Noam Mazor
According to our database1,
Noam Mazor
authored at least 24 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Mildly Accurate Computationally Differentially Private Inner Product Protocols Imply Oblivious Transfer.
CoRR, February, 2025
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Computationally Differentially Private Inner-Product Protocols Imply Oblivious Transfer.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025
2024
Electron. Colloquium Comput. Complex., 2024
Electron. Colloquium Comput. Complex., 2024
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 39th Computational Complexity Conference, 2024
Proceedings of the 39th Computational Complexity Conference, 2024
Proceedings of the Approximation, 2024
2023
Electron. Colloquium Comput. Complex., 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
2022
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019