2007 |
86 | EE | Benny Chor,
Michael R. Fellows,
Mark A. Ragan,
Igor Razgon,
Frances A. Rosamond,
Sagi Snir:
Connected Coloring Completion for General Graphs: Algorithms and Complexity.
COCOON 2007: 75-85 |
85 | EE | Matan Gavish,
Amnon Peled,
Benny Chor:
Genetic code symmetry and efficient design of GC-constrained coding sequences.
Bioinformatics 23(2): 57-63 (2007) |
84 | EE | Benny Chor,
Michael D. Hendy,
David Penny:
Analytic solutions for three taxon ML trees with variable rates across sites.
Discrete Applied Mathematics 155(6-7): 750-758 (2007) |
83 | EE | Benny Chor,
Tamir Tuller:
Biological Networks: Comparison, Conservation, and Evolution via Relative Description Length.
Journal of Computational Biology 14(6): 817-838 (2007) |
2006 |
82 | EE | Benny Chor,
Tamir Tuller:
Biological Networks: Comparison, Conservation, and Evolutionary Trees.
RECOMB 2006: 30-44 |
81 | EE | Benny Chor,
Tamir Tuller:
Finding a maximum likelihood tree is hard.
J. ACM 53(5): 722-744 (2006) |
80 | EE | Igor Ulitsky,
David Burstein,
Tamir Tuller,
Benny Chor:
The Average Common Substring Approach to Phylogenomic Reconstruction.
Journal of Computational Biology 13(2): 336-350 (2006) |
79 | EE | Benny Chor,
Amit Khetan,
Sagi Snir:
Maximum Likelihood Molecular Clock Comb: Analytic Solutions.
Journal of Computational Biology 13(3): 819-837 (2006) |
2005 |
78 | EE | Benny Chor,
Tamir Tuller:
Maximum likelihood of evolutionary trees: hardness and approximation.
ISMB (Supplement of Bioinformatics) 2005: 97-106 |
77 | EE | David Burstein,
Igor Ulitsky,
Tamir Tuller,
Benny Chor:
Information Theoretic Approaches to Whole Genome Phylogenies.
RECOMB 2005: 283-295 |
76 | EE | Benny Chor,
Tamir Tuller:
Maximum Likelihood of Evolutionary Trees Is Hard.
RECOMB 2005: 296-310 |
75 | EE | Tamir Tuller,
Efrat Oron,
Erez Makavy,
Daniel A. Chamovitz,
Benny Chor:
Time-Window Analysis of Developmental Gene Expression Data with Multiple Genetic Backgrounds.
WABI 2005: 53-64 |
74 | EE | Jianer Chen,
Benny Chor,
Mike Fellows,
Xiuzhen Huang,
David W. Juedes,
Iyad A. Kanj,
Ge Xia:
Tight lower bounds for certain parameterized NP-hard problems.
Inf. Comput. 201(2): 216-231 (2005) |
2004 |
73 | EE | Jianer Chen,
Benny Chor,
Mike Fellows,
Xiuzhen Huang,
David W. Juedes,
Iyad A. Kanj,
Ge Xia:
Tight Lower Bounds for Certain Parameterized NP-Hard Problems.
IEEE Conference on Computational Complexity 2004: 150-160 |
72 | EE | Benny Chor,
Tamir Tuller:
Adding Hidden Nodes to Gene Networks (Extended Abstract).
WABI 2004: 123-134 |
71 | EE | Benny Chor,
Mike Fellows,
David W. Juedes:
Linear Kernels in Linear Time, or How to Save k Colors in O(n2) Steps.
WG 2004: 257-269 |
70 | EE | Louigi Addario-Berry,
Benny Chor,
Michael T. Hallett,
Jens Lagergren,
Alessandro Panconesi,
Todd Wareham:
Ancestral Maximum Likelihood of Evolutionary Trees Is Hard.
J. Bioinformatics and Computational Biology 2(2): 257-272 (2004) |
2003 |
69 | EE | Benny Chor,
Amit Khetan,
Sagi Snir:
Maximum likelihood on four taxa phylogenetic trees: analytic solutions.
RECOMB 2003: 76-83 |
68 | EE | Louigi Addario-Berry,
Benny Chor,
Michael T. Hallett,
Jens Lagergren,
Alessandro Panconesi,
Todd Wareham:
Ancestral Maximum Likelihood of Evolutionary Trees Is Hard.
WABI 2003: 202-215 |
67 | EE | Amir Ben-Dor,
Benny Chor,
Richard M. Karp,
Zohar Yakhini:
Discovering Local Structure in Gene Expression Data: The Order-Preserving Submatrix Problem.
Journal of Computational Biology 10(3/4): 373-384 (2003) |
2002 |
66 | EE | Amir Ben-Dor,
Benny Chor,
Richard M. Karp,
Zohar Yakhini:
Discovering local structure in gene expression data: the order-preserving submatrix problem.
RECOMB 2002: 49-57 |
2001 |
65 | EE | Benny Chor,
Michael D. Hendy,
David Penny:
Analytic Solutions for Three-Taxon MLMC Trees with Variable Rates Across Sites.
WABI 2001: 204-213 |
64 | | Benny Chor,
Yuval Ishai:
On Privacy and Partition Arguments.
Inf. Comput. 167(1): 2-9 (2001) |
2000 |
63 | EE | Benny Chor,
Michael D. Hendy,
Barbara R. Holland,
David Penny:
Multiple maxima of likelihood in phylogenetic trees: an analytic approach.
RECOMB 2000: 108-117 |
62 | EE | Benny Chor,
Paul Lemke,
Ziv Mador:
On the number of ordered factorizations of natural numbers.
Discrete Mathematics 214(1-3): 123-133 (2000) |
61 | | Benny Chor,
Amos Fiat,
Moni Naor,
Benny Pinkas:
Tracing traitors.
IEEE Transactions on Information Theory 46(3): 893-910 (2000) |
1999 |
60 | | Benny Chor,
Lee-Bath Nelson:
Solvability in Asynchronous Environments II: Finite Interactive Tasks.
SIAM J. Comput. 29(2): 351-377 (1999) |
1998 |
59 | EE | Amir Ben-Dor,
Benny Chor,
Dan Graur,
Ron Ophir,
Dan Pelleg:
From four-taxon trees to phylogenies (preliminary report): the case of mammalian evolution.
RECOMB 1998: 9-19 |
58 | EE | Benny Chor:
From Quartets to Phylogenetic Trees.
SOFSEM 1998: 36-53 |
57 | | Amos Beimel,
Benny Chor:
Secret Sharing with Public Reconstruction.
IEEE Transactions on Information Theory 44(5): 1887-1896 (1998) |
56 | EE | Benny Chor,
Eyal Kushilevitz,
Oded Goldreich,
Madhu Sudan:
Private Information Retrieval.
J. ACM 45(6): 965-981 (1998) |
55 | | Amir Ben-Dor,
Benny Chor,
Dan Graur,
Ron Ophir,
Dan Pelleg:
Constructing Phylogenies from Quartets: Elucidation of Eutherian Superordinal Relationships.
Journal of Computational Biology 5(3): 377-390 (1998) |
54 | EE | Benny Chor,
Madhu Sudan:
A Geometric Approach to Betweenness.
SIAM J. Discrete Math. 11(4): 511-523 (1998) |
1997 |
53 | EE | Amir Ben-Dor,
Benny Chor:
On constructing radiation hybrid maps (extended abstract).
RECOMB 1997: 17-26 |
52 | EE | Benny Chor,
Niv Gilboa:
Computationally Private Information Retrieval (Extended Abstract).
STOC 1997: 304-313 |
51 | | Amir Ben-Dor,
Benny Chor:
On Constructing Radiation Hybrid Maps.
Journal of Computational Biology 4(4): 517-534 (1997) |
1996 |
50 | | Benny Chor,
Yuval Ishai:
On Privacy and Partition Arguments.
ISTCS 1996: 191-194 |
49 | | Amos Beimel,
Benny Chor:
Communication in key distribution schemes.
IEEE Transactions on Information Theory 42(1): 19-28 (1996) |
1995 |
48 | EE | Amos Beimel,
Benny Chor:
Secret Sharing with Public Reconstruction (Extended Abstract).
CRYPTO 1995: 353-366 |
47 | | Benny Chor,
Madhu Sudan:
A Geometric Approach to Betweenness.
ESA 1995: 227-237 |
46 | | Benny Chor,
Oded Goldreich,
Eyal Kushilevitz,
Madhu Sudan:
Private Information Retrieval.
FOCS 1995: 41-50 |
45 | | Benny Chor,
Netta Shani:
The Privacy of Dense Symmetric Functions.
Computational Complexity 5(1): 43-59 (1995) |
44 | | Benny Chor,
Mihály Geréb-Graus,
Eyal Kushilevitz:
Private Computations over the Integers.
SIAM J. Comput. 24(2): 376-386 (1995) |
1994 |
43 | EE | Benny Chor,
Amos Fiat,
Moni Naor:
Tracing Traitors.
CRYPTO 1994: 257-270 |
42 | | Benny Chor,
Lee-Bath Nelson:
Resilience of General Interactive Tasks.
PODC 1994: 173-182 |
41 | | Amos Beimel,
Benny Chor:
Universally ideal secret-sharing schemes.
IEEE Transactions on Information Theory 40(3): 786-794 (1994) |
40 | | Richard Chang,
Benny Chor,
Oded Goldreich,
Juris Hartmanis,
Johan Håstad,
Desh Ranjan,
Pankaj Rohatgi:
The Random Oracle Hypothesis Is False.
J. Comput. Syst. Sci. 49(1): 24-39 (1994) |
39 | | Benny Chor,
Mihály Geréb-Graus,
Eyal Kushilevitz:
On the Structure of the Privacy Hierarchy.
J. Cryptology 7(1): 53-60 (1994) |
38 | | Benny Chor,
Amos Israeli,
Ming Li:
Wait-Free Consensus Using Asynchronous Hardware.
SIAM J. Comput. 23(4): 701-712 (1994) |
1993 |
37 | EE | Amos Beimel,
Benny Chor:
Interaction in Key Distribution Schemes (Extended Abstract).
CRYPTO 1993: 444-455 |
36 | | Reuven Bar-Yehuda,
Benny Chor,
Eyal Kushilevitz,
Alon Orlitsky:
Privacy, additional information and communication.
IEEE Transactions on Information Theory 39(6): 1930-1943 (1993) |
35 | | Benny Chor,
Eyal Kushilevitz:
A Communication-Privacy Tradeoff for Modular Addition.
Inf. Process. Lett. 45(4): 205-210 (1993) |
34 | | Benny Chor,
Eyal Kushilevitz:
Secret Sharing Over Infinite Domains.
J. Cryptology 6(2): 87-95 (1993) |
1992 |
33 | EE | Amos Beimel,
Benny Chor:
Universally Ideal Secret Sharing Schemes (Preliminary Version).
CRYPTO 1992: 183-195 |
32 | | Shai Ben-David,
Benny Chor,
Oded Goldreich,
Michael Luby:
On the Theory of Average Case Complexity.
J. Comput. Syst. Sci. 44(2): 193-219 (1992) |
1991 |
31 | | Benny Chor,
Lee-Bath Nelson:
Resiliency of Interactive Distributed Tasks (Extended Abstract).
PODC 1991: 37-49 |
30 | | Benny Chor,
Eyal Kushilevitz:
A Zero-One Law for Boolean Privacy.
SIAM J. Discrete Math. 4(1): 36-47 (1991) |
1990 |
29 | | Benny Chor,
Mihály Geréb-Graus,
Eyal Kushilevitz:
Private Computations Over the Integers (Extended Abstract)
FOCS 1990: 335-344 |
28 | | Reuven Bar-Yehuda,
Benny Chor,
Eyal Kushilevitz:
Privacy, Additional Information, and Communication.
Structure in Complexity Theory Conference 1990: 55-65 |
27 | | Benny Chor,
Oded Goldreich:
An Improved Parallel Algorithm for Integer GCD.
Algorithmica 5(1): 1-10 (1990) |
1989 |
26 | EE | Benny Chor,
Eyal Kushilevitz:
Secret Sharing Over Infinite Domains (Extended Abstract).
CRYPTO 1989: 299-306 |
25 | | Benny Chor,
Lior Moscovici:
Solvability in Asynchronous Environments (Extended Abstract)
FOCS 1989: 422-427 |
24 | | Shai Ben-David,
Benny Chor,
Oded Goldreich,
Michael Luby:
On the Theory of Average Case Complexity
STOC 1989: 204-216 |
23 | | Benny Chor,
Eyal Kushilevitz:
A Zero-One Law for Boolean Privacy (extended abstract)
STOC 1989: 62-72 |
22 | | Shai Ben-David,
Benny Chor,
Oded Goldreich,
Michael Luby:
On the Theory of Average Case Complexity (abstract).
Structure in Complexity Theory Conference 1989: 36 |
21 | EE | Benny Chor,
Michael Merritt,
David B. Shmoys:
Simple constant-time consensus protocols in realistic failure models.
J. ACM 36(3): 591-614 (1989) |
20 | EE | Benny Chor,
Oded Goldreich:
On the power of two-point based sampling.
J. Complexity 5(1): 96-106 (1989) |
1988 |
19 | | Benny Chor,
Ronald L. Rivest:
A knapsack-type public key cryptosystem based on arithmetic in finite fields.
IEEE Transactions on Information Theory 34(5): 901-909 (1988) |
18 | | Werner Alexi,
Benny Chor,
Oded Goldreich,
Claus-Peter Schnorr:
RSA and Rabin Functions: Certain Parts are as Hard as the Whole.
SIAM J. Comput. 17(2): 194-209 (1988) |
17 | | Benny Chor,
Oded Goldreich:
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity.
SIAM J. Comput. 17(2): 230-261 (1988) |
16 | | Benny Chor,
Mihály Geréb-Graus:
On the Influence of Single Participant in Coin Flipping Schemes.
SIAM J. Discrete Math. 1(4): 411-415 (1988) |
1987 |
15 | | Benny Chor,
Michael O. Rabin:
Achieving Independence in Logarithmic Number of Rounds.
PODC 1987: 260-268 |
14 | | Benny Chor,
Amos Israeli,
Ming Li:
On Processor Coordination Using Asynchronous Hardware.
PODC 1987: 86-97 |
1986 |
13 | EE | Benny Chor,
Charles E. Leiserson,
Ronald L. Rivest,
James B. Shearer:
An application of number theory to the organization of raster-graphics memory.
J. ACM 33(1): 86-104 (1986) |
1985 |
12 | EE | Benny Chor,
Oded Goldreich,
Shafi Goldwasser:
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos.
CRYPTO 1985: 448-457 |
11 | | Benny Chor,
Shafi Goldwasser,
Silvio Micali,
Baruch Awerbuch:
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults (Extended Abstract)
FOCS 1985: 383-395 |
10 | | Benny Chor,
Oded Goldreich,
Johan Håstad,
Joel Friedman,
Steven Rudich,
Roman Smolensky:
The Bit Extraction Problem of t-Resilient Functions (Preliminary Version)
FOCS 1985: 396-407 |
9 | | Benny Chor,
Oded Goldreich:
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity (Extended Abstract)
FOCS 1985: 429-442 |
8 | | Benny Chor,
Michael Merritt,
David B. Shmoys:
Simple Constant-Time Consensus Protocols in Realistic Failure Models (Extended Abstract).
PODC 1985: 152-162 |
7 | | Benny Chor,
Brian A. Coan:
A Simple and Efficient Randomized Byzantine Agreement Algorithm.
IEEE Trans. Software Eng. 11(6): 531-539 (1985) |
1984 |
6 | EE | Benny Chor,
Oded Goldreich:
RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure.
CRYPTO 1984: 303-313 |
5 | EE | Benny Chor,
Ronald L. Rivest:
A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields.
CRYPTO 1984: 54-65 |
4 | | Werner Alexi,
Benny Chor,
Oded Goldreich,
Claus-Peter Schnorr:
RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure
FOCS 1984: 449-457 |
3 | | Benny Chor,
Brian A. Coan:
A Simple and Efficient Randomized Byzantine Agreement Algorithm.
Symposium on Reliability in Distributed Software and Database Systems 1984: 98-106 |
1983 |
2 | | Michael Ben-Or,
Benny Chor,
Adi Shamir:
On the Cryptographic Security of Single RSA Bits
STOC 1983: 421-430 |
1982 |
1 | | Benny Chor,
Charles E. Leiserson,
Ronald L. Rivest:
An Application of Number Theory to the Organization of Raster-Graphics Memory (Extended Abstract)
FOCS 1982: 92-99 |