Hila Zarosim

According to our database1, Hila Zarosim authored at least 7 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
The Feasibility of Outsourced Database Search in the Plain Model.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2013
On the Feasibility of Extending Oblivious Transfer.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Limits on the Usefulness of Random Oracles.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Fair and Efficient Secure Multiparty Computation with Reputation Systems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
On the Power of Random Oracles.
Electron. Colloquium Comput. Complex., 2012

Completeness for Symmetric Two-Party Functionalities - Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2009
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009


  Loading...