Volgen
Omer Paneth
Omer Paneth
Geverifieerd e-mailadres voor mit.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Succinct non-interactive arguments via linear interactive proofs
N Bitansky, A Chiesa, Y Ishai, O Paneth, R Ostrovsky
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
4282013
Protecting obfuscation against algebraic attacks
B Barak, S Garg, YT Kalai, O Paneth, A Sahai
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
2982014
Time-lock puzzles from randomized encodings
N Bitansky, S Goldwasser, A Jain, O Paneth, V Vaikuntanathan, B Waters
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
1912016
Reusable fuzzy extractors for low-entropy distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34, 1-33, 2021
1822021
On the existence of extractable one-way functions
N Bitansky, R Canetti, O Paneth, A Rosen
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
1792014
ZAPs and non-interactive witness indistinguishability from indistinguishability obfuscation
N Bitansky, O Paneth
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
1442015
On the cryptographic hardness of finding a Nash equilibrium
N Bitansky, O Paneth, A Rosen
2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 1480-1498, 2015
1422015
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1152013
Obfuscation for evasive functions
B Barak, N Bitansky, R Canetti, YT Kalai, O Paneth, A Sahai
Theory of Cryptography Conference, 26-51, 2014
902014
Multi-collision resistance: a paradigm for keyless hash functions
N Bitansky, YT Kalai, O Paneth
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing …, 2018
872018
Perfect Structure on the Edge of Chaos: Trapdoor Permutations from Indistinguishability Obfuscation
N Bitansky, O Paneth, D Wichs
Theory of Cryptography Conference, 474-502, 2015
822015
How to delegate computations publicly
YT Kalai, O Paneth, L Yang
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
802019
Verifiable set operations over outsourced databases
R Canetti, O Paneth, D Papadopoulos, N Triandopoulos
International Workshop on Public Key Cryptography, 113-130, 2014
772014
On virtual grey box obfuscation for general circuits
N Bitansky, R Canetti, YT Kalai, O Paneth
Algorithmica 79 (4), 1014-1051, 2017
762017
On the impossibility of approximate obfuscation and applications to resettable cryptography
N Bitansky, O Paneth
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
712013
Delegating RAM computations
Y Kalai, O Paneth
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
662016
The impossibility of obfuscation with auxiliary input or a universal simulator
N Bitansky, R Canetti, H Cohn, S Goldwasser, YT Kalai, O Paneth, ...
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
652014
Point obfuscation and 3-round zero-knowledge
N Bitansky, O Paneth
Theory of Cryptography Conference, 190-208, 2012
582012
From the impossibility of obfuscation to a new non-black-box simulation technique
N Bitansky, O Paneth
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 223-232, 2012
472012
On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments
O Paneth, GN Rothblum
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
442017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20