Volgen
Ron Rothblum
Ron Rothblum
Geverifieerd e-mailadres voor cs.technion.ac.il - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Constant-round interactive proofs for delegating computation
O Reingold, GN Rothblum, RD Rothblum
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing …, 2016
1732016
How to delegate computations: The power of no-signaling proofs
YT Kalai, R Raz, RD Rothblum
Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 485-494, 2014
1312014
Spooky encryption and its applications
Y Dodis, S Halevi, RD Rothblum, D Wichs
Annual Cryptology Conference, 93-122, 2016
1082016
Fiat-Shamir: from practice to theory
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum, ...
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
1052019
Homomorphic encryption: From private-key to public-key
R Rothblum
Theory of cryptography conference, 219-234, 2011
892011
Fiat-Shamir and correlation intractability from strong KDM-secure encryption
R Canetti, Y Chen, L Reyzin, RD Rothblum
Annual international conference on the theory and applications of …, 2018
792018
From Obfuscation to the Security of Fiat-Shamir for Proofs
YT Kalai, GN Rothblum, RD Rothblum
Cryptology ePrint Archive, Report 2016/303, 2016. http://eprint. iacr. org …, 2016
782016
On the circular security of bit-encryption
RD Rothblum
Theory of Cryptography, 579-598, 2013
752013
Delegation for bounded space
Y Tauman Kalai, R Raz, RD Rothblum
Proceedings of the 45th annual ACM symposium on Symposium on theory of …, 2013
702013
Non-interactive proofs of proximity
T Gur, RD Rothblum
computational complexity 27 (1), 99-207, 2018
662018
Distinguisher-Dependent Simulation in Two Rounds and its Applications
A Jain, YT Kalai, D Khurana, R Rothblum
IACR Cryptology ePrint Archive, 2017: 330, 2017
562017
Fiat-shamir from simpler assumptions
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum
Cryptology ePrint Archive, Report 2018/1004, 2018. http://eprint. iacr. org, 2018
412018
Enhancements of Trapdoor Permutations
O Goldreich, RD Rothblum
Journal of Cryptology, 1-29, 2013
392013
Multi-collision resistant hash functions and their applications
I Berman, A Degwekar, RD Rothblum, PN Vasudevan
Annual International Conference on the Theory and Applications of …, 2018
352018
Efficient multiparty protocols via log-depth threshold formulae
G Cohen, IB Damgård, Y Ishai, J Kölker, PB Miltersen, R Raz, ...
Annual Cryptology Conference, 185-202, 2013
352013
New constructions of reusable designated-verifier NIZKs
A Lombardi, W Quach, RD Rothblum, D Wichs, DJ Wu
IACR Cryptology ePrint Archive, 2019
312019
Arguments of proximity
YT Kalai, RD Rothblum
Annual Cryptology Conference, 422-442, 2015
262015
Local Proofs Approaching the Witness Length
N Ron-Zewi, RD Rothblum
Cryptology ePrint Archive, Report 2019/1062. 2019. URL: https://eprint. iacr …, 2019
242019
Reusable designated-verifier NIZKs for all NP from CDH
W Quach, RD Rothblum, D Wichs
Eurocrypt, 2019
232019
Relaxed locally correctable codes
T Gur, G Ramnarayan, R Rothblum
Theory of Computing 16 (1), 1-68, 2020
222020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20