Calculated based on number of publications stored in Pure and citations from Scopus
1989 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Adjacency Sketches in Adversarial Environments

    Naor, M. & Pekel, E., 4 Jan 2024, Proceedings of the 2024 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). Wooddruff, D. P. (ed.). Association for Computing Machinery (ACM), p. 1067-1098 32 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)
  • Are Your Keys Protected? Time Will Tell

    Dov, Y. B., David, L., Naor, M. & Tzalik, E., Aug 2024, 5th Conference on Information-Theoretic Cryptography, ITC 2024. Aggarwal, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 28 p. 3. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 304).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • From Donkeys to Kings in Tournaments

    Abboud, A., Grossman, T., Naor, M. & Solomon, T., 23 Sept 2024, 32nd Annual European Symposium on Algorithms, ESA 2024. Chan, T., Fischer, J., Iacono, J. & Herman, G. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 14 p. 3. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 308).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    File
    10 Downloads (Pure)
  • MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably

    Alon, B., Naor, M., Omri, E. & Stemmer, U., 16 Aug 2024, (Published Online) Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media B.V., p. 74-108 35 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • That’s Not My Signature! Fail-Stop Signatures for a Post-quantum World

    Boschini, C., Dahari, H., Naor, M. & Ronen, E., 16 Aug 2024, (Published Online) Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media B.V., p. 107-140 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 14920 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2023

    New Algorithms and Applications for Risk-Limiting Audits

    Karov, B. & Naor, M., 1 Jun 2023, 4th Symposium on Foundations of Responsible Computing, FORC 2023. Talwar, K. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 2. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 256).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Resistance to Timing Attacks for Sampling and Privacy Preserving Schemes

    Dov, Y. B., David, L., Naor, M. & Tzalik, E., 1 Jun 2023, 4th Symposium on Foundations of Responsible Computing, FORC 2023. Talwar, K. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 11. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 256).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs

    Cremers, C., Naor, M., Paz, S. & Ronen, E., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media B.V., Vol. 13508. p. 668-698 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Keep That Card in Mind: Card Guessing with Limited Memory

    Menuhin, B. & Naor, M., 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 28 p. 107. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Citations (Scopus)
  • Mirror Games Against an Open Book Player

    Magen, R. & Naor, M., 23 May 2022, 11th International Conference on Fun with Algorithms, FUN 2022. Fraigniaud, P. & Uno, Y. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 20. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 226).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)
  • 2021

    Adversarial laws of large numbers and optimal regret in online classification

    Alon, N., Ben-Eliezer, O., Dagan, Y., Moran, S., Naor, M. & Yogev, E., 15 Jun 2021, STOC 2021 - Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. Khuller, S. & Williams, V. V. (eds.). p. 447-455 9 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    34 Citations (Scopus)
  • 2020

    Can two walk together: Privacy enhancing methods and preventing tracking of users

    Naor, M. & Vexler, N., 1 May 2020, 1st Symposium on Foundations of Responsible Computing, FORC 2020. Roth, A. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 20 p. 4. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 156).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Instance complexity and unlabeled certificates in the decision tree model

    Grossman, T., Komargodski, I. & Naor, M., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 38 p. 56. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Citations (Scopus)
  • Out-of-band authenticated group key exchange: From strong authentication to immediate key delivery

    Naor, M., Rotem, L. & Segev, G., 1 Jun 2020, 1st Conference on Information-Theoretic Cryptography, ITC 2020. Kalai, Y. T., Smith, A. D. & Wichs, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 25 p. 9. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • The Power of Distributed Verifiers in Interactive Proofs

    Naor, M., Parter, M. & Yogev, E., 2020, Proceedings of the Thirty-First Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'20). Association for Computing Machinery (ACM), p. 1096-1115 20 p. (Symposium on Discrete Algorithms (SODA 2020)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    44 Citations (Scopus)
  • 2019

    How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior

    Naor, M., Pinkas, B. & Ronen, E., Nov 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1369-1386 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Incrementally Verifiable Computation via Incremental PCPs

    Naor, M., Paneth, O. & Rothblum, G. N., 22 Nov 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer Verlag, Vol. 11892. p. 552-576 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2018

    Collision resistant hashing for paranoids: dealing with multiple collisions

    Komargodski, I., Naor, M. & Yogev, E., 31 Mar 2018, (Published Online) Advances in Cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II. Nielsen, J. B. & Rijmen, V. (eds.). Springer-Verlag Italia, p. 162-194 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10821 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Citations (Scopus)
  • The Security of Lazy Users in Out-of-Band Authentication

    Naor, M., Rotem, L. & Segev, G., 8 Nov 2018, Theory of Cryptography : 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Science and Business Media B.V., p. 575-599 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 11240 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • 2017

    The Journey from NP to TFNP Hardness

    Hubácek, P., Naor, M. & Yogev, E., 28 Nov 2017, 8th Innovations in Theoretical Computer Science Conference, ITCS 2017. Papadimitriou, C. H. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 60:1-60:21 (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 67).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Citations (Scopus)
  • 2016

    How to share a secret, infinitely

    Komargodski, I., Naor, M. & Yogev, E., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 485-514 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9986 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Citations (Scopus)
  • Searchable symmetric encryption: Optimal locality in linear space via two-dimensional balanced allocations

    Asharov, G., Naor, M., Segev, G. & Shahaf, I., 19 Jun 2016, STOC 2016 - Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing. Mansour, Y. & Wichs, D. (eds.). p. 1101-1114 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing, Vol. 19-21-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    85 Citations (Scopus)
  • Spooky interaction and its discontents: Compilers for succinct two-message argument systems

    Dwork, C., Naor, M. & Rothblum, G. N., 21 Jul 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 123-145 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • The family holiday gathering problem or fair and periodic scheduling of independent sets

    Amir, A., Kapah, O., Kopelowitz, T., Naor, M. & Porat, E., 11 Jul 2016, SPAA 2016 - Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures. p. 367-375 9 p. (Annual ACM Symposium on Parallelism in Algorithms and Architectures, Vol. 11-13-July-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Citations (Scopus)
  • Universal constructions and robust combiners for indistinguishability obfuscation and witness encryption

    Ananth, P., Jain, A., Naor, M., Sahai, A. & Yogev, E., 21 Jul 2016, Advances in Cryptology : 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 491-520 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Citations (Scopus)
  • 2015

    Primary-secondary-resolver membership proof systems

    Naor, M. & Ziv, A., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 199-228 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Citations (Scopus)
  • Pure differential privacy for rectangle queries via private partitions

    Dwork, C., Naor, M., Reingold, O. & Rothblum, G. N., 2015, Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Iwata, T. & Cheon, J. H. (eds.). Springer Verlag, p. 735-751 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    36 Citations (Scopus)
  • When can limited randomness be used in repeated games?

    Hubáček, P. & Naor, M., 10 Dec 2015, Algorithmic Game Theory - 8th International Symposium, SAGT 2015. Hoefer, M. & Hoefer, M. (eds.). Springer Verlag, p. 259-271 13 p. A20. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 9347).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    One-way functions and (im)perfect obfuscation

    Komargodski, I., Moran, T., Naor, M., Pass, R., Rosen, A. & Yogev, E., 7 Dec 2014, Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. IEEE Computer Society, p. 374-383 10 p. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    54 Citations (Scopus)
  • 2013

    Hardness preserving reductions via cuckoo hashing

    Berman, I., Haitner, I., Komargodski, I. & Naor, M., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 40-59 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    12 Citations (Scopus)
  • 2010

    Differential privacy under continual observation

    Dwork, C., Naor, M., Pitassi, T. & Rothblum, G. N., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 715-724 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    560 Citations (Scopus)
  • Public-key encryption in the bounded-retrieval model

    Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Science and Business Media B.V., Vol. 6110. p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    192 Citations (Scopus)
  • The privacy of tracing traitors

    Naor, M., 2010, Proceedings of the 10th Annual ACM Workshop on Digital Rights Management, DRM '10, Co-located with CCS'10. p. 1-2 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2009

    De-amortized cuckoo hashing: Provable worst-case performance and experimental results

    Arbitman, Y., Naor, M. & Segev, G., 2009, Automata, Languages and Programming - 36th International Colloquium, ICALP 2009, Proceedings. PART 1 ed. Springer Science and Business Media B.V., Vol. 5555. p. 107-118 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); No. PART 1, Vol. 5555 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    44 Citations (Scopus)
  • Games for extracting randomness

    Halprin, R. & Naor, M., 2009, SOUPS 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. 12 p. 1572548. (SOUPS 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Citations (Scopus)
  • Hedged public-key encryption: How to protect against bad randomness

    Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H. & Yilek, S., 2009, Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Science and Business Media B.V., Vol. 5912. p. 232-249 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 5912 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    107 Citations (Scopus)
  • How efficient can memory checking be?

    Dwork, C., Naor, M., Rothblum, G. N. & Vaikuntanathan, V., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Springer Verlag, Vol. 5444. p. 503-520 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Citations (Scopus)
  • On the complexity of differentially private data release :Efficient algorithms and hardness results

    Dwork, C., Naor, M., Reingold, O., Rothblum, G. N. & Vadhan, S., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 381-390 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    316 Citations (Scopus)
  • 2008

    Informational overhead of incentive compatibility

    Babaioff, M., Blumrosen, L., Naor, M. & Schapira, M., 2008, EC'08 - Proceedings of the 2008 ACM Conference on Electronic Commerce. Association for Computing Machinery (ACM), p. 88-97 10 p. (Proceedings of the ACM Conference on Electronic Commerce).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Sketching in adversarial environments

    Mironov, I., Naor, M. & Segev, G., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. Association for Computing Machinery (ACM), p. 651-660 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • Traitor tracing with constant size ciphertext

    Boneh, D. & Naor, M., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. Association for Computing Machinery (ACM), p. 501-510 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    101 Citations (Scopus)
  • 2007

    Split-ballot voting: Everlasting privacy with distributed trust

    Moran, T. & Naor, M., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 246-255 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    50 Citations (Scopus)
  • 2006

    Learning to impersonate

    Naor, M. & Rothblum, G. N., 2006, ACM International Conference Proceeding Series - Proceedings of the 23rd International Conference on Machine Learning, ICML 2006. p. 649-656 8 p. (ACM International Conference Proceeding Series, Vol. 148).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • On the compressibility of N P instances and cryptographic applications

    Harnik, D. & Naor, M., 2006, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006. p. 719-728 10 p. 4031406. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    26 Citations (Scopus)
  • 2004

    Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 Cambridge, MA, USA, February 19-21, 2004 Proceedings

    Naor, M., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naor, M. (ed.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 2951).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2001

    Rank aggregation methods for the web

    Dwork, C., Kumar, R., Naor, M. & Sivakumar, D., 1 Apr 2001, Proceedings of the 10th International Conference on World Wide Web, WWW 2001. p. 613-622 10 p. (Proceedings of the 10th International Conference on World Wide Web, WWW 2001).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1462 Citations (Scopus)
  • Revocation and tracing schemes for stateless receivers

    Naor, D., Naor, M. & Lotspiech, J., 2 Aug 2001, Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. Kilian, J. (ed.). Springer Verlag, p. 41-62 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 2139 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    875 Citations (Scopus)
  • 2000

    Pseudo-random functions and factoring (extended abstract)

    Naor, M., Reingold, O. & Rosen, A., 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 11-20 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Citations (Scopus)
  • 1999

    Multicast security: A taxonomy and some efficient constructions

    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. & Pinkas, B., 1999, Proceedings - IEEE INFOCOM'99: The Conference on Computer Communications - 18th Annual Joint Conference of the IEEE Computer and Communications Societies: The Future is Now. Vol. 2. p. 708-716 9 p. 751457. (Proceedings - IEEE INFOCOM, Vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    629 Citations (Scopus)
  • Oblivious transfer with adaptive queries

    Naor, M. & Pinkas, B., 16 Dec 1999, Advances in Cryptology – CRYPTO 1999 - 19th Annual International Cryptology Conference, Proceedings. Wiener, M. (ed.). Springer Verlag, Vol. 1666. p. 573-590 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 1666).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    143 Citations (Scopus)