Proofs of ownership in remote storage systems S Halevi, D Harnik, B Pinkas, A Shulman-Peleg Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 910 | 2011 |
Side channels in cloud services: Deduplication in cloud storage D Harnik, B Pinkas, A Shulman-Peleg IEEE Security & Privacy 8 (6), 40-47, 2010 | 729 | 2010 |
On robust combiners for oblivious transfer and other primitives D Harnik, J Kilian, M Naor, O Reingold, A Rosen Annual International Conference on the Theory and Applications of …, 2005 | 159 | 2005 |
OT-combiners via secure computation D Harnik, Y Ishai, E Kushilevitz, JB Nielsen Theory of Cryptography Conference, 393-411, 2008 | 120 | 2008 |
Constant-round oblivious transfer in the bounded storage model YZ Ding, D Harnik, A Rosen, R Shaltiel Journal of Cryptology 20, 165-202, 2007 | 118 | 2007 |
On the Compressibility of Instances and Cryptographic Applications D Harnik, M Naor SIAM Journal on Computing 39 (5), 1667-1713, 2010 | 115 | 2010 |
Semantic security under related-key attacks and applications B Applebaum, D Harnik, Y Ishai Cryptology ePrint Archive, 2010 | 90 | 2010 |
On the power of the randomized iterate I Haitner, D Harnik, O Reingold SIAM Journal on Computing 40 (6), 1486-1528, 2011 | 85* | 2011 |
Low power mode in cloud storage systems D Harnik, D Naor, I Segall 2009 IEEE International Symposium on Parallel & Distributed Processing, 1-8, 2009 | 76 | 2009 |
Estimation of deduplication ratios in large data sets D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik 2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-11, 2012 | 69 | 2012 |
A cloud environment for data-intensive storage services EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ... 2011 IEEE third international conference on cloud computing technology and …, 2011 | 66 | 2011 |
To Zip or Not to Zip: Effective Resource Usage for {Real-Time} Compression D Harnik, R Kat, D Sotnikov, A Traeger, O Margalit 11th USENIX Conference on File and Storage Technologies (FAST 13), 229-241, 2013 | 61 | 2013 |
Compression and {SSDs}: Where and How? A Zuck, S Toledo, D Sotnikov, D Harnik 2nd Workshop on Interactions of NVM/Flash with Operating Systems and …, 2014 | 59 | 2014 |
Higher lower bounds on monotone size D Harnik, R Raz Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000 | 53 | 2000 |
It's Time to Revisit {LRU} vs.{FIFO} O Eytan, D Harnik, E Ofer, R Friedman, R Kat 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 20), 2020 | 46 | 2020 |
A fast implementation of deflate D Harnik, E Khaitzin, D Sotnikov, S Taharlev 2014 Data Compression Conference, 223-232, 2014 | 44 | 2014 |
Cognitive deduplication-aware data placement in large scale storage systems A Epstein, D Harnik, RI Kat US Patent 10,558,646, 2020 | 38 | 2020 |
Estimation of data reduction rate in a data storage system D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik US Patent 8,650,163, 2014 | 35 | 2014 |
How many oblivious transfers are needed for secure multiparty computation? D Harnik, Y Ishai, E Kushilevitz Annual International Cryptology Conference, 284-302, 2007 | 35 | 2007 |
Efficient pseudorandom generators from exponentially hard one-way functions I Haitner, D Harnik, O Reingold International Colloquium on Automata, Languages, and Programming, 228-239, 2006 | 35 | 2006 |