Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Boaz Barak
Search web for home page
Program Committees
1
2013
TCC
pc
2
2011
TCC
pc
3
2008
TCC
pc
4
2008
Crypto
pc
5
2006
Crypto
pc
6
2005
Crypto
pc
7
2005
TCC
pc
Publications
year
title
booktitle
pages
1
2017
Merkle's Key Agreement Protocol is Optimal: An O(n
2
) Attack on Any Key Agreement from Random Oracles
jofc
699-734
2
2014
Protecting Obfuscation against Algebraic Attacks
eurocrypt
221-238
3
2014
Obfuscation for Evasive Functions
tcc
26-51
4
2011
Leftover Hash Lemma, Revisited
crypto
1
5
2011
Secure Computation Without Authentication
jofc
720-760
6
2010
Bounded Key-Dependent Message Security
eurocrypt
423-444
7
2009
Merkle Puzzles Are Optimal - An
O
(
n
2
)-Query Attack on Any Key Exchange from a Random Oracle
crypto
374-390
8
2008
Merkle Puzzles are Optimal
eprint
online
9
2008
Lower Bounds on Signatures From Symmetric Primitives
eprint
online
10
2008
Public Key Cryptography from Different Assumptions
eprint
online
11
2008
Protocols and Lower Bounds for Failure Localization in the Internet
eurocrypt
341-360
12
2007
Secure Computation Without Authentication
eprint
online
13
2006
Concurrent Non-Malleable Zero Knowledge
eprint
online
14
2005
A model and architecture for pseudo-random generation with applications to /dev/random
eprint
online
15
2005
How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation
eprint
online
16
2005
Derandomization in Cryptography
eprint
online
17
2005
Secure Computation Without Authentication
crypto
online
18
2004
On the Possibility of One-Message Weak Zero-Knowledge
tcc
121-132
19
2004
Lower Bounds for Non-Black-Box Zero Knowledge
eprint
online
20
2004
Protocol Initialization for the Framework of Universal Composability
eprint
online
21
2003
True Random Number Generators Secure in a Changing Environment
ches
166-180
22
2003
Derandomization in Cryptography
crypto
online
23
2002
Strict Polynomial-time in Simulation and Extraction
eprint
online
24
2001
Resettably-Sound Zero-Knowledge and its Applications
eprint
online
25
2001
On the (Im)possibility of Obfuscating Programs
eprint
online
26
2001
On the (Im)possibility of Obfuscating Programs
crypto
1-18
27
2001
Universal Arguments and their Applications
eprint
online
Coauthors of Boaz Barak
Nir Bitansky (1)
Ran Canetti (4)
Yevgeniy Dodis (1)
Sanjam Garg (1)
Sharon Goldberg (1)
Oded Goldreich (4)
Shafi Goldwasser (1)
Iftach Haitner (1)
Shai Halevi (1)
Dennis Hofheinz (1)
Russell Impagliazzo (2)
Yuval Ishai (1)
Yael Tauman Kalai (2)
Hugo Krawczyk (1)
Yehuda Lindell (7)
Mohammad Mahmoody (3)
Mohammad Mahmoody-Ghidary (1)
Shien Jin Ong (2)
Omer Paneth (2)
Rafael Pass (4)
Olivier Pereira (1)
Krzysztof Pietrzak (1)
Manoj Prabhakaran (1)
Tal Rabin (4)
Steven Rudich (2)
Amit Sahai (6)
Ronen Shaltiel (1)
François-Xavier Standaert (1)
Eran Tromer (1)
Salil P. Vadhan (5)
Avi Wigderson (1)
David Xiao (1)
Ke Yang (2)
Yu Yu (1)