Name
Affiliation
Papers
OMER PANETH
Tel Aviv University, Israel and Boston University
39
Collaborators
Citations 
PageRank 
36
535
22.42
Referers 
Referees 
References 
533
422
777
Search Limit
100533
Title
Citations
PageRank
Year
Incrementally Verifiable Computation via Rate-1 Batch Arguments.00.342022
Succinct Non-Interactive Arguments via Linear Interactive Proofs00.342022
PPAD is as Hard as LWE and Iterated Squaring.00.342022
Reusable Fuzzy Extractors For Low-Entropy Distributions10.352021
Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.00.342020
On Round Optimal Statistical Zero Knowledge Arguments.00.342019
Incrementally Verifiable Computation via Incremental PCPs.00.342019
How to Delegate Computations Publicly.00.342019
On Publicly Verifiable Delegation From Standard Assumptions.00.342018
On Removing Graded Encodings from Functional Encryption.30.362017
Multi-Collision Resistance: A Paradigm for Keyless Hash Functions.80.422017
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-interactive Arguments.10.352017
3-Message Zero Knowledge Against Human Ignorance.40.382016
Time-Lock Puzzles From Randomized Encodings240.862016
Delegating RAM Computations.10.352016
Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation.80.442016
On the Equivalence of Obfuscation and Multilinear Maps.70.442015
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation.60.412015
On Obfuscation with Random Oracles.140.512015
Perfect Structure on the Edge of Chaos.180.542015
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation.270.682014
On the existence of extractable one-way functions350.842014
Key Derivation From Noisy Sources With More Errors Than Entropy.30.372014
On the Cryptographic Hardness of Finding a Nash Equilibrium.270.662014
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.00.342014
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.250.822014
Publicly Verifiable Non-Interactive Arguments for Delegating Computation.60.402014
On Virtual Grey Box Obfuscation for General Circuits.100.552014
On the Achievability of Simulation-Based Security for Functional Encryption.461.232013
How To Construct Extractable One-Way Functions Against Uniform Adversaries.20.372013
Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs.10.352013
Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall.130.572013
Succinct non-interactive arguments via linear interactive proofs691.722013
Public-Coin concurrent zero-knowledge in the global hash model160.532013
Obfuscation for Evasive Functions.100.522013
Protecting Obfuscation Against Algebraic Attacks.1192.862013
On the impossibility of approximate obfuscation and applications to resettable cryptography250.712013
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input.60.472013
Point obfuscation and 3-round zero-knowledge00.342011