关注
Mor Weiss
Mor Weiss
Assistant Professor, Bar-Ilan University
在 biu.ac.il 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Protecting obfuscation against arithmetic attacks
E Miles, A Sahai, M Weiss
Cryptology ePrint Archive, 2014
462014
Multi-key searchable encryption, revisited
A Hamlin, A Shelat, M Weiss, D Wichs
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
452018
Private anonymous data access
A Hamlin, R Ostrovsky, M Weiss, D Wichs
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
372019
Probabilistically checkable proofs of proximity with zero-knowledge
Y Ishai, M Weiss
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
372014
Linear-regression on packed encrypted data in the two-server model
A Akavia, H Shaul, M Weiss, Z Yakhini
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019
312019
Is there an oblivious RAM lower bound for online reads?
M Weiss, D Wichs
Journal of Cryptology 34 (3), 18, 2021
242021
Binary AMD circuits from secure multiparty computation
D Genkin, Y Ishai, M Weiss
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
232016
The price of active security in cryptographic protocols
C Hazay, M Venkitasubramaniam, M Weiss
Annual International Conference on the Theory and Applications of …, 2020
182020
Making the best of a leaky situation: zero-knowledge PCPs from leakage-resilient circuits
Y Ishai, M Weiss, G Yang
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
162016
Practical solutions for format-preserving encryption
M Weiss, B Rozenberg, M Barham
arXiv preprint arXiv:1506.04113, 2015
132015
Permuted puzzles and cryptographic hardness
E Boyle, J Holmgren, M Weiss
Theory of Cryptography Conference, 465-493, 2019
112019
On the plausibility of fully homomorphic encryption for RAMs
A Hamlin, J Holmgren, M Weiss, D Wichs
Annual International Cryptology Conference, 589-619, 2019
112019
Complex format-preserving encryption scheme
B Rozenberg, M Weiss
US Patent 9,634,838, 2017
102017
ZK-PCPs from leakage-resilient secret sharing
C Hazay, M Venkitasubramaniam, M Weiss
Journal of Cryptology 35 (4), 23, 2022
82022
How to construct a leakage-resilient (stateless) trusted party
D Genkin, Y Ishai, M Weiss
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
72017
Zero knowledge LTCs and their applications
Y Ishai, A Sahai, M Viderman, M Weiss
International Workshop on Approximation Algorithms for Combinatorial …, 2013
72013
On the security of doubly efficient PIR
E Boyle, J Holmgren, F Ma, M Weiss
Cryptology ePrint Archive, 2021
62021
Efficient privacy-preserving viral strain classification via k-mer signatures and FHE
A Akavia, B Galili, H Shaul, M Weiss, Z Yakhini
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 489-504, 2023
52023
Secure computation and probabilistic checking
M Weiss, Y Ishai
Computer Science Department, Technion, 2016
42016
Your reputation’s safe with me: Framing-free distributed zero-knowledge proofs
C Hazay, M Venkitasubramaniam, M Weiss
Theory of Cryptography Conference, 34-64, 2023
32023
系统目前无法执行此操作,请稍后再试。
文章 1–20