Iftach Haitner
Orcid: 0000-0003-3167-3294
According to our database1,
Iftach Haitner
authored at least 67 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Mildly Accurate Computationally Differentially Private Inner Product Protocols Imply Oblivious Transfer.
CoRR, February, 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Computationally Differentially Private Inner-Product Protocols Imply Oblivious Transfer.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
2023
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023
2022
Tighter Bounds on MultiParty Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling.
SIAM J. Comput., 2022
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
2020
Theory Comput., 2020
Inaccessible Entropy I: Inaccessible Entropy Generators and Statistically Hiding Commitments from One-Way Functions.
CoRR, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
A Tight Parallel Repetition Theorem for Partially Simulatable Interactive Arguments via Smooth KL-Divergence.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Electron. Colloquium Comput. Complex., 2019
Proceedings of the 33rd International Symposium on Distributed Computing, 2019
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
Tighter Bounds on Multi-Party Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
2017
Tighter Bounds on Multi-Party Coin Flipping, via Augmented Weak Martingales and Di erentially Private Sampling.
Electron. Colloquium Comput. Complex., 2017
Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 2017
Proceedings of the Tutorials on the Foundations of Cryptography., 2017
2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
2015
Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
SIAM J. Comput., 2015
Electron. Colloquium Comput. Complex., 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Proceedings of the Symposium on Theory of Computing, 2014
Proceedings of the Symposium on Theory of Computing, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
2010
Efficiency improvements in constructing pseudorandom generators from one-way functions.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP.
Proceedings of the 25th Annual IEEE Conference on Computational Complexity, 2010
2009
Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function.
SIAM J. Comput., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009
2008
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 2007
2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Advances in Cryptology, 2005
2004
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions
Electron. Colloquium Comput. Complex., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004