What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Moni Naor
Google Scholar
ORCID:
0000-0003-3381-0221
76
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Adversarially Robust Bloom Filters: Monotonicity and Betting.
Chen Lotan
Moni Naor
2024
conf/crypto
That's Not My Signature! Fail-Stop Signatures for a Post-quantum World.
Cecilia Boschini
Hila Dahari
Moni Naor
Eyal Ronen
2024
conf/crypto
MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably.
Bar Alon
Moni Naor
Eran Omri
Uri Stemmer
2022
conf/crypto
Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols.
Shahar P. Cohen
Moni Naor
2022
conf/crypto
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs.
Cas Cremers
Moni Naor
Shahar Paz
Eyal Ronen
2022
conf/tcc
Bet-or-Pass: Adversarially Robust Bloom Filters.
Moni Naor
Noa Oved
2019
journals/joc
Hardness-Preserving Reductions via Cuckoo Hashing.
Itay Berman
Iftach Haitner
Ilan Komargodski
Moni Naor
2019
conf/ccs
How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior.
Moni Naor
Benny Pinkas
Eyal Ronen
2019
conf/tcc
Incrementally Verifiable Computation via Incremental PCPs.
Moni Naor
Omer Paneth
Guy N. Rothblum
2018
conf/eurocrypt
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions.
Ilan Komargodski
Moni Naor
Eylon Yogev
2018
conf/tcc
The Security of Lazy Users in Out-of-Band Authentication.
Moni Naor
Lior Rotem
Gil Segev
2017
journals/joc
Secret-Sharing for NP.
Ilan Komargodski
Moni Naor
Eylon Yogev
2016
journals/joc
An Optimally Fair Coin Toss.
Tal Moran
Moni Naor
Gil Segev
2016
conf/crypto
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.
Prabhanjan Ananth
Aayush Jain
Moni Naor
Amit Sahai
Eylon Yogev
2016
conf/crypto
Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems.
Cynthia Dwork
Moni Naor
Guy N. Rothblum
2016
conf/tcc
How to Share a Secret, Infinitely.
Ilan Komargodski
Moni Naor
Eylon Yogev
2015
conf/crypto
Bloom Filters in Adversarial Environments.
Moni Naor
Eylon Yogev
2015
conf/ndss
NSEC5: Provably Preventing DNSSEC Zone Enumeration.
Sharon Goldberg
Moni Naor
Dimitrios Papadopoulos
Leonid Reyzin
Sachin Vasant
Asaf Ziv
2015
conf/asiacrypt
Pure Differential Privacy for Rectangle Queries via Private Partitions.
Cynthia Dwork
Moni Naor
Omer Reingold
Guy N. Rothblum
2015
conf/tcc
Secure Physical Computation Using Disposable Circuits.
Ben A. Fisch
Daniel Freund
Moni Naor
2015
conf/tcc
Primary-Secondary-Resolver Membership Proof Systems.
Moni Naor
Asaf Ziv
2014
conf/crypto
Physical Zero-Knowledge Proofs of Physical Properties.
Ben Fisch
Daniel Freund
Moni Naor
2014
conf/asiacrypt
Secret-Sharing for NP.
Ilan Komargodski
Moni Naor
Eylon Yogev
2013
conf/tcc
Hardness Preserving Reductions via Cuckoo Hashing.
Itay Berman
Iftach Haitner
Ilan Komargodski
Moni Naor
2010
conf/eurocrypt
Public-Key Encryption in the Bounded-Retrieval Model.
Joël Alwen
Yevgeniy Dodis
Moni Naor
Gil Segev
Shabsi Walfish
Daniel Wichs
2009
conf/crypto
Public-Key Cryptosystems Resilient to Key Leakage.
Moni Naor
Gil Segev
2009
conf/soups
Games for extracting randomness.
Ran Halprin
Moni Naor
2009
conf/asiacrypt
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare
Zvika Brakerski
Moni Naor
Thomas Ristenpart
Gil Segev
Hovav Shacham
Scott Yilek
2009
conf/tcc
An Optimally Fair Coin Toss.
Tal Moran
Moni Naor
Gil Segev
2009
conf/tcc
How Efficient Can Memory Checking Be?.
Cynthia Dwork
Moni Naor
Guy N. Rothblum
Vinod Vaikuntanathan
2008
conf/ccs
Traitor tracing with constant size ciphertext.
Dan Boneh
Moni Naor
2008
conf/tcc
Cryptography and Game Theory: Designing Protocols for Exchanging Information.
Gillat Kol
Moni Naor
2007
conf/ccs
Split-ballot voting: everlasting privacy with distributed trust.
Tal Moran
Moni Naor
2006
journals/joc
Completeness in Two-Party Secure Computation: A Computational View.
Danny Harnik
Moni Naor
Omer Reingold
Alon Rosen
2006
conf/crypto
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
Moni Naor
Gil Segev
Adam D. Smith
2006
conf/crypto
Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.
Tal Moran
Moni Naor
2006
conf/eurocrypt
Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Cynthia Dwork
Krishnaram Kenthapadi
Frank McSherry
Ilya Mironov
Moni Naor
2006
conf/eurocrypt
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol.
Tal Moran
Moni Naor
2005
journals/joc
Computationally Secure Oblivious Transfer.
Moni Naor
Benny Pinkas
2005
conf/crypto
Pebbling and Proofs of Work.
Cynthia Dwork
Moni Naor
Hoeteck Wee
2005
conf/eurocrypt
On Robust Combiners for Oblivious Transfer and Other Primitives.
Danny Harnik
Joe Kilian
Moni Naor
Omer Reingold
Alon Rosen
2005
conf/tcc
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.
Moni Naor
Asaf Nussboim
Eran Tromer
2004
conf/eurocrypt
Immunizing Encryption Schemes from Decryption Errors.
Cynthia Dwork
Moni Naor
Omer Reingold
2003
conf/crypto
On Memory-Bound Functions for Fighting Spam.
Cynthia Dwork
Andrew V. Goldberg
Moni Naor
2003
conf/crypto
On Cryptographic Assumptions and Challenges.
Moni Naor
2002
journals/joc
Constructing Pseudo-Random Permutations with a Prescribed Structure.
Moni Naor
Omer Reingold
2002
conf/crypto
Deniable Ring Authentication.
Moni Naor
2001
conf/crypto
Revocation and Tracing Schemes for Stateless Receivers.
Dalit Naor
Moni Naor
Jeffery Lotspiech
2000
conf/crypto
Timed Commitments.
Dan Boneh
Moni Naor
2000
conf/fc
Efficient Trace and Revoke Schemes.
Moni Naor
Benny Pinkas
2000
conf/asiacrypt
Distributed Oblivious Transfer.
Moni Naor
Benny Pinkas
1999
journals/joc
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited.
Moni Naor
Omer Reingold
1999
conf/crypto
Oblivious Transfer with Adaptive Queries.
Moni Naor
Benny Pinkas
1999
conf/eurocrypt
Distributed Pseudo-random Functions and KDCs.
Moni Naor
Benny Pinkas
Omer Reingold
1998
journals/joc
An Efficient Existentially Unforgeable Signature Scheme and Its Applications.
Cynthia Dwork
Moni Naor
1998
journals/joc
Using Any One-Way Permutation.
Moni Naor
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1998
conf/uss
Certificate Revocation and Certificate Update.
Kobbi Nissim
Moni Naor
1998
conf/crypto
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract).
Moni Naor
Omer Reingold
1998
conf/crypto
Threshold Traitor Tracing.
Moni Naor
Benny Pinkas
1998
conf/eurocrypt
A Formal Treatment of Remotely Keyed Encryption.
Matt Blaze
Joan Feigenbaum
Moni Naor
1998
conf/eurocrypt
Secure and Efficient Metering.
Moni Naor
Benny Pinkas
1997
conf/crypto
Visual Authentication and Identification.
Moni Naor
Benny Pinkas
1997
conf/crypto
Deniable Encryption.
Ran Canetti
Cynthia Dwork
Moni Naor
Rafail Ostrovsky
1996
journals/joc
Efficient Cryptographic Schemes Provably as Secure as Subset Sum.
Russell Impagliazzo
Moni Naor
1996
conf/ccs
Access Control and Signatures via Quorum Secret Sharing.
Moni Naor
Avishai Wool
1994
conf/crypto
Tracing Traitors.
Benny Chor
Amos Fiat
Moni Naor
1994
conf/crypto
An Efficient Existentially Unforgeable Signature Scheme and its Applications.
Cynthia Dwork
Moni Naor
1994
conf/eurocrypt
Visual Cryptography.
Moni Naor
Adi Shamir
1993
conf/crypto
Codes for Interactive Authentication.
Peter Gemmell
Moni Naor
1993
conf/crypto
Broadcast Encryption.
Amos Fiat
Moni Naor
1992
conf/crypto
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract).
Moni Naor
Rafail Ostrovsky
Ramarathnam Venkatesan
Moti Yung
1992
conf/crypto
Low Communication 2-Prover Zero-Knowledge Proofs for NP.
Cynthia Dwork
Uriel Feige
Joe Kilian
Moni Naor
Shmuel Safra
1992
conf/crypto
Pricing via Processing or Combatting Junk Mail.
Cynthia Dwork
Moni Naor
1991
journals/joc
Bit Commitment Using Pseudorandomness.
Moni Naor
1989
conf/crypto
Bit Commitment Using Pseudo-Randomness.
Moni Naor
1988
conf/crypto
Untraceable Electronic Cash.
David Chaum
Amos Fiat
Moni Naor
Coauthors
Aayush Jain
(1)
Adam D. Smith
(1)
Adi Shamir
(1)
Alon Rosen
(2)
Amit Sahai
(1)
Amos Fiat
(3)
Andrew V. Goldberg
(1)
Asaf Nussboim
(1)
Asaf Ziv
(2)
Avishai Wool
(1)
Bar Alon
(1)
Ben A. Fisch
(1)
Ben Fisch
(1)
Benny Chor
(1)
Benny Pinkas
(9)
Cas Cremers
(1)
Cecilia Boschini
(1)
Chen Lotan
(1)
Cynthia Dwork
(12)
Dalit Naor
(1)
Dan Boneh
(2)
Daniel Freund
(2)
Daniel Wichs
(1)
Danny Harnik
(2)
David Chaum
(1)
Dimitrios Papadopoulos
(1)
Eran Omri
(1)
Eran Tromer
(1)
Eyal Ronen
(3)
Eylon Yogev
(6)
Frank McSherry
(1)
Gil Segev
(7)
Gillat Kol
(1)
Guy N. Rothblum
(4)
Hila Dahari
(1)
Hoeteck Wee
(1)
Hovav Shacham
(1)
Iftach Haitner
(2)
Ilan Komargodski
(6)
Ilya Mironov
(1)
Itay Berman
(2)
Jeffery Lotspiech
(1)
Joan Feigenbaum
(1)
Joe Kilian
(2)
Joël Alwen
(1)
Kobbi Nissim
(1)
Krishnaram Kenthapadi
(1)
Leonid Reyzin
(1)
Lior Rotem
(1)
Matt Blaze
(1)
Mihir Bellare
(1)
Moni Naor
(76)
Moti Yung
(2)
Noa Oved
(1)
Omer Paneth
(1)
Omer Reingold
(8)
Peter Gemmell
(1)
Prabhanjan Ananth
(1)
Rafail Ostrovsky
(3)
Ramarathnam Venkatesan
(2)
Ran Canetti
(1)
Ran Halprin
(1)
Russell Impagliazzo
(1)
Sachin Vasant
(1)
Scott Yilek
(1)
Shabsi Walfish
(1)
Shahar P. Cohen
(1)
Shahar Paz
(1)
Sharon Goldberg
(1)
Shmuel Safra
(1)
Tal Moran
(5)
Thomas Ristenpart
(1)
Uri Stemmer
(1)
Uriel Feige
(1)
Vinod Vaikuntanathan
(1)
Yevgeniy Dodis
(1)
Zvika Brakerski
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to