2009 | ||
---|---|---|
62 | EE | Amos Beimel, Ilan Orlov: Secret Sharing and Non-Shannon Information Inequalities. TCC 2009: 539-557 |
61 | EE | Amos Beimel, Boaz Ben-Moshe, Yehuda Ben-Shimol, Paz Carmi, Eldad Chai, Itzik Kitroser, Eran Omri: Matrix columns allocation problems. Theor. Comput. Sci. 410(21-23): 2174-2183 (2009) |
2008 | ||
60 | EE | Amos Beimel, Kobbi Nissim, Eran Omri: Distributed Private Data Analysis: Simultaneously Solving How and What. CRYPTO 2008: 451-468 |
59 | EE | Amos Beimel, Anat Paskin: On Linear Secret Sharing for Connectivity in Directed Graphs. SCN 2008: 172-184 |
58 | EE | Amos Beimel, Noam Livne, Carles Padró: Matroids Can Be Far from Ideal Secret Sharing. TCC 2008: 194-212 |
57 | EE | Amos Beimel, Francesco Bergadano, Nader H. Bshouty, Eyal Kushilevitz, Stefano Varricchio: Learning Automata. Encyclopedia of Algorithms 2008 |
56 | EE | Amos Beimel, Noam Livne: On Matroids and Nonideal Secret Sharing. IEEE Transactions on Information Theory 54(6): 2626-2643 (2008) |
55 | EE | Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb: Private Approximation of Search Problems. SIAM J. Comput. 38(5): 1728-1760 (2008) |
54 | EE | Amos Beimel, Tamir Tassa, Enav Weinreb: Characterizing Ideal Weighted Threshold Secret Sharing. SIAM J. Discrete Math. 22(1): 360-397 (2008) |
2007 | ||
53 | EE | Amos Beimel, Tal Malkin, Kobbi Nissim, Enav Weinreb: How Should We Solve Search Problems Privately? CRYPTO 2007: 31-49 |
52 | EE | Amos Beimel, Matthew K. Franklin: Weakly-Private Secret Sharing Schemes. TCC 2007: 253-272 |
51 | EE | Amos Beimel, Renen Hallak, Kobbi Nissim: Private Approximation of Clustering and Vertex Cover. TCC 2007: 383-403 |
50 | EE | Amos Beimel: On private computation in incomplete networks. Distributed Computing 19(3): 237-252 (2007) |
49 | EE | Amos Beimel, Shlomi Dolev, Noam Singer: RT oblivious erasure correcting. IEEE/ACM Trans. Netw. 15(6): 1321-1332 (2007) |
48 | EE | Amos Beimel, Yoav Stahl: Robust Information-Theoretic Private Information Retrieval. J. Cryptology 20(3): 295-321 (2007) |
2006 | ||
47 | EE | Amos Beimel, Matthew K. Franklin: Edge Eavesdropping Games. SCN 2006: 1-17 |
46 | EE | Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb: Private approximation of search problems. STOC 2006: 119-128 |
45 | EE | Amos Beimel, Noam Livne: On Matroids and Non-ideal Secret Sharing. TCC 2006: 482-501 |
44 | EE | Amos Beimel, Enav Weinreb: Monotone circuits for monotone weighted threshold functions. Inf. Process. Lett. 97(1): 12-18 (2006) |
2005 | ||
43 | EE | Amos Beimel, Enav Weinreb: Monotone Circuits for Weighted Threshold Functions. IEEE Conference on Computational Complexity 2005: 67-75 |
42 | EE | Amos Beimel: On Private Computation in Incomplete Networks. SIROCCO 2005: 18-33 |
41 | EE | Amos Beimel, Tamir Tassa, Enav Weinreb: Characterizing Ideal Weighted Threshold Secret Sharing. TCC 2005: 600-619 |
40 | EE | Amos Beimel, Lior Malka: Efficient reliable communication over partially authenticated networks. Distributed Computing 18(1): 1-19 (2005) |
39 | EE | Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb: Private Approximation of Search Problems Electronic Colloquium on Computational Complexity (ECCC)(141): (2005) |
38 | EE | Amos Beimel, Yuval Ishai, Eyal Kushilevitz: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2): 213-247 (2005) |
37 | EE | Amos Beimel, Enav Weinreb: Separating the Power of Monotone Span Programs over Different Fields. SIAM J. Comput. 34(5): 1196-1215 (2005) |
2004 | ||
36 | EE | Amos Beimel, Shlomi Dolev, Noam Singer: Brief announcement: RT oblivious erasure correcting. PODC 2004: 393 |
35 | EE | Amos Beimel, Tal Malkin: A Quantitative Approach to Reductions in Secure Computation. TCC 2004: 238-257 |
34 | EE | Amos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. J. Cryptology 17(2): 125-151 (2004) |
2003 | ||
33 | EE | Amos Beimel, Enav Weinreb: Separating the Power of Monotone Span Programs over Different Fields. FOCS 2003: 428-437 |
32 | EE | Amos Beimel, Lior Malka: Efficient reliable communication over partially authenticated networks. PODC 2003: 233-242 |
31 | EE | Amos Beimel, Tal Malkin: A Quantitative Approach to Reductions in Secure Computation Electronic Colloquium on Computational Complexity (ECCC)(086): (2003) |
30 | EE | Amos Beimel, Shlomi Dolev: Buses for Anonymous Message Delivery. J. Cryptology 16(1): 25-39 (2003) |
2002 | ||
29 | EE | Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Jean-François Raymond: Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval. FOCS 2002: 261-270 |
28 | EE | Amos Beimel, Yoav Stahl: Robust Information-Theoretic Private Information Retrieval. SCN 2002: 326-341 |
2001 | ||
27 | EE | Amos Beimel, Yuval Ishai: Information-Theoretic Private Information Retrieval: A Unified Construction. ICALP 2001: 912-926 |
26 | EE | Amos Beimel, Yuval Ishai: On the Power of Nonlinear Secrect-Sharing. IEEE Conference on Computational Complexity 2001: 188-202 |
25 | EE | Amos Beimel, Yuval Ishai: Information-Theoretic Private Information Retrieval: A Unified Construction Electronic Colloquium on Computational Complexity (ECCC) 8(15): (2001) |
24 | Amos Beimel, Felix Geller, Eyal Kushilevitz: The Query Complexity of Finding Local Minima in the Lattice. Inf. Comput. 171(1): 69-83 (2001) | |
2000 | ||
23 | EE | Amos Beimel, Yuval Ishai, Tal Malkin: Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. CRYPTO 2000: 55-73 |
22 | EE | Amos Beimel, Eyal Kushilevitz: Learning unions of high-dimensional boxes over the reals. Inf. Process. Lett. 73(5-6): 213-220 (2000) |
21 | EE | Amos Beimel, Francesco Bergadano, Nader H. Bshouty, Eyal Kushilevitz, Stefano Varricchio: Learning functions represented as multiplicity automata. J. ACM 47(3): 506-530 (2000) |
20 | EE | Amos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz: Computing Functions of a Shared Secret. SIAM J. Discrete Math. 13(3): 324-345 (2000) |
1999 | ||
19 | EE | Amos Beimel, Tal Malkin, Silvio Micali: The All-or-Nothing Nature of Two-Party Secure Computation. CRYPTO 1999: 80-97 |
18 | EE | Amos Beimel, Yuval Ishai, Eyal Kushilevitz, Tal Malkin: One-Way Functions Are Essential for Single-Server Private Information Retrieval. STOC 1999: 89-98 |
17 | Amos Beimel, Anna Gál: On Arithmetic Branching Programs. J. Comput. Syst. Sci. 59(2): 195-220 (1999) | |
16 | EE | Amos Beimel, Matthew K. Franklin: Reliable Communication over Partially Authenticated Networks. Theor. Comput. Sci. 220(1): 185-210 (1999) |
1998 | ||
15 | EE | Amos Beimel, Felix Geller, Eyal Kushilevitz: The Query Complexity of Finding Local Minima in the Lattice. COLT 1998: 294-302 |
14 | EE | Amos Beimel, Anna Gál: On Arithmetic Branching Programs. IEEE Conference on Computational Complexity 1998: 68-80 |
13 | Amos Beimel, Eyal Kushilevitz: Learning Boxes in High Dimension. Algorithmica 22(1/2): 76-90 (1998) | |
12 | Amos Beimel, Benny Chor: Secret Sharing with Public Reconstruction. IEEE Transactions on Information Theory 44(5): 1887-1896 (1998) | |
1997 | ||
11 | Amos Beimel, Eyal Kushilevitz: Learning Boxes in High Dimension. EuroCOLT 1997: 3-15 | |
10 | Amos Beimel, Matthew K. Franklin: Reliable Communication over Partially Authenticated Networks. WDAG 1997: 245-259 | |
9 | Amos Beimel, Anna Gál, Mike Paterson: Lower Bounds for Monotone Span Programs. Computational Complexity 6(1): 29-45 (1997) | |
1996 | ||
8 | Amos Beimel, Francesco Bergadano, Nader H. Bshouty, Eyal Kushilevitz, Stefano Varricchio: On the Applications of Multiplicity Automata in Learning. FOCS 1996: 349-358 | |
7 | Amos Beimel, Benny Chor: Communication in key distribution schemes. IEEE Transactions on Information Theory 42(1): 19-28 (1996) | |
1995 | ||
6 | EE | Amos Beimel, Benny Chor: Secret Sharing with Public Reconstruction (Extended Abstract). CRYPTO 1995: 353-366 |
5 | Amos Beimel, Anna Gál, Mike Paterson: Lower Bounds for Monotone Span Programs. FOCS 1995: 674-681 | |
4 | EE | Amos Beimel, Anna Gál, Mike Paterson: Lower Bounds for Monotone Span Programs Electronic Colloquium on Computational Complexity (ECCC) 2(1): (1995) |
1994 | ||
3 | Amos Beimel, Benny Chor: Universally ideal secret-sharing schemes. IEEE Transactions on Information Theory 40(3): 786-794 (1994) | |
1993 | ||
2 | EE | Amos Beimel, Benny Chor: Interaction in Key Distribution Schemes (Extended Abstract). CRYPTO 1993: 444-455 |
1992 | ||
1 | EE | Amos Beimel, Benny Chor: Universally Ideal Secret Sharing Schemes (Preliminary Version). CRYPTO 1992: 183-195 |