Year |
Citation |
Score |
2017 |
Barak B. The Complexity of Public-Key Cryptography Electronic Colloquium On Computational Complexity. 2017: 45-77. DOI: 10.1007/978-3-319-57048-8_2 |
0.337 |
|
2015 |
Goldberg S, Xiao D, Tromer E, Barak B, Rexford J. Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols Ieee/Acm Transactions On Networking. 23: 1729-1741. DOI: 10.1109/Tnet.2014.2339853 |
0.68 |
|
2014 |
Glaser A, Barak B, Goldston RJ. A zero-knowledge protocol for nuclear warhead verification. Nature. 510: 497-502. PMID 24965650 DOI: 10.1038/Nature13457 |
0.322 |
|
2013 |
Barak B, Braverman M, Chen X, Rao A. How to compress interactive communication Siam Journal On Computing. 42: 1327-1363. DOI: 10.1137/100811969 |
0.33 |
|
2011 |
Arora S, Barak B, Brunnermeier M, Ge R. Computational complexity and information asymmetry in financial products Communications of the Acm. 54: 101-107. DOI: 10.1145/1941487.1941511 |
0.312 |
|
2011 |
Barak B, Canetti R, Lindell Y, Pass R, Rabin T. Secure Computation Without Authentication Journal of Cryptology. 24: 720-760. DOI: 10.1007/S00145-010-9075-9 |
0.668 |
|
2008 |
Barak B, Goldreich O. Universal Arguments and their Applications Siam Journal On Computing. 38: 1661-1694. DOI: 10.1137/070709244 |
0.59 |
|
2007 |
Barak B, Ong SJ, Vadhan S. Derandomization in Cryptography Siam Journal On Computing. 37: 380-400. DOI: 10.1137/050641958 |
0.351 |
|
2006 |
Barak B, Prabhakaran M, Sahai A. Concurrent non-malleable zero knowledge Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 345-354. DOI: 10.1109/FOCS.2006.21 |
0.317 |
|
2006 |
Barak B, Lindell Y, Vadhan S. Lower bounds for non-black-box zero knowledge Journal of Computer and System Sciences. 72: 321-391. DOI: 10.1016/J.Jcss.2005.06.010 |
0.651 |
|
2004 |
Barak B, Lindell Y. Strict Polynomial-Time in Simulation and Extraction Siam Journal On Computing. 33: 783-818. DOI: 10.1137/S0097539703427975 |
0.645 |
|
2001 |
Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K. On the (Im)possibility of obfuscating programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 1-18. DOI: 10.1145/2160158.2160159 |
0.565 |
|
Show low-probability matches. |