Welcome to DiSC 2002
SIGMOD 2001
PODS 2001
 SIGMOD RECORD 2001
CIKM 2001
CoopIS 2001
DASFAA 2001
DASFAA 2000
DBPL 2001
Data Engineering Bul
DEXA_EC-WEB 2001
DMKD 2001
 DPDJ 2001
HYPERTEXT 2001
ICDE 2001
ICDM 2001
ICDT 2001
JCDL 2001
KDD 2001
 KDD_EXPLORATIONS 20
KRDB 2001
MDM 2001
MIR 2001
MIS 2001
RIDE 2001
SBBD 2001
 SIGIR 2001
 SIGIR FORUM 2001
SSDBM 2001
SSTD 2001
TODS 2001
TIME 2001
VLDB 2001
VLDBJ 2001
About DiSC 2002
Editorial Board
Acknowledgements
DiSC 2002 Production
ADVIS
DiSC'02 Feedback
DiSC'02 Sitemap
Search DiSC'02
<<<Author Index>>>
Copyright Notice

Moni Naor

Papers on DiSC'02


Optimal Aggregation Algorithms for Middleware

Publications


Note: Links lead to the DBLP on the Web.

Moni Naor

116 Cynthia Dwork , Moni Naor: Zaps and Their Applications. Electronic Colloquium on Computational Complexity (ECCC) (001): (2002)

115 Moni Naor, Omer Reingold : Constructing Pseudo-Random Permutations with a Prescribed Structure. Journal of Cryptology 15 (2): 97-102 (2002)

114 Dalit Naor , Moni Naor, Jeffrey B. Lotspiech : Revocation and Tracing Schemes for Stateless Receivers. CRYPTO 2001 : 41-62

113 Ronald Fagin , Amnon Lotem , Moni Naor: Optimal Aggregation Algorithms for Middleware. PODS 2001

112 Moni Naor, Benny Pinkas : Efficient oblivious transfer protocols. SODA 2001 : 448-457

111 Moni Naor, Omer Reingold : Constructing pseudo-random permutations with a prescribed structure. SODA 2001 : 458-459

110 Moni Naor, Vanessa Teague : Anti-presistence: history independent data structures. STOC 2001 : 492-501

109 Moni Naor, Kobbi Nissim : Communication preserving protocols for secure function evaluation. STOC 2001 : 590-599

108 Cynthia Dwork , S. Ravi Kumar , Moni Naor, D. Sivakumar : Rank aggregation methods for the Web. WWW 2001 : 613-622

107 Moni Naor, Kobbi Nissim : Communication Complexity and Secure Function Evaluation. Electronic Colloquium on Computational Complexity (ECCC) 8 (062): (2001)

106 Moni Naor, Omer Reingold , Alon Rosen : Pseudo-Random Functions and Factoring. Electronic Colloquium on Computational Complexity (ECCC) 8 (064): (2001)

105 Moni Naor, Sitvanit Ruah : On the Decisional Complexity of Problems Over the Reals. Information and Computation 167 (1): 27-45 (2001)

104 Moni Naor, Benny Pinkas : Distributed Oblivious Transfer. ASIACRYPT 2000 : 205-219

103 Dan Boneh , Moni Naor: Timed Commitments. CRYPTO 2000 : 236-254

102 Cynthia Dwork , Moni Naor: Zaps and Their Applications. FOCS 2000 : 283-293

101 Moni Naor, Benny Pinkas : Efficient Trace and Revoke Schemes. Financial Cryptography 2000 : 1-20

100 Moni Naor, Omer Reingold , Alon Rosen : Pseudo-random functions and factoring (extended abstract). STOC 2000 : 11-20

99 Carlo Blundo , Alfredo De Santis , Moni Naor: Visual cryptography for grey level images. Information Processing Letters 75 (6): 255-259 (2000)

98 Danny Dolev , Cynthia Dwork , Moni Naor: Nonmalleable Cryptography. SIAM J. Comput. 30 (2): 391-437 (2000)

97 Moni Naor, Benny Pinkas , Reuban Sumner : Privacy preserving auctions and mechanism design. ACM Conference on Electronic Commerce 1999 : 129-139

96 Moni Naor, Benny Pinkas : Oblivious Transfer with Adaptive Queries. CRYPTO 1999 : 573-590

95 Moni Naor, Benny Pinkas , Omer Reingold : Distributed Pseudo-random Functions and KDCs. EUROCRYPT 1999 : 327-346

94 Cynthia Dwork , Moni Naor, Omer Reingold , Larry J. Stockmeyer : Magic Functions. FOCS 1999 : 523-534

93 Ran Canetti , Juan A. Garay , Gene Itkis , Daniele Micciancio , Moni Naor, Benny Pinkas : Multicast Security: A Taxonomy and Some Efficient Constructions. INFOCOM 1999 : 708-716

92 Matt Blaze , Joan Feigenbaum , Moni Naor: A Formal Treatment of Remotely Keyed Encryption. SODA 1999 : 868-869

91 Moni Naor, Benny Pinkas : Oblivious Transfer and Polynomial Evaluation. STOC 1999 : 245-254

90 Moni Naor, Omer Reingold : Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions. JCSS 58 (2): 336-375 (1999)

89 Moni Naor, Omer Reingold : On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. Journal of Cryptology 12 (1): 29-66 (1999)

88 Amos Fiat , Moni Naor: Rigorous Time/Space Trade-offs for Inverting Functions. SIAM J. Comput. 29 (3): 790-803 (1999)

87 Moni Naor, Omer Reingold : From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). CRYPTO 1998 : 267-282

86 Moni Naor, Benny Pinkas : Threshold Traitor Tracing. CRYPTO 1998 : 502-517

85 Matt Blaze , Joan Feigenbaum , Moni Naor: A Formal Treatment of Remotely Keyed Encryption. EUROCRYPT 1998 : 251-265

84 Moni Naor, Benny Pinkas : Secure and Efficient Metering. EUROCRYPT 1998 : 576-590

83 Cynthia Dwork , Moni Naor, Amit Sahai : Concurrent Zero-Knowledge. STOC 1998 : 409-418

82 Moni Naor, Avishai Wool : Access Control and Signatures via Quorum Secret Sharing. IEEE Transactions on Parallel and Distributed Systems 9 (9): 909-922 (1998)

81 Miklós Ajtai , James Aspnes , Moni Naor, Yuval Rabani , Leonard J. Schulman , Orli Waarts : Fairness in Scheduling. J. Algorithms 29 (2): 306-357 (1998)

80 Moni Naor, Rafail Ostrovsky , Ramarathnam Venkatesan , Moti Yung : Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation. Journal of Cryptology 11 (2): 87-108 (1998)

79 Cynthia Dwork , Moni Naor: An Efficient Existentially Unforgeable Signature Scheme and Its Applications. Journal of Cryptology 11 (3): 187-208 (1998)

78 Moni Naor, Avishai Wool : The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27 (2): 423-447 (1998)

77 Moni Naor, Benny Pinkas : Secure Accounting and Auditing on the Web. WWW7 / Computer Networks 30 (1-7): 541-550 (1998)

76 Moni Naor, Benny Pinkas : Visual Authentication and Identification. CRYPTO 1997 : 322-336

75 Ran Canetti , Cynthia Dwork , Moni Naor, Rafail Ostrovsky : Deniable Encryption. CRYPTO 1997 : 90-104

74 Mihir Bellare , Russell Impagliazzo , Moni Naor: Does Parallel Repetition Lower the Error in Computationally Sound Protocols? FOCS 1997 : 374-383

73 Moni Naor, Omer Reingold : Number-theoretic Constructions of Efficient Pseudo-random Functions. FOCS 1997 : 458-467

72 Moni Naor, Omer Reingold : On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited (Extended Abstract). STOC 1997 : 189-199

71 Moni Naor, Omer Reingold : On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited. Electronic Colloquium on Computational Complexity (ECCC) 4 (5): (1997)

70 Moni Naor, Avishai Wool : Access Control and Signatures via Quorum Secret Sharing. ACM Conference on Computer and Communications Security 1996 : 157-168

69 Moni Naor, Sitvanit Ruah : On the Decisional Complexity of Problems Over the Reals. ISTCS 1996 : 176-187

68 Cynthia Dwork , Jeffrey B. Lotspiech , Moni Naor: Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version). STOC 1996 : 489-498

67 Ran Canetti , Uriel Feige , Oded Goldreich , Moni Naor: Adaptively Secure Multi-Party Computation. STOC 1996 : 639-648

66 Moni Naor: Evaluation May Be Easier Than Generation (Extended Abstract). STOC 1996 : 74-83

65 Moni Naor, Adi Shamir : Visual Cryptography II: Improving the Contrast Via the Cover Base. Security Protocols Workshop 1996 : 197-202

64 Noga Alon , Moni Naor: Derandomization, Witnesses for Boolean Matrix Multiplication and Construction of Perfect Hash Functions. Algorithmica 16 (4/5): 434-449 (1996)

63 Ronald Fagin , Moni Naor, Peter Winkler : Comparing Information Without Leaking It. CACM 39 (5): 77-85 (1996)

62 Russell Impagliazzo , Moni Naor: Efficient Cryptographic Schemes Provably as Secure as Subset Sum. Journal of Cryptology 9 (4): 199-216 (1996)

61 Moni Naor, Omer Reingold : Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions. FOCS 1995 : 170-181

60 Moni Naor, Leonard J. Schulman , Aravind Srinivasan : Splitters and Near-Optimal Derandomization. FOCS 1995 : 182-191

59 Joe Kilian , Moni Naor: On the Complexity of Statistical Reasoning (extended abtract). ISTCS 1995 : 209-217

58 Alain J. Mayer , Moni Naor, Larry J. Stockmeyer : Local Computations on Static and Dynamic Graphs (Preliminary Version). ISTCS 1995 : 268-278

57 Miklós Ajtai , James Aspnes , Moni Naor, Yuval Ravani , Leonard J. Schulman , Orli Waarts : Fairness in Scheduling. SODA 1995 : 477-485

56 Moni Naor, Omer Reingold : Synthesizers and Their Application to the Parallel Construction of Pseudo-random Functions. Electronic Colloquium on Computational Complexity (ECCC) 2 (45): (1995)

55 Moni Naor, Ron M. Roth : Optimal File Sharing in Distributed Networks. SIAM J. Comput. 24 (1): 158-183 (1995)

54 Tomás Feder , Eyal Kushilevitz , Moni Naor, Noam Nisan : Amortized Communication Complexity. SIAM J. Comput. 24 (4): 736-750 (1995)

53 Moni Naor, Larry J. Stockmeyer : What Can be Computed Locally? SIAM J. Comput. 24 (6): 1259-1277 (1995)

52 László Lovász , Moni Naor, Ilan Newman , Avi Wigderson : Search Problems in the Decision Tree Model. SIAM Journal on Discrete Mathematics 8 (1): 119-132 (1995)

51 Cynthia Dwork , Moni Naor: An Efficient Existentially Unforgeable Signature Scheme and its Applications. CRYPTO 1994 : 234-246

50 Benny Chor , Amos Fiat , Moni Naor: Tracing Traitors. CRYPTO 1994 : 257-270

49 Moni Naor, Adi Shamir : Visual Cryptography. EUROCRYPT 1994 : 1-12

48 Moni Naor, Avishai Wool : The Load, Capacity and Availability of Quorum Systems. FOCS 1994 : 214-225

47 Noga Alon , Manuel Blum , Amos Fiat , Sampath Kannan , Moni Naor, Rafail Ostrovsky : Matching Nuts and Bolts. SODA 1994 : 690-696

46 Uriel Feige , Joe Kilian , Moni Naor: A Minimal Model for Secure Computation (Extended Abstract). STOC 1994 : 554-563

45 Manuel Blum , William S. Evans , Peter Gemmell , Sampath Kannan , Moni Naor: Checking the Correctness of Memories. Algorithmica 12 (2/3): 225-244 (1994)

44 Rajeev Motwani , Joseph Naor , Moni Naor: The Probabilistic Method Yields Deterministic Parallel Algorithms. JCSS 49 (3): 478-516 (1994)

43 Peter Gemmell , Moni Naor: Codes for Interactive Authentication. CRYPTO 1993 : 355-367

42 Amos Fiat , Moni Naor: Broadcast Encryption. CRYPTO 1993 : 480-491

41 Nimrod Megiddo , Moni Naor, David P. Anderson : The Minimum Reservation Rate Problem in Digital Audio/Video Systems. ISTCS 1993 : 43-48

40 Moni Naor, Larry J. Stockmeyer : What Can Be Computed Locally? (Extended Abstract). STOC 1993 : 184-193

39 David Feldman , Russell Impagliazzo , Moni Naor, Noam Nisan , Steven Rudich , Adi Shamir : On Dice and Coins: Models of Computation for Random Generation. Information and Computation 104 (2): 159-174 (1993)

38 Amos Fiat , Moni Naor: Implicit O(1) Probe Search. SIAM J. Comput. 22 (1): 1-10 (1993)

37 Noga Alon , Moni Naor: Coin-Flipping Games Immune Against Linear-Sized Coalitions. SIAM J. Comput. 22 (2): 403-417 (1993)

36 Joseph Naor , Moni Naor: Small-Bias Probability Spaces: Efficient Constructions and Applications. SIAM J. Comput. 22 (4): 838-856 (1993)

35 Cynthia Dwork , Moni Naor: Pricing via Processing or Combatting Junk Mail. CRYPTO 1992 : 139-147

34 Moni Naor, Rafail Ostrovsky , Ramarathnam Venkatesan , Moti Yung : Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions (Extended Abstract). CRYPTO 1992 : 196-214

33 Cynthia Dwork , Uriel Feige , Joe Kilian , Moni Naor, Muli Safra : Low Communication 2-Prover Zero-Knowledge Proofs for NP. CRYPTO 1992 : 215-227

32 Noga Alon , Zvi Galil , Oded Margalit , Moni Naor: Witnesses for Boolean Matrix Multiplication and for Shortest Paths. FOCS 1992 : 417-426

31 Miklós Ajtai , Noga Alon , Jehoshua Bruck , Robert Cypher , Ching-Tien Ho , Moni Naor, Endre Szemerédi : Fault Tolerant Graphs, Perfect Hash Functions and Disjoint Paths. FOCS 1992 : 693-702

30 Amos Fiat , Moni Naor, Jeanette P. Schmidt , Alan Siegel : Nonoblivious Hashing. JACM 39 (4): 764-782 (1992)

29 Sandy Irani , Moni Naor, Ronitt Rubinfeld : On the Time and Space Complexity of Computation Using Write-Once Memory Or Is Pen Really Much Worse Than Pencil? Mathematical Systems Theory 25 (2): 141-159 (1992)

28 Sampath Kannan , Moni Naor, Steven Rudich : Implicit Representation of Graphs. SIAM Journal on Discrete Mathematics 5 (4): 596-603 (1992)

27 Tomás Feder , Eyal Kushilevitz , Moni Naor: Amortized Communication Complexity (Preliminary Version). FOCS 1991 : 239-248

26 Moni Naor, Ron M. Roth : Optimal File Sharing in Distributed Networks (Preliminary Version). FOCS 1991 : 515-525

25 László Lovász , Moni Naor, Ilan Newman , Avi Wigderson : Search Problems in the Decision Tree Model (Preliminary Version). FOCS 1991 : 576-585

24 Manuel Blum , William S. Evans , Peter Gemmell , Sampath Kannan , Moni Naor: Checking the Correctness of Memories. FOCS 1991 : 90-99

23 Moni Naor: String Matching with Preprocessing of Text and Pattern. ICALP 1991 : 739-750

22 Amos Fiat , Moni Naor: Rigorous Time/Space Tradeoffs for Inverting Functions. STOC 1991 : 534-541

21 Danny Dolev , Cynthia Dwork , Moni Naor: Non-Malleable Cryptography (Extended Abstract). STOC 1991 : 542-552

20 Amos Fiat , J. Ian Munro , Moni Naor, Alejandro A. Schäffer , Jeanette P. Schmidt , Alan Siegel : An Implicit Data Structure for Searching a Multikey Table in Logarithmic Time. JCSS 43 (3): 406-424 (1991)

19 Moni Naor: Bit Commitment Using Pseudorandomness. Journal of Cryptology 4 (2): 151-158 (1991)

18 Moni Naor: A Lower Bound on Probabilistic Algorithms for Distributive Ring Coloring. SIAM Journal on Discrete Mathematics 4 (3): 409-412 (1991)

17 Noga Alon , Moni Naor: Coin-Flipping Games Immune against Linear-Sized Coalitions (Extended Abstract). FOCS 1990 : 46-54

16 Joseph Naor , Moni Naor: Small-bias Probability Spaces: Efficient Constructions and Applications. STOC 1990 : 213-223

15 Moni Naor, Moti Yung : Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. STOC 1990 : 427-437

14 Amotz Bar-Noy , Joseph Naor , Moni Naor: One-Bit Algorithms. Distributed Computing 4 : 3-8 (1990)

13 Moni Naor: Bit Commitment Using Pseudo-Randomness. CRYPTO 1989 : 128-136

12 Russell Impagliazzo , Moni Naor: Efficient Cryptographic Schemes Provably as Secure as Subset Sum. FOCS 1989 : 236-241

11 Rajeev Motwani , Joseph Naor , Moni Naor: The Probabilistic Method Yields Deterministic Parallel Algorithms. FOCS 1989 : 8-13

10 David Feldman , Russell Impagliazzo , Moni Naor, Noam Nisan , Steven Rudich , Adi Shamir : On Dice and Coins: Models of Computation for Random Generation. ICALP 1989 : 319-340

9 Moni Naor, Moti Yung : Universal One-Way Hash Functions and their Cryptographic Applications. STOC 1989 : 33-43

8 Amos Fiat , Moni Naor: Implicit O(1) Probe Search. STOC 1989 : 336-344

7 Joseph Naor , Moni Naor, Alejandro A. Schäffer : Fast Parallel Algorithms for Chordal Graphs. SIAM J. Comput. 18 (2): 327-349 (1989)

6 David Chaum , Amos Fiat , Moni Naor: Untraceable Electronic Cash. CRYPTO 1988 : 319-327

5 Amotz Bar-Noy , Joseph Naor , Moni Naor: One Bit Algorithms. PODC 1988 : 66-76

4 Sampath Kannan , Moni Naor, Steven Rudich : Implicit Representation of Graphs. STOC 1988 : 334-343

3 Amos Fiat , Moni Naor, Alejandro A. Schäffer , Jeanette P. Schmidt , Alan Siegel : Storing and Searching a Multikey Table (Extended Abstract). STOC 1988 : 344-353

2 Amos Fiat , Moni Naor, Jeanette P. Schmidt , Alan Siegel : Non-Oblivious Hashing (Extended Abstract). STOC 1988 : 367-376

1 Joseph Naor , Moni Naor, Alejandro A. Schäffer : Fast Parallel Algorithms for Chordal Graphs (Extended Abstract). STOC 1987 : 355-364




DiSC'02 © 2003 Association for Computing Machinery