, Israel


According to our database1, Eylon Yogev authored at least 58 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Incompressible Encryption with Everlasting Security.
IACR Cryptol. ePrint Arch., 2025

WHIR: Reed-Solomon Proximity Testing with Super-Fast Verification.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Instance Compression, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Towards a White-Box Secure Fiat-Shamir Transformation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
From One-Time to Two-Round Reusable Multi-signatures Without Nested Forking.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Security Bounds for Proof-Carrying Data from Straightline Extractors.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Untangling the Security of Kilian's Protocol: Upper and Lower Bounds.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Hamming Weight Proofs of Proximity with One-Sided Error.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

STIR: Reed-Solomon Proximity Testing with Fewer Queries.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Rogue-Instance Security for Batch Knowledge Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Secure Distributed Network Optimization Against Eavesdroppers.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

IOPs with Inverse Polynomial Soundness Error.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023

2022
Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

Broadcast CONGEST Algorithms Against Eavesdroppers.
Proceedings of the 36th International Symposium on Distributed Computing, 2022

A Toolbox for Barriers on Interactive Oracle Proofs.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

A PCP Theorem for Interactive Proofs and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Lower Bound on SNARGs in the Random Oracle Model.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Hardness of Approximation for Stochastic Problems via Interactive Oracle Proofs.
Proceedings of the 37th Computational Complexity Conference, 2022

2021
A PCP Theorem for Interactive Proofs.
IACR Cryptol. ePrint Arch., 2021

Tight Security Bounds for Micali's SNARGs.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Adversarial laws of large numbers and optimal regret in online classification.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021

Subquadratic SNARGs in the Random Oracle Model.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Transparent Error Correcting in a Computationally Bounded World.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Barriers for Succinct Arguments in the Random Oracle Model.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

The Power of Distributed Verifiers in Interactive Proofs.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

The Adversarial Robustness of Sampling.
Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2020

A Framework for Adversarially Robust Streaming Algorithms.
Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2020

On Exponential-Time Hypotheses, Derandomization, and Circuit Lower Bounds: Extended Abstract.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Interactive Proofs for Social Graphs.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
On Exponential-Time Hypotheses, Derandomization, and Circuit Lower Bounds.
Electron. Colloquium Comput. Complex., 2019

Parallel Balanced Allocations: The Heavily Loaded Case.
Proceedings of the 31st ACM on Symposium on Parallelism in Algorithms and Architectures, 2019

Distributed Algorithms Made Secure: A Graph Theoretic Approach.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

Low Congestion Cycle Covers and Their Applications.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

CB2CF: a neural multiview content-to-collaborative filtering model for completely cold item recommendations.
Proceedings of the 13th ACM Conference on Recommender Systems, 2019

Secure Distributed Computing Made (Nearly) Optimal.
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Optimal Short Cycle Decomposition in Almost Linear Time.
Proceedings of the 46th International Colloquium on Automata, Languages, and Programming, 2019

Distributional Collision Resistance Beyond One-Way Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Congested Clique Algorithms for Graph Spanners.
Proceedings of the 32nd International Symposium on Distributed Computing, 2018

Another Step Towards Realizing Random Oracles: Non-malleable Point Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On Distributional Collision Resistant Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Distributed Computing Made Secure: A New Cycle Cover Theorem.
IACR Cryptol. ePrint Arch., 2017

Hardness of Continuous Local Search: Query Complexity and Cryptographic Lower Bounds.
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017

The Journey from NP to TFNP Hardness.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Non-Interactive Multiparty Computation Without Correlated Randomness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.
IACR Cryptol. ePrint Arch., 2016

The Deep Journey from Content to Collaborative Filtering.
CoRR, 2016

How to Share a Secret, Infinitely.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Tight Bounds for Sliding Bloom Filters.
Algorithmica, 2015

Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Bloom Filters in Adversarial Environments.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Secret-Sharing for NP from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

One-Way Functions and (Im)Perfect Obfuscation.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Secret-Sharing for NP.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Sliding Bloom Filters.
Proceedings of the Algorithms and Computation - 24th International Symposium, 2013


  Loading...