Alon Rosen
Alon Rosen
Geverifieerd e-mailadres voor unibocconi.it - Homepage
Geciteerd door
Geciteerd door
Pseudorandom functions and lattices
A Banerjee, C Peikert, A Rosen
Annual International Conference on the Theory and Applications of …, 2012
Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices
C Peikert, A Rosen
Theory of Cryptography Conference, 145-166, 2006
SWIFFT: A modest proposal for FFT hashing
V Lyubashevsky, D Micciancio, C Peikert, A Rosen
Fast Software Encryption, 54-72, 2008
Black-box concurrent zero-knowledge requires\ tilde {Ω}(log n) rounds
R Canetti, J Kilian, E Petrank, A Rosen
Proceedings of the thirty-third annual ACM symposium on Theory of computing …, 2001
Concurrent zero knowledge with logarithmic round-complexity
M Prabhakaran, A Rosen, A Sahai
Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE …, 2002
Chosen-ciphertext security via correlated products
A Rosen, G Segev
Theory of Cryptography Conference, 419-436, 2009
New and improved constructions of nonmalleable cryptographic protocols
R Pass, A Rosen
SIAM Journal on Computing 38 (2), 702-752, 2008
More constructions of lossy and correlation-secure trapdoor functions
D Freeman, O Goldreich, E Kiltz, A Rosen, G Segev
Public Key Cryptography–PKC 2010, 279-295, 2010
On the existence of extractable one-way functions
N Bitansky, R Canetti, O Paneth, A Rosen
SIAM Journal on Computing 45 (5), 1910-1952, 2016
Concurrent nonmalleable commitments
R Pass, A Rosen
SIAM Journal on Computing 37 (6), 1891-1925, 2008
On robust combiners for oblivious transfer and other primitives
D Harnik, J Kilian, M Naor, O Reingold, A Rosen
Advances in Cryptology–EUROCRYPT 2005, 559-559, 2005
RIPPLE authentication for network coding
Y Li, H Yao, M Chen, S Jaggi, A Rosen
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Fairness with an honest minority and a rational majority
SJ Ong, DC Parkes, A Rosen, S Vadhan
Theory of Cryptography Conference, 36-53, 2009
On the cryptographic hardness of finding a nash equilibrium
N Bitansky, O Paneth, A Rosen
2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 1480-1498, 2015
Proofs of Useful Work.
M Ball, A Rosen, M Sabin, PN Vasudevan
IACR Cryptol. ePrint Arch. 2017, 203, 2017
On the hardness of learning with rounding over small modulus
A Bogdanov, S Guo, D Masny, S Richelson, A Rosen
Theory of Cryptography Conference, 209-224, 2016
Constant-round oblivious transfer in the bounded storage model
YZ Ding, D Harnik, A Rosen, R Shaltiel
Theory of Cryptography, 446-472, 2004
Lattices that admit logarithmic worst-case to average-case connection factors
C Peikert, A Rosen
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
Bounded-concurrent secure two-party computation in a constant number of rounds
R Pass, A Rosen
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
One-way functions and (im) perfect obfuscation
I Komargodski, T Moran, M Naor, R Pass, A Rosen, E Yogev
2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 374-383, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20