M
Moni Naor
Researcher at Weizmann Institute of Science
Publications - 348
Citations - 49941
Moni Naor is an academic researcher from Weizmann Institute of Science. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 102, co-authored 338 publications receiving 47090 citations. Previous affiliations of Moni Naor include IBM & Stanford University.
Papers
More filters
Journal Article
Secure Accounting and Auditing on the Web.
Moni Naor,Benny Pinkas +1 more
TL;DR: In this article, the authors present schemes that measure the amount of service requested from servers by clients, which are secure and efficient and provide a short proof for the metered data.
Book ChapterDOI
Hardness preserving reductions via cuckoo hashing
TL;DR: This work shows how to go beyond the birthday attack barrier by replacing the above simple hashing approach with a variant of cuckoo hashing — a hashing paradigm typically used for resolving hash collisions in a table, by using two hash functions and two tables, and cleverly assigning each element into one of the two tables.
Book ChapterDOI
String matching with preprocessing of text and pattern
TL;DR: This work considers the well known string matching problem where a text and pattern are given and the problem is to determine if the pattern appears as a substring in the text and provides preprocessing and on-line algorithms such that the preprocessing algorithm runs in linear time and requires linear storage and the on- line complexity is logarithmic in theText.
Journal ArticleDOI
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
Moni Naor,Gil Segev,Adam Smith +2 more
TL;DR: In this paper, the authors considered the message authentication problem in two seemingly different communication models: the first model, where the sender and receiver are connected by an insecure channel and by a lowbandwidth auxiliary channel, that enables the sender to authenticate one short message to the receiver (for example, by typing a short string or comparing two short strings).
Journal Article
On Everlasting Security in the Hybrid Bounded Storage Model
Danny Harnik,Moni Naor +1 more
TL;DR: It is shown that everlasting security with low storage requirements cannot be achieved by black-box reductions in the hybrid BSM, and two augmentations of the model are shown that allow for low storage everlasting security.