Name
Affiliation
Papers
EYLON YOGEV
Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
30
Collaborators
Citations 
PageRank 
27
54
11.30
Referers 
Referees 
References 
147
401
355
Search Limit
100401
Title
Citations
PageRank
Year
A Framework for Adversarially Robust Streaming Algorithms00.342022
A Framework for Adversarially Robust Streaming Algorithms00.342021
On Exponential-Time Hypotheses, Derandomization, and Circuit Lower Bounds: Extended Abstract00.342020
A Framework for Adversarially Robust Streaming Algorithms20.382020
Parallel Balanced Allocations: The Heavily Loaded Case.10.352019
Secure Distributed Computing Made (Nearly) Optimal00.342019
Optimal Short Cycle Decomposition in Almost Linear Time.00.342019
Distributional Collision Resistance Beyond One-Way Functions.00.342019
Distributed Algorithms Made Secure - A Graph Theoretic Approach.00.342019
The Adversarial Robustness of Sampling20.652019
CB2CF: a neural multiview content-to-collaborative filtering model for completely cold item recommendations60.392019
Low Congestion Cycle Covers and their Applications.00.342019
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing00.342019
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions.60.422018
The Power of Distributed Verifiers in Interactive Proofs.10.352018
On Distributional Collision Resistant Hashing.10.352018
Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation.10.372018
Congested Clique Algorithms for Graph Spanners.10.352018
Non-Interactive Multiparty Computation Without Correlated Randomness.20.372017
The Journey from NP to TFNP Hardness.10.352017
Hardness of Continuous Local Search: Query Complexity and Cryptographic Lower Bounds.40.392017
Distributed Computing Made Secure: A New Cycle Cover Theorem.00.342017
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.50.402016
How to Share a Secret, Infinitely.10.372016
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.70.422016
Tight Bounds for Sliding Bloom Filters30.382015
Secret-Sharing for NP from Indistinguishability Obfuscation.20.422014
Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.50.432014
Secret-Sharing for NP.20.372014
Sliding Bloom Filters10.412013