scispace - formally typeset
M

Moni Naor

Researcher at Weizmann Institute of Science

Publications -  348
Citations -  49941

Moni Naor is an academic researcher from Weizmann Institute of Science. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 102, co-authored 338 publications receiving 47090 citations. Previous affiliations of Moni Naor include IBM & Stanford University.

Papers
More filters
Book ChapterDOI

Derandomized constructions of k -wise (almost) independent permutations

TL;DR: A new method for reducing the size of families given by previous constructions of k-wise almost independent permutations, which relies on pseudorandom generators for space-bounded computations.

White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing.

TL;DR: In this article, the authors examined the relationship between black box complexity and white box complexity for search problems with guaranteed solution such as the above Ramsey problem and showed that the white-box Ramsey problem is hard and this is true even if one is looking for a much smaller clique or independent set than the theorem guarantees.
Journal ArticleDOI

Constructing Pseudo-Random Permutations with a Prescribed Structure

TL;DR: In this paper, the authors show how to construct pseudo-random permutations that satisfy a certain cycle restriction, for example that the permutation be cyclic (consisting of one cycle containing all the elements) or an involution with no fixed points.
Posted Content

Communication Complexity and Secure Function Evaluation.

TL;DR: Two new methodologies for the design of efficient secure protocols, that differ with respect to their underlying computational models are suggested, including a protocol for the "millionaires problem", which is more efficient than previously known ones in either communication or computation.
Book ChapterDOI

Tight bounds for unconditional authentication protocols in the manual channel and shared key models

TL;DR: It is proved that one-way functions are essential (and sufficient) for the existence of protocols breaking the above lower bounds in the computational setting.