dblp.uni-trier.dewww.uni-trier.de

Boaz Barak

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
43EEBoaz Barak, Moritz Hardt, Satyen Kale: The uniform hardcore lemma via approximate Bregman projections. SODA 2009: 1193-1200
2008
42EEBoaz Barak, Sharon Goldberg, David Xiao: Protocols and Lower Bounds for Failure Localization in the Internet. EUROCRYPT 2008: 341-360
41EEBenny Applebaum, Boaz Barak, David Xiao: On Basing Lower-Bounds for Learning on Worst-Case Assumptions. FOCS 2008: 211-220
40EEBoaz Barak, Moritz Hardt, Ishay Haviv, Anup Rao, Oded Regev, David Steurer: Rounding Parallel Repetitions of Unique Games. FOCS 2008: 374-383
39EESharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, Jennifer Rexford: Path-quality monitoring in the presence of adversaries. SIGMETRICS 2008: 193-204
38EEBoaz Barak, Mohammad Mahmoody-Ghidary: Merkle Puzzles are Optimal CoRR abs/0801.3669: (2008)
37EEBoaz Barak, Mohammad Mahmoody-Ghidary: Lower Bounds on Signatures from Symmetric Primitives CoRR abs/0801.3680: (2008)
36EEBoaz Barak, Oded Goldreich: Universal Arguments and their Applications. SIAM J. Comput. 38(5): 1661-1694 (2008)
2007
35EEBoaz Barak, Mohammad Mahmoody-Ghidary: Lower Bounds on Signatures From Symmetric Primitives. FOCS 2007: 680-688
34EEBoaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, Kunal Talwar: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. PODS 2007: 273-282
33EEBoaz Barak, Shien Jin Ong, Salil P. Vadhan: Derandomization in Cryptography. SIAM J. Comput. 37(2): 380-400 (2007)
2006
32EEBoaz Barak: Non-black-box Techniques in Cryptography. CSR 2006: 1
31EEBoaz Barak, Manoj Prabhakaran, Amit Sahai: Concurrent Non-Malleable Zero Knowledge. FOCS 2006: 345-354
30EEBoaz Barak, Anup Rao, Ronen Shaltiel, Avi Wigderson: 2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction. STOC 2006: 671-680
29EEBoaz Barak, Yehuda Lindell, Salil P. Vadhan: Lower bounds for non-black-box zero knowledge. J. Comput. Syst. Sci. 72(2): 321-391 (2006)
28EEBoaz Barak, Russell Impagliazzo, Avi Wigderson: Extracting Randomness Using Few Independent Sources. SIAM J. Comput. 36(4): 1095-1118 (2006)
2005
27EEBoaz Barak, Shai Halevi: A model and architecture for pseudo-random generation with applications to /dev/random. ACM Conference on Computer and Communications Security 2005: 203-212
26EEBoaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pass, Tal Rabin: Secure Computation Without Authentication. CRYPTO 2005: 361-377
25EEBoaz Barak, Amit Sahai: How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation. FOCS 2005: 543-552
24EEBoaz Barak, Guy Kindler, Ronen Shaltiel, Benny Sudakov, Avi Wigderson: Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors. STOC 2005: 1-10
23EEBoaz Barak, Amit Sahai: How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation Electronic Colloquium on Computational Complexity (ECCC)(096): (2005)
22EEBoaz Barak, Shien Jin Ong, Salil P. Vadhan: Derandomization in Cryptography Electronic Colloquium on Computational Complexity (ECCC)(114): (2005)
2004
21EEBoaz Barak, Ran Canetti, Jesper Buus Nielsen, Rafael Pass: Universally Composable Protocols with Relaxed Set-Up Assumptions. FOCS 2004: 186-195
20EEBoaz Barak, Russell Impagliazzo, Avi Wigderson: Extracting Randomness Using Few Independent Sources. FOCS 2004: 384-393
19EEBoaz Barak, Rafael Pass: On the Possibility of One-Message Weak Zero-Knowledge. TCC 2004: 121-132
18EEBoaz Barak, Yehuda Lindell, Salil P. Vadhan: Lower Bounds for Non-Black-Box Zero Knowledge Electronic Colloquium on Computational Complexity (ECCC)(083): (2004)
17EEBoaz Barak, Yehuda Lindell: Strict Polynomial-Time in Simulation and Extraction. SIAM J. Comput. 33(4): 738-818 (2004)
2003
16EEBoaz Barak, Ronen Shaltiel, Eran Tromer: True Random Number Generators Secure in a Changing Environment. CHES 2003: 166-180
15EEBoaz Barak, Shien Jin Ong, Salil P. Vadhan: Derandomization in Cryptography. CRYPTO 2003: 299-315
14EEBoaz Barak, Yehuda Lindell, Salil P. Vadhan: Lower Bounds for Non-Black-Box Zero Knowledge. FOCS 2003: 384-393
13EEBoaz Barak, Ronen Shaltiel, Avi Wigderson: Computational Analogues of Entropy. RANDOM-APPROX 2003: 200-215
2002
12EEBoaz Barak: Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model. FOCS 2002: 345-355
11EEBoaz Barak, Oded Goldreich: Universal Arguments and their Applications. IEEE Conference on Computational Complexity 2002: 194-203
10EEBoaz Barak: A Probabilistic-Time Hierarchy Theorem for "Slightly Non-uniform" Algorithms. RANDOM 2002: 194-208
9EEBoaz Barak, Yehuda Lindell: Strict polynomial-time in simulation and extraction. STOC 2002: 484-493
8EEBoaz Barak, Yehuda Lindell: Strict Polynomial-time in Simulation and Extraction Electronic Colloquium on Computational Complexity (ECCC)(026): (2002)
2001
7EEBoaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang: On the (Im)possibility of Obfuscating Programs. CRYPTO 2001: 1-18
6 Boaz Barak: How to Go Beyond the Black-Box Simulation Barrier. FOCS 2001: 106-115
5 Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell: Resettably-Sound Zero-Knowledge and its Applications. FOCS 2001: 116-125
4EEBoaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang: On the (Im)possibility of Obfuscating Programs Electronic Colloquium on Computational Complexity (ECCC) 8(057): (2001)
3EEBoaz Barak, Oded Goldreich: Universal Arguments and their Applications Electronic Colloquium on Computational Complexity (ECCC)(093): (2001)
2000
2EEBoaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor: Clock synchronization with faults and recoveries (extended abstract). PODC 2000: 133-142
1999
1EEBoaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai: The Proactive Security Toolkit and Applications. ACM Conference on Computer and Communications Security 1999: 18-27

Coauthor Index

1Benny Applebaum [41]
2Ran Canetti [21] [26]
3Kamalika Chaudhuri [34]
4Cynthia Dwork [34]
5Sharon Goldberg [39] [42]
6Oded Goldreich [3] [4] [5] [7] [11] [36]
7Shafi Goldwasser [5]
8Shai Halevi [2] [27]
9Moritz Hardt [40] [43]
10Ishay Haviv [40]
11Amir Herzberg [1] [2]
12Russell Impagliazzo [4] [7] [20] [28]
13Satyen Kale [34] [43]
14Guy Kindler [24]
15Yehuda Lindell (Andrew Y. Lindell) [5] [8] [9] [14] [17] [18] [26] [29]
16Mohammad Mahmoody-Ghidary [35] [37] [38]
17Frank McSherry [34]
18Dalit Naor [1] [2]
19Jesper Buus Nielsen [21]
20Shien Jin Ong [15] [22] [33]
21Rafael Pass [19] [21] [26]
22Manoj Prabhakaran [31]
23Tal Rabin [26]
24Anup Rao [30] [40]
25Oded Regev [40]
26Jennifer Rexford [39]
27Steven Rudich [4] [7]
28Amit Sahai [4] [7] [23] [25] [31]
29Eldad Shai [1]
30Ronen Shaltiel [13] [16] [24] [30]
31David Steurer [40]
32Benny Sudakov [24]
33Kunal Talwar [34]
34Eran Tromer [16] [39]
35Salil P. Vadhan [4] [7] [14] [15] [18] [22] [29] [33]
36Avi Wigderson [13] [20] [24] [28] [30]
37David Xiao [39] [41] [42]
38Ke Yang [4] [7]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)