Name
Affiliation
Papers
TAL MORAN
Interdisciplinary Center (IDC), Herzliya, Israel
36
Collaborators
Citations 
PageRank 
58
439
25.36
Referers 
Referees 
References 
750
561
564
Search Limit
100750
Title
Citations
PageRank
Year
Companionship Is Not a Function: The Effect of a Novel Robotic Object on Healthy Older Adults' Feelings of "Being-Seen"30.402020
Topology-Hiding Computation on All Graphs.00.342020
Simple Proofs of Space-Time and Rational Proofs of Storage.00.342019
Topology-Hiding Computation for Networks with Unknown Delays.00.342019
Robust MPC: Asynchronous Responsiveness yet Synchronous Security.00.342019
Topology-Hiding Computation Beyond Semi-Honest Adversaries00.342018
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds.00.342018
Exploring the Boundaries of Topology-Hiding Computation.20.382018
Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies.10.382017
Topology-Hiding Computation Beyond Logarithmic Diameter.40.412017
Proofs of Space-Time and Rational Proofs of Storage.30.552016
How to Use Bitcoin to Play Decentralized Poker270.902015
One-Way Functions and (Im)Perfect Obfuscation280.892014
Topology-Hiding Computation.70.482014
Truthful Mechanisms for Agents that Value Privacy261.612013
Publicly verifiable proofs of sequential work40.432013
There is no Indistinguishability Obfuscation in Pessiland.80.662013
Review of Surveillance or Security? by Susan Landau00.342013
Counterexamples to hardness amplification beyond negligible40.392012
A mix-net from any CCA2 secure cryptosystem100.492012
Time-lock puzzles in the random oracle model130.842011
Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model.40.652011
On complete primitives for fairness130.682010
The phish-market protocol: securely sharing attack data between competitors30.492010
Split-ballot voting: Everlasting privacy with distributed trust461.472010
The Phish-Market Protocol: Secure Sharing Between Competitors40.442010
Attacking paper-based e2e voting systems50.432010
Basing cryptographic protocols on tamper-evident seals170.882010
Shuffle-sum: coercion-resistant verifiable tallying for STV voting160.932009
Non-interactive Timestamping in the Bounded-Storage Model60.532009
An Optimally Fair Coin Toss160.832009
David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware451.302008
Deterministic history-independent strategies for storing information on write-once memories80.492007
Polling with physical envelopes: a rigorous analysis of a human-centric protocol221.562006
Receipt-free universally-verifiable voting with everlasting privacy822.802006
Non-interactive Timestamping in the Bounded Storage Model120.722004