Simultaneous hardcore bits and cryptography against memory attacks A Akavia, S Goldwasser, V Vaikuntanathan Theory of cryptography conference, 474-495, 2009 | 611 | 2009 |
Proving hard-core predicates using list decoding A Akavia, S Goldwasser, S Safra FOCS 44, 146-159, 2003 | 140 | 2003 |
On basing one-way functions on NP-hardness A Akavia, O Goldreich, S Goldwasser, D Moshkovitz Proceedings of the thirty-eighth annual ACM symposium on Theory of computing …, 2006 | 111 | 2006 |
Candidate weak pseudorandom functions in AC0 ○ MOD2 A Akavia, A Bogdanov, S Guo, A Kamath, A Rosen Proceedings of the 5th conference on Innovations in theoretical computer …, 2014 | 65 | 2014 |
Perturbation codes A Akavia, R Venkatesan 2008 46th Annual Allerton Conference on Communication, Control, and …, 2008 | 57* | 2008 |
Deterministic Sparse Fourier Approximation via Fooling Arithmetic Progressions. A Akavia COLT, 381-393, 2010 | 56 | 2010 |
Privacy-preserving decision trees training and prediction A Akavia, M Leibovich, YS Resheff, R Ron, M Shahar, M Vald ACM Transactions on Privacy and Security 25 (3), 1-30, 2022 | 50 | 2022 |
Linear-regression on packed encrypted data in the two-server model A Akavia, H Shaul, M Weiss, Z Yakhini Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019 | 32 | 2019 |
Solving hidden number problem with one bit oracle and advice A Akavia Annual International Cryptology Conference, 337-354, 2009 | 31 | 2009 |
Secure search on encrypted data via multi-ring sketch A Akavia, D Feldman, H Shaul Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 29 | 2018 |
Distributed public key schemes secure against continual leakage A Akavia, S Goldwasser, C Hazay Proceedings of the 2012 ACM symposium on Principles of distributed computing …, 2012 | 28 | 2012 |
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free A Akavia, C Gentry, S Halevi, M Leibovich Proceedings on Privacy Enhancing Technologies 3, 87-107, 2019 | 27 | 2019 |
Topology-hiding computation on all graphs A Akavia, R LaVigne, T Moran Journal of Cryptology 33 (1), 176-227, 2020 | 26 | 2020 |
Deterministic sparse Fourier approximation via approximating arithmetic progressions A Akavia IEEE Transactions on Information Theory 60 (3), 1733-1741, 2013 | 24 | 2013 |
Topology-hiding computation beyond logarithmic diameter A Akavia, T Moran Annual International Conference on the Theory and Applications of …, 2017 | 23 | 2017 |
Learning noisy characters, multiplication codes, and cryptographic hardcore predicates A Akavia Massachusetts Institute of Technology, 2008 | 19 | 2008 |
Privacy-preserving decision trees training and prediction A Akavia, M Leibovich, YS Resheff, R Ron, M Shahar, M Vald ACM Transactions on Privacy and Security 25 (3), 1-30, 2022 | 18* | 2022 |
Cross Chain Atomic Swaps in the Absence of Time via Attribute Verifiable Timed Commitments Y Manevich, A Akavia 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 606-625, 2022 | 17 | 2022 |
Secure search on encrypted data via multi-ring sketch A Akavia, D Feldman, H Shaul Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 16* | 2018 |
Erratum for: On basing one-way functions on NP-hardness A Akavia, O Goldreich, S Goldwasser, D Moshkovitz Proceedings of the forty-second ACM symposium on Theory of computing, 795-796, 2010 | 15 | 2010 |