Volgen
Adi Akavia
Adi Akavia
Geverifieerd e-mailadres voor cs.haifa.ac.il - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Simultaneous hardcore bits and cryptography against memory attacks
A Akavia, S Goldwasser, V Vaikuntanathan
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
5772009
Proving hard-core predicates using list decoding
A Akavia, S Goldwasser, S Safra
FOCS 44, 146-159, 2003
1492003
On basing one-way functions on NP-hardness
A Akavia, O Goldreich, S Goldwasser, D Moshkovitz
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing …, 2006
1022006
Deterministic Sparse Fourier Approximation via Fooling Arithmetic Progressions.
A Akavia
COLT, 381-393, 2010
642010
Perturbation codes
A Akavia, R Venkatesan
2008 46th Annual Allerton Conference on Communication, Control, and …, 2008
56*2008
Candidate weak pseudorandom functions in AC0 ○ MOD2
A Akavia, A Bogdanov, S Guo, A Kamath, A Rosen
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
552014
Secure search on encrypted data via multi-ring sketch
A Akavia, D Feldman, H Shaul
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
33*2018
Privacy-preserving decision trees training and prediction
A Akavia, M Leibovich, YS Resheff, R Ron, M Shahar, M Vald
ACM Transactions on Privacy and Security 25 (3), 1-30, 2022
30*2022
Solving hidden number problem with one bit oracle and advice
A Akavia
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
292009
Distributed public key schemes secure against continual leakage
A Akavia, S Goldwasser, C Hazay
Proceedings of the 2012 ACM symposium on Principles of distributed computing …, 2012
272012
Deterministic sparse Fourier approximation via approximating arithmetic progressions
A Akavia
IEEE Transactions on Information Theory 60 (3), 1733-1741, 2013
242013
Topology-hiding computation on all graphs
A Akavia, R LaVigne, T Moran
Journal of Cryptology 33 (1), 176-227, 2020
232020
Setup-free secure search on encrypted data: Faster and post-processing free
A Akavia, C Gentry, S Halevi, M Leibovich
Cryptology ePrint Archive, 2018
222018
Topology-hiding computation beyond logarithmic diameter
A Akavia, T Moran
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
212017
Linear-regression on packed encrypted data in the two-server model
A Akavia, H Shaul, M Weiss, Z Yakhini
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019
192019
Learning noisy characters, multiplication codes, and cryptographic hardcore predicates
A Akavia
Massachusetts Institute of Technology, 2008
172008
Erratum for: On basing one-way functions on NP-hardness
A Akavia, O Goldreich, S Goldwasser, D Moshkovitz
Proceedings of the forty-second ACM symposium on Theory of computing, 795-796, 2010
102010
Secure data retrieval on the cloud: Homomorphic encryption meets coresets
A Akavia, D Feldman, H Shaul
IACR Transactions on Cryptographic Hardware and Embedded Systems, 80-106, 2019
72019
Achievable CCA2 Relaxation for Homomorphic Encryption
A Akavia, C Gentry, S Halevi, M Vald
Theory of Cryptography Conference, 70-99, 2022
5*2022
Finding significant Fourier transform coefficients deterministically and locally
A Akavia
Electronic Colloquium on Computational Complexity (ECCC) 15, 102, 2008
42008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20