Name
Affiliation
Papers
ILAN KOMARGODSKI
Weizmann Institute of Science, Rehovot, Israel
46
Collaborators
Citations 
PageRank 
48
113
17.69
Referers 
Referees 
References 
177
445
603
Search Limit
100445
Title
Citations
PageRank
Year
Non-malleable Time-Lock Puzzles and Applications00.342021
A Logarithmic Lower Bound For Oblivious Ram (For All Parameters)00.342021
Oblivious Ram With Worst-Case Logarithmic Overhead00.342021
Non-Malleable Codes For Bounded Parallel-Time Tampering00.342021
From Minicrypt to Obfustopia via Private-Key Functional Encryption100.502020
Instance Complexity and Unlabeled Certificates in the Decision Tree Model.00.342020
Threshold Secret Sharing Requires a Linear-Size Alphabet00.342020
Oblivious Parallel Tight Compaction.00.342020
On Perfect Correctness without Derandomization.00.342019
Hardness-Preserving Reductions via Cuckoo Hashing00.342019
Impossibility of Strong KDM Security with Auxiliary Input.00.342019
Distributional Collision Resistance Beyond One-Way Functions.00.342019
Continuous Verifiable Delay Functions.00.342019
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing00.342019
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge00.342019
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions.60.422018
A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols.00.342018
OptORAMa: Optimal Oblivious RAM.10.362018
Cutting-Edge Cryptography Through the Lens of Secret Sharing.40.392018
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions.10.352018
On Distributional Collision Resistant Hashing.10.352018
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation.10.372018
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.100.552018
On the Complexity of Compressing Obfuscation.00.342018
Communication with Contextual Uncertainty10.362018
Non-Interactive Multiparty Computation Without Correlated Randomness.20.372017
Improved Average-Case Lower Bounds for De Morgan Formula Size: Matching Worst-Case Lower Bound.10.352017
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation).10.342017
Evolving Secret Sharing: Dynamic Thresholds and Robustness.10.372017
Be Adaptive, Avoid Overcommitting.10.352017
Threshold Secret Sharing Requires a Linear Size Alphabet.60.472016
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting.10.342016
How to Share a Secret, Infinitely.10.372016
Compressing Communication in Distributed Protocols.00.342015
Negation-Limited Formulas.00.342015
From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.110.512015
Communication with Contextual Uncertainty.00.342015
Modern Cryptography Through the Lens of Secret Sharing.00.342015
Secret-Sharing for NP from Indistinguishability Obfuscation.20.422014
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.50.432014
Secret-Sharing for NP.20.372014
Strong Locally Testable Codes with Relaxed Local Decoders.20.362014
Improved Average-Case Lower Bounds for DeMorgan Formula Size220.772013
Hardness preserving reductions via cuckoo hashing50.392012
Average-case lower bounds for formula size150.732012
The Spectrum of Small DeMorgan Formulas.00.342012