scispace - formally typeset
A

Adi Akavia

Researcher at University of Haifa

Publications -  36
Citations -  1235

Adi Akavia is an academic researcher from University of Haifa. The author has contributed to research in topics: Encryption & Homomorphic encryption. The author has an hindex of 12, co-authored 30 publications receiving 1102 citations. Previous affiliations of Adi Akavia include Massachusetts Institute of Technology & Princeton University.

Papers
More filters
Book ChapterDOI

Simultaneous Hardcore Bits and Cryptography against Memory Attacks

TL;DR: The public-key encryption scheme of Regev, and the identity-basedryption scheme of Gentry, Peikert and Vaikuntanathan are remarkably robust against memory attacks where the adversary can measure a large fraction of the bits of the secret-key, or more generally, can compute an arbitrary function of thesecret-key of bounded output length.
Proceedings ArticleDOI

Proving hard-core predicates using list decoding

TL;DR: A unifying framework for proving that predicate P is hard-core for a one-way function f is introduced, and it is applied to a broad family of functions and predicates, reproving old results in an entirely different way as well as showing newhard-core predicates for well known one- way function candidates.
Proceedings ArticleDOI

On basing one-way functions on NP-hardness

TL;DR: The possibility of basing one-way functions on NP-Hardness is considered, and possible reductions from a worst-case decision problem to the task of average-case inverting a polynomial-time computable function f are studied.
Proceedings Article

Deterministic Sparse Fourier Approximation via Fooling Arithmetic Progressions.

TL;DR: This paper presents the first deterministic SFT algorithm for functions f over ZN which is local, i.e., its running time is polynomial in logN, 1/τ and L1(f) (the L1 norm of f ’s Fourier transform).
Proceedings ArticleDOI

Candidate weak pseudorandom functions in AC0 ○ MOD2

TL;DR: It is argued that such a complexity-driven approach can play a role in bridging the gap between the theory and practice of cryptography.