Moni Naor
Orcid: 0000-0003-3381-0221Affiliations:
- Weizmann Institute of Science, Israel
According to our database1,
Moni Naor
authored at least 215 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2020, "For contributions to the foundations of cryptography and theoretical computer science".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Electron. Colloquium Comput. Complex., 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 4th Symposium on Foundations of Responsible Computing, 2023
Proceedings of the 4th Symposium on Foundations of Responsible Computing, 2023
2022
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols.
IACR Cryptol. ePrint Arch., 2022
MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably.
IACR Cryptol. ePrint Arch., 2022
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Electron. Colloquium Comput. Complex., 2021
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
2020
ACM Trans. Priv. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 1st Symposium on Foundations of Responsible Computing, 2020
Proceedings of the Conference on Learning Theory, 2020
2019
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing.
J. ACM, 2019
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Electron. Colloquium Comput. Complex., 2019
2018
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior.
IACR Cryptol. ePrint Arch., 2018
Electron. Colloquium Comput. Complex., 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses.
IACR Cryptol. ePrint Arch., 2016
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations.
IACR Cryptol. ePrint Arch., 2016
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.
IACR Cryptol. ePrint Arch., 2016
Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems.
Electron. Colloquium Comput. Complex., 2016
The Family Holiday Gathering Problem or Fair and Periodic Scheduling of Independent Sets.
Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures, 2016
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Algorithms and Computation - 24th International Symposium, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
2011
2010
ACM Trans. Inf. Syst. Secur., 2010
SIAM J. Comput., 2010
On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy.
J. Priv. Confidentiality, 2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the Innovations in Computer Science, 2010
Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
2009
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
Theory Comput., 2009
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles.
Theory Comput. Syst., 2009
IACR Cryptol. ePrint Arch., 2009
Algorithmica, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
On the complexity of differentially private data release: efficient algorithms and hardness results.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results.
Proceedings of the Automata, Languages and Programming, 36th International Colloquium, 2009
2008
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
IEEE Trans. Inf. Theory, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
ACM Trans. Algorithms, 2007
2006
J. Cryptol., 2006
Electron. Colloquium Comput. Complex., 2006
Electron. Colloquium Comput. Complex., 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Distributed Computing, 19th International Conference, 2005
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Distributed Computing, 18th International Conference, 2004
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Peer-to-Peer Systems II, Second International Workshop, 2003
Proceedings of the FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
2002
J. Cryptol., 2002
IACR Cryptol. ePrint Arch., 2002
Electron. Colloquium Comput. Complex., 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Electron. Colloquium Comput. Complex., 2001
Proceedings of the Tenth International World Wide Web Conference, 2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001
2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
1999
J. Cryptol., 1999
Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions.
J. Comput. Syst. Sci., 1999
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
IEEE Trans. Parallel Distributed Syst., 1998
J. Cryptol., 1998
J. Cryptol., 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract).
Proceedings of the Advances in Cryptology, 1998
1997
Electron. Colloquium Comput. Complex., 1997
On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract).
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
1996
IACR Cryptol. ePrint Arch., 1996
Derandomization, Witnesses for Boolean Matrix Multiplication and Construction of Perfect Hash Functions.
Algorithmica, 1996
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version).
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996
1995
Proceedings of the Third Israel Symposium on Theory of Computing and Systems, 1995
Proceedings of the Third Israel Symposium on Theory of Computing and Systems, 1995
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995
Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995
1994
J. Comput. Syst. Sci., 1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 23-25 January 1994, 1994
1993
Inf. Comput., June, 1993
SIAM J. Comput., 1993
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993
Proceedings of the Advances in Cryptology, 1993
1992
Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs.
IEEE Trans. Inf. Theory, 1992
On the Time and Space Complexity of Computation Using Write-Once Memory Or Is Pen Really Much Worse Than Pencil?
Math. Syst. Theory, 1992
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
SIAM J. Discret. Math., 1991
J. Comput. Syst. Sci., 1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
Proceedings of the Automata, Languages and Programming, 18th International Colloquium, 1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
1990
IEEE Trans. Inf. Theory, 1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990
1989
Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the Proceedings: Third Annual Structure in Complexity Theory Conference, 1988
1987
Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987