Mor Weiss

Orcid: 0000-0002-4059-7628

According to our database1, Mor Weiss authored at least 24 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Zero-Knowledge IOPs Approaching Witness Length.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Privacy Preserving Feature Selection for Sparse Linear Regression.
IACR Cryptol. ePrint Arch., 2023

Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Shielding Probabilistically Checkable Proofs: Zero-Knowledge PCPs from Leakage Resilience.
IACR Cryptol. ePrint Arch., 2022

Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
On the Security of Doubly Efficient PIR.
IACR Cryptol. ePrint Arch., 2021

ZK-PCPs from Leakage-Resilient Secret Sharing.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
The Price of Active Security in Cryptographic Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Permuted Puzzles and Cryptographic Hardness.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Private Anonymous Data Access.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

On the Plausibility of Fully Homomorphic Encryption for RAMs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Linear-Regression on Packed Encrypted Data in the Two-Server Model.
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2019

2018
Is There an Oblivious RAM Lower Bound for Online Reads?
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Multi-Key Searchable Encryption, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
How to Construct a Leakage-Resilient (Stateless) Trusted Party.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

2016
Secure Computation and Probabilistic Checking.
PhD thesis, 2016

Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Binary AMD Circuits from Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

2015
Practical Solutions For Format-Preserving Encryption.
CoRR, 2015

2014
Protecting obfuscation against arithmetic attacks.
IACR Cryptol. ePrint Arch., 2014

Probabilistically Checkable Proofs of Proximity with Zero-Knowledge.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

2013
Zero Knowledge LTCs and Their Applications.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2013


  Loading...