2009 |
62 | EE | Amos Beimel,
Ilan Orlov:
Secret Sharing and Non-Shannon Information Inequalities.
TCC 2009: 539-557 |
61 | EE | Amos Beimel,
Boaz Ben-Moshe,
Yehuda Ben-Shimol,
Paz Carmi,
Eldad Chai,
Itzik Kitroser,
Eran Omri:
Matrix columns allocation problems.
Theor. Comput. Sci. 410(21-23): 2174-2183 (2009) |
2008 |
60 | EE | Amos Beimel,
Kobbi Nissim,
Eran Omri:
Distributed Private Data Analysis: Simultaneously Solving How and What.
CRYPTO 2008: 451-468 |
59 | EE | Amos Beimel,
Anat Paskin:
On Linear Secret Sharing for Connectivity in Directed Graphs.
SCN 2008: 172-184 |
58 | EE | Amos Beimel,
Noam Livne,
Carles Padró:
Matroids Can Be Far from Ideal Secret Sharing.
TCC 2008: 194-212 |
57 | EE | Amos Beimel,
Francesco Bergadano,
Nader H. Bshouty,
Eyal Kushilevitz,
Stefano Varricchio:
Learning Automata.
Encyclopedia of Algorithms 2008 |
56 | EE | Amos Beimel,
Noam Livne:
On Matroids and Nonideal Secret Sharing.
IEEE Transactions on Information Theory 54(6): 2626-2643 (2008) |
55 | EE | Amos Beimel,
Paz Carmi,
Kobbi Nissim,
Enav Weinreb:
Private Approximation of Search Problems.
SIAM J. Comput. 38(5): 1728-1760 (2008) |
54 | EE | Amos Beimel,
Tamir Tassa,
Enav Weinreb:
Characterizing Ideal Weighted Threshold Secret Sharing.
SIAM J. Discrete Math. 22(1): 360-397 (2008) |
2007 |
53 | EE | Amos Beimel,
Tal Malkin,
Kobbi Nissim,
Enav Weinreb:
How Should We Solve Search Problems Privately?
CRYPTO 2007: 31-49 |
52 | EE | Amos Beimel,
Matthew K. Franklin:
Weakly-Private Secret Sharing Schemes.
TCC 2007: 253-272 |
51 | EE | Amos Beimel,
Renen Hallak,
Kobbi Nissim:
Private Approximation of Clustering and Vertex Cover.
TCC 2007: 383-403 |
50 | EE | Amos Beimel:
On private computation in incomplete networks.
Distributed Computing 19(3): 237-252 (2007) |
49 | EE | Amos Beimel,
Shlomi Dolev,
Noam Singer:
RT oblivious erasure correcting.
IEEE/ACM Trans. Netw. 15(6): 1321-1332 (2007) |
48 | EE | Amos Beimel,
Yoav Stahl:
Robust Information-Theoretic Private Information Retrieval.
J. Cryptology 20(3): 295-321 (2007) |
2006 |
47 | EE | Amos Beimel,
Matthew K. Franklin:
Edge Eavesdropping Games.
SCN 2006: 1-17 |
46 | EE | Amos Beimel,
Paz Carmi,
Kobbi Nissim,
Enav Weinreb:
Private approximation of search problems.
STOC 2006: 119-128 |
45 | EE | Amos Beimel,
Noam Livne:
On Matroids and Non-ideal Secret Sharing.
TCC 2006: 482-501 |
44 | EE | Amos Beimel,
Enav Weinreb:
Monotone circuits for monotone weighted threshold functions.
Inf. Process. Lett. 97(1): 12-18 (2006) |
2005 |
43 | EE | Amos Beimel,
Enav Weinreb:
Monotone Circuits for Weighted Threshold Functions.
IEEE Conference on Computational Complexity 2005: 67-75 |
42 | EE | Amos Beimel:
On Private Computation in Incomplete Networks.
SIROCCO 2005: 18-33 |
41 | EE | Amos Beimel,
Tamir Tassa,
Enav Weinreb:
Characterizing Ideal Weighted Threshold Secret Sharing.
TCC 2005: 600-619 |
40 | EE | Amos Beimel,
Lior Malka:
Efficient reliable communication over partially authenticated networks.
Distributed Computing 18(1): 1-19 (2005) |
39 | EE | Amos Beimel,
Paz Carmi,
Kobbi Nissim,
Enav Weinreb:
Private Approximation of Search Problems
Electronic Colloquium on Computational Complexity (ECCC)(141): (2005) |
38 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz:
General constructions for information-theoretic private information retrieval.
J. Comput. Syst. Sci. 71(2): 213-247 (2005) |
37 | EE | Amos Beimel,
Enav Weinreb:
Separating the Power of Monotone Span Programs over Different Fields.
SIAM J. Comput. 34(5): 1196-1215 (2005) |
2004 |
36 | EE | Amos Beimel,
Shlomi Dolev,
Noam Singer:
Brief announcement: RT oblivious erasure correcting.
PODC 2004: 393 |
35 | EE | Amos Beimel,
Tal Malkin:
A Quantitative Approach to Reductions in Secure Computation.
TCC 2004: 238-257 |
34 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing.
J. Cryptology 17(2): 125-151 (2004) |
2003 |
33 | EE | Amos Beimel,
Enav Weinreb:
Separating the Power of Monotone Span Programs over Different Fields.
FOCS 2003: 428-437 |
32 | EE | Amos Beimel,
Lior Malka:
Efficient reliable communication over partially authenticated networks.
PODC 2003: 233-242 |
31 | EE | Amos Beimel,
Tal Malkin:
A Quantitative Approach to Reductions in Secure Computation
Electronic Colloquium on Computational Complexity (ECCC)(086): (2003) |
30 | EE | Amos Beimel,
Shlomi Dolev:
Buses for Anonymous Message Delivery.
J. Cryptology 16(1): 25-39 (2003) |
2002 |
29 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Jean-François Raymond:
Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval.
FOCS 2002: 261-270 |
28 | EE | Amos Beimel,
Yoav Stahl:
Robust Information-Theoretic Private Information Retrieval.
SCN 2002: 326-341 |
2001 |
27 | EE | Amos Beimel,
Yuval Ishai:
Information-Theoretic Private Information Retrieval: A Unified Construction.
ICALP 2001: 912-926 |
26 | EE | Amos Beimel,
Yuval Ishai:
On the Power of Nonlinear Secrect-Sharing.
IEEE Conference on Computational Complexity 2001: 188-202 |
25 | EE | Amos Beimel,
Yuval Ishai:
Information-Theoretic Private Information Retrieval: A Unified Construction
Electronic Colloquium on Computational Complexity (ECCC) 8(15): (2001) |
24 | | Amos Beimel,
Felix Geller,
Eyal Kushilevitz:
The Query Complexity of Finding Local Minima in the Lattice.
Inf. Comput. 171(1): 69-83 (2001) |
2000 |
23 | EE | Amos Beimel,
Yuval Ishai,
Tal Malkin:
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
CRYPTO 2000: 55-73 |
22 | EE | Amos Beimel,
Eyal Kushilevitz:
Learning unions of high-dimensional boxes over the reals.
Inf. Process. Lett. 73(5-6): 213-220 (2000) |
21 | EE | Amos Beimel,
Francesco Bergadano,
Nader H. Bshouty,
Eyal Kushilevitz,
Stefano Varricchio:
Learning functions represented as multiplicity automata.
J. ACM 47(3): 506-530 (2000) |
20 | EE | Amos Beimel,
Mike Burmester,
Yvo Desmedt,
Eyal Kushilevitz:
Computing Functions of a Shared Secret.
SIAM J. Discrete Math. 13(3): 324-345 (2000) |
1999 |
19 | EE | Amos Beimel,
Tal Malkin,
Silvio Micali:
The All-or-Nothing Nature of Two-Party Secure Computation.
CRYPTO 1999: 80-97 |
18 | EE | Amos Beimel,
Yuval Ishai,
Eyal Kushilevitz,
Tal Malkin:
One-Way Functions Are Essential for Single-Server Private Information Retrieval.
STOC 1999: 89-98 |
17 | | Amos Beimel,
Anna Gál:
On Arithmetic Branching Programs.
J. Comput. Syst. Sci. 59(2): 195-220 (1999) |
16 | EE | Amos Beimel,
Matthew K. Franklin:
Reliable Communication over Partially Authenticated Networks.
Theor. Comput. Sci. 220(1): 185-210 (1999) |
1998 |
15 | EE | Amos Beimel,
Felix Geller,
Eyal Kushilevitz:
The Query Complexity of Finding Local Minima in the Lattice.
COLT 1998: 294-302 |
14 | EE | Amos Beimel,
Anna Gál:
On Arithmetic Branching Programs.
IEEE Conference on Computational Complexity 1998: 68-80 |
13 | | Amos Beimel,
Eyal Kushilevitz:
Learning Boxes in High Dimension.
Algorithmica 22(1/2): 76-90 (1998) |
12 | | Amos Beimel,
Benny Chor:
Secret Sharing with Public Reconstruction.
IEEE Transactions on Information Theory 44(5): 1887-1896 (1998) |
1997 |
11 | | Amos Beimel,
Eyal Kushilevitz:
Learning Boxes in High Dimension.
EuroCOLT 1997: 3-15 |
10 | | Amos Beimel,
Matthew K. Franklin:
Reliable Communication over Partially Authenticated Networks.
WDAG 1997: 245-259 |
9 | | Amos Beimel,
Anna Gál,
Mike Paterson:
Lower Bounds for Monotone Span Programs.
Computational Complexity 6(1): 29-45 (1997) |
1996 |
8 | | Amos Beimel,
Francesco Bergadano,
Nader H. Bshouty,
Eyal Kushilevitz,
Stefano Varricchio:
On the Applications of Multiplicity Automata in Learning.
FOCS 1996: 349-358 |
7 | | Amos Beimel,
Benny Chor:
Communication in key distribution schemes.
IEEE Transactions on Information Theory 42(1): 19-28 (1996) |
1995 |
6 | EE | Amos Beimel,
Benny Chor:
Secret Sharing with Public Reconstruction (Extended Abstract).
CRYPTO 1995: 353-366 |
5 | | Amos Beimel,
Anna Gál,
Mike Paterson:
Lower Bounds for Monotone Span Programs.
FOCS 1995: 674-681 |
4 | EE | Amos Beimel,
Anna Gál,
Mike Paterson:
Lower Bounds for Monotone Span Programs
Electronic Colloquium on Computational Complexity (ECCC) 2(1): (1995) |
1994 |
3 | | Amos Beimel,
Benny Chor:
Universally ideal secret-sharing schemes.
IEEE Transactions on Information Theory 40(3): 786-794 (1994) |
1993 |
2 | EE | Amos Beimel,
Benny Chor:
Interaction in Key Distribution Schemes (Extended Abstract).
CRYPTO 1993: 444-455 |
1992 |
1 | EE | Amos Beimel,
Benny Chor:
Universally Ideal Secret Sharing Schemes (Preliminary Version).
CRYPTO 1992: 183-195 |