scispace - formally typeset
M

Moni Naor

Researcher at Weizmann Institute of Science

Publications -  348
Citations -  49941

Moni Naor is an academic researcher from Weizmann Institute of Science. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 102, co-authored 338 publications receiving 47090 citations. Previous affiliations of Moni Naor include IBM & Stanford University.

Papers
More filters
Journal Article

Secure Accounting and Auditing on the Web.

Moni Naor, +1 more
- 01 Jan 1998 - 
TL;DR: In this article, the authors present schemes that measure the amount of service requested from servers by clients, which are secure and efficient and provide a short proof for the metered data.
Book ChapterDOI

Hardness preserving reductions via cuckoo hashing

TL;DR: This work shows how to go beyond the birthday attack barrier by replacing the above simple hashing approach with a variant of cuckoo hashing — a hashing paradigm typically used for resolving hash collisions in a table, by using two hash functions and two tables, and cleverly assigning each element into one of the two tables.
Book ChapterDOI

String matching with preprocessing of text and pattern

Moni Naor
TL;DR: This work considers the well known string matching problem where a text and pattern are given and the problem is to determine if the pattern appears as a substring in the text and provides preprocessing and on-line algorithms such that the preprocessing algorithm runs in linear time and requires linear storage and the on- line complexity is logarithmic in theText.
Journal ArticleDOI

Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models

TL;DR: In this paper, the authors considered the message authentication problem in two seemingly different communication models: the first model, where the sender and receiver are connected by an insecure channel and by a lowbandwidth auxiliary channel, that enables the sender to authenticate one short message to the receiver (for example, by typing a short string or comparing two short strings).
Journal Article

On Everlasting Security in the Hybrid Bounded Storage Model

TL;DR: It is shown that everlasting security with low storage requirements cannot be achieved by black-box reductions in the hybrid BSM, and two augmentations of the model are shown that allow for low storage everlasting security.