Name
Affiliation
Papers
RON D. ROTHBLUM
Weizmann Institute, Rehovot, Israel
29
Collaborators
Citations 
PageRank 
34
132
12.48
Referers 
Referees 
References 
210
393
442
Search Limit
100393
Title
Citations
PageRank
Year
Statistical Difference Beyond the Polarizing Regime.00.342019
On the (In)security of Kilian-Based SNARGs.00.342019
Fiat-Shamir: from practice to theory00.342019
Zero-Knowledge Proofs of Proximity.00.342018
Efficient Batch Verification for UP.00.342018
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption.50.432018
An Exponential Separation Between Ma And Am Proofs Of Proximity00.342018
Fiat-Shamir From Simpler Assumptions.00.342018
Towards Non-Interactive Zero-Knowledge for NP from LWE.10.342018
From Laconic Zero-Knowledge to Public-Key Cryptography.00.342018
From Laconic Zero-Knowledge to Public-Key Cryptography - Extended Abstract.00.342018
Multi-Collision Resistant Hash Functions and Their Applications.50.392018
Relaxed Locally Correctable Codes20.372018
Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs.00.342018
Distinguisher-Dependent Simulation in Two Rounds and its Applications.80.452017
From Obfuscation to the Security of Fiat-Shamir for Proofs.80.432017
A Hierarchy Theorem for Interactive Proofs of Proximity.20.362017
Multi Collision Resistant Hash Functions and their Applications.00.342017
Spooky Encryption and its Applications.150.572016
Constant-Round Interactive Proofs for Delegating Computation.240.652016
Arguments Of Proximity [Extended Abstract]30.372015
Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs - (Extended Abstract).20.362015
Pseudorandom Graphs in Data Structures.20.362014
Fast Pseudorandomness for Independence and Load Balancing - (Extended Abstract).00.342014
Efficient Multiparty Protocols via Log-Depth Threshold Formulae.40.392013
Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract).50.432013
Delegation for bounded space60.622013
Non-Interactive Proofs of Proximity100.542013
On the circular security of bit-encryption301.362012