Omer Reingold

Affiliations:
  • Stanford University, CA, USA
  • Weizmann Institute of Science, Israel (former)


According to our database1, Omer Reingold authored at least 127 papers between 1995 and 2025.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

ACM Fellow

ACM Fellow 2014, "For contributions to the study of pseudorandomness, derandomization, and cryptography.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On the Impossibility of Separating Intelligence from Judgment: The Computational Intractability of Filtering for AI Alignment.
CoRR, July, 2025

Representative Language Generation.
CoRR, May, 2025

Accuracy vs. Accuracy: Computational Tradeoffs Between Classification Rates and Utility.
CoRR, May, 2025

How Global Calibration Strengthens Multiaccuracy.
CoRR, April, 2025

Fairness with respect to Stereotype Predictors: Impossibilities and Best Practices.
Trans. Mach. Learn. Res., 2025

OWA for Bipartite Assignments.
Proceedings of the 6th Symposium on Foundations of Responsible Computing, 2025

Multiaccuracy for Subpopulation Calibration Over Distribution Shift in Medical Prediction Models.
Proceedings of the Conference on Health, 2025

2024
Oracle Efficient Online Multicalibration and Omniprediction.
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024

Dissenting Explanations: Leveraging Disagreement to Reduce Model Overreliance.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Characterizing notions of omniprediction via multicalibration.
CoRR, 2023

Swap Agnostic Learning, or Characterizing Omniprediction via Multicalibration.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Loss Minimization Through the Lens Of Outcome Indistinguishability.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Omnipredictors for Constrained Optimization.
Proceedings of the International Conference on Machine Learning, 2023

Bidding Strategies for Proportional Representation in Advertisement Campaigns.
Proceedings of the 4th Symposium on Foundations of Responsible Computing, 2023

From the Real Towards the Ideal: Risk Prediction in a Better World.
Proceedings of the 4th Symposium on Foundations of Responsible Computing, 2023

Generative Models of Huge Objects.
Proceedings of the 38th Computational Complexity Conference, 2023

2022
Bringing Research-Life to Centerstage.
Bull. EATCS, 2022

KL Divergence Estimation with Multi-group Attribution.
CoRR, 2022

Omnipredictors.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Leximax Approximations and Representative Cohort Selection.
Proceedings of the 3rd Symposium on Foundations of Responsible Computing, 2022

Metric Entropy Duality and the Sample Complexity of Outcome Indistinguishability.
Proceedings of the International Conference on Algorithmic Learning Theory, 29 March, 2022

Multicalibrated Partitions for Importance Weights.
Proceedings of the International Conference on Algorithmic Learning Theory, 29 March, 2022

Beyond Bernoulli: Generating Random Outcomes that cannot be Distinguished from Nature.
Proceedings of the International Conference on Algorithmic Learning Theory, 29 March, 2022

2021
Monotone Branching Programs: Pseudorandomness and Circuit Complexity.
Electron. Colloquium Comput. Complex., 2021

Outcome indistinguishability.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021

Pseudorandom Generators for Read-Once Monotone Branching Programs.
Proceedings of the Approximation, 2021

Robust Mean Estimation on Highly Incomplete Data with Arbitrary Outliers.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
Inaccessible Entropy II: IE Functions and Universal One-Way Hashing.
Theory Comput., 2020

Inaccessible Entropy I: Inaccessible Entropy Generators and Statistically Hiding Commitments from One-Way Functions.
CoRR, 2020

Through the lens of a passionate theoretician.
Commun. ACM, 2020

Bounded-Leakage Differential Privacy.
Proceedings of the 1st Symposium on Foundations of Responsible Computing, 2020

2019
Pseudorandom generators for width-3 branching programs.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

On the Communication Complexity of Key-Agreement Protocols.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Learning from Outcomes: Evidence-Based Rankings.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

Tracking and Improving Information in the Service of Fairness.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

Deterministic Approximation of Random Walks in Small Space.
Proceedings of the Approximation, 2019

2018
Improved pseudorandomness for unordered branching programs through local monotonicity.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Fairness Through Computationally-Bounded Awareness.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Multicalibration: Calibration for the (Computationally-Identifiable) Masses.
Proceedings of the 35th International Conference on Machine Learning, 2018

Efficient Batch Verification for UP.
Proceedings of the 33rd Computational Complexity Conference, 2018

2017
Calibration for the (Computationally-Identifiable) Masses.
CoRR, 2017

Guilt-free data reuse.
Commun. ACM, 2017

ERA: A Framework for Economic Resource Allocation for the Cloud.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Derandomization Beyond Connectivity: Undirected Laplacian Systems in Nearly Logarithmic Space.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

2016
New techniques and tighter bounds for local computation algorithms.
J. Comput. Syst. Sci., 2016

Equality and Social Mobility in Twitter Discussion Groups.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

Constant-round interactive proofs for delegating computation.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Adaptive Condorcet-Based Stopping Rules Can Be Efficient.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

2015
Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
SIAM J. Comput., 2015

Preserving Statistical Validity in Adaptive Data Analysis.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Generalization in Adaptive Data Analysis and Holdout Reuse.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Pure Differential Privacy for Rectangle Queries via Private Partitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Pseudorandom Graphs in Data Structures.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Fast Pseudorandomness for Independence and Load Balancing - (Extended Abstract).
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Deterministic Coupon Collection and Better Strong Dispersers.
Proceedings of the Approximation, 2014

2013
Pseudorandomness for Regular Branching Programs via Fourier Analysis.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2013

2012
DNF Sparsification and a Faster Deterministic Counting.
Electron. Colloquium Comput. Complex., 2012

Fairness through awareness.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

Better Pseudorandom Generators from Milder Pseudorandom Restrictions.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

Incremental Deterministic Public-Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

DNF Sparsification and a Faster Deterministic Counting Algorithm.
Proceedings of the 27th Conference on Computational Complexity, 2012

2011
Pseudorandom generators for combinatorial shapes.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Only valuable experts can be valued.
Proceedings of the Proceedings 12th ACM Conference on Electronic Commerce (EC-2011), 2011

Balls and Bins: Smaller Hash Families and Faster Evaluation.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010
Partial exposure in large games.
Games Econ. Behav., 2010

Efficiency improvements in constructing pseudorandom generators from one-way functions.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

The Limits of Two-Party Differential Privacy.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Universal One-Way Hash Functions via Inaccessible Entropy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function.
SIAM J. Comput., 2009

Players' Effects Under Limited Independence.
Math. Oper. Res., 2009

Derandomized Constructions of <i>k</i>-Wise (Almost) Independent Permutations.
Algorithmica, 2009

Inaccessible entropy.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

On the complexity of differentially private data release: efficient algorithms and hardness results.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Computational Differential Privacy.
Proceedings of the Advances in Cryptology, 2009

Pseudorandom Bit Generators That Fool Modular Sums.
Proceedings of the Approximation, 2009

How Well Do Random Walks Parallelize?.
Proceedings of the Approximation, 2009

2008
Undirected connectivity in log-space.
J. ACM, 2008

Fault tolerance in large games.
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008

Dense Subsets of Pseudorandom Sets.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

2007
Statistically-hiding commitment from any one-way function.
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007

Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

A New Interactive Hashing Theorem.
Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 2007

S-T Connectivity on Digraphs with a Known Stationary Distribution.
Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 2007

2006
Pseudorandom walks on regular digraphs and the RL vs. L problem.
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006

Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

On the Power of the Randomized Iterate.
Proceedings of the Advances in Cryptology, 2006

2005
Pseudorandom Walks in Biregular Graphs and the RL vs. L Problem
Electron. Colloquium Comput. Complex., 2005

Tight bounds for shared memory systems accessed by Byzantine processes.
Distributed Comput., 2005

Keyword Search and Oblivious Pseudorandom Functions.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Undirected ST-connectivity in log-space.
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005

On Robust Combiners for Oblivious Transfer and Other Primitives.
Proceedings of the Advances in Cryptology, 2005

Derandomized Constructions of k-Wise (Almost) Independent Permutations.
Proceedings of the Approximation, 2005

On the Error Parameter of Dispersers.
Proceedings of the Approximation, 2005

2004
Just fast keying: Key agreement in a hostile internet.
ACM Trans. Inf. Syst. Secur., 2004

Notions of Reducibility between Cryptographic Primitives.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Completeness in two-party secure computation: a computational view.
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004

Assignment Testers: Towards a Combinatorial Proof of the PCP-Theorem.
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004

Immunizing Encryption Schemes from Decryption Errors.
Proceedings of the Advances in Cryptology, 2004

2003
Extractors: optimal up to constant factors.
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003

2002
Pseudorandom Functions and Factoring.
SIAM J. Comput., 2002

Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes.
Proceedings of the Distributed Computing, 16th International Conference, 2002

Randomness Conductors and Constant-Degree Lossless Expanders.
Proceedings of the 17th Annual IEEE Conference on Computational Complexity, 2002

Streaming Computation of Combinatorial Objects.
Proceedings of the 17th Annual IEEE Conference on Computational Complexity, 2002

2001
Pseudo-Random Functions and Factoring
Electron. Colloquium Comput. Complex., 2001

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.
Proceedings of the Security Protocols, 2001

Constructing pseudo-random permutations with a prescribed structure.
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001

On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates.
Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, 2001

Priced Oblivious Transfer: How to Sell Digital Goods.
Proceedings of the Advances in Cryptology, 2001

2000
Pseudo-random functions and factoring (extended abstract).
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Entropy Waves, the Zig-Zag Graph Product, and New Constant-Degree Expanders and Extractors.
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000

Extracting Randomness via Repeated Condensing.
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000

The Relationship between Public Key Encryption and Oblivious Transfer.
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000

1999
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited.
J. Cryptol., 1999

Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring.
Inf. Process. Lett., 1999

Extracting all the Randomness and Reducing the Error in Trevisan's Extractors.
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999

On Recycling the Randomness of States in Space Bounded Computation.
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999

Error Reduction for Extractors.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999

Magic Functions.
Proceedings of the 40th Annual Symposium on Foundations of Computer Science, 1999

Distributed Pseudo-random Functions and KDCs.
Proceedings of the Advances in Cryptology, 1999

1998
Perfectly One-Way Probabilistic Hash Functions (Preliminary Version).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract).
Proceedings of the Advances in Cryptology, 1998

1997
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring
Electron. Colloquium Comput. Complex., 1997

On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited
Electron. Colloquium Comput. Complex., 1997

On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract).
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997

Number-theoretic Constructions of Efficient Pseudo-random Functions.
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997

1995
Synthesizers and Their Application to the Parallel Construction of Pseudo-random Functions
Electron. Colloquium Comput. Complex., 1995

Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995


  Loading...